cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2021-3337
2021-01-28T20:15:13.307
The Hide-Thread-Content plugin through 2021-01-27 for MyBB allows remote attackers to bypass intended content-reading restrictions by clicking on reply or quote in the postbit.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/161185/MyBB-Hide-Thread-Content-1.0-Information-Disclosure.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hide_thread_content_project:hide_thread_content:1.0:*:*:*:*:mybb:*:*", "matchCriteriaId": "A378E2BC-F30C-4F34-BD60-B26EF403A1F4", "versionEndExcluding": null, "versionEndIncluding": null...
[ "863" ]
863
https://github.com/snlbaral/Hide-Thread-Content/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "snlbaral", "Hide-Thread-Content" ]
Hidden thread content is able to be viewed without replying by using the _reply_ or _quote_ button located in the postbit. By clicking either two buttons you can view the thread content in the `[quote]` brackets without having to actually reply. Example: ![example](https://user-images.githubusercontent.com/3361237...
Hidden content visible without replying
https://api.github.com/repos/snlbaral/Hide-Thread-Content/issues/1/comments
4
2021-01-27T22:34:32Z
2024-10-19T18:25:08Z
https://github.com/snlbaral/Hide-Thread-Content/issues/1
795,497,859
1
1,670
CVE-2021-23330
2021-02-01T15:15:13.450
All versions of package launchpad are vulnerable to Command Injection via stop.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://github.com/bitovi/launchpad/issues/123%23issuecomment-732188118" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bitovi:launchpad:0.1.0:*:*:*:*:node.js:*:*", "matchCriteriaId": "9D41E148-9F2D-4718-A249-7FD69F0F9C5A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "78" ]
78
https://github.com/bitovi/launchpad/issues/123%23issuecomment-732188118
[ "Third Party Advisory" ]
github.com
[ "bitovi", "launchpad" ]
This issue has been generated on-behalf of Mik317 (https://huntr.dev/app/users/Mik317) # Overview [launchpad](https://www.npmjs.com/package/launchpad) allows you to launch browsers! With NodeJS! The issue occurs because a `user input` is formatted inside a `command` that will be executed without any check. # Bug...
Security Notice & Bug Bounty - Remote Code Execution - huntr.dev
https://api.github.com/repos/bitovi/launchpad/issues/123/comments
3
2020-06-19T16:59:31Z
2022-06-21T22:08:56Z
https://github.com/bitovi/launchpad/issues/123
642,110,560
123
1,671
CVE-2020-20294
2021-02-01T18:15:13.060
An issue was found in CMSWing project version 1.3.8. Because the log function does not check the log parameter, malicious parameters can execute arbitrary commands.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/arterli/CmsWing/issues/49" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cmswing:cmswing:1.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "8F12313E-0A52-4EFB-AEAA-74EAFEF8901B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "89" ]
89
https://github.com/arterli/CmsWing/issues/49
[ "Exploit", "Third Party Advisory" ]
github.com
[ "arterli", "CmsWing" ]
Find a code execution vulnerability in cmswing project version 1.3.8,Details can be found in the analysis below. The vulnerability lies in the `log` function in the `cmswing/src/mode/action.js` ``` async log(action, model, record_id, user_id, ip, url) { // action=action||null,model=model||null,record_id=rec...
Vulnerability Report: cmswing 1.3.8 code execution
https://api.github.com/repos/arterli/CmsWing/issues/49/comments
1
2019-10-10T03:26:21Z
2019-11-07T08:19:45Z
https://github.com/arterli/CmsWing/issues/49
505,009,818
49
1,672
CVE-2020-20295
2021-02-01T18:15:13.123
An issue was found in CMSWing project version 1.3.8. Because the updateAction function does not check the detail parameter, malicious parameters can execute arbitrary SQL commands.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/arterli/CmsWing/issues/50" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cmswing:cmswing:1.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "8F12313E-0A52-4EFB-AEAA-74EAFEF8901B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "89" ]
89
https://github.com/arterli/CmsWing/issues/50
[ "Exploit", "Third Party Advisory" ]
github.com
[ "arterli", "CmsWing" ]
Find a code execution vulnerability in cmswing project version 1.3.8,Details can be found in the analysis below. **Vulnerability Location** The vulnerability lies in the `updateAction` function in the `cmswing/src/controller/admin/action.js` ``` async updateAction() { const data = this.post(); if ...
Vulnerability Report: cmswing 1.3.8 updateAction sql injection
https://api.github.com/repos/arterli/CmsWing/issues/50/comments
1
2019-10-10T03:56:23Z
2019-10-10T03:58:31Z
https://github.com/arterli/CmsWing/issues/50
505,017,656
50
1,673
CVE-2020-20296
2021-02-01T18:15:13.203
An issue was found in CMSWing project version 1.3.8, Because the rechargeAction function does not check the balance parameter, malicious parameters can execute arbitrary SQL commands.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/arterli/CmsWing/issues/51" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cmswing:cmswing:1.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "8F12313E-0A52-4EFB-AEAA-74EAFEF8901B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "89" ]
89
https://github.com/arterli/CmsWing/issues/51
[ "Exploit", "Third Party Advisory" ]
github.com
[ "arterli", "CmsWing" ]
Find a code execution vulnerability in cmswing project version 1.3.8,Details can be found in the analysis below. **Vulnerability Location** The vulnerability lies in the `rechargeAction` function in the `cmswing/src/controller/admin/user.js` ``` async rechargeAction() { if (this.isAjax('POST')) { ...
Vulnerability Report: cmswing 1.3.8 user recharge sql injection
https://api.github.com/repos/arterli/CmsWing/issues/51/comments
0
2019-10-10T04:00:45Z
2019-10-10T04:00:45Z
https://github.com/arterli/CmsWing/issues/51
505,018,744
51
1,674
CVE-2020-21179
2021-02-01T18:15:13.327
Sql injection vulnerability in koa2-blog 1.0.0 allows remote attackers to Injecting a malicious SQL statement via the name parameter to the signin page.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wclimb/Koa2-blog/issues/40" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:koa2-blog_project:koa2-blog:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "43A986EE-B5A7-4972-9AEC-4E04F5DAA875", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ "89" ]
89
https://github.com/wclimb/Koa2-blog/issues/40
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wclimb", "Koa2-blog" ]
A sql injection was discovered in koa2-blog 1.0.0 .There is a sql injection vulnerability which allows remote attackers to Injecting a malicious SQL statement into a server via: `post http://127.0.0.1:3000/signin` Vulnerability code ``` // 通过名字查找用户 exports.findDataByName = ( name ) => { let _sql = `select *...
koa2-blog v1.0.0 sql injection vulnerability
https://api.github.com/repos/wunci/Koa2-blog/issues/40/comments
0
2019-11-28T07:35:07Z
2019-11-30T09:03:38Z
https://github.com/wunci/Koa2-blog/issues/40
529,741,727
40
1,675
CVE-2020-21180
2021-02-01T18:15:13.390
Sql injection vulnerability in koa2-blog 1.0.0 allows remote attackers to Injecting a malicious SQL statement via the name parameter to the signup page.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wclimb/Koa2-blog/issues/41" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:koa2-blog_project:koa2-blog:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "43A986EE-B5A7-4972-9AEC-4E04F5DAA875", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ "89" ]
89
https://github.com/wclimb/Koa2-blog/issues/41
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wclimb", "Koa2-blog" ]
A sql injection was discovered in koa2-blog 1.0.0 .There is a sql injection vulnerability which allows remote attackers to Injecting a malicious SQL statement into a server via: `post http://127.0.0.1:3000/signup` Vulnerability code ``` // 通过名字查找用户数量判断是否已经存在 exports.findDataCountByName = ( name ) => { let _...
koa2-blog v1.0.0 sql injection vulnerability
https://api.github.com/repos/wunci/Koa2-blog/issues/41/comments
0
2019-11-28T07:53:03Z
2019-11-30T09:04:06Z
https://github.com/wunci/Koa2-blog/issues/41
529,748,271
41
1,676
CVE-2021-20199
2021-02-02T19:15:14.000
Rootless containers run with Podman, receive all traffic with a source IP address of 127.0.0.1 (including from remote hosts). This impacts containerized applications that trust localhost (127.0.01) connections by default and do not require authentication. This issue affects Podman 1.8.0 onwards.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919050" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://githu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:podman_project:podman:*:*:*:*:*:*:*:*", "matchCriteriaId": "3720247B-439B-4853-9312-87AFBB4B763D", "versionEndExcluding": "3.0.0", "versionEndIncluding": null, "versionStartE...
[ "346" ]
346
https://github.com/containers/podman/issues/5138
[ "Exploit", "Third Party Advisory" ]
github.com
[ "containers", "podman" ]
/kind bug **Description** For a rootless container the source IP of incoming packets on a publish port is always `127.0.0.1`. Even if the request is made from an external host. **Steps to reproduce the issue:** 1. Start a NGINX container: ``` machine-1$ podman run -p 8888:80 docker.io/library/nginx:late...
Source IP always 127.0.0.1 in rootless Podman 1.8.0
https://api.github.com/repos/containers/podman/issues/5138/comments
25
2020-02-09T22:06:10Z
2023-09-22T10:31:42Z
https://github.com/containers/podman/issues/5138
562,247,505
5,138
1,677
CVE-2020-18737
2021-02-05T16:15:12.430
An issue was discovered in Typora 0.9.67. There is an XSS vulnerability that causes Remote Code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/typora/typora-issues/issues/2289" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Th...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:typora:typora:0.9.67:-:*:*:*:*:*:*", "matchCriteriaId": "A33C7DD4-B303-4247-A3B5-D54B5C767089", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "79" ]
79
https://github.com/typora/typora-issues/issues/2289
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "typora", "typora-issues" ]
Tested On Windows 10 Version : 0.9.67 ![image](https://user-images.githubusercontent.com/35799367/54488371-1000be80-48dc-11e9-91cf-7a94b177ea4a.png) XSS: >&#96;&#96;&#96;mermaid graph LR id1["<iframe src=javascript:alert('xss')></iframe>"] &#96;&#96;&#96; ![image](https://user-images.githubuserconte...
Typora(v0.9.67) XSS to RCE
https://api.github.com/repos/typora/typora-issues/issues/2289/comments
1
2019-03-17T10:04:54Z
2019-03-21T02:40:40Z
https://github.com/typora/typora-issues/issues/2289
421,904,266
2,289
1,678
CVE-2021-26722
2021-02-05T18:15:12.690
LinkedIn Oncall through 1.4.0 allows reflected XSS via /query because of mishandling of the "No results found for" message in the search bar.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/linkedin/oncall/issues/341" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:linkedin:oncall:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCD66815-E6CB-43FE-8F10-F1F1ABEADCEE", "versionEndExcluding": null, "versionEndIncluding": "1.4.0", "versionStartExcludi...
[ "79" ]
79
https://github.com/linkedin/oncall/issues/341
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "linkedin", "oncall" ]
Hi! I've found a reflected cross-site scripting vulnerability in Oncall's search bar. I've reported this issue to the LinkedIn Information Security Response Center back in September 2020 but Oncall still seems vulnerable to this date. Therefore I decided to report it here. ### Reproduction 1. Navigate to `http...
[CVE-2021-26722] Reflected Cross-Site Scripting in search bar.
https://api.github.com/repos/linkedin/oncall/issues/341/comments
3
2021-02-05T11:56:10Z
2021-02-05T23:32:07Z
https://github.com/linkedin/oncall/issues/341
802,105,883
341
1,679
CVE-2020-18750
2021-02-05T19:15:11.917
Buffer overflow in pdf2json 0.69 allows local users to execute arbitrary code by converting a crafted PDF file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/commit/80bf71f16c804108fd933e267fe31692aaa509b4" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advis...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flowpaper:pdf2json:0.69:*:*:*:*:*:*:*", "matchCriteriaId": "2F7376EA-8894-4F38-9B0E-E74BD2639130", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "120" ]
120
https://github.com/flexpaper/pdf2json/issues/22
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "flexpaper", "pdf2json" ]
In CharCodeToUnicode.cc::264 !pst->getToken(tok3, sizeof(tok3), &n3) || //sizeof(tok3) == 256 here n3 can be a value from 0 to 256 - 2 In CharCodeToUnicode.cc::298 addMapping(code1, tok3 + 1, n3 - 2, i); In CharCodeToUnicode.cc::313 if (n <= 4) { if (sscanf(uStr, "%x", &u) != 1) { error(-1, "...
HEAP OVERFLOW VULNERABILITY
https://api.github.com/repos/flexpaper/pdf2json/issues/22/comments
4
2019-03-20T02:55:13Z
2019-03-23T07:08:58Z
https://github.com/flexpaper/pdf2json/issues/22
423,042,193
22
1,680
CVE-2021-26843
2021-02-07T21:15:11.790
An issue was discovered in sthttpd through 2.27.1. On systems where the strcpy function is implemented with memcpy, the de_dotdot function may cause a Denial-of-Service (daemon crash) due to overlapping memory ranges being passed to memcpy. This can triggered with an HTTP GET request for a crafted filename. NOTE: this ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/blueness/sthttpd/issues/14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sthttpd_project:sthttpd:*:*:*:*:*:*:*:*", "matchCriteriaId": "A20AC738-9C0B-480E-8C76-37DB8BC6A098", "versionEndExcluding": null, "versionEndIncluding": "2.27.1", "versionSta...
[ "119" ]
119
https://github.com/blueness/sthttpd/issues/14
[ "Exploit", "Third Party Advisory" ]
github.com
[ "blueness", "sthttpd" ]
When building sthttpd with ASAN (`-fsanitize=address`) I noticed a number of crashes with trivial requests such as the following: ``` GET //../HTTP/1.1\r\n\r\n ``` The problem is most visible on systems where `strcpy` is implemented using `memcpy` (e.g. GLIBC and macOS), here we end up with `memcpy` on overlapp...
Potential memory corruption/crash due to overlapping strcpy arguments
https://api.github.com/repos/blueness/sthttpd/issues/14/comments
1
2021-01-26T20:14:02Z
2021-02-08T08:40:46Z
https://github.com/blueness/sthttpd/issues/14
794,529,041
14
1,682
CVE-2020-35700
2021-02-08T09:15:12.463
A second-order SQL injection issue in Widgets/TopDevicesController.php (aka the Top Devices dashboard widget) of LibreNMS before 21.1.0 allows remote authenticated attackers to execute arbitrary SQL commands via the sort_order parameter against the /ajax/form/widget-settings endpoint.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/librenms/librenms/blob/master/app/Http/Controllers/Widgets/TopDevicesController.php" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FF7D7E0-76F6-43EE-B8D7-C22D68D9FD4A", "versionEndExcluding": "21.1.0", "versionEndIncluding": null, "versionStartExcl...
[ "89" ]
89
https://github.com/librenms/librenms/issues/12405
[ "Third Party Advisory" ]
github.com
[ "librenms", "librenms" ]
Hi, can I please get a point of contact to report a security issue? The email address team@librenms.org is bouncing. Thanks!
security issue
https://api.github.com/repos/librenms/librenms/issues/12405/comments
0
2020-12-22T14:03:39Z
2021-01-07T11:44:28Z
https://github.com/librenms/librenms/issues/12405
772,970,476
12,405
1,683
CVE-2020-16629
2021-02-08T15:15:12.037
PhpOK 5.4.137 contains a SQL injection vulnerability that can inject an attachment data through SQL, and then call the attachment replacement function through api.php to write a PHP file to the target path.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Gh0stF/phpok_cve/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpok:phpok:5.4.137:*:*:*:*:*:*:*", "matchCriteriaId": "E367CCE4-12E3-47DC-B5A8-EDBB52E489F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "89" ]
89
https://github.com/Gh0stF/phpok_cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Gh0stF", "phpok_cve" ]
Problem location: Here is the injection point framework / API / upload_control.php:67. The main operation is to save the file upload information to the database. $upload = $this->lib('upload')->upload('upfile'); if (!$upload || !$upload['status']) { $this - > JSON (p_lang ('attachment upload failed '); ...
phpokcms Sqli To Getshell
https://api.github.com/repos/Gh0stF/phpok_cve/issues/1/comments
0
2020-02-06T05:33:40Z
2020-02-06T05:33:40Z
https://github.com/Gh0stF/phpok_cve/issues/1
560,789,961
1
1,684
CVE-2021-25834
2021-02-08T18:15:13.740
Cosmos Network Ethermint <= v0.4.0 is affected by a transaction replay vulnerability in the EVM module. If the victim sends a very large nonce transaction, the attacker can replay the transaction through the application.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/cosmos/ethermint/issues/686" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/cosmos/ethermint/issues/686" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chainsafe:ethermint:*:*:*:*:*:*:*:*", "matchCriteriaId": "A35C91FB-4A33-4A25-8406-5F9143CF0828", "versionEndExcluding": null, "versionEndIncluding": "0.4.0", "versionStartExc...
[ "294" ]
294
https://github.com/cosmos/ethermint/issues/686
[ "Third Party Advisory" ]
github.com
[ "cosmos", "ethermint" ]
## Vulnerability Overview: Since there is no explicit +1 limit on the nonce check used by ethermint, this results in transactions passing the antehandler checksum as long as they are greater than the node’s cached nonce. If the victim sends a very large nonce transaction, the attacker can replay the transaction. ...
Weak noncecheck lead to replay of transactions
https://api.github.com/repos/cosmos/ethermint/issues/686/comments
2
2021-01-06T02:39:29Z
2021-02-22T05:39:56Z
https://github.com/cosmos/ethermint/issues/686
779,904,555
686
1,685
CVE-2021-25835
2021-02-08T18:15:13.803
Cosmos Network Ethermint <= v0.4.0 is affected by a cross-chain transaction replay vulnerability in the EVM module. Since ethermint uses the same chainIDEpoch and signature schemes with ethereum for compatibility, a verified signature in ethereum is still valid in ethermint with the same msg content and chainIDEpoch, w...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/cosmos/ethermint/issues/687" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/cosmos/ethermint/pull/692" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chainsafe:ethermint:*:*:*:*:*:*:*:*", "matchCriteriaId": "A35C91FB-4A33-4A25-8406-5F9143CF0828", "versionEndExcluding": null, "versionEndIncluding": "0.4.0", "versionStartExc...
[ "294" ]
294
https://github.com/cosmos/ethermint/issues/687
[ "Third Party Advisory" ]
github.com
[ "cosmos", "ethermint" ]
## Vulnerability Overview: Since ethermint uses the same type of chainIDEpoch for ethereum compatibility, a verified signature in ethereum is still valid in ethermint with the same msg content and chainIDEpoch, which enables "cross-chain transaction replay" attack etc. ## Details and Root Cause: First, we foun...
Replay Tx on another Chain
https://api.github.com/repos/cosmos/ethermint/issues/687/comments
2
2021-01-06T03:01:00Z
2021-04-17T00:03:01Z
https://github.com/cosmos/ethermint/issues/687
779,923,860
687
1,686
CVE-2020-24944
2021-02-08T21:15:13.007
picoquic (before 3rd of July 2020) allows attackers to cause a denial of service (infinite loop) via a crafted QUIC frame, related to the picoquic_decode_frames and picoquic_decode_stream_frame functions and epoch==3.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/private-octopus/picoquic/issues/969" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:privateoctopus:picoquic:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5AC7576-D03B-4558-A45C-5E31F89C4849", "versionEndExcluding": "2020-07-03", "versionEndIncluding": null, "versio...
[ "835" ]
835
https://github.com/private-octopus/picoquic/issues/969
[ "Exploit", "Third Party Advisory" ]
github.com
[ "private-octopus", "picoquic" ]
In picoquic QUIC server maliciously crafted QUIC frame triggers infinite loop while processing. Incorrect logical conditions in picoquic_decode_frames() and picoquic_decode_stream_frame() leads to infinite loop after processing single packet in epoch==3. Attack can be performed remotely without any user interacti...
Denial of Service vulnerability (infinite loop) while parsing malicious QUIC frame
https://api.github.com/repos/private-octopus/picoquic/issues/969/comments
2
2020-07-02T16:25:16Z
2020-07-03T01:33:27Z
https://github.com/private-octopus/picoquic/issues/969
650,060,583
969
1,687
CVE-2020-36148
2021-02-08T21:15:13.070
Incorrect handling of input data in verifyAttribute function in the libmysofa library 0.5 - 1.1 will lead to NULL pointer dereference and segmentation fault error in case of restrictive memory protection or near NULL pointer overwrite in case of no memory restrictions (e.g. in embedded environments).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hoene/libmysofa/issues/138" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.or...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symonics:libmysofa:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A54F39D-2695-46A2-98DF-7FCDF56A3EC2", "versionEndExcluding": null, "versionEndIncluding": "1.1", "versionStartExclud...
[ "476" ]
476
https://github.com/hoene/libmysofa/issues/138
[ "Exploit", "Third Party Advisory" ]
github.com
[ "hoene", "libmysofa" ]
Opening maliciously crafted file with mysofa_open leads to crash of the application. NULL pointer dereference in verifyAttribute (tools.c:26) on variable attr->value causes segmentation fault. Message from gdb: > Program received signal SIGSEGV, Segmentation fault. > __strcmp_sse2_unaligned () at ../sysdeps/x86_6...
NULL pointer dereference in verifyAttribute
https://api.github.com/repos/hoene/libmysofa/issues/138/comments
2
2020-08-26T16:00:48Z
2021-02-09T08:57:15Z
https://github.com/hoene/libmysofa/issues/138
686,437,740
138
1,688
CVE-2020-36149
2021-02-08T21:15:13.133
Incorrect handling of input data in changeAttribute function in the libmysofa library 0.5 - 1.1 will lead to NULL pointer dereference and segmentation fault error in case of restrictive memory protection or near NULL pointer overwrite in case of no memory restrictions (e.g. in embedded environments).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hoene/libmysofa/issues/137" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.or...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symonics:libmysofa:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A54F39D-2695-46A2-98DF-7FCDF56A3EC2", "versionEndExcluding": null, "versionEndIncluding": "1.1", "versionStartExclud...
[ "476" ]
476
https://github.com/hoene/libmysofa/issues/137
[ "Exploit", "Third Party Advisory" ]
github.com
[ "hoene", "libmysofa" ]
Opening maliciously crafted file with mysofa_open leads to crash of the application. NULL pointer dereference in changeAttribute (tools.c:37) on variable attr->value causes segmentation fault. Message from gdb: > Program received signal SIGSEGV, Segmentation fault. > __strcmp_sse2_unaligned () at ../sysdeps/x86_6...
NULL pointer dereference in changeAttribute
https://api.github.com/repos/hoene/libmysofa/issues/137/comments
2
2020-08-26T15:56:07Z
2021-02-09T08:57:17Z
https://github.com/hoene/libmysofa/issues/137
686,434,379
137
1,689
CVE-2020-36150
2021-02-08T21:15:13.180
Incorrect handling of input data in loudness function in the libmysofa library 0.5 - 1.1 will lead to heap buffer overflow and access to unallocated memory block.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/hoene/libmysofa/issues/135" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.f...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symonics:libmysofa:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A54F39D-2695-46A2-98DF-7FCDF56A3EC2", "versionEndExcluding": null, "versionEndIncluding": "1.1", "versionStartExclud...
[ "125" ]
125
https://github.com/hoene/libmysofa/issues/135
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "hoene", "libmysofa" ]
Opening maliciously crafted file with mysofa_open leads to crash of the application. Heap buffer overread by 126976 bytes in loudness() (libmysofa/src/hrtf/tools.c:179) cause segmentation fault. Message from gdb: > Program received signal SIGSEGV, Segmentation fault. > 0x000000000040fcdc in loudness (in=0x65200...
Heap buffer overflow in loudness
https://api.github.com/repos/hoene/libmysofa/issues/135/comments
2
2020-08-26T13:10:12Z
2021-02-09T08:57:19Z
https://github.com/hoene/libmysofa/issues/135
686,307,539
135
1,690
CVE-2020-36151
2021-02-08T21:15:13.257
Incorrect handling of input data in mysofa_resampler_reset_mem function in the libmysofa library 0.5 - 1.1 will lead to heap buffer overflow and overwriting large memory block.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/hoene/libmysofa/issues/134" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.f...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symonics:libmysofa:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A54F39D-2695-46A2-98DF-7FCDF56A3EC2", "versionEndExcluding": null, "versionEndIncluding": "1.1", "versionStartExclud...
[ "787" ]
787
https://github.com/hoene/libmysofa/issues/134
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "hoene", "libmysofa" ]
Opening maliciously crafted file with mysofa_open leads to crash of the application. Heap buffer overflow is caused by zeroing memory block of size (-1 casted to unsigned) in mysofa_resampler_reset_mem (speex_resampler.c:798). AddressSanitizer report on crash: ==4759==ERROR: AddressSanitizer: heap-buffer-overflow ...
Heap buffer overflow in mysofa_resampler_reset_mem
https://api.github.com/repos/hoene/libmysofa/issues/134/comments
3
2020-08-25T18:42:17Z
2021-02-09T08:57:21Z
https://github.com/hoene/libmysofa/issues/134
685,705,800
134
1,691
CVE-2020-36152
2021-02-08T21:15:13.320
Buffer overflow in readDataVar in hdf/dataobject.c in Symonics libmysofa 0.5 - 1.1 allows attackers to execute arbitrary code via a crafted SOFA.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/hoene/libmysofa/issues/136" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.f...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symonics:libmysofa:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A54F39D-2695-46A2-98DF-7FCDF56A3EC2", "versionEndExcluding": null, "versionEndIncluding": "1.1", "versionStartExclud...
[ "120" ]
120
https://github.com/hoene/libmysofa/issues/136
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "hoene", "libmysofa" ]
Incorrect use of sprintf on a too small buffer leads to a stack buffer overflow by 4 bytes in dataobject.c:806. This can lead to overwriting the next variable on the stack and logic errors in the application or crash in case of strong stack protection. GDB stacktrace: #10 0x00000000004123ce in sprintf (__fmt=0x442...
Stack buffer overflow in readDataVar
https://api.github.com/repos/hoene/libmysofa/issues/136/comments
2
2020-08-26T15:33:36Z
2021-02-09T08:57:24Z
https://github.com/hoene/libmysofa/issues/136
686,418,384
136
1,692
CVE-2021-26528
2021-02-08T21:15:13.680
The mg_http_serve_file function in Cesanta Mongoose HTTP server 7.0 is vulnerable to remote OOB write attack via connection request after exhausting memory pool.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cesanta/mongoose/issues/1201" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://githu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mongoose:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "60B6E6E9-893D-4993-B8E4-906343FF7837", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "787" ]
787
https://github.com/cesanta/mongoose/issues/1201
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cesanta", "mongoose" ]
Mongoose HTTP server is vulnerable to remote OOB write attack via connection request after exhausting memory pool. Incorrect handling of the value returned by calloc may lead to: - NULL pointer dereference and segmentation fault error in case of restrictive memory protection, - near NULL pointer overwrite in case ...
Out-of-bounds write caused by incorrect error handling of calloc in mg_http_serve_file (mongoose.c:800)
https://api.github.com/repos/cesanta/mongoose/issues/1201/comments
1
2021-01-23T13:57:54Z
2021-01-26T12:17:56Z
https://github.com/cesanta/mongoose/issues/1201
792,565,056
1,201
1,693
CVE-2021-26529
2021-02-08T21:15:13.740
The mg_tls_init function in Cesanta Mongoose HTTPS server 7.0 and 6.7-6.18 (compiled with mbedTLS support) is vulnerable to remote OOB write attack via connection request after exhausting memory pool.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cesanta/mongoose/issues/1203" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://githu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mongoose:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B840E82-6F04-41CB-AF1C-50643326A123", "versionEndExcluding": null, "versionEndIncluding": "6.18", "versionStartExcludi...
[ "787" ]
787
https://github.com/cesanta/mongoose/issues/1203
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cesanta", "mongoose" ]
Mongoose HTTPS server (compiled with mbedTLS support) is vulnerable to remote OOB write attack via connection request after exhausting memory pool. Incorrect handling of the value returned by calloc in mg_tls_init may lead to: - out-of-bound write attempt and segmentation fault error in case of restrictive memory p...
Out-of-bounds write caused by incorrect error handling of calloc in mg_tls_init (mongoose.c:3297)
https://api.github.com/repos/cesanta/mongoose/issues/1203/comments
1
2021-01-23T17:58:50Z
2021-01-26T12:17:48Z
https://github.com/cesanta/mongoose/issues/1203
792,617,302
1,203
1,694
CVE-2021-26530
2021-02-08T21:15:13.803
The mg_tls_init function in Cesanta Mongoose HTTPS server 7.0 (compiled with OpenSSL support) is vulnerable to remote OOB write attack via connection request after exhausting memory pool.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cesanta/mongoose/issues/1204" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://githu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mongoose:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "60B6E6E9-893D-4993-B8E4-906343FF7837", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "787" ]
787
https://github.com/cesanta/mongoose/issues/1204
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cesanta", "mongoose" ]
Mongoose HTTPS server (compiled with OpenSSL support) is vulnerable to remote OOB write attack via connection request after exhausting memory pool. Incorrect handling of the value returned by calloc in mg_tls_init may lead to: - out-of-bound write attempt and segmentation fault error in case of restrictive memory p...
Out-of-bounds write caused by incorrect error handling of calloc in mg_tls_init (mongoose.c:3443)
https://api.github.com/repos/cesanta/mongoose/issues/1204/comments
1
2021-01-23T18:20:54Z
2021-01-26T12:17:41Z
https://github.com/cesanta/mongoose/issues/1204
792,621,378
1,204
1,695
CVE-2021-21306
2021-02-08T22:15:12.450
Marked is an open-source markdown parser and compiler (npm package "marked"). In marked from version 1.1.1 and before version 2.0.0, there is a Regular expression Denial of Service vulnerability. This vulnerability can affect anyone who runs user generated code through marked. This vulnerability is fixed in version 2.0...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/markedjs/marked/commit/7293251c438e3ee968970f7609f1a27f9007bccd" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ]...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:marked_project:marked:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "A9E51743-C978-477B-8B63-EEFC0C7EA788", "versionEndExcluding": "2.0.0", "versionEndIncluding": null, "version...
[ "400" ]
400
https://github.com/markedjs/marked/issues/1927
[ "Third Party Advisory" ]
github.com
[ "markedjs", "marked" ]
**Marked version:** 1.2.9 **Describe the bug** 3 or more groups of odd and even-numbered consecutive underscores followed by a character takes a very long time to convert. Example input: `_______________________________ ____________________ __________________________ a` If you click on the Marked Demo link below,...
Groups of consecutive underscores in a specific pattern hang/take a long time to convert
https://api.github.com/repos/markedjs/marked/issues/1927/comments
12
2021-02-05T01:36:23Z
2021-05-11T18:39:42Z
https://github.com/markedjs/marked/issues/1927
801,767,434
1,927
1,696
CVE-2021-26916
2021-02-08T22:15:12.873
In nopCommerce 4.30, a Reflected XSS issue in the Discount Coupon component allows remote attackers to inject arbitrary web script or HTML through the Filters/CheckDiscountCouponAttribute.cs discountcode parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nopSolutions/nopCommerce/issues/5322" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nopcommerce:nopcommerce:4.30:-:*:*:*:*:*:*", "matchCriteriaId": "36397DE8-5530-44AD-94C0-926A81A5933E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "79" ]
79
https://github.com/nopSolutions/nopCommerce/issues/5322
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nopSolutions", "nopCommerce" ]
The vulnerability is a reflected XSS in the discountcode URL parameter. If an invalid discount code is entered, the value is reflected directly in the response without HTML encoding. This was tested on Google Chrome, Firefox and Edge with a fresh install of nopCommerce. I have attached a screenshot of the PoC. The c...
XSS issue in the "discountcode" parameter
https://api.github.com/repos/nopSolutions/nopCommerce/issues/5322/comments
1
2021-02-08T06:57:44Z
2021-02-15T11:36:05Z
https://github.com/nopSolutions/nopCommerce/issues/5322
803,259,316
5,322
1,697
CVE-2020-22840
2021-02-09T14:15:14.903
Open redirect vulnerability in b2evolution CMS version prior to 6.11.6 allows an attacker to perform malicious open redirects to an attacker controlled resource via redirect_to parameter in email_passthrough.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/161362/b2evolution-CMS-6.11.6-Open-Redirection.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:b2evolution:b2evolution:*:*:*:*:*:*:*:*", "matchCriteriaId": "165A561F-3E58-44E9-9362-EB9F4DCD7C40", "versionEndExcluding": "6.11.6", "versionEndIncluding": null, "versionSta...
[ "601" ]
601
https://github.com/b2evolution/b2evolution/issues/102
[ "Third Party Advisory" ]
github.com
[ "b2evolution", "b2evolution" ]
Hi @fplanque, We have identified the following vulnerabilities in version 6.11.6-stable: - Open redirect - Multiple XSS Please check your mail for more information.
Multiple vulnerabilies in b2evolution version: 6.11.6-stable
https://api.github.com/repos/b2evolution/b2evolution/issues/102/comments
5
2020-04-27T13:48:14Z
2020-07-09T21:42:45Z
https://github.com/b2evolution/b2evolution/issues/102
607,565,832
102
1,698
CVE-2019-17582
2021-02-09T19:15:12.553
A use-after-free in the _zip_dirent_read function of zip_dirent.c in libzip 1.2.0 allows attackers to have an unspecified impact by attempting to unzip a malformed ZIP archive. NOTE: the discoverer states "This use-after-free is triggered prior to the double free reported in CVE-2017-12858."
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nih-at/libzip/commit/2217022b7d1142738656d891e00b3d2d9179b796" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/nih...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libzip:libzip:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CBAF9F0B-71F7-4A20-9BA6-DCFCF3EA9268", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "416" ]
416
https://github.com/nih-at/libzip/issues/5
[ "Third Party Advisory" ]
github.com
[ "nih-at", "libzip" ]
On 1.2.0: ``` # ziptool $FILE cat index ==1771==ERROR: AddressSanitizer: heap-use-after-free on address 0x6030000000d1 at pc 0x7f267d085fc1 bp 0x7ffed21f65f0 sp 0x7ffed21f65e8 READ of size 1 at 0x6030000000d1 thread T0 ...
use-after-free in _zip_buffer_free (zip_buffer.c)
https://api.github.com/repos/nih-at/libzip/issues/5/comments
2
2017-08-24T10:44:17Z
2017-09-01T13:51:10Z
https://github.com/nih-at/libzip/issues/5
252,561,553
5
1,699
CVE-2020-14343
2021-02-09T21:15:12.707
A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw....
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10, "confidentialityImpact": "COMPLETE"...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860466" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://github.com/SeldonIO/seldon-core/issues/2252" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pyyaml:pyyaml:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B49BB31-68E9-4F02-8D00-925418F7372C", "versionEndExcluding": "5.4", "versionEndIncluding": null, "versionStartExcluding":...
[ "20" ]
20
https://github.com/SeldonIO/seldon-core/issues/2252
null
github.com
[ "SeldonIO", "seldon-core" ]
Report [here](https://snyk.io/vuln/SNYK-PYTHON-PYYAML-590151) Redhat report [here](https://access.redhat.com/security/cve/cve-2020-14343) WIP in [pyaml project](https://github.com/yaml/pyyaml/issues/420)
Resolve CVE for PyYAML - CVE-2020-14343
https://api.github.com/repos/SeldonIO/seldon-core/issues/2252/comments
2
2020-08-07T07:51:11Z
2021-01-27T12:41:45Z
https://github.com/SeldonIO/seldon-core/issues/2252
674,833,414
2,252
1,700
CVE-2020-14343
2021-02-09T21:15:12.707
A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw....
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10, "confidentialityImpact": "COMPLETE"...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860466" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://github.com/SeldonIO/seldon-core/issues/2252" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pyyaml:pyyaml:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B49BB31-68E9-4F02-8D00-925418F7372C", "versionEndExcluding": "5.4", "versionEndIncluding": null, "versionStartExcluding":...
[ "20" ]
20
https://github.com/yaml/pyyaml/issues/420
null
github.com
[ "yaml", "pyyaml" ]
As of 5.3.1 .load() defaults to using FullLoader and FullLoader is still vulnerable to RCE when run on untrusted input. As demonstrated by the examples below, #386 was not enough to fix this issue. Some example payloads: ``` !!python/object/new:tuple - !!python/object/new:map - !!python/name:eval - [ "RCE...
.load() and FullLoader still vulnerable to fairly trivial RCE
https://api.github.com/repos/yaml/pyyaml/issues/420/comments
44
2020-07-22T08:18:35Z
2021-09-28T17:21:40Z
https://github.com/yaml/pyyaml/issues/420
663,569,505
420
1,701
CVE-2020-36244
2021-02-10T07:15:12.833
The daemon in GENIVI diagnostic log and trace (DLT), is vulnerable to a heap-based buffer overflow that could allow an attacker to remotely execute arbitrary code on the DLT-Daemon (versions prior to 2.18.6).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/GENIVI/dlt-daemon/compare/v2.18.5...v2.18.6" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GENIVI/dlt-daemon/iss...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:genivi:diagnostic_log_and_trace:*:*:*:*:*:*:*:*", "matchCriteriaId": "9F4D7936-540E-459D-940C-5C87706FB017", "versionEndExcluding": "2.18.6", "versionEndIncluding": null, "ve...
[ "787" ]
787
https://github.com/GENIVI/dlt-daemon/issues/265
[ "Third Party Advisory" ]
github.com
[ "GENIVI", "dlt-daemon" ]
Hello, I have fuzzed dlt-daemon to search for bugs using the Tool [CI-Fuzz](https://www.code-intelligence.com/). I think I found a write heap buffer overflow in the function dlt_buffer_write_block. You can find the full crash report below. This is from a fuzz test I wrote to execute the function dlt_buffer_push with...
write heap buffer overflow in dlt_buffer_write_block
https://api.github.com/repos/COVESA/dlt-daemon/issues/265/comments
11
2020-11-02T18:38:23Z
2023-05-19T03:36:10Z
https://github.com/COVESA/dlt-daemon/issues/265
734,733,134
265
1,702
CVE-2020-26299
2021-02-10T18:15:12.703
ftp-srv is an open-source FTP server designed to be simple yet configurable. In ftp-srv before version 4.4.0 there is a path-traversal vulnerability. Clients of FTP servers utilizing ftp-srv hosted on Windows machines can escape the FTP user's defined root folder using the expected FTP commands, for example, CWD and UP...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL"...
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/autovance/ftp-srv/commit/457b859450a37cba10ff3c431eb4aa67771122e3" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Patch", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ftp-srv_project:ftp-srv:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "AA72E811-17FD-45E1-AA69-CC4D4C677F45", "versionEndExcluding": "4.4.0", "versionEndIncluding": null, "versi...
[ "22" ]
22
https://github.com/autovance/ftp-srv/issues/167
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "autovance", "ftp-srv" ]
Windows, default File System, root directory set in login event callback. User can browse parent directory using /../../ in URL. Example: `root: 'X:\\Project\\Storage\\User'` URL `ftp://127.0.0.1/../../` becomes a command `CWD \/../../` At line 30 in fs.js we have `nodePath.resolve('X:\Project\Storage\User', '....
Windows: User can escape from root directory
https://api.github.com/repos/QuorumDMS/ftp-srv/issues/167/comments
20
2019-07-17T12:56:53Z
2021-11-30T19:50:33Z
https://github.com/QuorumDMS/ftp-srv/issues/167
469,177,567
167
1,703
CVE-2021-27186
2021-02-10T22:15:13.877
Fluent Bit 1.6.10 has a NULL pointer dereference when an flb_malloc return value is not validated by flb_avro.c or http_server/api/v1/metrics.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/fluent/fluent-bit/issues/3044" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/f...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:treasuredata:fluent_bit:1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "20744F77-02AC-4F07-A359-27275282DCE4", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "476" ]
476
https://github.com/fluent/fluent-bit/issues/3044
[ "Exploit", "Third Party Advisory" ]
github.com
[ "fluent", "fluent-bit" ]
## Bug Report **Describe the bug** <!--- A clear and concise description of what the bug is. --> NULL dereference (value returned by flb_malloc is not checked) after memory allocation error (flb_malloc is wrapper on malloc returning NULL on unsuccessful allocation). In most cases this issue will lead to crash via...
NULL dereference on memory allocation error (src/ flb_avro)
https://api.github.com/repos/fluent/fluent-bit/issues/3044/comments
3
2021-02-09T06:49:52Z
2021-02-11T07:43:43Z
https://github.com/fluent/fluent-bit/issues/3044
804,266,845
3,044
1,704
CVE-2021-27190
2021-02-12T03:15:12.883
A Stored Cross Site Scripting(XSS) Vulnerability was discovered in PEEL SHOPPING 9.3.0 and 9.4.0, which are publicly available. The user supplied input containing polyglot payload is echoed back in javascript code in HTML response. This allows an attacker to input malicious JavaScript which can steal cookie, redirect t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/advisto/peel-shopping/issues/4#issuecomment-953461611" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://githu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:peel:peel_shopping:9.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8F6162D3-7FE6-4A81-8092-C639AB059B9C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "79" ]
79
https://github.com/advisto/peel-shopping/issues/4#issuecomment-953461611
[ "Patch", "Third Party Advisory" ]
github.com
[ "advisto", "peel-shopping" ]
### [CVE-2021-27190](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27190) updated ## Vulnerability Stored Cross Site Scripting (XSS) in the "Address" field of "http://localhost/peelshopping_9_4_0/utilisateurs/change_params.php" ## Affects Peel Shopping 9.4.0 ## Description A Stored Cross Site Scri...
Stored Cross site Scripting in "‘Address’" parameter (Peel Shopping 9.4.0)
https://api.github.com/repos/advisto/peel-shopping/issues/4/comments
1
2021-10-26T04:08:24Z
2021-11-10T07:59:13Z
https://github.com/advisto/peel-shopping/issues/4
1,035,802,896
4
1,705
CVE-2020-35734
2021-02-15T21:15:13.263
Sruu.pl in Batflat 1.3.6 allows an authenticated user to perform code injection (and consequently Remote Code Execution) via the input fields of the Users tab. To exploit this, one must login to the administration panel and edit an arbitrary user's data (username, displayed name, etc.). NOTE: This vulnerability only af...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/161457/Batflat-CMS-1.3.6-Remote-Code-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "u...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:batflat:batflat:1.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "CCD502D1-2B27-4BC5-9DF2-C71F42212D85", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "94" ]
94
https://github.com/sruupl/batflat/issues/98
[ "Exploit", "Third Party Advisory" ]
github.com
[ "sruupl", "batflat" ]
Users tab attributes aren't sanitized and some of them allow for code injection. This means that an authenticated user with access to Users tab can execute arbitrary code on the web server with application privileges. Adding user with PHP code in "Displayed name" field: ![image](https://user-images.githubusercon...
Code injection vulnerability in Batflat v1.3.6 Users tab
https://api.github.com/repos/sruupl/batflat/issues/98/comments
2
2021-01-20T13:41:48Z
2021-07-31T14:09:14Z
https://github.com/sruupl/batflat/issues/98
789,989,295
98
1,706
CVE-2020-25340
2021-02-16T15:15:13.197
An issue was discovered in NFStream 5.2.0. Because some allocated modules are not correctly freed, if the nfstream object is directly destroyed without being used after it is created, it will cause a memory leak that may result in a local denial of service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ntop/nDPI/issues/994" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nt...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nfstream:nfstream:5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "7C90CF7E-24AF-4023-9092-6A6C4530CBB8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "401" ]
401
https://github.com/ntop/nDPI/issues/994
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ntop", "nDPI" ]
I am using `nfstream` to detect traffic, and the `dissect` option is turned on, which means that nfstream will use `nDPI` to complete this task. But I encountered a **memory leak** problem during use. Nfstream is developed based on the python language, memory leaks are rarely encountered, so I started to locate the cau...
Memory leak in ndpi_free_flow()
https://api.github.com/repos/ntop/nDPI/issues/994/comments
5
2020-08-26T08:51:21Z
2020-08-27T21:12:47Z
https://github.com/ntop/nDPI/issues/994
686,137,898
994
1,707
CVE-2020-36245
2021-02-17T22:15:12.633
GramAddict through 1.2.3 allows remote attackers to execute arbitrary code because of use of UIAutomator2 and ATX-Agent. The attacker must be able to reach TCP port 7912, e.g., by being on the same Wi-Fi network.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact":...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/GramAddict/bot/issues/134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gramaddict:gramaddict:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A4A6AB8-C6B0-45DA-9D04-BAFDB59259F7", "versionEndExcluding": null, "versionEndIncluding": "1.2.3", "versionStartE...
[ "306" ]
306
https://github.com/GramAddict/bot/issues/134
[ "Exploit", "Third Party Advisory" ]
github.com
[ "GramAddict", "bot" ]
I discovered something very concerning just now. When using [uiautomator2](https://github.com/openatx/uiautomator2), which is what GramAddict is based around, it silently installs the application [ATX-Agent](https://github.com/openatx/atx-agent) on your device, which opens a webserver on TCP port 7912, that lets any...
UIAutomator2 lets anyone on the network control/view your device!
https://api.github.com/repos/GramAddict/bot/issues/134/comments
18
2020-12-08T10:55:40Z
2021-03-19T15:51:07Z
https://github.com/GramAddict/bot/issues/134
759,345,639
134
1,708
CVE-2020-28496
2021-02-18T15:15:13.360
This affects the package three before 0.125.0. This can happen when handling rgb or hsl colors. PoC: var three = require('three') function build_blank (n) { var ret = "rgb(" for (var i = 0; i < n; i++) { ret += " " } return ret + ""; } var Color = three.Color var time = Date.now(); new Color(build_blank(50000)) var tim...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mrdoob/three.js/issues/21132" }, { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:three_project:three:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "A5487196-28D5-4BF5-B8A5-D3291128438F", "versionEndExcluding": "0.125.0", "versionEndIncluding": null, "version...
[ "400" ]
400
https://github.com/mrdoob/three.js/issues/21132
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "mrdoob", "three.js" ]
<!-- Ignoring this template may result in your bug report getting deleted --> Hi, I would like to report a Regular Expression Denial of Service (REDoS) vulnerability in three. It allows cause a denial of service when handling rgb or hsl colors. The vulnerable regex is located in https://github.com/mrdoob...
ReDoS in three
https://api.github.com/repos/mrdoob/three.js/issues/21132/comments
1
2021-01-23T10:11:12Z
2021-01-25T11:58:07Z
https://github.com/mrdoob/three.js/issues/21132
792,522,989
21,132
1,709
CVE-2020-28491
2021-02-18T16:15:13.207
This affects the package com.fasterxml.jackson.dataformat:jackson-dataformat-cbor from 0 and before 2.11.4, from 2.12.0-rc1 and before 2.12.1. Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-dataformats-binary/commit/de072d314af8f5f269c8abec6930652af67bc8e6" }, { "source": "report@snyk.io", "tags": [ "Issue Tracking", "Patch", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-dataformats-binary:*:*:*:*:*:*:*:*", "matchCriteriaId": "6621426E-1001-48B0-BEFD-F032AFC27526", "versionEndExcluding": "2.11.4", "versionEndIncluding": null, ...
[ "770" ]
770
https://github.com/FasterXML/jackson-dataformats-binary/issues/186
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-dataformats-binary" ]
CBORParser.java _finishBytes() accepts an unchecked field string length value discovered during parsing, and is used to allocated a buffer. A malicious payload can be fabricated to exploit this and (at least) cause a java.lang.OutOfMemoryError exception. ``` @SuppressWarnings("resource") protected byte[] _...
Eager allocation of byte buffer can cause `java.lang.OutOfMemoryError` exception (CVE-2020-28491)
https://api.github.com/repos/FasterXML/jackson-dataformats-binary/issues/186/comments
17
2019-10-17T01:59:37Z
2021-02-19T17:14:01Z
https://github.com/FasterXML/jackson-dataformats-binary/issues/186
508,187,241
186
1,710
CVE-2021-27329
2021-02-18T18:15:11.677
Friendica 2021.01 allows SSRF via parse_url?binurl= for DNS lookups or HTTP requests to arbitrary domain names.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10, "confidentialityImpact": "COMPLETE"...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/friendica/friendica/issues/9929" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:frendi:frendica:2021.01:*:*:*:*:*:*:*", "matchCriteriaId": "7E01771F-BE73-421C-BB99-0257000C0AB5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "918" ]
918
https://github.com/friendica/friendica/issues/9929
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "friendica", "friendica" ]
**Hello Friendica Team.** ### Issue detail I found a vulnerability issue while testing frendica locally. It is possible to induce the application to perform server-side DNS lookups of arbitrary domain names and HTTP request. ### Bug Description The ability to send requests to other systems can allow the vulner...
External service interaction (HTTP & DNS)
https://api.github.com/repos/friendica/friendica/issues/9929/comments
5
2021-02-14T03:31:00Z
2021-02-19T06:22:33Z
https://github.com/friendica/friendica/issues/9929
807,880,142
9,929
1,711
CVE-2019-25024
2021-02-19T04:15:12.160
OpenRepeater (ORP) before 2.2 allows unauthenticated command injection via shell metacharacters in the functions/ajax_system.php post_service parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10, "confidentialityImpact": "COMPLETE"...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/OpenRepeater/openrepeater/issues/66" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/codexlynx/CVE-2019-25024" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alleghenycreative:openrepeater:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6B59951-2604-493B-9D6C-FC3805305E0D", "versionEndExcluding": "2.2", "versionEndIncluding": null, "versio...
[ "78" ]
78
https://github.com/OpenRepeater/openrepeater/issues/66
[ "Exploit", "Third Party Advisory" ]
github.com
[ "OpenRepeater", "openrepeater" ]
An unauthenticated malicious actor can execute arbitrary system commands via "__functions/ajax_system.php__". This has a critical impact in the security of the system, for example * Download system database: > $ curl \<ADDRESS>/openrepeater/functions/ajax_system.php --data "post_service=;cat /var/lib/openrepeater/d...
Unauthenticated Command Injection Flaw
https://api.github.com/repos/OpenRepeater/openrepeater/issues/66/comments
2
2019-03-06T21:08:00Z
2020-12-07T03:16:14Z
https://github.com/OpenRepeater/openrepeater/issues/66
418,009,444
66
1,712
CVE-2021-3210
2021-02-19T14:15:12.573
components/Modals/HelpTexts/GenericAll/GenericAll.jsx in Bloodhound <= 4.0.1 allows remote attackers to execute arbitrary system commands when the victim imports a malicious data file containing JavaScript in the objectId parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPL...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/BloodHoundAD/BloodHound/blob/338e197dc4b7a1ee929c335141172ada5bc80800/src/components/Modals/HelpModal.jsx#L57" }, { "source": "cve@mitre.org", "tags": [ "Exploit", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bloodhound_project:bloodhound:*:*:*:*:*:*:*:*", "matchCriteriaId": "28AF6D85-0B1A-4E95-B434-622D024D82D2", "versionEndExcluding": null, "versionEndIncluding": "4.0.1", "versi...
[ "79" ]
79
https://github.com/BloodHoundAD/BloodHound/issues/338
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "BloodHoundAD", "BloodHound" ]
The **help text**-modal utilizes the React component attribute `dangerouslySetInnerHTML` when rendering the **Info**, **Abuse Info**, etc. texts. E.g. https://github.com/BloodHoundAD/BloodHound/blob/338e197dc4b7a1ee929c335141172ada5bc80800/src/components/Modals/HelpTexts/GenericAll/GenericAll.jsx#L31-L37 This makes ...
[Security] XSS in HelpModal leading to RCE via imported malicious data file
https://api.github.com/repos/SpecterOps/BloodHound-Legacy/issues/338/comments
4
2020-06-21T16:20:56Z
2022-08-03T16:14:30Z
https://github.com/SpecterOps/BloodHound-Legacy/issues/338
642,594,259
338
1,713
CVE-2021-26716
2021-02-21T06:15:12.257
Modules/input/Views/schedule.php in Emoncms through 10.2.7 allows XSS via the node parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/emoncms/emoncms/issues/1652" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openenergymonitor:emoncms:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CCCE00D-43E0-43B7-8BEE-D3AA3BA629D7", "versionEndExcluding": null, "versionEndIncluding": "10.2.7", "versionS...
[ "79" ]
79
https://github.com/emoncms/emoncms/issues/1652
[ "Exploit", "Third Party Advisory" ]
github.com
[ "emoncms", "emoncms" ]
Hi, I have found a XSS in vulnerability in: emoncms/Modules/input/Views/schedule.php using the parameter 'node' Proof of concept exploit: http://127.0.0.1:9000/Modules/input/Views/schedule.php?node=1%22;alert(1);var%20x=%22l
XSS Vulnerability
https://api.github.com/repos/emoncms/emoncms/issues/1652/comments
1
2021-01-27T20:28:35Z
2021-03-14T14:07:52Z
https://github.com/emoncms/emoncms/issues/1652
795,420,305
1,652
1,714
CVE-2021-27513
2021-02-22T00:15:12.310
The module admin_ITSM in EyesOfNetwork 5.3-10 allows remote authenticated users to upload arbitrary .xml.php files because it relies on "le filtre userside."
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ArianeBlow/exploit-eyesofnetwork5.3.10/blob/main/PoC-BruteForceID-arbitraty-file-upload-RCE-PrivEsc.py" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyesofnetwork:eyesofnetwork:5.3-10:*:*:*:*:*:*:*", "matchCriteriaId": "74EF3A57-69B9-4E5F-9E04-0273F5A011F3", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "434" ]
434
https://github.com/EyesOfNetworkCommunity/eonweb/issues/87
[ "Patch", "Third Party Advisory" ]
github.com
[ "EyesOfNetworkCommunity", "eonweb" ]
Bonjour, En testant la version 5.3-10, je me suis rendu compte qu'il était possible d'uploader n'importe quel type de file en bypassant le filtre userside dans le module admin_ITSM, j'ai pu ainsi uploader un shell PHP en le nomant machin.xml.php via interception et modification de la requête. Une demande d'enre...
Arbitrary file upload & RCE
https://api.github.com/repos/EyesOfNetworkCommunity/eonweb/issues/87/comments
6
2021-02-21T07:41:32Z
2021-03-18T10:11:05Z
https://github.com/EyesOfNetworkCommunity/eonweb/issues/87
812,796,100
87
1,715
CVE-2021-27368
2021-02-22T15:15:12.677
The Contact page in Monica 2.19.1 allows stored XSS via the First Name field.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/monicahq/monica/issues/4888" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://githu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:monicahq:monica:2.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "E3CE0D8A-8910-46A7-BE3C-E4F44C09042F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "79" ]
79
https://github.com/monicahq/monica/issues/4888
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "monicahq", "monica" ]
Hi there, I'm using the latest version of Monica PRM web application 2.19.1, deployed on my local Ubuntu machine. I would like to report to you the existing of Cross Site Scripting Vulnerability in the Contact Page. The following fields of the Contact object can be used to host a stored XSS ( First name, Middle nam...
Security Issue - XSS
https://api.github.com/repos/monicahq/monica/issues/4888/comments
3
2021-02-18T10:29:23Z
2022-05-02T00:05:09Z
https://github.com/monicahq/monica/issues/4888
810,967,891
4,888
1,716
CVE-2021-27568
2021-02-23T02:15:12.887
An issue was discovered in netplex json-smart-v1 through 2015-10-23 and json-smart-v2 through 2.4. An exception is thrown from a function, but it is not caught, as demonstrated by NumberFormatException. When it is not caught, it may cause programs using the library to crash or expose sensitive information.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/netplex/json-smart-v1/issues/7" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/netplex/json-sm...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:json-smart_project:json-smart-v1:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF4BCC9F-24C9-4BA3-84D2-F31A3B473F34", "versionEndExcluding": "1.3.2", "versionEndIncluding": null, "ve...
[ "754" ]
754
https://github.com/netplex/json-smart-v1/issues/7
[ "Exploit", "Third Party Advisory" ]
github.com
[ "netplex", "json-smart-v1" ]
The parser fails to throw the ParseException when the parser expects the input to be of the float number type AND the input not being a valid number. This can lead to uncaught exceptions by unexpected input, which may lead to Denial-of-Service (DoS). https://github.com/netplex/json-smart-v1/blob/51e1641ec53d3066c79f...
Uncaught Exception in Parser
https://api.github.com/repos/netplex/json-smart-v1/issues/7/comments
2
2021-02-22T21:10:21Z
2021-04-04T14:28:24Z
https://github.com/netplex/json-smart-v1/issues/7
813,866,347
7
1,717
CVE-2021-27568
2021-02-23T02:15:12.887
An issue was discovered in netplex json-smart-v1 through 2015-10-23 and json-smart-v2 through 2.4. An exception is thrown from a function, but it is not caught, as demonstrated by NumberFormatException. When it is not caught, it may cause programs using the library to crash or expose sensitive information.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/netplex/json-smart-v1/issues/7" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/netplex/json-sm...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:json-smart_project:json-smart-v1:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF4BCC9F-24C9-4BA3-84D2-F31A3B473F34", "versionEndExcluding": "1.3.2", "versionEndIncluding": null, "ve...
[ "754" ]
754
https://github.com/netplex/json-smart-v2/issues/60
[ "Exploit", "Third Party Advisory" ]
github.com
[ "netplex", "json-smart-v2" ]
The parser fails to throw the ParseException when the parser expects the input to be of the float number type AND the input not being a valid number. This can lead to uncaught exceptions by unexpected input, which may lead to Denial-of-Service (DoS). https://github.com/netplex/json-smart-v2/blob/4402bae12ada8009502b...
Uncaught Exception in Parser
https://api.github.com/repos/netplex/json-smart-v2/issues/60/comments
8
2021-02-22T21:44:52Z
2021-04-26T08:06:57Z
https://github.com/netplex/json-smart-v2/issues/60
813,889,987
60
1,718
CVE-2021-26926
2021-02-23T18:15:14.053
A flaw was found in jasper before 2.0.25. An out of bounds read issue was found in jp2_decode function whic may lead to disclosure of information or program crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/jasper-software/jasper/commit/41f214b121b837fa30d9ca5f2430212110f5cd9b" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jasper_project:jasper:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F4472E5-259B-44B7-AAC5-93765989D527", "versionEndExcluding": "2.0.25", "versionEndIncluding": null, "versionStart...
[ "125" ]
125
https://github.com/jasper-software/jasper/issues/264
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jasper-software", "jasper" ]
Hi, there's a heap-buffer-overflow vulnerability in function jp2_decode() , ( jp2_dec.c:280 ) poc: [poc.zip](https://github.com/jasper-software/jasper/files/5893235/poc.zip) please compile the Jasper with ASAN, and run the poc with `"./jasper -f ~/Desktop/poc.jp2 --output-format jpg"`. It seems because of the `at...
jp2_decode() heap-buffer-overflow vulnerability
https://api.github.com/repos/jasper-software/jasper/issues/264/comments
5
2021-01-29T10:33:49Z
2021-03-01T09:17:24Z
https://github.com/jasper-software/jasper/issues/264
796,768,912
264
1,719
CVE-2021-26927
2021-02-23T20:15:12.040
A flaw was found in jasper before 2.0.25. A null pointer dereference in jp2_decode in jp2_dec.c may lead to program crash and denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/jasper-software/jasper/commit/41f214b121b837fa30d9ca5f2430212110f5cd9b" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jasper_project:jasper:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F4472E5-259B-44B7-AAC5-93765989D527", "versionEndExcluding": "2.0.25", "versionEndIncluding": null, "versionStart...
[ "476" ]
476
https://github.com/jasper-software/jasper/issues/265
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jasper-software", "jasper" ]
Hi, There's a Null Pointer Access in `jp2_decode /home/dgh05t/fuzz/jasper-master/src/libjasper/jp2/jp2_dec.c:442` run the poc with `"./jasper -f ~/Desktop/poc2.jp2 --output-format jpg"` poc: [poc2.zip](https://github.com/jasper-software/jasper/files/5893286/poc2.zip)
jp2_decode() Null Pointer Access
https://api.github.com/repos/jasper-software/jasper/issues/265/comments
3
2021-01-29T10:42:37Z
2021-02-10T19:29:16Z
https://github.com/jasper-software/jasper/issues/265
796,774,807
265
1,720
CVE-2021-3405
2021-02-23T20:15:12.087
A flaw was found in libebml before 1.4.2. A heap overflow bug exists in the implementation of EbmlString::ReadData and EbmlUnicodeString::ReadData in libebml.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Matroska-Org/libebml/issues/74" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://lists.d...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:matroska:libebml:*:*:*:*:*:*:*:*", "matchCriteriaId": "A929FB51-F804-41A9-AF60-834ECB4352E8", "versionEndExcluding": "1.4.2", "versionEndIncluding": null, "versionStartExclud...
[ "787" ]
787
https://github.com/Matroska-Org/libebml/issues/74
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Matroska-Org", "libebml" ]
--[ 1. Summary An extremely exploitable heap overflow bug exists in the implementation of EbmlString::ReadData and EbmlUnicodeString::ReadData in libebml. This bug is reachable from the current stable release of vlc. --[ 2. Discussion The issue exists in the calculation of the required buffer size to store ...
Ebml[Unicode]String::ReadData heap overflow bug on 32bit builds
https://api.github.com/repos/Matroska-Org/libebml/issues/74/comments
4
2021-02-07T14:10:51Z
2021-02-18T12:17:15Z
https://github.com/Matroska-Org/libebml/issues/74
802,961,245
74
1,721
CVE-2021-21323
2021-02-23T23:15:13.317
Brave is an open source web browser with a focus on privacy and security. In Brave versions 1.17.73-1.20.103, the CNAME adblocking feature added in Brave 1.17.73 accidentally initiated DNS requests that bypassed the Brave Tor proxy. Users with adblocking enabled would leak DNS requests from Tor windows to their DNS pro...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/brave/brave-browser/issues/13527" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.co...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:brave:brave:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD17A757-9D61-4E54-849D-AD603B5001F3", "versionEndExcluding": null, "versionEndIncluding": "1.20.103", "versionStartExcludin...
[ "200" ]
200
https://github.com/brave/brave-browser/issues/13527
[ "Patch", "Third Party Advisory" ]
github.com
[ "brave", "brave-browser" ]
https://hackerone.com/reports/1077022 ~~related: #4257. it appears this was a known issue at least in the muon days. unclear if it was ever fixed in brave-core.~~ UPDATE: cause was cname adblocking, so this is a regression, not an earlier issue.
[hackerone] Tor DNS issue
https://api.github.com/repos/brave/brave-browser/issues/13527/comments
1
2021-01-12T23:53:28Z
2023-01-01T20:58:13Z
https://github.com/brave/brave-browser/issues/13527
784,678,328
13,527
1,722
CVE-2021-3410
2021-02-23T23:15:14.160
A flaw was found in libcaca v0.99.beta19. A buffer overflow issue in caca_resize function in libcaca/caca/canvas.c may lead to local execution of arbitrary code in the user context.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL",...
[ { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928437" }, { "source": "patrick@puiterwijk.org", "tags": [ "Third Party Advisory" ], "url": "https:/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libcaca_project:libcaca:0.99:beta19:*:*:*:*:*:*", "matchCriteriaId": "27B545C0-6311-4AD1-AC52-F9C86040A90B", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ "190" ]
190
https://github.com/cacalabs/libcaca/issues/52
[ "Third Party Advisory" ]
github.com
[ "cacalabs", "libcaca" ]
Following vulnerability has been reported to Red Hat issue tracker: https://bugzilla.redhat.com/show_bug.cgi?id=1928437
CVE-2021-3410
https://api.github.com/repos/cacalabs/libcaca/issues/52/comments
8
2021-02-14T02:07:08Z
2021-02-26T11:42:19Z
https://github.com/cacalabs/libcaca/issues/52
807,870,879
52
1,723
CVE-2021-3355
2021-02-24T15:15:13.933
A stored-self XSS exists in LightCMS v1.3.4, allowing an attacker to execute HTML or JavaScript code in a vulnerable Title field to /admin/SensitiveWords.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/161562/LightCMS-1.3.4-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lightcms_project:lightcms:1.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "F82513F0-C30D-4A33-9847-EF0EB278146E", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "79" ]
79
https://github.com/eddy8/LightCMS/issues/18
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "eddy8", "LightCMS" ]
### Description - There's no escape being done before printing out the value of `noun`、`verb`、`exclusive` in the SensitiveWords page. ### LightCMS version - v1.3.4 ### Steps to reproduce - - Navigate to http://lightcms.bituier.com/admin/login & Log in to the background with the account admin and password a...
Stored XSS in "exclusive" field - SensitiveWords
https://api.github.com/repos/eddy8/LightCMS/issues/18/comments
1
2021-01-26T06:15:44Z
2021-02-01T01:08:26Z
https://github.com/eddy8/LightCMS/issues/18
793,966,506
18
1,724
CVE-2020-27224
2021-02-24T17:15:15.500
In Eclipse Theia versions up to and including 1.2.0, the Markdown Preview (@theia/preview), can be exploited to execute arbitrary code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPL...
[ { "source": "emo@eclipse.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/eclipse-theia/theia/issues/7954" }, { "source": "emo@eclipse.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eclipse:theia:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B4523BE-7475-4619-B454-5E8D508EB99B", "versionEndExcluding": null, "versionEndIncluding": "1.2.0", "versionStartExcluding...
[ "79" ]
79
https://github.com/eclipse-theia/theia/issues/7954
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "eclipse-theia", "theia" ]
### Bug Description: XSS vulnerability in markdown preview The Markdown Preview can exploited to execute arbitrary code. ### Steps to Reproduce: 1. Create markdown file and append the following text: <style onload="alert(0)"> 2. Save and close the file. 3. Right click the file and select Open With -> Previ...
[security] XSS vulnerability in markdown preview
https://api.github.com/repos/eclipse-theia/theia/issues/7954/comments
16
2020-06-03T20:15:17Z
2021-02-24T16:51:43Z
https://github.com/eclipse-theia/theia/issues/7954
630,295,523
7,954
1,725
CVE-2020-23534
2021-02-25T16:15:12.150
A server-side request forgery (SSRF) vulnerability in Upgrade.php of gopeak masterlab 2.1.5, via the 'source' parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gopeak/masterlab/issues/254" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:masterlab:masterlab:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "EE09F1E6-3590-44E1-AA92-A3E594219236", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "918" ]
918
https://github.com/gopeak/masterlab/issues/254
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gopeak", "masterlab" ]
这里输入对bug做出清晰简洁的描述. Vulnerability file path:/app/ctrl/Upgrade.php ![image](https://user-images.githubusercontent.com/8120951/83759011-820e2080-a6a5-11ea-9652-9336193e95d4.png) POC: http://192.168.222.123/Upgrade/run?source=gopher://192.168.31.103:1234/_Hello ![image](https://user-images.githubusercontent.com/8120...
SSRF exists in the background
https://api.github.com/repos/gopeak/masterlab/issues/254/comments
3
2020-06-04T13:00:59Z
2020-06-16T03:06:54Z
https://github.com/gopeak/masterlab/issues/254
630,800,234
254
1,726
CVE-2021-23345
2021-02-26T18:15:12.330
All versions of package github.com/thecodingmachine/gotenberg are vulnerable to Server-side Request Forgery (SSRF) via the /convert/html endpoint when the src attribute of an HTML element refers to an internal system file, such as <iframe src='file:///etc/passwd'>.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/thecodingmachine/gotenberg/issues/261" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thecodingmachine:gotenberg:*:*:*:*:*:*:*:*", "matchCriteriaId": "04B8DDEA-4AE8-45F2-9FF8-77E45DACD9A0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "918" ]
918
https://github.com/thecodingmachine/gotenberg/issues/261
[ "Exploit", "Third Party Advisory" ]
github.com
[ "thecodingmachine", "gotenberg" ]
## Expected Behavior - When attempting to convert html into a PDF using the /html endpoint, gotenberg should throw an exception (respond with a bad request) whenever there is an attempt to convert html with a source (src) reference to an internal system file. - [HTTP POST] /convert/html - [BODY] file: index.html >> ...
Server-Side Request Forgery <iframe src='file:///etc/passwd'> (in version 6.3.0)
https://api.github.com/repos/gotenberg/gotenberg/issues/261/comments
8
2020-11-24T19:30:47Z
2021-08-22T15:13:47Z
https://github.com/gotenberg/gotenberg/issues/261
749,979,322
261
1,727
CVE-2020-36079
2021-02-26T23:15:11.187
Zenphoto through 1.5.7 is affected by authenticated arbitrary file upload, leading to remote code execution. The attacker must navigate to the uploader plugin, check the elFinder box, and then drag and drop files into the Files(elFinder) portion of the UI. This can, for example, place a .php file in the server's upload...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/161569/Zenphoto-CMS-1.5.7-Shell-Upload.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "h...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zenphoto:zenphoto:*:*:*:*:*:*:*:*", "matchCriteriaId": "776AEF1F-758A-4080-BBB9-FDE3020D499A", "versionEndExcluding": null, "versionEndIncluding": "1.5.7", "versionStartExclu...
[ "434" ]
434
https://github.com/zenphoto/zenphoto/issues/1292
[ "Third Party Advisory" ]
github.com
[ "zenphoto", "zenphoto" ]
[CVE-2020-36079](https://nvd.nist.gov/vuln/detail/CVE-2020-36079) vulnerability description is: ``` Zenphoto through 1.5.7 is affected by authenticated arbitrary file upload, leading to remote code execution. The attacker must navigate to the uploader plugin, check the elFinder box, and then drag and drop files into ...
CVE-2020-36079 clarification needed
https://api.github.com/repos/zenphoto/zenphoto/issues/1292/comments
2
2021-02-28T15:14:45Z
2021-03-03T09:25:56Z
https://github.com/zenphoto/zenphoto/issues/1292
818,230,210
1,292
1,728
CVE-2021-27884
2021-03-01T23:15:13.267
Weak JSON Web Token (JWT) signing secret generation in YMFE YApi through 1.9.2 allows recreation of other users' JWT tokens. This occurs because Math.random in Node.js is used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/YMFE/yapi/issues/2117" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://securitylab.github.com/advisories/GHSL-2020-228-YMFE-yapi" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ymfe:yapi:*:*:*:*:*:*:*:*", "matchCriteriaId": "D457FF7A-2FFE-425F-A0B8-C6F292C4DA10", "versionEndExcluding": null, "versionEndIncluding": "1.9.2", "versionStartExcluding": n...
[ "330" ]
330
https://github.com/YMFE/yapi/issues/2117
[ "Third Party Advisory" ]
github.com
[ "YMFE", "yapi" ]
## Summary Weak random number generator is used to sign JSON Web Token (JWT). ## Product [YApi](https://github.com/YMFE/yapi) ## Tested Version The latest commit to the date: [8e1f654](https://github.com/YMFE/yapi/tree/8e1f6546d52ad6a3f8d3ce3325eb1d0276209f4c). ## Details ### JWT signing Functio...
GitHub Security Lab (GHSL) Vulnerability Report: `GHSL-2020-228`
https://api.github.com/repos/YMFE/yapi/issues/2117/comments
0
2021-02-23T14:55:07Z
2021-02-23T14:57:23Z
https://github.com/YMFE/yapi/issues/2117
814,540,386
2,117
1,729
CVE-2021-27886
2021-03-02T00:15:18.097
rakibtg Docker Dashboard before 2021-02-28 allows command injection in backend/utilities/terminal.js via shell metacharacters in the command parameter of an API request. NOTE: this is NOT a Docker, Inc. product.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/163416/Docker-Dashboard-Remote-Command-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:docker_dashboard_project:docker_dashboard:*:*:*:*:*:*:*:*", "matchCriteriaId": "44392BD7-3321-4E6C-AF23-CFE01B6FE298", "versionEndExcluding": "2021-02-28", "versionEndIncluding": null, ...
[ "78" ]
78
https://github.com/rakibtg/docker-web-gui/issues/23
[ "Third Party Advisory" ]
github.com
[ "rakibtg", "docker-web-gui" ]
For example, making GET requests such as the following results in arbitrary commands being executed on the server, outside of the intended docker process only. This is otherwise known as a remote command injection bug (especially since app.js listens on the network interface by default, accessible by anyone on the netw...
Security: lack of input validation in APIs leads to command injection
https://api.github.com/repos/rakibtg/docker-web-gui/issues/23/comments
5
2021-01-31T02:00:31Z
2021-03-02T08:10:35Z
https://github.com/rakibtg/docker-web-gui/issues/23
797,597,769
23
1,730
CVE-2021-21353
2021-03-03T02:15:13.143
Pug is an npm package which is a high-performance template engine. In pug before version 3.0.1, if a remote attacker was able to control the `pretty` option of the pug compiler, e.g. if you spread a user provided object such as the query parameters of a request into the pug template inputs, it was possible for them to ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/pugjs/pug/commit/991e78f7c4220b2f8da042877c6f0ef5a4683be0" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Patch", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pugjs:pug:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "AE43CE50-8DE8-4487-BCCB-9E3931241EB2", "versionEndExcluding": "3.0.1", "versionEndIncluding": null, "versionStartExcludi...
[ "74" ]
74
https://github.com/pugjs/pug/issues/3312
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "pugjs", "pug" ]
Hello, I found that pug may allow an attacker to inject arbitrary javascript code if an attacker can control `options.pretty`. **Pug Version:** 3.0.0 ## Proof of concept Here is an vulnerable example including 2 files: **app.js** and **index.pug**. In the example, there is only one variable "pretty" that i...
Code injection vulnerability in visitMixin and visitMixinBlock through "pretty" option
https://api.github.com/repos/pugjs/pug/issues/3312/comments
4
2021-02-10T06:17:12Z
2021-04-17T22:42:32Z
https://github.com/pugjs/pug/issues/3312
805,211,096
3,312
1,731
CVE-2020-8296
2021-03-03T18:15:13.847
Nextcloud Server prior to 20.0.0 stores passwords in a recoverable format even when external storage is not configured.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL",...
[ { "source": "support@hackerone.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nextcloud/server/issues/17439" }, { "source": "support@hackerone.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ne...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "00443127-F3B3-47FF-AC22-4B9BF23CCD4A", "versionEndExcluding": "20.0.0", "versionEndIncluding": null, "version...
[ "521" ]
521
https://github.com/nextcloud/server/issues/17439
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nextcloud", "server" ]
Hi, Can i get informations about the algorithm used to hash password inside oc_credentials. I think this is synchronous hash because nextcloud need it with external storage but i’m not sure ? Best regards
Oc_credentials security?
https://api.github.com/repos/nextcloud/server/issues/17439/comments
13
2019-10-07T11:19:59Z
2020-05-19T10:09:23Z
https://github.com/nextcloud/server/issues/17439
503,388,023
17,439
1,732
CVE-2021-22877
2021-03-03T18:15:14.707
A missing user check in Nextcloud prior to 20.0.6 inadvertently populates a user's own credentials for other users external storage configuration when not already configured yet.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL"...
[ { "source": "support@hackerone.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nextcloud/server/issues/24600" }, { "source": "support@hackerone.com", "tags": [ "Patch", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FEA4E5F-306F-4E45-AB46-C232BCB0F4EB", "versionEndExcluding": "20.0.6", "versionEndIncluding": null, "version...
[ "862" ]
862
https://github.com/nextcloud/server/issues/24600
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nextcloud", "server" ]
<!-- Thanks for reporting issues back to Nextcloud! Note: This is the **issue tracker of Nextcloud**, please do NOT use this to get 4answers to your questions or get help for fixing your installation. This is a place to report bugs to developers, after your server has been debugged. You can find help debugging your...
Wrong (malformed) external storage credentials saved in `oc_storages_credentials`
https://api.github.com/repos/nextcloud/server/issues/24600/comments
3
2020-12-07T21:33:05Z
2021-02-01T14:10:28Z
https://github.com/nextcloud/server/issues/24600
758,866,869
24,600
1,733
CVE-2021-27935
2021-03-03T20:15:12.437
An issue was discovered in AdGuard before 0.105.2. An attacker able to get the user's cookie is able to bruteforce their password offline, because the hash of the password is stored in the cookie.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/AdguardTeam/AdGuardHome/issues/2470" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Thi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adguard:adguard_home:*:*:*:*:*:*:*:*", "matchCriteriaId": "8978CCDB-CABE-49C9-A3B7-9F55F8AF474F", "versionEndExcluding": "0.105.2", "versionEndIncluding": null, "versionStart...
[ "522" ]
522
https://github.com/AdguardTeam/AdGuardHome/issues/2470
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "AdguardTeam", "AdGuardHome" ]
It [seems]( https://github.com/AdguardTeam/AdGuardHome/blob/bdff46ec1dc8bfebaea236fef5e4ea64b4f21738/internal/home/auth.go#L279-L289 ) that the username as well as the bcrypt'ed password have their sha256 stored in the cookie. This is a bit worrying, since an attacker able to get the cookie would not only gain acces...
Hash of the password stored in the cookies
https://api.github.com/repos/AdguardTeam/AdGuardHome/issues/2470/comments
6
2020-12-21T18:37:22Z
2021-03-03T21:30:06Z
https://github.com/AdguardTeam/AdGuardHome/issues/2470
772,381,498
2,470
1,734
CVE-2021-24031
2021-03-04T21:15:12.743
In the Zstandard command-line utility prior to v1.4.1, output files were created with default permissions. Correct file permissions (matching the input) would only be set at completion time. Output files could therefore be readable or writable to unintended parties.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve-assign@fb.com", "tags": [ "Exploit", "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981404" }, { "source": "cve-assign@fb.com", "tags": [ "Exploit", "Issue Tracking...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:zstandard:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BB54F72-0467-43BC-B73A-DA6DC8A55FD9", "versionEndExcluding": "1.4.1", "versionEndIncluding": null, "versionStartExcl...
[ "276" ]
276
https://github.com/facebook/zstd/issues/1630
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "facebook", "zstd" ]
While the final file mode is reflective of the input file, when compressing or uncompressing, the file can temporarily gain greater permissions than the input and potentially leading to security issues (especially if large files are being handled). Example: `file` has mode 600 -> `zstd file` -> `file.zst` has mode 6...
zstd adds read permissions to files while being compressed or uncompressed
https://api.github.com/repos/facebook/zstd/issues/1630/comments
13
2019-06-04T18:29:11Z
2021-03-05T22:01:21Z
https://github.com/facebook/zstd/issues/1630
452,143,298
1,630
1,735
CVE-2021-24032
2021-03-04T21:15:12.963
Beginning in v1.4.1 and prior to v1.4.9, due to an incomplete fix for CVE-2021-24031, the Zstandard command-line utility created output files with default permissions and restricted those permissions immediately afterwards. Output files could therefore momentarily be readable or writable to unintended parties.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve-assign@fb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982519" }, { "source": "cve-assign@fb.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:zstandard:*:*:*:*:*:*:*:*", "matchCriteriaId": "D09560DA-1F1B-41AA-B96F-DABEE82C04D0", "versionEndExcluding": "1.4.9", "versionEndIncluding": null, "versionStartExcl...
[ "276" ]
276
https://github.com/facebook/zstd/issues/2491
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "facebook", "zstd" ]
The patches for #1630 still create the file with the default umask, before chmod'ing down to 0600, so an attacker could still open it in the meantime. inotify can for instance help automating such an attack. zstd should either set the mode directly through open(2), or use umask(2) before creating the file. This i...
Race condition allows attacker to access world-readable destination file
https://api.github.com/repos/facebook/zstd/issues/2491/comments
2
2021-02-11T07:41:51Z
2021-02-17T22:05:35Z
https://github.com/facebook/zstd/issues/2491
806,153,115
2,491
1,736
CVE-2021-3403
2021-03-04T22:15:14.577
In ytnef 1.9.3, the TNEFSubjectHandler function in lib/ytnef.c allows remote attackers to cause a denial-of-service (and potentially code execution) due to a double free which can be triggered via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1926967" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ytnef_project:ytnef:1.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "0801E2DD-1A5E-47C8-8CF3-4B41CDE4B5D9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "415" ]
415
https://github.com/Yeraze/ytnef/issues/85
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Yeraze", "ytnef" ]
While it seems there are many checks which ought to prevent various memory corruption situations it seems there's a double free that can be triggered still as of ecc9d87. With ASAN and some crafted input: ``` ================================================================= ==2678633==ERROR: AddressSanitizer: atte...
Double free via TNEFSubjectHandler
https://api.github.com/repos/Yeraze/ytnef/issues/85/comments
1
2021-01-30T11:51:22Z
2021-03-05T14:06:10Z
https://github.com/Yeraze/ytnef/issues/85
797,400,586
85
1,737
CVE-2021-3404
2021-03-04T22:15:14.657
In ytnef 1.9.3, the SwapWord function in lib/ytnef.c allows remote attackers to cause a denial-of-service (and potentially code execution) due to a heap buffer overflow which can be triggered via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1926965" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ytnef_project:ytnef:1.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "0801E2DD-1A5E-47C8-8CF3-4B41CDE4B5D9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "787" ]
787
https://github.com/Yeraze/ytnef/issues/86
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Yeraze", "ytnef" ]
A heap buffer overflow can be triggered as of ecc9d87 with crafted input, despite `ytnef` recognizing that the provided input file is not valid: ``` ERROR: Checksum mismatch. Data corruption?: ``` However when built with ASAN we see that `SwapWord` attempts to read invalid memory before said error message can b...
Heap buffer overflow via TNEFVersion
https://api.github.com/repos/Yeraze/ytnef/issues/86/comments
1
2021-01-30T11:51:28Z
2021-03-05T14:05:15Z
https://github.com/Yeraze/ytnef/issues/86
797,400,610
86
1,738
CVE-2021-25313
2021-03-05T09:15:13.503
A Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rancher allows remote attackers to execute JavaScript via malicious links. This issue affects: SUSE Rancher Rancher versions prior to 2.5.6.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "meissner@suse.de", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1181852" }, { "source": "meissner@suse.de", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:suse:rancher:*:*:*:*:*:*:*:*", "matchCriteriaId": "409DC667-DF62-4860-B9C1-F8060D93631D", "versionEndExcluding": "2.5.6", "versionEndIncluding": null, "versionStartExcluding"...
[ "79" ]
79
https://github.com/rancher/rancher/issues/31583
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rancher", "rancher" ]
When accessing the Rancher API with a browser, user input in the URL was not properly escaped and was vulnerable to an XSS attack. Specially crafted URLs to these API endpoints could include JavaScript which would be embedded in the page and execute in a browser. There is no direct mitigation. Avoid clicking on untrust...
XSS script execution vulnerability
https://api.github.com/repos/rancher/rancher/issues/31583/comments
0
2021-03-04T05:15:24Z
2021-06-02T12:03:29Z
https://github.com/rancher/rancher/issues/31583
821,761,554
31,583
1,739
CVE-2021-28040
2021-03-05T18:15:13.270
An issue was discovered in OSSEC 3.6.0. An uncontrolled recursion vulnerability in os_xml.c occurs when a large number of opening and closing XML tags is used. Because recursion is used in _ReadElem without restriction, an attacker can trigger a segmentation fault once unmapped memory is reached.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ossec/ossec-hids/issues/1953" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ossec:ossec:3.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "5194EBBE-813E-4C77-BE63-1302B9E88855", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "674" ]
674
https://github.com/ossec/ossec-hids/issues/1953
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ossec", "ossec-hids" ]
# os_xml _ReadElem() - Uncontrolled recursion vulnerability ## INTRODUCTION An Uncontrolled Recursion vulnerability has been identified in the `os_xml` XML parsing library used by OSSEC. Through the `os_xml/examples/test.c` code, a flaw has been identified in `os_xml.c` that allows non-defined recursion cycles...
os_xml _ReadElem() - Uncontrolled recursion vulnerability leading to DoS (SIGSEGV)
https://api.github.com/repos/ossec/ossec-hids/issues/1953/comments
3
2021-02-23T14:37:16Z
2022-05-12T08:54:48Z
https://github.com/ossec/ossec-hids/issues/1953
814,524,956
1,953
1,740
CVE-2021-21361
2021-03-09T01:15:13.230
The `com.bmuschko:gradle-vagrant-plugin` Gradle plugin contains an information disclosure vulnerability due to the logging of the system environment variables. When this Gradle plugin is executed in public CI/CD, this can lead to sensitive credentials being exposed to malicious actors. This is fixed in version 3.0.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PART...
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-jpcm-4485-69p7" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Th...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vagrant_project:vagrant:*:*:*:*:*:gradle:*:*", "matchCriteriaId": "3AFF2CD1-56CD-4765-AF25-F7B928781487", "versionEndExcluding": "0.6", "versionEndIncluding": null, "versionS...
[ "532" ]
532
https://github.com/bmuschko/gradle-vagrant-plugin/issues/19
[ "Patch", "Third Party Advisory" ]
github.com
[ "bmuschko", "gradle-vagrant-plugin" ]
## Problem Currently if `environmentVariables` is set, this will cause the [whole environment from the Gradle process](https://github.com/bmuschko/gradle-vagrant-plugin/blob/630a33b2e16f0f9eced983ec3bfbad289b81201f/src/main/groovy/com/bmuschko/gradle/vagrant/utils/OsUtils.groovy#L28) to be inherited to the vagrant c...
Potential credentials leak when setting environmentVariables
https://api.github.com/repos/bmuschko/gradle-vagrant-plugin/issues/19/comments
6
2021-02-15T18:01:12Z
2021-03-08T17:45:17Z
https://github.com/bmuschko/gradle-vagrant-plugin/issues/19
808,729,863
19
1,741
CVE-2021-20245
2021-03-09T19:15:12.500
A flaw was found in ImageMagick in coders/webp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE"...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928943" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advis...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "465FCAC7-2745-4B78-AF5C-58D7B3A8D424", "versionEndExcluding": "6.9.11-62", "versionEndIncluding": null, "version...
[ "369" ]
369
https://github.com/ImageMagick/ImageMagick/issues/3176
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
When `image->ticks_per_second` was set to zero, a division by zero error would happen in line 961. So a crafted file may trigger undefined behavior in the form of division by zero. Maybe there need a `PerceptibleReciprocal()` to do division in line 961? https://github.com/ImageMagick/ImageMagick/blob/74f8868c779a5bd...
Division by zero in WriteAnimatedWEBPImage() in coders/webp.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/3176/comments
2
2021-02-02T06:03:44Z
2021-02-17T07:16:38Z
https://github.com/ImageMagick/ImageMagick/issues/3176
798,961,516
3,176
1,742
CVE-2020-23721
2021-03-10T14:15:12.373
An issue was discovered in FUEL CMS V1.4.7. An attacker can use a XSS payload and bypass a filter via /fuelCM/fuel/pages/edit/1?lang=english.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/559" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "E8B64313-C2ED-4400-9EDE-2AC0DB753CBC", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "79" ]
79
https://github.com/daylightstudio/FUEL-CMS/issues/559
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
HI: The attacker bypasses the filter In this pages page! POC: `"><details/open/ontoggle=\u0061\u006c\u0065\u0072\u0074(/xss/)>` <img width="842" alt="222" src="https://user-images.githubusercontent.com/12816285/85382827-eb30d780-b571-11ea-8a59-928afc638ae9.png"> <img width="698" alt="333" src="https://user-images...
bypass filter XSS vunerability
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/559/comments
0
2020-06-23T08:53:30Z
2021-05-14T13:59:44Z
https://github.com/daylightstudio/FUEL-CMS/issues/559
643,655,458
559
1,743
CVE-2020-23722
2021-03-10T14:15:12.453
An issue was discovered in FUEL CMS 1.4.7. There is a escalation of privilege vulnerability to obtain super admin privilege via the "id" and "fuel_id" parameters.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/560" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "E8B64313-C2ED-4400-9EDE-2AC0DB753CBC", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "639" ]
639
https://github.com/daylightstudio/FUEL-CMS/issues/560
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
General users can modify the administrator password and account infomation vulnerability . for example: The account test123 can chanage the admin password!!! step 1: log in test123: <img width="958" alt="1" src="https://user-images.githubusercontent.com/12816285/85488214-81abda00-b600-11ea-9b6e-b8c0551322df.png"> ...
General users can modify the administrator password vulnerability
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/560/comments
1
2020-06-24T02:12:08Z
2020-07-02T15:18:03Z
https://github.com/daylightstudio/FUEL-CMS/issues/560
644,263,989
560
1,744
CVE-2020-24791
2021-03-10T14:15:12.547
FUEL CMS 1.4.8 allows SQL injection via the 'fuel_replace_id' parameter in pages/replace/1. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/561" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "AB4A4A9E-CC08-4A74-A807-92843A9912E8", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "89" ]
89
https://github.com/daylightstudio/FUEL-CMS/issues/561
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
FUEL CMS 1.4.8 allows SQL Injection via parameter 'fuel_replace_id' in pages/replace/1 Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. POC: POST /FUEL-CMS-1.4.8/fuel/pages/replace/1?inline=1 HTTP/1.1 ...
FUEL CMS 1.4.8 allows SQL Injection via parameter 'fuel_replace_id' in pages/replace/1
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/561/comments
0
2020-08-19T08:22:40Z
2020-09-23T16:35:29Z
https://github.com/daylightstudio/FUEL-CMS/issues/561
681,646,072
561
1,745
CVE-2020-28705
2021-03-10T14:15:12.623
FUEL CMS 1.4.13 contains a cross-site request forgery (CSRF) vulnerability that can delete a page via a post ID to /pages/delete/3.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/commit/fbf2d59215800f05d4359e8f984d5680d62f0f3b" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "22D4ECFB-0516-4086-83DA-AA5F1EE17D26", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ "352" ]
352
https://github.com/daylightstudio/FUEL-CMS/issues/576
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
In /pages/delete/3 Cross-site request forgery (CSRF) vulnerability The Attacker can use this vulnerability to delete random pages! <img width="536" alt="222png" src="https://user-images.githubusercontent.com/68934938/98192825-c0f71980-1f56-11eb-8c11-efb7a60f17ad.png"> POC: ![111](https://user-images.githubusercon...
FUEL-CMS V1.4.13 Cross-site request forgery (CSRF) vulnerability
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/576/comments
0
2020-11-05T02:54:39Z
2021-05-14T13:59:33Z
https://github.com/daylightstudio/FUEL-CMS/issues/576
736,567,837
576
1,746
CVE-2021-3224
2021-03-10T14:15:12.703
A stored cross-site scripting (XSS) vulnerability in cszcms 1.2.9 exists in /admin/pages/new via the content parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cskaza/cszcms/issues/28" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://www.cszcms.com/" }, { "source":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cszcms:csz_cms:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "0068F78B-C701-4A09-8978-A0D07EE14906", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "79" ]
79
https://github.com/cskaza/cszcms/issues/28
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cskaza", "cszcms" ]
Hi,@cskaza I found a Stored XSS Vulnerability In /admin/pages/new (release/1.2.9) In content page ,The content Parameter are not filtered: ![image](https://user-images.githubusercontent.com/12816285/104397701-4b2bb180-5588-11eb-9364-d607b86908c3.png) ![image](https://user-images.githubusercontent.com/12816285/10...
Stored XSS Vulnerability In /admin/pages/new (release/1.2.9)
https://api.github.com/repos/cskaza/cszcms/issues/28/comments
8
2021-01-13T02:19:45Z
2021-12-04T09:23:31Z
https://github.com/cskaza/cszcms/issues/28
784,731,354
28
1,747
CVE-2021-28122
2021-03-10T15:15:12.930
A request-validation issue was discovered in Open5GS 2.1.3 through 2.2.x before 2.2.1. The WebUI component allows an unauthenticated user to use a crafted HTTP API request to create, read, update, or delete entries in the subscriber database. For example, new administrative users can be added. The issue occurs because ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/open5gs/open5gs/compare/v2.2.0...v2.2.1" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/open5gs/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*", "matchCriteriaId": "34A2C732-AE91-433F-9A9E-3B28F7503E47", "versionEndExcluding": null, "versionEndIncluding": "2.2.0", "versionStartExcludi...
[ "306" ]
306
https://github.com/open5gs/open5gs/issues/837
[ "Exploit", "Third Party Advisory" ]
github.com
[ "open5gs", "open5gs" ]
An unauthenticated user can utilize information provided by the login page of the webui component to craft HTTP requests that will allow that user to create, read, update, and delete entries in the subscriber database. This includes the ability to add administrative users, add/modify/delete subscribers, and add/modify/...
Authentication Bypass in Webui
https://api.github.com/repos/open5gs/open5gs/issues/837/comments
1
2021-03-10T13:18:52Z
2023-03-21T22:35:28Z
https://github.com/open5gs/open5gs/issues/837
827,727,045
837
1,748
CVE-2021-26776
2021-03-11T17:15:12.843
CSZ CMS 1.2.9 is affected by a cross-site scripting (XSS) vulnerability in multiple pages through the field name.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cskaza/cszcms/issues/29" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cszcms:csz_cms:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "0068F78B-C701-4A09-8978-A0D07EE14906", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "79" ]
79
https://github.com/cskaza/cszcms/issues/29
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cskaza", "cszcms" ]
Multiple Stored XSS Cross-Site Scripting on CSZ CMS 1.2.9 Login with editor account with rights to Forms Builder, XML Plugin Widgets, Statistic for link, Banner Manager, Carousel Widget, Pages Content, Language, Plugin Manager. ``` Forms Builder - Add or edit Forms Builder: Forms Name: <noframes><p title="</...
Multiple Stored XSS Cross-Site Scripting on CSZ CMS 1.2.9
https://api.github.com/repos/cskaza/cszcms/issues/29/comments
2
2021-02-02T01:16:34Z
2021-11-10T08:58:04Z
https://github.com/cskaza/cszcms/issues/29
798,839,047
29
1,749
CVE-2021-27677
2021-03-11T17:15:12.907
Cross-site scripting (XSS) vulnerability in Galleries in Batflat CMS 1.3.6 allows remote attackers to inject arbitrary web script or HTML via the field name.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sruupl/batflat/issues/105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Par...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:batflat:batflat:1.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "CCD502D1-2B27-4BC5-9DF2-C71F42212D85", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "79" ]
79
https://github.com/sruupl/batflat/issues/105
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sruupl", "batflat" ]
Multiple Stored XSS Cross-Site Scripting on Batflat CMS 1.3.6 Login with editor account with rights to Navigation, Galleries, Snippets <h2>Navigation</h2> ``` Add link payload: "><img src=x onerror=alert(document.cookie)> ``` ![image](https://user-images.githubusercontent.com/25518949/108699235-8fbb4d00-...
Multiple Stored XSS Cross-Site Scripting on Batflat CMS 1.3.6
https://api.github.com/repos/sruupl/batflat/issues/105/comments
1
2021-02-22T11:07:28Z
2021-07-31T15:03:30Z
https://github.com/sruupl/batflat/issues/105
813,396,789
105
1,750
CVE-2021-28154
2021-03-11T22:15:12.857
Camunda Modeler (aka camunda-modeler) through 4.6.0 allows arbitrary file access. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which manipulates the readFile and writeFile APIs. NOTE: the vendor states "The way we secured the app is that it does not allow any rem...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/camunda/camunda-modeler/issues/2143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:camunda:modeler:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E8FC2A3-2C9A-48E2-A874-9D63E2CB0E20", "versionEndExcluding": null, "versionEndIncluding": "4.6.0", "versionStartExcludi...
[ "862" ]
862
https://github.com/camunda/camunda-modeler/issues/2143
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "camunda", "camunda-modeler" ]
__Describe the Bug__ Hi, Great work! We did a security analysis and found that `app/lib/preload.js` directly expose risky ipcRenderer instance to unsafe renderer process, which enables a remote attacker to abuse sensitive methods in the main process by crafting malicious ipc message. I notice that the app has ...
Arbitrary filesystem manipulation vulnerability introduced by IPC exposure
https://api.github.com/repos/camunda/camunda-modeler/issues/2143/comments
5
2021-03-09T16:17:42Z
2021-03-15T14:20:13Z
https://github.com/camunda/camunda-modeler/issues/2143
826,182,019
2,143
1,751
CVE-2020-36282
2021-03-12T01:15:12.373
JMS Client for RabbitMQ 1.x before 1.15.2 and 2.x before 2.2.0 is vulnerable to unsafe deserialization that can result in code execution via crafted StreamMessage data.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rabbitmq/rabbitmq-jms-client/issues/135" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/ra...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rabbitmq:jms_client:*:*:*:*:*:rabbitmq:*:*", "matchCriteriaId": "88DCB385-FDA7-44B3-B4DF-B3FAE97D5AE2", "versionEndExcluding": "1.15.2", "versionEndIncluding": null, "version...
[ "502" ]
502
https://github.com/rabbitmq/rabbitmq-jms-client/issues/135
[ "Patch", "Third Party Advisory" ]
github.com
[ "rabbitmq", "rabbitmq-jms-client" ]
`StreamMessage` should use the same "white list" mechanism as `ObjectMessage` to avoid some arbitrary code execution on deserialization. Even though `StreamMessage` is supposed to handle only primitive types, it is still to possible to send a message that contains an arbitrary serializable instance. The consuming ap...
Limit StreamMessage deserialization
https://api.github.com/repos/rabbitmq/rabbitmq-jms-client/issues/135/comments
0
2020-11-02T10:38:12Z
2020-11-02T12:10:38Z
https://github.com/rabbitmq/rabbitmq-jms-client/issues/135
734,391,983
135
1,752
CVE-2021-23354
2021-03-12T15:15:14.207
The package printf before 0.6.1 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex string /\%(?:\(([\w_.]+)\)|([1-9]\d*)\$)?([0 +\-\]*)(\*|\d+)?(\.)?(\*|\d+)?[hlL]?([\%bscdeEfFgGioOuxX])/g in lib/printf.js. The vulnerable regular expression has cubic worst-case time complexity.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/adaltas/node-printf/issues/31" }, { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://git...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adaltas:printf:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "355FBD56-0D7A-4DB1-9517-BAD18C121E39", "versionEndExcluding": "0.6.1", "versionEndIncluding": null, "versionStartEx...
[ "1333" ]
1333
https://github.com/adaltas/node-printf/issues/31
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "adaltas", "node-printf" ]
Hi, I would like to report two Regular Expression Denial of Service (REDoS) vulnerability in `printf`. It allows cause a denial of service when using crafted invalid formats. You can execute the code below to reproduce the vulnerability.​ ```JS var printf = require("printf") function build_attack(n) {...
ReDoS in printf
https://api.github.com/repos/adaltas/node-printf/issues/31/comments
5
2021-02-09T11:49:09Z
2021-02-12T12:21:35Z
https://github.com/adaltas/node-printf/issues/31
804,479,506
31
1,753
CVE-2021-28302
2021-03-12T15:15:14.377
A stack overflow in pupnp before version 1.14.5 can cause the denial of service through the Parser_parseDocument() function. ixmlNode_free() will release a child node recursively, which will consume stack space and lead to a crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pupnp/pupnp/issues/249" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/pupnp/pupnp/rele...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pupnp_project:pupnp:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEB13C63-2F47-4A96-B84F-5226835BDCBF", "versionEndExcluding": "1.14.5", "versionEndIncluding": null, "versionStartEx...
[ "770" ]
770
https://github.com/pupnp/pupnp/issues/249
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pupnp", "pupnp" ]
hi, this poc caused a crash. When parsing xml, if there if too many "<a>" in it ,that causes a crash. The problem is in the function Parser_parseDocument() , After parses all < a >, it can't find the closed node, and finally enters the errorhandler. When using ixmlDocument_free(), When releases gRootDoc, ixmlNode_...
Too many nested tags will lead to stack space exhaustion, resulting in signal 11 (SIGSEGV)
https://api.github.com/repos/pupnp/pupnp/issues/249/comments
15
2021-03-12T02:54:55Z
2022-01-06T14:50:50Z
https://github.com/pupnp/pupnp/issues/249
829,708,638
249
1,754
CVE-2021-28161
2021-03-12T22:15:15.077
In Eclipse Theia versions up to and including 1.8.0, in the debug console there is no HTML escaping, so arbitrary Javascript code can be injected.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "emo@eclipse.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/eclipse-theia/theia/issues/8794" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eclipse:theia:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6229F48-421D-4A07-B017-8E6F07F4121E", "versionEndExcluding": null, "versionEndIncluding": "1.8.0", "versionStartExcluding...
[ "79" ]
79
https://github.com/eclipse-theia/theia/issues/8794
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "eclipse-theia", "theia" ]
### Bug Description: In the debug console there is no HTML escaping, so arbitrary Javascript code can be injected. I think the issue is `dangerouslySetInnerHTML` in [ansi-console-item.tsx](https://github.com/eclipse-theia/theia/blob/497452921c55fcda82e0ab50d79e4531fc1abf1b/packages/console/src/browser/ansi-console-i...
XSS in Debug Console [Theia v1.8.0]
https://api.github.com/repos/eclipse-theia/theia/issues/8794/comments
6
2020-11-28T23:36:58Z
2021-04-19T23:06:57Z
https://github.com/eclipse-theia/theia/issues/8794
752,791,480
8,794
1,755
CVE-2021-28162
2021-03-12T22:15:15.157
In Eclipse Theia versions up to and including 0.16.0, in the notification messages there is no HTML escaping, so Javascript code can run.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "emo@eclipse.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/eclipse-theia/theia/issues/7283" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eclipse:theia:*:*:*:*:*:*:*:*", "matchCriteriaId": "636CCCB3-F8BE-4506-84BA-8E7D21601BF0", "versionEndExcluding": null, "versionEndIncluding": "0.16.0", "versionStartExcludin...
[ "829" ]
829
https://github.com/eclipse-theia/theia/issues/7283
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "eclipse-theia", "theia" ]
### Description In the notification messages there is no an HTML escaping, so Javascript code can run. I'm not sure, but I think the issue is in [packages/messages/src/browser/notification-component.tsx:76](https://github.com/eclipse-theia/theia/blob/1ca3ec37c079a6b316278cf292609653e57b8151/packages/messages/src/bro...
Javascript injection via notification messages
https://api.github.com/repos/eclipse-theia/theia/issues/7283/comments
5
2020-03-05T15:45:25Z
2021-03-12T21:40:07Z
https://github.com/eclipse-theia/theia/issues/7283
576,347,925
7,283
1,756
CVE-2021-23357
2021-03-15T17:15:21.597
All versions of package github.com/tyktechnologies/tyk/gateway are vulnerable to Directory Traversal via the handleAddOrUpdateApi function. This function is able to delete arbitrary JSON files on the disk where Tyk is running via the management API. The APIID is provided by the user and this value is then used to creat...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL",...
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/TykTechnologies/tyk/issues/3390" }, { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMTYKTEC...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tyk:tyk:*:*:*:*:*:*:*:*", "matchCriteriaId": "31F492C7-6DF7-4CCA-9B23-C2063688FDB8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, ...
[ "22" ]
22
https://github.com/TykTechnologies/tyk/issues/3390
[ "Exploit", "Third Party Advisory" ]
github.com
[ "TykTechnologies", "tyk" ]
**Branch/Environment/Version** - Branch/Version: https://github.com/TykTechnologies/tyk/tree/v3.0.1 - Environment: On-Prem, Linux **Describe the bug** The function at https://github.com/TykTechnologies/tyk/blob/v3.0.1/gateway/api.go#L771 is able to delete arbitrary JSON files on disk where Tyk is running via the ...
[TT-1397] Security: Path Traversal Bug - Able to delete/modify arbitrary JSON files via management API
https://api.github.com/repos/TykTechnologies/tyk/issues/3390/comments
1
2020-11-17T23:13:51Z
2023-04-12T16:38:52Z
https://github.com/TykTechnologies/tyk/issues/3390
745,156,773
3,390
1,757
CVE-2020-24263
2021-03-16T15:15:12.530
Portainer 1.24.1 and earlier is affected by an insecure permissions vulnerability that may lead to remote arbitrary code execution. A non-admin user is allowed to spawn new containers with critical capabilities such as SYS_MODULE, which can be used to take over the Docker host.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/portainer/portainer/issues/4105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/portainer/portainer/issue...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:portainer:portainer:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA8836F8-EA3E-4DCB-9B6B-FA6111980475", "versionEndExcluding": null, "versionEndIncluding": "1.24.1", "versionStartEx...
[ "732" ]
732
https://github.com/portainer/portainer/issues/4105
[ "Third Party Advisory" ]
github.com
[ "portainer", "portainer" ]
We currently provide the ability for a user to specify additional container capabilities when deploying a container, both using the container UX and also via a compose file. There are certain capabilities that could be escalate privilege higher than a user should need for reasonable activities, and therefore may be dee...
Disable Container Capabilities for non-admins
https://api.github.com/repos/portainer/portainer/issues/4105/comments
3
2020-07-27T03:51:32Z
2021-01-19T21:05:25Z
https://github.com/portainer/portainer/issues/4105
665,954,628
4,105
1,758
CVE-2020-24264
2021-03-16T15:15:12.607
Portainer 1.24.1 and earlier is affected by incorrect access control that may lead to remote arbitrary code execution. The restriction checks for bind mounts are applied only on the client-side and not the server-side, which can lead to spawning a container with bind mount. Once such a container is spawned, it can be l...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10, "confidentialityImpact": "COMPLETE"...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/portainer/portainer/issues/4106" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/portainer/portainer/issue...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:portainer:portainer:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA8836F8-EA3E-4DCB-9B6B-FA6111980475", "versionEndExcluding": null, "versionEndIncluding": "1.24.1", "versionStartEx...
[ "863" ]
863
https://github.com/portainer/portainer/issues/4106
[ "Third Party Advisory" ]
github.com
[ "portainer", "portainer" ]
Right now we allow the Portainer administrator to "disable the use of bind mounts by non-admins", which is purely a front-end restriction, and is more of a "hide the capability". This feature stops using from selecting to use bind mounts in the container / service creation views, and stops the use of bind mounts when w...
enforce the security switch "disable the use of bind mounts" when set via API
https://api.github.com/repos/portainer/portainer/issues/4106/comments
5
2020-07-27T03:57:20Z
2021-03-17T19:42:13Z
https://github.com/portainer/portainer/issues/4106
665,956,241
4,106
1,759
CVE-2021-20218
2021-03-16T21:15:10.930
A flaw was found in the fabric8 kubernetes-client in version 4.2.0 and after. This flaw allows a malicious pod/container to cause applications using the fabric8 kubernetes-client `copy` command to extract files outside the working path. The highest threat from this vulnerability is to integrity and system availability....
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923405" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/f...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:kubernetes-client:*:*:*:*:*:*:*:*", "matchCriteriaId": "396A03F1-9514-4805-9AB5-6B31FD4B4413", "versionEndExcluding": "4.7.2", "versionEndIncluding": null, "versionSta...
[ "22" ]
22
https://github.com/fabric8io/kubernetes-client/issues/2715
[ "Patch", "Third Party Advisory" ]
github.com
[ "fabric8io", "kubernetes-client" ]
A recently found [vulnerability](https://seclists.org/oss-sec/2021/q1/19) was fixed in [another project](https://github.com/kubernetes-client/java/issues/1491) similar to this one. It might potentially affect [a similar implementation](https://github.com/fabric8io/kubernetes-client/blob/c9bf95da45f2560a7be7651fc37db525...
Potential CVE?
https://api.github.com/repos/fabric8io/kubernetes-client/issues/2715/comments
2
2021-01-12T04:35:34Z
2021-02-17T15:53:53Z
https://github.com/fabric8io/kubernetes-client/issues/2715
783,901,313
2,715
1,760
CVE-2021-28681
2021-03-18T04:15:14.617
Pion WebRTC before 3.0.15 didn't properly tear down the DTLS Connection when certificate verification failed. The PeerConnectionState was set to failed, but a user could ignore that and continue to use the PeerConnection. )A WebRTC implementation shouldn't allow the user to continue if verification has failed.)
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pion/webrtc/issues/1708" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/pion/webrtc/security/adv...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webrtc_project:webrtc:*:*:*:*:*:*:*:*", "matchCriteriaId": "6268E745-4C5D-4103-AD3F-0B16DBA1B1CD", "versionEndExcluding": "3.0.15", "versionEndIncluding": null, "versionStart...
[ "863" ]
863
https://github.com/pion/webrtc/issues/1708
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "pion", "webrtc" ]
<!-- Come join our community on Slack https://pion.ly/slack for quicker support and more resources We also provide a Knowledge Base https://pion.ly/knowledge-base that covers Pion and general WebRTC We maintain a FAQ of common issues and questions https://pion.ly/knowledge-base/pion-basics/faq/ Pleas...
DTLS Fingerprints in SDP Offer/Answer are not verified
https://api.github.com/repos/pion/webrtc/issues/1708/comments
9
2021-03-17T22:26:36Z
2021-03-18T00:41:08Z
https://github.com/pion/webrtc/issues/1708
834,225,058
1,708
1,761
CVE-2021-28417
2021-03-18T12:15:12.037
A cross-site scripting (XSS) issue in Seo Panel 4.8.0 allows remote attackers to inject JavaScript via archive.php and the "search_name" parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162914/Seo-Panel-4.8.0-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:seopanel:seo_panel:4.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA338EF9-AC8B-411D-8BE3-9F9A2E68F8E0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "79" ]
79
https://github.com/seopanel/Seo-Panel/issues/208
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "seopanel", "Seo-Panel" ]
Hi team, I would like to report XSS vulnerability. **Description** A cross-site scripting (XSS) issue in the SEO admin login panel version 4.8.0 allows remote attackers to inject JavaScript via the "redirect" parameter. ___ **XSS Payload:** x%22%20onmouseover%3dalert(document.cookie)%20x%3d%22 ___ **Vuln...
XSS Vulnerability in "search_name" parameter
https://api.github.com/repos/seopanel/Seo-Panel/issues/208/comments
0
2021-03-11T19:12:27Z
2021-03-22T07:52:32Z
https://github.com/seopanel/Seo-Panel/issues/208
829,446,239
208
1,762
CVE-2021-28418
2021-03-18T12:15:12.100
A cross-site scripting (XSS) issue in Seo Panel 4.8.0 allows remote attackers to inject JavaScript via settings.php and the "category" parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162914/Seo-Panel-4.8.0-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:seopanel:seo_panel:4.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA338EF9-AC8B-411D-8BE3-9F9A2E68F8E0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "79" ]
79
https://github.com/seopanel/Seo-Panel/issues/207
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "seopanel", "Seo-Panel" ]
Hi team, I would like to report XSS vulnerability. **Description** A cross-site scripting (XSS) issue in the SEO admin login panel version 4.8.0 allows remote attackers to inject JavaScript via the "redirect" parameter. ___ **XSS Payload**: x%22%20onmouseover%3dalert(document.cookie)%20x%3d%22 ___ **Vuln...
XSS Vulnerability in "category" parameter
https://api.github.com/repos/seopanel/Seo-Panel/issues/207/comments
2
2021-03-11T19:08:43Z
2021-03-24T09:02:13Z
https://github.com/seopanel/Seo-Panel/issues/207
829,443,724
207
1,763
CVE-2021-28419
2021-03-18T12:15:12.177
The "order_col" parameter in archive.php of SEO Panel 4.8.0 is vulnerable to time-based blind SQL injection, which leads to the ability to retrieve all databases.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162322/SEO-Panel-4.8.0-SQL-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ]...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:seopanel:seo_panel:4.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA338EF9-AC8B-411D-8BE3-9F9A2E68F8E0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "89" ]
89
https://github.com/seopanel/Seo-Panel/issues/209
[ "Exploit", "Third Party Advisory" ]
github.com
[ "seopanel", "Seo-Panel" ]
Hi Team I would like to report Time-based blind SQLI. **Description:** SQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might ...
Time-based blind SQLi Injection Vulnerability in "order_col" parameter
https://api.github.com/repos/seopanel/Seo-Panel/issues/209/comments
1
2021-03-13T12:05:18Z
2021-03-23T10:32:02Z
https://github.com/seopanel/Seo-Panel/issues/209
830,884,757
209
1,764
CVE-2021-28420
2021-03-18T12:15:12.240
A cross-site scripting (XSS) issue in Seo Panel 4.8.0 allows remote attackers to inject JavaScript via alerts.php and the "from_time" parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162914/Seo-Panel-4.8.0-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:seopanel:seo_panel:4.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA338EF9-AC8B-411D-8BE3-9F9A2E68F8E0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "79" ]
79
https://github.com/seopanel/Seo-Panel/issues/206
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "seopanel", "Seo-Panel" ]
Hi team, I would like to report XSS vulnerability. **Description** A cross-site scripting (XSS) issue in the SEO admin login panel in version 4.8.0 allows remote attackers to inject JavaScript via the "from_time" parameter. ___ **XSS Payload:** x%22%20onmouseover%3dalert(document.cookie)%20x%3d%2...
XSS Vulnerablity in "from_time" parameter
https://api.github.com/repos/seopanel/Seo-Panel/issues/206/comments
0
2021-03-11T19:06:01Z
2021-06-02T16:40:46Z
https://github.com/seopanel/Seo-Panel/issues/206
829,441,836
206
1,765
CVE-2020-36144
2021-03-18T20:15:13.020
Redash 8.0.0 is affected by LDAP Injection. There is an information leak through the crafting of special queries, escaping the provided template since the username included in the search filter lacks sanitization.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/getredash/redash/issues/5426" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/getr...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redash:redash:8.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "E99307EF-9777-4D61-AA36-E2EE410F9561", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "74" ]
74
https://github.com/getredash/redash/issues/5426
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "getredash", "redash" ]
I've tried to contact the security team through `security@redash.io` but had no response. I'm attaching the CVE contents for a proper fix. Suggested description > Redash 8.0.0 is affected by LDAP Injection. There is an information leak through the crafting of special queries, escaping the provided template since th...
LDAP Injection
https://api.github.com/repos/getredash/redash/issues/5426/comments
3
2021-03-14T02:16:09Z
2024-02-01T19:57:52Z
https://github.com/getredash/redash/issues/5426
831,046,370
5,426
1,766
CVE-2021-27519
2021-03-19T19:15:13.913
A cross-site scripting (XSS) issue in FUDForum 3.1.0 allows remote attackers to inject JavaScript via index.php in the "srch" parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162942/FUDForum-3.1.0-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fudforum:fudforum:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F38C9CCE-ABB8-4093-9EED-D11EF11F8B07", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "79" ]
79
https://github.com/fudforum/FUDforum/issues/2
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "fudforum", "FUDforum" ]
**What is XSS** Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser-side script, to a different end-user. Flaw...
Cross Site Scripting
https://api.github.com/repos/fudforum/FUDforum/issues/2/comments
1
2021-02-17T07:30:23Z
2021-03-18T20:10:00Z
https://github.com/fudforum/FUDforum/issues/2
809,934,824
2
1,767
CVE-2021-27308
2021-03-22T15:15:14.160
A cross-site scripting (XSS) vulnerability in the admin login panel in 4images version 1.8 allows remote attackers to inject JavaScript via the "redirect" parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162946/4Images-1.8-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:4homepages:4images:1.8:*:*:*:*:*:*:*", "matchCriteriaId": "8D15DA7C-22D1-4281-951E-FD4F5BA2BE54", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "79" ]
79
https://github.com/4images/4images/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "4images", "4images" ]
**Vulnerable parameter**: redirect **XSS sample Payload**: '"()%26%25<e><ScRiPt%20>alert(document.cookie)</ScRiPt> **Steps to reproduce the vulnerability(POC)**: 1- Goto 4images admin panel page (demo instance:https://localhost/4images/admin/index.php) 2- Enter the credentials , Turn on the intercept and click ...
4images v1.8 - 'Admin panel login' Cross-Site Scripting
https://api.github.com/repos/4images/4images/issues/3/comments
1
2021-02-13T12:30:30Z
2022-10-02T12:45:28Z
https://github.com/4images/4images/issues/3
807,740,811
3
1,768
CVE-2021-21401
2021-03-23T18:15:13.160
Nanopb is a small code-size Protocol Buffers implementation in ansi C. In Nanopb before versions 0.3.9.8 and 0.4.5, decoding a specifically formed message can cause invalid `free()` or `realloc()` calls if the message type contains an `oneof` field, and the `oneof` directly contains both a pointer field and a non-point...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE"...
[ { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/nanopb/nanopb/blob/c9124132a604047d0ef97a09c0e99cd9bed2c818/CHANGELOG.txt#L1" }, { "source": "security-advisories@github.com", "tags": [ "Patch"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nanopb_project:nanopb:*:*:*:*:*:*:*:*", "matchCriteriaId": "A39AC3AB-38B5-453C-B7A8-AC4B55CA26B3", "versionEndExcluding": "0.3.9.8", "versionEndIncluding": null, "versionStar...
[ "763" ]
763
https://github.com/nanopb/nanopb/issues/647
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nanopb", "nanopb" ]
This affects `0.3.9.7` (and probably lower versions, though I haven't checked) with `PB_ENABLE_MALLOC` enabled. Specially crafted bytes can make `pb_decode` eventually call `pb_free` on an arbitrary pointer. Here's the smallest repro case I could make: ```cpp /* // Equivalent to: syntax = "proto3"; message Re...
Ill-formed oneof message leads to calling free on an arbitrary pointer
https://api.github.com/repos/nanopb/nanopb/issues/647/comments
3
2021-03-20T00:14:28Z
2021-03-22T17:46:41Z
https://github.com/nanopb/nanopb/issues/647
836,515,067
647
1,769
CVE-2020-24994
2021-03-23T20:15:13.073
Stack overflow in the parse_tag function in libass/ass_parse.c in libass before 0.15.0 allows remote attackers to cause a denial of service or remote code execution via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libass/libass/commit/6835731c2fe4164a0c50bc91d12c43b2a2b4e" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://gi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libass_project:libass:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFE0DEE3-A9C6-4008-BB80-4B5A6D9B0B4E", "versionEndExcluding": "0.15.0", "versionEndIncluding": null, "versionStart...
[ "770" ]
770
https://github.com/libass/libass/issues/422
[ "Patch", "Third Party Advisory" ]
github.com
[ "libass", "libass" ]
**Description** A vulnerability was found in function parse_tag in ass_parse.c:234 ,which allow attackers to cause a denial of service or remote code execution via a crafted file. test@test:~/libass-0.14.0/afl$ ./a.out crash/poc ======================= INFO ========================= This binary is built for AF...
stack-overflow on ass_parse.c:234 *parse_tag
https://api.github.com/repos/libass/libass/issues/422/comments
5
2020-08-27T02:18:39Z
2021-04-20T01:05:07Z
https://github.com/libass/libass/issues/422
686,885,373
422
1,770