cve_id stringlengths 13 16 | cve_published stringdate 2019-01-01 16:29:00 2025-02-25 20:15:37 | cve_descriptions stringlengths 34 2.6k | cve_metrics dict | cve_references listlengths 1 281 | cve_configurations listlengths 1 70 | cve_cwe_list listlengths 1 1 | cve_primary_cwe stringclasses 164
values | url stringlengths 36 97 | cve_tags listlengths 1 5 ⌀ | domain stringclasses 1
value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 198k ⌀ | issue_title stringlengths 1 335 | issue_comments_url stringlengths 55 116 | issue_comments_count int64 0 338 | issue_created_at stringdate 2012-06-06 09:34:24 2025-04-02 09:37:20 | issue_updated_at stringdate 2014-04-01 20:16:21 2025-06-16 12:26:58 | issue_html_url stringlengths 36 97 | issue_github_id int64 4.93M 2.97B | issue_number int64 1 199k | __index_level_0__ int64 0 6.55k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2021-3337 | 2021-01-28T20:15:13.307 | The Hide-Thread-Content plugin through 2021-01-27 for MyBB allows remote attackers to bypass intended content-reading restrictions by clicking on reply or quote in the postbit. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/161185/MyBB-Hide-Thread-Content-1.0-Information-Disclosure.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hide_thread_content_project:hide_thread_content:1.0:*:*:*:*:mybb:*:*",
"matchCriteriaId": "A378E2BC-F30C-4F34-BD60-B26EF403A1F4",
"versionEndExcluding": null,
"versionEndIncluding": null... | [
"863"
] | 863 | https://github.com/snlbaral/Hide-Thread-Content/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"snlbaral",
"Hide-Thread-Content"
] | Hidden thread content is able to be viewed without replying by using the _reply_ or _quote_ button located in the postbit.
By clicking either two buttons you can view the thread content in the `[quote]` brackets without having to actually reply.
Example:

# Overview
[launchpad](https://www.npmjs.com/package/launchpad) allows you to launch browsers! With NodeJS!
The issue occurs because a `user input` is formatted inside a `command` that will be executed without any check.
# Bug... | Security Notice & Bug Bounty - Remote Code Execution - huntr.dev | https://api.github.com/repos/bitovi/launchpad/issues/123/comments | 3 | 2020-06-19T16:59:31Z | 2022-06-21T22:08:56Z | https://github.com/bitovi/launchpad/issues/123 | 642,110,560 | 123 | 1,671 |
CVE-2020-20294 | 2021-02-01T18:15:13.060 | An issue was found in CMSWing project version 1.3.8. Because the log function does not check the log parameter, malicious parameters can execute arbitrary commands. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/arterli/CmsWing/issues/49"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cmswing:cmswing:1.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "8F12313E-0A52-4EFB-AEAA-74EAFEF8901B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"89"
] | 89 | https://github.com/arterli/CmsWing/issues/49 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"arterli",
"CmsWing"
] | Find a code execution vulnerability in cmswing project version 1.3.8,Details can be found in the analysis below.
The vulnerability lies in the `log` function in the `cmswing/src/mode/action.js`
```
async log(action, model, record_id, user_id, ip, url) {
// action=action||null,model=model||null,record_id=rec... | Vulnerability Report: cmswing 1.3.8 code execution | https://api.github.com/repos/arterli/CmsWing/issues/49/comments | 1 | 2019-10-10T03:26:21Z | 2019-11-07T08:19:45Z | https://github.com/arterli/CmsWing/issues/49 | 505,009,818 | 49 | 1,672 |
CVE-2020-20295 | 2021-02-01T18:15:13.123 | An issue was found in CMSWing project version 1.3.8. Because the updateAction function does not check the detail parameter, malicious parameters can execute arbitrary SQL commands. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/arterli/CmsWing/issues/50"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cmswing:cmswing:1.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "8F12313E-0A52-4EFB-AEAA-74EAFEF8901B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"89"
] | 89 | https://github.com/arterli/CmsWing/issues/50 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"arterli",
"CmsWing"
] | Find a code execution vulnerability in cmswing project version 1.3.8,Details can be found in the analysis below.
**Vulnerability Location**
The vulnerability lies in the `updateAction` function in the `cmswing/src/controller/admin/action.js`
```
async updateAction() {
const data = this.post();
if ... | Vulnerability Report: cmswing 1.3.8 updateAction sql injection | https://api.github.com/repos/arterli/CmsWing/issues/50/comments | 1 | 2019-10-10T03:56:23Z | 2019-10-10T03:58:31Z | https://github.com/arterli/CmsWing/issues/50 | 505,017,656 | 50 | 1,673 |
CVE-2020-20296 | 2021-02-01T18:15:13.203 | An issue was found in CMSWing project version 1.3.8, Because the rechargeAction function does not check the balance parameter, malicious parameters can execute arbitrary SQL commands. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/arterli/CmsWing/issues/51"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cmswing:cmswing:1.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "8F12313E-0A52-4EFB-AEAA-74EAFEF8901B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"89"
] | 89 | https://github.com/arterli/CmsWing/issues/51 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"arterli",
"CmsWing"
] | Find a code execution vulnerability in cmswing project version 1.3.8,Details can be found in the analysis below.
**Vulnerability Location**
The vulnerability lies in the `rechargeAction` function in the `cmswing/src/controller/admin/user.js`
```
async rechargeAction() {
if (this.isAjax('POST')) {
... | Vulnerability Report: cmswing 1.3.8 user recharge sql injection | https://api.github.com/repos/arterli/CmsWing/issues/51/comments | 0 | 2019-10-10T04:00:45Z | 2019-10-10T04:00:45Z | https://github.com/arterli/CmsWing/issues/51 | 505,018,744 | 51 | 1,674 |
CVE-2020-21179 | 2021-02-01T18:15:13.327 | Sql injection vulnerability in koa2-blog 1.0.0 allows remote attackers to Injecting a malicious SQL statement via the name parameter to the signin page. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wclimb/Koa2-blog/issues/40"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:koa2-blog_project:koa2-blog:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "43A986EE-B5A7-4972-9AEC-4E04F5DAA875",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | [
"89"
] | 89 | https://github.com/wclimb/Koa2-blog/issues/40 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"wclimb",
"Koa2-blog"
] | A sql injection was discovered in koa2-blog 1.0.0 .There is a sql injection vulnerability which allows remote attackers to Injecting a malicious SQL statement into a server via:
`post http://127.0.0.1:3000/signin`
Vulnerability code
```
// 通过名字查找用户
exports.findDataByName = ( name ) => {
let _sql = `select *... | koa2-blog v1.0.0 sql injection vulnerability | https://api.github.com/repos/wunci/Koa2-blog/issues/40/comments | 0 | 2019-11-28T07:35:07Z | 2019-11-30T09:03:38Z | https://github.com/wunci/Koa2-blog/issues/40 | 529,741,727 | 40 | 1,675 |
CVE-2020-21180 | 2021-02-01T18:15:13.390 | Sql injection vulnerability in koa2-blog 1.0.0 allows remote attackers to Injecting a malicious SQL statement via the name parameter to the signup page. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wclimb/Koa2-blog/issues/41"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:koa2-blog_project:koa2-blog:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "43A986EE-B5A7-4972-9AEC-4E04F5DAA875",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | [
"89"
] | 89 | https://github.com/wclimb/Koa2-blog/issues/41 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"wclimb",
"Koa2-blog"
] | A sql injection was discovered in koa2-blog 1.0.0 .There is a sql injection vulnerability which allows remote attackers to Injecting a malicious SQL statement into a server via:
`post http://127.0.0.1:3000/signup`
Vulnerability code
```
// 通过名字查找用户数量判断是否已经存在
exports.findDataCountByName = ( name ) => {
let _... | koa2-blog v1.0.0 sql injection vulnerability | https://api.github.com/repos/wunci/Koa2-blog/issues/41/comments | 0 | 2019-11-28T07:53:03Z | 2019-11-30T09:04:06Z | https://github.com/wunci/Koa2-blog/issues/41 | 529,748,271 | 41 | 1,676 |
CVE-2021-20199 | 2021-02-02T19:15:14.000 | Rootless containers run with Podman, receive all traffic with a source IP address of 127.0.0.1 (including from remote hosts). This impacts containerized applications that trust localhost (127.0.01) connections by default and do not require authentication. This issue affects Podman 1.8.0 onwards. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919050"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://githu... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:podman_project:podman:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3720247B-439B-4853-9312-87AFBB4B763D",
"versionEndExcluding": "3.0.0",
"versionEndIncluding": null,
"versionStartE... | [
"346"
] | 346 | https://github.com/containers/podman/issues/5138 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"containers",
"podman"
] | /kind bug
**Description**
For a rootless container the source IP of incoming packets on a publish port is always `127.0.0.1`. Even if the request is made from an external host.
**Steps to reproduce the issue:**
1. Start a NGINX container:
```
machine-1$ podman run -p 8888:80 docker.io/library/nginx:late... | Source IP always 127.0.0.1 in rootless Podman 1.8.0 | https://api.github.com/repos/containers/podman/issues/5138/comments | 25 | 2020-02-09T22:06:10Z | 2023-09-22T10:31:42Z | https://github.com/containers/podman/issues/5138 | 562,247,505 | 5,138 | 1,677 |
CVE-2020-18737 | 2021-02-05T16:15:12.430 | An issue was discovered in Typora 0.9.67. There is an XSS vulnerability that causes Remote Code Execution. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/typora/typora-issues/issues/2289"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Th... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:typora:typora:0.9.67:-:*:*:*:*:*:*",
"matchCriteriaId": "A33C7DD4-B303-4247-A3B5-D54B5C767089",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"79"
] | 79 | https://github.com/typora/typora-issues/issues/2289 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"typora",
"typora-issues"
] | Tested On Windows 10
Version : 0.9.67

XSS:
>```mermaid
graph LR
id1["<iframe src=javascript:alert('xss')></iframe>"]
```
 XSS to RCE | https://api.github.com/repos/typora/typora-issues/issues/2289/comments | 1 | 2019-03-17T10:04:54Z | 2019-03-21T02:40:40Z | https://github.com/typora/typora-issues/issues/2289 | 421,904,266 | 2,289 | 1,678 |
CVE-2021-26722 | 2021-02-05T18:15:12.690 | LinkedIn Oncall through 1.4.0 allows reflected XSS via /query because of mishandling of the "No results found for" message in the search bar. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/linkedin/oncall/issues/341"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:linkedin:oncall:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DCD66815-E6CB-43FE-8F10-F1F1ABEADCEE",
"versionEndExcluding": null,
"versionEndIncluding": "1.4.0",
"versionStartExcludi... | [
"79"
] | 79 | https://github.com/linkedin/oncall/issues/341 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"linkedin",
"oncall"
] | Hi!
I've found a reflected cross-site scripting vulnerability in Oncall's search bar. I've reported this issue to the LinkedIn Information Security Response Center back in September 2020 but Oncall still seems vulnerable to this date. Therefore I decided to report it here.
### Reproduction
1. Navigate to `http... | [CVE-2021-26722] Reflected Cross-Site Scripting in search bar. | https://api.github.com/repos/linkedin/oncall/issues/341/comments | 3 | 2021-02-05T11:56:10Z | 2021-02-05T23:32:07Z | https://github.com/linkedin/oncall/issues/341 | 802,105,883 | 341 | 1,679 |
CVE-2020-18750 | 2021-02-05T19:15:11.917 | Buffer overflow in pdf2json 0.69 allows local users to execute arbitrary code by converting a crafted PDF file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/flexpaper/pdf2json/commit/80bf71f16c804108fd933e267fe31692aaa509b4"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advis... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:flowpaper:pdf2json:0.69:*:*:*:*:*:*:*",
"matchCriteriaId": "2F7376EA-8894-4F38-9B0E-E74BD2639130",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"120"
] | 120 | https://github.com/flexpaper/pdf2json/issues/22 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"flexpaper",
"pdf2json"
] | In CharCodeToUnicode.cc::264
!pst->getToken(tok3, sizeof(tok3), &n3) || //sizeof(tok3) == 256
here n3 can be a value from 0 to 256 - 2
In CharCodeToUnicode.cc::298
addMapping(code1, tok3 + 1, n3 - 2, i);
In CharCodeToUnicode.cc::313
if (n <= 4) {
if (sscanf(uStr, "%x", &u) != 1) {
error(-1, "... | HEAP OVERFLOW VULNERABILITY | https://api.github.com/repos/flexpaper/pdf2json/issues/22/comments | 4 | 2019-03-20T02:55:13Z | 2019-03-23T07:08:58Z | https://github.com/flexpaper/pdf2json/issues/22 | 423,042,193 | 22 | 1,680 |
CVE-2021-26843 | 2021-02-07T21:15:11.790 | An issue was discovered in sthttpd through 2.27.1. On systems where the strcpy function is implemented with memcpy, the de_dotdot function may cause a Denial-of-Service (daemon crash) due to overlapping memory ranges being passed to memcpy. This can triggered with an HTTP GET request for a crafted filename. NOTE: this ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/blueness/sthttpd/issues/14"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sthttpd_project:sthttpd:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A20AC738-9C0B-480E-8C76-37DB8BC6A098",
"versionEndExcluding": null,
"versionEndIncluding": "2.27.1",
"versionSta... | [
"119"
] | 119 | https://github.com/blueness/sthttpd/issues/14 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"blueness",
"sthttpd"
] | When building sthttpd with ASAN (`-fsanitize=address`) I noticed a number of crashes with trivial requests such as the following:
```
GET //../HTTP/1.1\r\n\r\n
```
The problem is most visible on systems where `strcpy` is implemented using `memcpy` (e.g. GLIBC and macOS), here we end up with `memcpy` on overlapp... | Potential memory corruption/crash due to overlapping strcpy arguments | https://api.github.com/repos/blueness/sthttpd/issues/14/comments | 1 | 2021-01-26T20:14:02Z | 2021-02-08T08:40:46Z | https://github.com/blueness/sthttpd/issues/14 | 794,529,041 | 14 | 1,682 |
CVE-2020-35700 | 2021-02-08T09:15:12.463 | A second-order SQL injection issue in Widgets/TopDevicesController.php (aka the Top Devices dashboard widget) of LibreNMS before 21.1.0 allows remote authenticated attackers to execute arbitrary SQL commands via the sort_order parameter against the /ajax/form/widget-settings endpoint. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/librenms/librenms/blob/master/app/Http/Controllers/Widgets/TopDevicesController.php"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5FF7D7E0-76F6-43EE-B8D7-C22D68D9FD4A",
"versionEndExcluding": "21.1.0",
"versionEndIncluding": null,
"versionStartExcl... | [
"89"
] | 89 | https://github.com/librenms/librenms/issues/12405 | [
"Third Party Advisory"
] | github.com | [
"librenms",
"librenms"
] | Hi, can I please get a point of contact to report a security issue? The email address team@librenms.org is bouncing. Thanks! | security issue | https://api.github.com/repos/librenms/librenms/issues/12405/comments | 0 | 2020-12-22T14:03:39Z | 2021-01-07T11:44:28Z | https://github.com/librenms/librenms/issues/12405 | 772,970,476 | 12,405 | 1,683 |
CVE-2020-16629 | 2021-02-08T15:15:12.037 | PhpOK 5.4.137 contains a SQL injection vulnerability that can inject an attachment data through SQL, and then call the attachment replacement function through api.php to write a PHP file to the target path. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Gh0stF/phpok_cve/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:phpok:phpok:5.4.137:*:*:*:*:*:*:*",
"matchCriteriaId": "E367CCE4-12E3-47DC-B5A8-EDBB52E489F3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"89"
] | 89 | https://github.com/Gh0stF/phpok_cve/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Gh0stF",
"phpok_cve"
] | Problem location:
Here is the injection point framework / API / upload_control.php:67. The main operation is to save the file upload information to the database.
$upload = $this->lib('upload')->upload('upfile');
if (!$upload || !$upload['status']) {
$this - > JSON (p_lang ('attachment upload failed ');
... | phpokcms Sqli To Getshell | https://api.github.com/repos/Gh0stF/phpok_cve/issues/1/comments | 0 | 2020-02-06T05:33:40Z | 2020-02-06T05:33:40Z | https://github.com/Gh0stF/phpok_cve/issues/1 | 560,789,961 | 1 | 1,684 |
CVE-2021-25834 | 2021-02-08T18:15:13.740 | Cosmos Network Ethermint <= v0.4.0 is affected by a transaction replay vulnerability in the EVM module. If the victim sends a very large nonce transaction, the attacker can replay the transaction through the application. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/cosmos/ethermint/issues/686"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/cosmos/ethermint/issues/686"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:chainsafe:ethermint:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A35C91FB-4A33-4A25-8406-5F9143CF0828",
"versionEndExcluding": null,
"versionEndIncluding": "0.4.0",
"versionStartExc... | [
"294"
] | 294 | https://github.com/cosmos/ethermint/issues/686 | [
"Third Party Advisory"
] | github.com | [
"cosmos",
"ethermint"
] | ## Vulnerability Overview:
Since there is no explicit +1 limit on the nonce check used by ethermint, this results in transactions passing the antehandler checksum as long as they are greater than the node’s cached nonce. If the victim sends a very large nonce transaction, the attacker can replay the transaction.
... | Weak noncecheck lead to replay of transactions | https://api.github.com/repos/cosmos/ethermint/issues/686/comments | 2 | 2021-01-06T02:39:29Z | 2021-02-22T05:39:56Z | https://github.com/cosmos/ethermint/issues/686 | 779,904,555 | 686 | 1,685 |
CVE-2021-25835 | 2021-02-08T18:15:13.803 | Cosmos Network Ethermint <= v0.4.0 is affected by a cross-chain transaction replay vulnerability in the EVM module. Since ethermint uses the same chainIDEpoch and signature schemes with ethereum for compatibility, a verified signature in ethereum is still valid in ethermint with the same msg content and chainIDEpoch, w... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/cosmos/ethermint/issues/687"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cosmos/ethermint/pull/692"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:chainsafe:ethermint:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A35C91FB-4A33-4A25-8406-5F9143CF0828",
"versionEndExcluding": null,
"versionEndIncluding": "0.4.0",
"versionStartExc... | [
"294"
] | 294 | https://github.com/cosmos/ethermint/issues/687 | [
"Third Party Advisory"
] | github.com | [
"cosmos",
"ethermint"
] | ## Vulnerability Overview:
Since ethermint uses the same type of chainIDEpoch for ethereum compatibility, a verified signature in ethereum is still valid in ethermint with the same msg content and chainIDEpoch, which enables "cross-chain transaction replay" attack etc.
## Details and Root Cause:
First, we foun... | Replay Tx on another Chain | https://api.github.com/repos/cosmos/ethermint/issues/687/comments | 2 | 2021-01-06T03:01:00Z | 2021-04-17T00:03:01Z | https://github.com/cosmos/ethermint/issues/687 | 779,923,860 | 687 | 1,686 |
CVE-2020-24944 | 2021-02-08T21:15:13.007 | picoquic (before 3rd of July 2020) allows attackers to cause a denial of service (infinite loop) via a crafted QUIC frame, related to the picoquic_decode_frames and picoquic_decode_stream_frame functions and epoch==3. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/private-octopus/picoquic/issues/969"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https:... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:privateoctopus:picoquic:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D5AC7576-D03B-4558-A45C-5E31F89C4849",
"versionEndExcluding": "2020-07-03",
"versionEndIncluding": null,
"versio... | [
"835"
] | 835 | https://github.com/private-octopus/picoquic/issues/969 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"private-octopus",
"picoquic"
] | In picoquic QUIC server maliciously crafted QUIC frame triggers infinite loop while processing.
Incorrect logical conditions in picoquic_decode_frames() and picoquic_decode_stream_frame() leads to infinite loop after processing single packet in epoch==3.
Attack can be performed remotely without any user interacti... | Denial of Service vulnerability (infinite loop) while parsing malicious QUIC frame | https://api.github.com/repos/private-octopus/picoquic/issues/969/comments | 2 | 2020-07-02T16:25:16Z | 2020-07-03T01:33:27Z | https://github.com/private-octopus/picoquic/issues/969 | 650,060,583 | 969 | 1,687 |
CVE-2020-36148 | 2021-02-08T21:15:13.070 | Incorrect handling of input data in verifyAttribute function in the libmysofa library 0.5 - 1.1 will lead to NULL pointer dereference and segmentation fault error in case of restrictive memory protection or near NULL pointer overwrite in case of no memory restrictions (e.g. in embedded environments). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/hoene/libmysofa/issues/138"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.or... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:symonics:libmysofa:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1A54F39D-2695-46A2-98DF-7FCDF56A3EC2",
"versionEndExcluding": null,
"versionEndIncluding": "1.1",
"versionStartExclud... | [
"476"
] | 476 | https://github.com/hoene/libmysofa/issues/138 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"hoene",
"libmysofa"
] | Opening maliciously crafted file with mysofa_open leads to crash of the application.
NULL pointer dereference in verifyAttribute (tools.c:26) on variable attr->value causes segmentation fault.
Message from gdb:
> Program received signal SIGSEGV, Segmentation fault.
> __strcmp_sse2_unaligned () at ../sysdeps/x86_6... | NULL pointer dereference in verifyAttribute | https://api.github.com/repos/hoene/libmysofa/issues/138/comments | 2 | 2020-08-26T16:00:48Z | 2021-02-09T08:57:15Z | https://github.com/hoene/libmysofa/issues/138 | 686,437,740 | 138 | 1,688 |
CVE-2020-36149 | 2021-02-08T21:15:13.133 | Incorrect handling of input data in changeAttribute function in the libmysofa library 0.5 - 1.1 will lead to NULL pointer dereference and segmentation fault error in case of restrictive memory protection or near NULL pointer overwrite in case of no memory restrictions (e.g. in embedded environments). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/hoene/libmysofa/issues/137"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.or... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:symonics:libmysofa:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1A54F39D-2695-46A2-98DF-7FCDF56A3EC2",
"versionEndExcluding": null,
"versionEndIncluding": "1.1",
"versionStartExclud... | [
"476"
] | 476 | https://github.com/hoene/libmysofa/issues/137 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"hoene",
"libmysofa"
] | Opening maliciously crafted file with mysofa_open leads to crash of the application.
NULL pointer dereference in changeAttribute (tools.c:37) on variable attr->value causes segmentation fault.
Message from gdb:
> Program received signal SIGSEGV, Segmentation fault.
> __strcmp_sse2_unaligned () at ../sysdeps/x86_6... | NULL pointer dereference in changeAttribute | https://api.github.com/repos/hoene/libmysofa/issues/137/comments | 2 | 2020-08-26T15:56:07Z | 2021-02-09T08:57:17Z | https://github.com/hoene/libmysofa/issues/137 | 686,434,379 | 137 | 1,689 |
CVE-2020-36150 | 2021-02-08T21:15:13.180 | Incorrect handling of input data in loudness function in the libmysofa library 0.5 - 1.1 will lead to heap buffer overflow and access to unallocated memory block. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/hoene/libmysofa/issues/135"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.f... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:symonics:libmysofa:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1A54F39D-2695-46A2-98DF-7FCDF56A3EC2",
"versionEndExcluding": null,
"versionEndIncluding": "1.1",
"versionStartExclud... | [
"125"
] | 125 | https://github.com/hoene/libmysofa/issues/135 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"hoene",
"libmysofa"
] | Opening maliciously crafted file with mysofa_open leads to crash of the application.
Heap buffer overread by 126976 bytes in loudness() (libmysofa/src/hrtf/tools.c:179) cause segmentation fault.
Message from gdb:
> Program received signal SIGSEGV, Segmentation fault.
> 0x000000000040fcdc in loudness (in=0x65200... | Heap buffer overflow in loudness | https://api.github.com/repos/hoene/libmysofa/issues/135/comments | 2 | 2020-08-26T13:10:12Z | 2021-02-09T08:57:19Z | https://github.com/hoene/libmysofa/issues/135 | 686,307,539 | 135 | 1,690 |
CVE-2020-36151 | 2021-02-08T21:15:13.257 | Incorrect handling of input data in mysofa_resampler_reset_mem function in the libmysofa library 0.5 - 1.1 will lead to heap buffer overflow and overwriting large memory block. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/hoene/libmysofa/issues/134"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.f... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:symonics:libmysofa:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1A54F39D-2695-46A2-98DF-7FCDF56A3EC2",
"versionEndExcluding": null,
"versionEndIncluding": "1.1",
"versionStartExclud... | [
"787"
] | 787 | https://github.com/hoene/libmysofa/issues/134 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"hoene",
"libmysofa"
] | Opening maliciously crafted file with mysofa_open leads to crash of the application.
Heap buffer overflow is caused by zeroing memory block of size (-1 casted to unsigned) in mysofa_resampler_reset_mem (speex_resampler.c:798).
AddressSanitizer report on crash:
==4759==ERROR: AddressSanitizer: heap-buffer-overflow ... | Heap buffer overflow in mysofa_resampler_reset_mem | https://api.github.com/repos/hoene/libmysofa/issues/134/comments | 3 | 2020-08-25T18:42:17Z | 2021-02-09T08:57:21Z | https://github.com/hoene/libmysofa/issues/134 | 685,705,800 | 134 | 1,691 |
CVE-2020-36152 | 2021-02-08T21:15:13.320 | Buffer overflow in readDataVar in hdf/dataobject.c in Symonics libmysofa 0.5 - 1.1 allows attackers to execute arbitrary code via a crafted SOFA. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/hoene/libmysofa/issues/136"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.f... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:symonics:libmysofa:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1A54F39D-2695-46A2-98DF-7FCDF56A3EC2",
"versionEndExcluding": null,
"versionEndIncluding": "1.1",
"versionStartExclud... | [
"120"
] | 120 | https://github.com/hoene/libmysofa/issues/136 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"hoene",
"libmysofa"
] | Incorrect use of sprintf on a too small buffer leads to a stack buffer overflow by 4 bytes in dataobject.c:806.
This can lead to overwriting the next variable on the stack and logic errors in the application or crash in case of strong stack protection.
GDB stacktrace:
#10 0x00000000004123ce in sprintf (__fmt=0x442... | Stack buffer overflow in readDataVar | https://api.github.com/repos/hoene/libmysofa/issues/136/comments | 2 | 2020-08-26T15:33:36Z | 2021-02-09T08:57:24Z | https://github.com/hoene/libmysofa/issues/136 | 686,418,384 | 136 | 1,692 |
CVE-2021-26528 | 2021-02-08T21:15:13.680 | The mg_http_serve_file function in Cesanta Mongoose HTTP server 7.0 is vulnerable to remote OOB write attack via connection request after exhausting memory pool. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mongoose/issues/1201"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://githu... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mongoose:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "60B6E6E9-893D-4993-B8E4-906343FF7837",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"787"
] | 787 | https://github.com/cesanta/mongoose/issues/1201 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mongoose"
] | Mongoose HTTP server is vulnerable to remote OOB write attack via connection request after exhausting memory pool.
Incorrect handling of the value returned by calloc may lead to:
- NULL pointer dereference and segmentation fault error in case of restrictive memory protection,
- near NULL pointer overwrite in case ... | Out-of-bounds write caused by incorrect error handling of calloc in mg_http_serve_file (mongoose.c:800) | https://api.github.com/repos/cesanta/mongoose/issues/1201/comments | 1 | 2021-01-23T13:57:54Z | 2021-01-26T12:17:56Z | https://github.com/cesanta/mongoose/issues/1201 | 792,565,056 | 1,201 | 1,693 |
CVE-2021-26529 | 2021-02-08T21:15:13.740 | The mg_tls_init function in Cesanta Mongoose HTTPS server 7.0 and 6.7-6.18 (compiled with mbedTLS support) is vulnerable to remote OOB write attack via connection request after exhausting memory pool. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mongoose/issues/1203"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://githu... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mongoose:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7B840E82-6F04-41CB-AF1C-50643326A123",
"versionEndExcluding": null,
"versionEndIncluding": "6.18",
"versionStartExcludi... | [
"787"
] | 787 | https://github.com/cesanta/mongoose/issues/1203 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mongoose"
] | Mongoose HTTPS server (compiled with mbedTLS support) is vulnerable to remote OOB write attack via connection request after exhausting memory pool.
Incorrect handling of the value returned by calloc in mg_tls_init may lead to:
- out-of-bound write attempt and segmentation fault error in case of restrictive memory p... | Out-of-bounds write caused by incorrect error handling of calloc in mg_tls_init (mongoose.c:3297) | https://api.github.com/repos/cesanta/mongoose/issues/1203/comments | 1 | 2021-01-23T17:58:50Z | 2021-01-26T12:17:48Z | https://github.com/cesanta/mongoose/issues/1203 | 792,617,302 | 1,203 | 1,694 |
CVE-2021-26530 | 2021-02-08T21:15:13.803 | The mg_tls_init function in Cesanta Mongoose HTTPS server 7.0 (compiled with OpenSSL support) is vulnerable to remote OOB write attack via connection request after exhausting memory pool. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mongoose/issues/1204"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://githu... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mongoose:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "60B6E6E9-893D-4993-B8E4-906343FF7837",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"787"
] | 787 | https://github.com/cesanta/mongoose/issues/1204 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mongoose"
] | Mongoose HTTPS server (compiled with OpenSSL support) is vulnerable to remote OOB write attack via connection request after exhausting memory pool.
Incorrect handling of the value returned by calloc in mg_tls_init may lead to:
- out-of-bound write attempt and segmentation fault error in case of restrictive memory p... | Out-of-bounds write caused by incorrect error handling of calloc in mg_tls_init (mongoose.c:3443) | https://api.github.com/repos/cesanta/mongoose/issues/1204/comments | 1 | 2021-01-23T18:20:54Z | 2021-01-26T12:17:41Z | https://github.com/cesanta/mongoose/issues/1204 | 792,621,378 | 1,204 | 1,695 |
CVE-2021-21306 | 2021-02-08T22:15:12.450 | Marked is an open-source markdown parser and compiler (npm package "marked"). In marked from version 1.1.1 and before version 2.0.0, there is a Regular expression Denial of Service vulnerability. This vulnerability can affect anyone who runs user generated code through marked. This vulnerability is fixed in version 2.0... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/markedjs/marked/commit/7293251c438e3ee968970f7609f1a27f9007bccd"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:marked_project:marked:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "A9E51743-C978-477B-8B63-EEFC0C7EA788",
"versionEndExcluding": "2.0.0",
"versionEndIncluding": null,
"version... | [
"400"
] | 400 | https://github.com/markedjs/marked/issues/1927 | [
"Third Party Advisory"
] | github.com | [
"markedjs",
"marked"
] | **Marked version:** 1.2.9
**Describe the bug**
3 or more groups of odd and even-numbered consecutive underscores followed by a character takes a very long time to convert.
Example input: `_______________________________ ____________________ __________________________ a`
If you click on the Marked Demo link below,... | Groups of consecutive underscores in a specific pattern hang/take a long time to convert | https://api.github.com/repos/markedjs/marked/issues/1927/comments | 12 | 2021-02-05T01:36:23Z | 2021-05-11T18:39:42Z | https://github.com/markedjs/marked/issues/1927 | 801,767,434 | 1,927 | 1,696 |
CVE-2021-26916 | 2021-02-08T22:15:12.873 | In nopCommerce 4.30, a Reflected XSS issue in the Discount Coupon component allows remote attackers to inject arbitrary web script or HTML through the Filters/CheckDiscountCouponAttribute.cs discountcode parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nopSolutions/nopCommerce/issues/5322"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nopcommerce:nopcommerce:4.30:-:*:*:*:*:*:*",
"matchCriteriaId": "36397DE8-5530-44AD-94C0-926A81A5933E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"79"
] | 79 | https://github.com/nopSolutions/nopCommerce/issues/5322 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"nopSolutions",
"nopCommerce"
] | The vulnerability is a reflected XSS in the discountcode URL parameter. If an invalid discount code is entered, the value is reflected directly in the response without HTML encoding. This was tested on Google Chrome, Firefox and Edge with a fresh install of nopCommerce. I have attached a screenshot of the PoC.
The c... | XSS issue in the "discountcode" parameter | https://api.github.com/repos/nopSolutions/nopCommerce/issues/5322/comments | 1 | 2021-02-08T06:57:44Z | 2021-02-15T11:36:05Z | https://github.com/nopSolutions/nopCommerce/issues/5322 | 803,259,316 | 5,322 | 1,697 |
CVE-2020-22840 | 2021-02-09T14:15:14.903 | Open redirect vulnerability in b2evolution CMS version prior to 6.11.6 allows an attacker to perform malicious open redirects to an attacker controlled resource via redirect_to parameter in email_passthrough.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/161362/b2evolution-CMS-6.11.6-Open-Redirection.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:b2evolution:b2evolution:*:*:*:*:*:*:*:*",
"matchCriteriaId": "165A561F-3E58-44E9-9362-EB9F4DCD7C40",
"versionEndExcluding": "6.11.6",
"versionEndIncluding": null,
"versionSta... | [
"601"
] | 601 | https://github.com/b2evolution/b2evolution/issues/102 | [
"Third Party Advisory"
] | github.com | [
"b2evolution",
"b2evolution"
] | Hi @fplanque,
We have identified the following vulnerabilities in version 6.11.6-stable:
- Open redirect
- Multiple XSS
Please check your mail for more information.
| Multiple vulnerabilies in b2evolution version: 6.11.6-stable | https://api.github.com/repos/b2evolution/b2evolution/issues/102/comments | 5 | 2020-04-27T13:48:14Z | 2020-07-09T21:42:45Z | https://github.com/b2evolution/b2evolution/issues/102 | 607,565,832 | 102 | 1,698 |
CVE-2019-17582 | 2021-02-09T19:15:12.553 | A use-after-free in the _zip_dirent_read function of zip_dirent.c in libzip 1.2.0 allows attackers to have an unspecified impact by attempting to unzip a malformed ZIP archive. NOTE: the discoverer states "This use-after-free is triggered prior to the double free reported in CVE-2017-12858." | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nih-at/libzip/commit/2217022b7d1142738656d891e00b3d2d9179b796"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/nih... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libzip:libzip:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CBAF9F0B-71F7-4A20-9BA6-DCFCF3EA9268",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"416"
] | 416 | https://github.com/nih-at/libzip/issues/5 | [
"Third Party Advisory"
] | github.com | [
"nih-at",
"libzip"
] | On 1.2.0:
```
# ziptool $FILE cat index
==1771==ERROR: AddressSanitizer: heap-use-after-free on address 0x6030000000d1 at pc 0x7f267d085fc1 bp 0x7ffed21f65f0 sp 0x7ffed21f65e8
READ of size 1 at 0x6030000000d1 thread T0 ... | use-after-free in _zip_buffer_free (zip_buffer.c) | https://api.github.com/repos/nih-at/libzip/issues/5/comments | 2 | 2017-08-24T10:44:17Z | 2017-09-01T13:51:10Z | https://github.com/nih-at/libzip/issues/5 | 252,561,553 | 5 | 1,699 |
CVE-2020-14343 | 2021-02-09T21:15:12.707 | A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw.... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10,
"confidentialityImpact": "COMPLETE"... | [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860466"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://github.com/SeldonIO/seldon-core/issues/2252"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pyyaml:pyyaml:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B49BB31-68E9-4F02-8D00-925418F7372C",
"versionEndExcluding": "5.4",
"versionEndIncluding": null,
"versionStartExcluding":... | [
"20"
] | 20 | https://github.com/SeldonIO/seldon-core/issues/2252 | null | github.com | [
"SeldonIO",
"seldon-core"
] | Report [here](https://snyk.io/vuln/SNYK-PYTHON-PYYAML-590151)
Redhat report [here](https://access.redhat.com/security/cve/cve-2020-14343)
WIP in [pyaml project](https://github.com/yaml/pyyaml/issues/420) | Resolve CVE for PyYAML - CVE-2020-14343 | https://api.github.com/repos/SeldonIO/seldon-core/issues/2252/comments | 2 | 2020-08-07T07:51:11Z | 2021-01-27T12:41:45Z | https://github.com/SeldonIO/seldon-core/issues/2252 | 674,833,414 | 2,252 | 1,700 |
CVE-2020-14343 | 2021-02-09T21:15:12.707 | A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw.... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10,
"confidentialityImpact": "COMPLETE"... | [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860466"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://github.com/SeldonIO/seldon-core/issues/2252"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pyyaml:pyyaml:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B49BB31-68E9-4F02-8D00-925418F7372C",
"versionEndExcluding": "5.4",
"versionEndIncluding": null,
"versionStartExcluding":... | [
"20"
] | 20 | https://github.com/yaml/pyyaml/issues/420 | null | github.com | [
"yaml",
"pyyaml"
] | As of 5.3.1 .load() defaults to using FullLoader and FullLoader is still vulnerable to RCE when run on untrusted input. As demonstrated by the examples below, #386 was not enough to fix this issue.
Some example payloads:
```
!!python/object/new:tuple
- !!python/object/new:map
- !!python/name:eval
- [ "RCE... | .load() and FullLoader still vulnerable to fairly trivial RCE | https://api.github.com/repos/yaml/pyyaml/issues/420/comments | 44 | 2020-07-22T08:18:35Z | 2021-09-28T17:21:40Z | https://github.com/yaml/pyyaml/issues/420 | 663,569,505 | 420 | 1,701 |
CVE-2020-36244 | 2021-02-10T07:15:12.833 | The daemon in GENIVI diagnostic log and trace (DLT), is vulnerable to a heap-based buffer overflow that could allow an attacker to remotely execute arbitrary code on the DLT-Daemon (versions prior to 2.18.6). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/GENIVI/dlt-daemon/compare/v2.18.5...v2.18.6"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GENIVI/dlt-daemon/iss... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:genivi:diagnostic_log_and_trace:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9F4D7936-540E-459D-940C-5C87706FB017",
"versionEndExcluding": "2.18.6",
"versionEndIncluding": null,
"ve... | [
"787"
] | 787 | https://github.com/GENIVI/dlt-daemon/issues/265 | [
"Third Party Advisory"
] | github.com | [
"GENIVI",
"dlt-daemon"
] | Hello,
I have fuzzed dlt-daemon to search for bugs using the Tool [CI-Fuzz](https://www.code-intelligence.com/). I think I found a write heap buffer overflow in the function dlt_buffer_write_block. You can find the full crash report below. This is from a fuzz test I wrote to execute the function dlt_buffer_push with... | write heap buffer overflow in dlt_buffer_write_block | https://api.github.com/repos/COVESA/dlt-daemon/issues/265/comments | 11 | 2020-11-02T18:38:23Z | 2023-05-19T03:36:10Z | https://github.com/COVESA/dlt-daemon/issues/265 | 734,733,134 | 265 | 1,702 |
CVE-2020-26299 | 2021-02-10T18:15:12.703 | ftp-srv is an open-source FTP server designed to be simple yet configurable. In ftp-srv before version 4.4.0 there is a path-traversal vulnerability. Clients of FTP servers utilizing ftp-srv hosted on Windows machines can escape the FTP user's defined root folder using the expected FTP commands, for example, CWD and UP... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"confidentialityImpact": "PARTIAL"... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/autovance/ftp-srv/commit/457b859450a37cba10ff3c431eb4aa67771122e3"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Patch",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ftp-srv_project:ftp-srv:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "AA72E811-17FD-45E1-AA69-CC4D4C677F45",
"versionEndExcluding": "4.4.0",
"versionEndIncluding": null,
"versi... | [
"22"
] | 22 | https://github.com/autovance/ftp-srv/issues/167 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"autovance",
"ftp-srv"
] | Windows, default File System, root directory set in login event callback. User can browse parent directory using /../../ in URL.
Example:
`root: 'X:\\Project\\Storage\\User'`
URL `ftp://127.0.0.1/../../` becomes a command `CWD \/../../`
At line 30 in fs.js we have `nodePath.resolve('X:\Project\Storage\User', '.... | Windows: User can escape from root directory | https://api.github.com/repos/QuorumDMS/ftp-srv/issues/167/comments | 20 | 2019-07-17T12:56:53Z | 2021-11-30T19:50:33Z | https://github.com/QuorumDMS/ftp-srv/issues/167 | 469,177,567 | 167 | 1,703 |
CVE-2021-27186 | 2021-02-10T22:15:13.877 | Fluent Bit 1.6.10 has a NULL pointer dereference when an flb_malloc return value is not validated by flb_avro.c or http_server/api/v1/metrics.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/fluent/fluent-bit/issues/3044"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/f... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:treasuredata:fluent_bit:1.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "20744F77-02AC-4F07-A359-27275282DCE4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"476"
] | 476 | https://github.com/fluent/fluent-bit/issues/3044 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"fluent",
"fluent-bit"
] | ## Bug Report
**Describe the bug**
<!--- A clear and concise description of what the bug is. -->
NULL dereference (value returned by flb_malloc is not checked) after memory allocation error (flb_malloc is wrapper on malloc returning NULL on unsuccessful allocation).
In most cases this issue will lead to crash via... | NULL dereference on memory allocation error (src/ flb_avro) | https://api.github.com/repos/fluent/fluent-bit/issues/3044/comments | 3 | 2021-02-09T06:49:52Z | 2021-02-11T07:43:43Z | https://github.com/fluent/fluent-bit/issues/3044 | 804,266,845 | 3,044 | 1,704 |
CVE-2021-27190 | 2021-02-12T03:15:12.883 | A Stored Cross Site Scripting(XSS) Vulnerability was discovered in PEEL SHOPPING 9.3.0 and 9.4.0, which are publicly available. The user supplied input containing polyglot payload is echoed back in javascript code in HTML response. This allows an attacker to input malicious JavaScript which can steal cookie, redirect t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/advisto/peel-shopping/issues/4#issuecomment-953461611"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://githu... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:peel:peel_shopping:9.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8F6162D3-7FE6-4A81-8092-C639AB059B9C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"79"
] | 79 | https://github.com/advisto/peel-shopping/issues/4#issuecomment-953461611 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"advisto",
"peel-shopping"
] | ### [CVE-2021-27190](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27190) updated
## Vulnerability
Stored Cross Site Scripting (XSS) in the "Address" field of "http://localhost/peelshopping_9_4_0/utilisateurs/change_params.php"
## Affects
Peel Shopping 9.4.0
## Description
A Stored Cross Site Scri... | Stored Cross site Scripting in "‘Address’" parameter (Peel Shopping 9.4.0) | https://api.github.com/repos/advisto/peel-shopping/issues/4/comments | 1 | 2021-10-26T04:08:24Z | 2021-11-10T07:59:13Z | https://github.com/advisto/peel-shopping/issues/4 | 1,035,802,896 | 4 | 1,705 |
CVE-2020-35734 | 2021-02-15T21:15:13.263 | Sruu.pl in Batflat 1.3.6 allows an authenticated user to perform code injection (and consequently Remote Code Execution) via the input fields of the Users tab. To exploit this, one must login to the administration panel and edit an arbitrary user's data (username, displayed name, etc.). NOTE: This vulnerability only af... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http://packetstormsecurity.com/files/161457/Batflat-CMS-1.3.6-Remote-Code-Execution.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"u... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:batflat:batflat:1.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "CCD502D1-2B27-4BC5-9DF2-C71F42212D85",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"94"
] | 94 | https://github.com/sruupl/batflat/issues/98 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"sruupl",
"batflat"
] | Users tab attributes aren't sanitized and some of them allow for code injection. This means that an authenticated user with access to Users tab can execute arbitrary code on the web server with application privileges.
Adding user with PHP code in "Displayed name" field:
. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ntop/nDPI/issues/994"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nt... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nfstream:nfstream:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7C90CF7E-24AF-4023-9092-6A6C4530CBB8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"401"
] | 401 | https://github.com/ntop/nDPI/issues/994 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ntop",
"nDPI"
] | I am using `nfstream` to detect traffic, and the `dissect` option is turned on, which means that nfstream will use `nDPI` to complete this task. But I encountered a **memory leak** problem during use. Nfstream is developed based on the python language, memory leaks are rarely encountered, so I started to locate the cau... | Memory leak in ndpi_free_flow() | https://api.github.com/repos/ntop/nDPI/issues/994/comments | 5 | 2020-08-26T08:51:21Z | 2020-08-27T21:12:47Z | https://github.com/ntop/nDPI/issues/994 | 686,137,898 | 994 | 1,707 |
CVE-2020-36245 | 2021-02-17T22:15:12.633 | GramAddict through 1.2.3 allows remote attackers to execute arbitrary code because of use of UIAutomator2 and ATX-Agent. The attacker must be able to reach TCP port 7912, e.g., by being on the same Wi-Fi network. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact":... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/GramAddict/bot/issues/134"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gramaddict:gramaddict:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A4A6AB8-C6B0-45DA-9D04-BAFDB59259F7",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.3",
"versionStartE... | [
"306"
] | 306 | https://github.com/GramAddict/bot/issues/134 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"GramAddict",
"bot"
] | I discovered something very concerning just now.
When using [uiautomator2](https://github.com/openatx/uiautomator2), which is what GramAddict is based around, it silently installs the application [ATX-Agent](https://github.com/openatx/atx-agent) on your device, which opens a webserver on TCP port 7912, that lets any... | UIAutomator2 lets anyone on the network control/view your device! | https://api.github.com/repos/GramAddict/bot/issues/134/comments | 18 | 2020-12-08T10:55:40Z | 2021-03-19T15:51:07Z | https://github.com/GramAddict/bot/issues/134 | 759,345,639 | 134 | 1,708 |
CVE-2020-28496 | 2021-02-18T15:15:13.360 | This affects the package three before 0.125.0. This can happen when handling rgb or hsl colors. PoC: var three = require('three') function build_blank (n) { var ret = "rgb(" for (var i = 0; i < n; i++) { ret += " " } return ret + ""; } var Color = three.Color var time = Date.now(); new Color(build_blank(50000)) var tim... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/mrdoob/three.js/issues/21132"
},
{
"source": "report@snyk.io",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:three_project:three:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "A5487196-28D5-4BF5-B8A5-D3291128438F",
"versionEndExcluding": "0.125.0",
"versionEndIncluding": null,
"version... | [
"400"
] | 400 | https://github.com/mrdoob/three.js/issues/21132 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"mrdoob",
"three.js"
] | <!-- Ignoring this template may result in your bug report getting deleted -->
Hi,
I would like to report a Regular Expression Denial of Service (REDoS) vulnerability in three.
It allows cause a denial of service when handling rgb or hsl colors.
The vulnerable regex is located in https://github.com/mrdoob... | ReDoS in three | https://api.github.com/repos/mrdoob/three.js/issues/21132/comments | 1 | 2021-01-23T10:11:12Z | 2021-01-25T11:58:07Z | https://github.com/mrdoob/three.js/issues/21132 | 792,522,989 | 21,132 | 1,709 |
CVE-2020-28491 | 2021-02-18T16:15:13.207 | This affects the package com.fasterxml.jackson.dataformat:jackson-dataformat-cbor from 0 and before 2.11.4, from 2.12.0-rc1 and before 2.12.1. Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "report@snyk.io",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/FasterXML/jackson-dataformats-binary/commit/de072d314af8f5f269c8abec6930652af67bc8e6"
},
{
"source": "report@snyk.io",
"tags": [
"Issue Tracking",
"Patch",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-dataformats-binary:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6621426E-1001-48B0-BEFD-F032AFC27526",
"versionEndExcluding": "2.11.4",
"versionEndIncluding": null,
... | [
"770"
] | 770 | https://github.com/FasterXML/jackson-dataformats-binary/issues/186 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"FasterXML",
"jackson-dataformats-binary"
] | CBORParser.java _finishBytes() accepts an unchecked field string length value discovered during parsing, and is used to allocated a buffer. A malicious payload can be fabricated to exploit this and (at least) cause a java.lang.OutOfMemoryError exception.
```
@SuppressWarnings("resource")
protected byte[] _... | Eager allocation of byte buffer can cause `java.lang.OutOfMemoryError` exception (CVE-2020-28491) | https://api.github.com/repos/FasterXML/jackson-dataformats-binary/issues/186/comments | 17 | 2019-10-17T01:59:37Z | 2021-02-19T17:14:01Z | https://github.com/FasterXML/jackson-dataformats-binary/issues/186 | 508,187,241 | 186 | 1,710 |
CVE-2021-27329 | 2021-02-18T18:15:11.677 | Friendica 2021.01 allows SSRF via parse_url?binurl= for DNS lookups or HTTP requests to arbitrary domain names. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10,
"confidentialityImpact": "COMPLETE"... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/friendica/friendica/issues/9929"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Thi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:frendi:frendica:2021.01:*:*:*:*:*:*:*",
"matchCriteriaId": "7E01771F-BE73-421C-BB99-0257000C0AB5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"918"
] | 918 | https://github.com/friendica/friendica/issues/9929 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"friendica",
"friendica"
] | **Hello Friendica Team.**
### Issue detail
I found a vulnerability issue while testing frendica locally.
It is possible to induce the application to perform server-side DNS lookups of arbitrary domain names and HTTP request.
### Bug Description
The ability to send requests to other systems can allow the vulner... | External service interaction (HTTP & DNS) | https://api.github.com/repos/friendica/friendica/issues/9929/comments | 5 | 2021-02-14T03:31:00Z | 2021-02-19T06:22:33Z | https://github.com/friendica/friendica/issues/9929 | 807,880,142 | 9,929 | 1,711 |
CVE-2019-25024 | 2021-02-19T04:15:12.160 | OpenRepeater (ORP) before 2.2 allows unauthenticated command injection via shell metacharacters in the functions/ajax_system.php post_service parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10,
"confidentialityImpact": "COMPLETE"... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/OpenRepeater/openrepeater/issues/66"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/codexlynx/CVE-2019-25024"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:alleghenycreative:openrepeater:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F6B59951-2604-493B-9D6C-FC3805305E0D",
"versionEndExcluding": "2.2",
"versionEndIncluding": null,
"versio... | [
"78"
] | 78 | https://github.com/OpenRepeater/openrepeater/issues/66 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"OpenRepeater",
"openrepeater"
] | An unauthenticated malicious actor can execute arbitrary system commands via "__functions/ajax_system.php__". This has a critical impact in the security of the system, for example
* Download system database:
> $ curl \<ADDRESS>/openrepeater/functions/ajax_system.php --data "post_service=;cat /var/lib/openrepeater/d... | Unauthenticated Command Injection Flaw | https://api.github.com/repos/OpenRepeater/openrepeater/issues/66/comments | 2 | 2019-03-06T21:08:00Z | 2020-12-07T03:16:14Z | https://github.com/OpenRepeater/openrepeater/issues/66 | 418,009,444 | 66 | 1,712 |
CVE-2021-3210 | 2021-02-19T14:15:12.573 | components/Modals/HelpTexts/GenericAll/GenericAll.jsx in Bloodhound <= 4.0.1 allows remote attackers to execute arbitrary system commands when the victim imports a malicious data file containing JavaScript in the objectId parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPL... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/BloodHoundAD/BloodHound/blob/338e197dc4b7a1ee929c335141172ada5bc80800/src/components/Modals/HelpModal.jsx#L57"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bloodhound_project:bloodhound:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28AF6D85-0B1A-4E95-B434-622D024D82D2",
"versionEndExcluding": null,
"versionEndIncluding": "4.0.1",
"versi... | [
"79"
] | 79 | https://github.com/BloodHoundAD/BloodHound/issues/338 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"BloodHoundAD",
"BloodHound"
] | The **help text**-modal utilizes the React component attribute `dangerouslySetInnerHTML` when rendering the **Info**, **Abuse Info**, etc. texts. E.g. https://github.com/BloodHoundAD/BloodHound/blob/338e197dc4b7a1ee929c335141172ada5bc80800/src/components/Modals/HelpTexts/GenericAll/GenericAll.jsx#L31-L37
This makes ... | [Security] XSS in HelpModal leading to RCE via imported malicious data file | https://api.github.com/repos/SpecterOps/BloodHound-Legacy/issues/338/comments | 4 | 2020-06-21T16:20:56Z | 2022-08-03T16:14:30Z | https://github.com/SpecterOps/BloodHound-Legacy/issues/338 | 642,594,259 | 338 | 1,713 |
CVE-2021-26716 | 2021-02-21T06:15:12.257 | Modules/input/Views/schedule.php in Emoncms through 10.2.7 allows XSS via the node parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/emoncms/emoncms/issues/1652"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openenergymonitor:emoncms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CCCE00D-43E0-43B7-8BEE-D3AA3BA629D7",
"versionEndExcluding": null,
"versionEndIncluding": "10.2.7",
"versionS... | [
"79"
] | 79 | https://github.com/emoncms/emoncms/issues/1652 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"emoncms",
"emoncms"
] | Hi,
I have found a XSS in vulnerability in: emoncms/Modules/input/Views/schedule.php using the parameter 'node'
Proof of concept exploit: http://127.0.0.1:9000/Modules/input/Views/schedule.php?node=1%22;alert(1);var%20x=%22l | XSS Vulnerability | https://api.github.com/repos/emoncms/emoncms/issues/1652/comments | 1 | 2021-01-27T20:28:35Z | 2021-03-14T14:07:52Z | https://github.com/emoncms/emoncms/issues/1652 | 795,420,305 | 1,652 | 1,714 |
CVE-2021-27513 | 2021-02-22T00:15:12.310 | The module admin_ITSM in EyesOfNetwork 5.3-10 allows remote authenticated users to upload arbitrary .xml.php files because it relies on "le filtre userside." | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ArianeBlow/exploit-eyesofnetwork5.3.10/blob/main/PoC-BruteForceID-arbitraty-file-upload-RCE-PrivEsc.py"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyesofnetwork:eyesofnetwork:5.3-10:*:*:*:*:*:*:*",
"matchCriteriaId": "74EF3A57-69B9-4E5F-9E04-0273F5A011F3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | [
"434"
] | 434 | https://github.com/EyesOfNetworkCommunity/eonweb/issues/87 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"EyesOfNetworkCommunity",
"eonweb"
] | Bonjour,
En testant la version 5.3-10, je me suis rendu compte qu'il était possible d'uploader n'importe quel type de file en bypassant le filtre userside dans le module admin_ITSM, j'ai pu ainsi uploader un shell PHP en le nomant machin.xml.php via interception et modification de la requête.
Une demande d'enre... | Arbitrary file upload & RCE | https://api.github.com/repos/EyesOfNetworkCommunity/eonweb/issues/87/comments | 6 | 2021-02-21T07:41:32Z | 2021-03-18T10:11:05Z | https://github.com/EyesOfNetworkCommunity/eonweb/issues/87 | 812,796,100 | 87 | 1,715 |
CVE-2021-27368 | 2021-02-22T15:15:12.677 | The Contact page in Monica 2.19.1 allows stored XSS via the First Name field. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/monicahq/monica/issues/4888"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://githu... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:monicahq:monica:2.19.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E3CE0D8A-8910-46A7-BE3C-E4F44C09042F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"79"
] | 79 | https://github.com/monicahq/monica/issues/4888 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"monicahq",
"monica"
] | Hi there,
I'm using the latest version of Monica PRM web application 2.19.1, deployed on my local Ubuntu machine. I would like to report to you the existing of Cross Site Scripting Vulnerability in the Contact Page.
The following fields of the Contact object can be used to host a stored XSS ( First name, Middle nam... | Security Issue - XSS | https://api.github.com/repos/monicahq/monica/issues/4888/comments | 3 | 2021-02-18T10:29:23Z | 2022-05-02T00:05:09Z | https://github.com/monicahq/monica/issues/4888 | 810,967,891 | 4,888 | 1,716 |
CVE-2021-27568 | 2021-02-23T02:15:12.887 | An issue was discovered in netplex json-smart-v1 through 2015-10-23 and json-smart-v2 through 2.4. An exception is thrown from a function, but it is not caught, as demonstrated by NumberFormatException. When it is not caught, it may cause programs using the library to crash or expose sensitive information. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/netplex/json-smart-v1/issues/7"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/netplex/json-sm... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:json-smart_project:json-smart-v1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CF4BCC9F-24C9-4BA3-84D2-F31A3B473F34",
"versionEndExcluding": "1.3.2",
"versionEndIncluding": null,
"ve... | [
"754"
] | 754 | https://github.com/netplex/json-smart-v1/issues/7 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"netplex",
"json-smart-v1"
] | The parser fails to throw the ParseException when the parser expects the input to be of the float number type AND the input not being a valid number. This can lead to uncaught exceptions by unexpected input, which may lead to Denial-of-Service (DoS).
https://github.com/netplex/json-smart-v1/blob/51e1641ec53d3066c79f... | Uncaught Exception in Parser | https://api.github.com/repos/netplex/json-smart-v1/issues/7/comments | 2 | 2021-02-22T21:10:21Z | 2021-04-04T14:28:24Z | https://github.com/netplex/json-smart-v1/issues/7 | 813,866,347 | 7 | 1,717 |
CVE-2021-27568 | 2021-02-23T02:15:12.887 | An issue was discovered in netplex json-smart-v1 through 2015-10-23 and json-smart-v2 through 2.4. An exception is thrown from a function, but it is not caught, as demonstrated by NumberFormatException. When it is not caught, it may cause programs using the library to crash or expose sensitive information. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/netplex/json-smart-v1/issues/7"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/netplex/json-sm... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:json-smart_project:json-smart-v1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CF4BCC9F-24C9-4BA3-84D2-F31A3B473F34",
"versionEndExcluding": "1.3.2",
"versionEndIncluding": null,
"ve... | [
"754"
] | 754 | https://github.com/netplex/json-smart-v2/issues/60 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"netplex",
"json-smart-v2"
] | The parser fails to throw the ParseException when the parser expects the input to be of the float number type AND the input not being a valid number. This can lead to uncaught exceptions by unexpected input, which may lead to Denial-of-Service (DoS).
https://github.com/netplex/json-smart-v2/blob/4402bae12ada8009502b... | Uncaught Exception in Parser | https://api.github.com/repos/netplex/json-smart-v2/issues/60/comments | 8 | 2021-02-22T21:44:52Z | 2021-04-26T08:06:57Z | https://github.com/netplex/json-smart-v2/issues/60 | 813,889,987 | 60 | 1,718 |
CVE-2021-26926 | 2021-02-23T18:15:14.053 | A flaw was found in jasper before 2.0.25. An out of bounds read issue was found in jp2_decode function whic may lead to disclosure of information or program crash. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PART... | [
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jasper-software/jasper/commit/41f214b121b837fa30d9ca5f2430212110f5cd9b"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Issue Tracking",
"T... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jasper_project:jasper:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5F4472E5-259B-44B7-AAC5-93765989D527",
"versionEndExcluding": "2.0.25",
"versionEndIncluding": null,
"versionStart... | [
"125"
] | 125 | https://github.com/jasper-software/jasper/issues/264 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jasper-software",
"jasper"
] | Hi,
there's a heap-buffer-overflow vulnerability in function jp2_decode() , ( jp2_dec.c:280 )
poc: [poc.zip](https://github.com/jasper-software/jasper/files/5893235/poc.zip)
please compile the Jasper with ASAN, and run the poc with `"./jasper -f ~/Desktop/poc.jp2 --output-format jpg"`.
It seems because of the `at... | jp2_decode() heap-buffer-overflow vulnerability | https://api.github.com/repos/jasper-software/jasper/issues/264/comments | 5 | 2021-01-29T10:33:49Z | 2021-03-01T09:17:24Z | https://github.com/jasper-software/jasper/issues/264 | 796,768,912 | 264 | 1,719 |
CVE-2021-26927 | 2021-02-23T20:15:12.040 | A flaw was found in jasper before 2.0.25. A null pointer dereference in jp2_decode in jp2_dec.c may lead to program crash and denial of service. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jasper-software/jasper/commit/41f214b121b837fa30d9ca5f2430212110f5cd9b"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Issue Tracking",
"P... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jasper_project:jasper:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5F4472E5-259B-44B7-AAC5-93765989D527",
"versionEndExcluding": "2.0.25",
"versionEndIncluding": null,
"versionStart... | [
"476"
] | 476 | https://github.com/jasper-software/jasper/issues/265 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"jasper-software",
"jasper"
] | Hi,
There's a Null Pointer Access in `jp2_decode /home/dgh05t/fuzz/jasper-master/src/libjasper/jp2/jp2_dec.c:442`
run the poc with `"./jasper -f ~/Desktop/poc2.jp2 --output-format jpg"`
poc:
[poc2.zip](https://github.com/jasper-software/jasper/files/5893286/poc2.zip)
| jp2_decode() Null Pointer Access | https://api.github.com/repos/jasper-software/jasper/issues/265/comments | 3 | 2021-01-29T10:42:37Z | 2021-02-10T19:29:16Z | https://github.com/jasper-software/jasper/issues/265 | 796,774,807 | 265 | 1,720 |
CVE-2021-3405 | 2021-02-23T20:15:12.087 | A flaw was found in libebml before 1.4.2. A heap overflow bug exists in the implementation of EbmlString::ReadData and EbmlUnicodeString::ReadData in libebml. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Matroska-Org/libebml/issues/74"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.d... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:matroska:libebml:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A929FB51-F804-41A9-AF60-834ECB4352E8",
"versionEndExcluding": "1.4.2",
"versionEndIncluding": null,
"versionStartExclud... | [
"787"
] | 787 | https://github.com/Matroska-Org/libebml/issues/74 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Matroska-Org",
"libebml"
] | --[ 1. Summary
An extremely exploitable heap overflow bug exists in the implementation
of EbmlString::ReadData and EbmlUnicodeString::ReadData in libebml. This
bug is reachable from the current stable release of vlc.
--[ 2. Discussion
The issue exists in the calculation of the required buffer size to store
... | Ebml[Unicode]String::ReadData heap overflow bug on 32bit builds | https://api.github.com/repos/Matroska-Org/libebml/issues/74/comments | 4 | 2021-02-07T14:10:51Z | 2021-02-18T12:17:15Z | https://github.com/Matroska-Org/libebml/issues/74 | 802,961,245 | 74 | 1,721 |
CVE-2021-21323 | 2021-02-23T23:15:13.317 | Brave is an open source web browser with a focus on privacy and security. In Brave versions 1.17.73-1.20.103, the CNAME adblocking feature added in Brave 1.17.73 accidentally initiated DNS requests that bypassed the Brave Tor proxy. Users with adblocking enabled would leak DNS requests from Tor windows to their DNS pro... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/brave/brave-browser/issues/13527"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.co... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:brave:brave:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AD17A757-9D61-4E54-849D-AD603B5001F3",
"versionEndExcluding": null,
"versionEndIncluding": "1.20.103",
"versionStartExcludin... | [
"200"
] | 200 | https://github.com/brave/brave-browser/issues/13527 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"brave",
"brave-browser"
] | https://hackerone.com/reports/1077022
~~related: #4257. it appears this was a known issue at least in the muon days. unclear if it was ever fixed in brave-core.~~
UPDATE: cause was cname adblocking, so this is a regression, not an earlier issue. | [hackerone] Tor DNS issue | https://api.github.com/repos/brave/brave-browser/issues/13527/comments | 1 | 2021-01-12T23:53:28Z | 2023-01-01T20:58:13Z | https://github.com/brave/brave-browser/issues/13527 | 784,678,328 | 13,527 | 1,722 |
CVE-2021-3410 | 2021-02-23T23:15:14.160 | A flaw was found in libcaca v0.99.beta19. A buffer overflow issue in caca_resize function in libcaca/caca/canvas.c may lead to local execution of arbitrary code in the user context. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "patrick@puiterwijk.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928437"
},
{
"source": "patrick@puiterwijk.org",
"tags": [
"Third Party Advisory"
],
"url": "https:/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libcaca_project:libcaca:0.99:beta19:*:*:*:*:*:*",
"matchCriteriaId": "27B545C0-6311-4AD1-AC52-F9C86040A90B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | [
"190"
] | 190 | https://github.com/cacalabs/libcaca/issues/52 | [
"Third Party Advisory"
] | github.com | [
"cacalabs",
"libcaca"
] | Following vulnerability has been reported to Red Hat issue tracker:
https://bugzilla.redhat.com/show_bug.cgi?id=1928437 | CVE-2021-3410 | https://api.github.com/repos/cacalabs/libcaca/issues/52/comments | 8 | 2021-02-14T02:07:08Z | 2021-02-26T11:42:19Z | https://github.com/cacalabs/libcaca/issues/52 | 807,870,879 | 52 | 1,723 |
CVE-2021-3355 | 2021-02-24T15:15:13.933 | A stored-self XSS exists in LightCMS v1.3.4, allowing an attacker to execute HTML or JavaScript code in a vulnerable Title field to /admin/SensitiveWords. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/161562/LightCMS-1.3.4-Cross-Site-Scripting.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:lightcms_project:lightcms:1.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F82513F0-C30D-4A33-9847-EF0EB278146E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"79"
] | 79 | https://github.com/eddy8/LightCMS/issues/18 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"eddy8",
"LightCMS"
] | ### Description -
There's no escape being done before printing out the value of `noun`、`verb`、`exclusive` in the SensitiveWords page.
### LightCMS version - v1.3.4
### Steps to reproduce -
- Navigate to http://lightcms.bituier.com/admin/login & Log in to the background with the account admin and password a... | Stored XSS in "exclusive" field - SensitiveWords | https://api.github.com/repos/eddy8/LightCMS/issues/18/comments | 1 | 2021-01-26T06:15:44Z | 2021-02-01T01:08:26Z | https://github.com/eddy8/LightCMS/issues/18 | 793,966,506 | 18 | 1,724 |
CVE-2020-27224 | 2021-02-24T17:15:15.500 | In Eclipse Theia versions up to and including 1.2.0, the Markdown Preview (@theia/preview), can be exploited to execute arbitrary code. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPL... | [
{
"source": "emo@eclipse.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/eclipse-theia/theia/issues/7954"
},
{
"source": "emo@eclipse.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eclipse:theia:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B4523BE-7475-4619-B454-5E8D508EB99B",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.0",
"versionStartExcluding... | [
"79"
] | 79 | https://github.com/eclipse-theia/theia/issues/7954 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"eclipse-theia",
"theia"
] | ### Bug Description: XSS vulnerability in markdown preview
The Markdown Preview can exploited to execute arbitrary code.
### Steps to Reproduce:
1. Create markdown file and append the following text: <style onload="alert(0)">
2. Save and close the file.
3. Right click the file and select Open With -> Previ... | [security] XSS vulnerability in markdown preview | https://api.github.com/repos/eclipse-theia/theia/issues/7954/comments | 16 | 2020-06-03T20:15:17Z | 2021-02-24T16:51:43Z | https://github.com/eclipse-theia/theia/issues/7954 | 630,295,523 | 7,954 | 1,725 |
CVE-2020-23534 | 2021-02-25T16:15:12.150 | A server-side request forgery (SSRF) vulnerability in Upgrade.php of gopeak masterlab 2.1.5, via the 'source' parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gopeak/masterlab/issues/254"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third P... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:masterlab:masterlab:2.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EE09F1E6-3590-44E1-AA92-A3E594219236",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"918"
] | 918 | https://github.com/gopeak/masterlab/issues/254 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gopeak",
"masterlab"
] | 这里输入对bug做出清晰简洁的描述.
Vulnerability file path:/app/ctrl/Upgrade.php

POC:
http://192.168.222.123/Upgrade/run?source=gopher://192.168.31.103:1234/_Hello
 via the /convert/html endpoint when the src attribute of an HTML element refers to an internal system file, such as <iframe src='file:///etc/passwd'>. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/thecodingmachine/gotenberg/issues/261"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thecodingmachine:gotenberg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "04B8DDEA-4AE8-45F2-9FF8-77E45DACD9A0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"918"
] | 918 | https://github.com/thecodingmachine/gotenberg/issues/261 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"thecodingmachine",
"gotenberg"
] | ## Expected Behavior
- When attempting to convert html into a PDF using the /html endpoint, gotenberg should throw an exception (respond with a bad request) whenever there is an attempt to convert html with a source (src) reference to an internal system file.
- [HTTP POST] /convert/html
- [BODY] file: index.html >> ... | Server-Side Request Forgery <iframe src='file:///etc/passwd'> (in version 6.3.0) | https://api.github.com/repos/gotenberg/gotenberg/issues/261/comments | 8 | 2020-11-24T19:30:47Z | 2021-08-22T15:13:47Z | https://github.com/gotenberg/gotenberg/issues/261 | 749,979,322 | 261 | 1,727 |
CVE-2020-36079 | 2021-02-26T23:15:11.187 | Zenphoto through 1.5.7 is affected by authenticated arbitrary file upload, leading to remote code execution. The attacker must navigate to the uploader plugin, check the elFinder box, and then drag and drop files into the Files(elFinder) portion of the UI. This can, for example, place a .php file in the server's upload... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/161569/Zenphoto-CMS-1.5.7-Shell-Upload.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "h... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zenphoto:zenphoto:*:*:*:*:*:*:*:*",
"matchCriteriaId": "776AEF1F-758A-4080-BBB9-FDE3020D499A",
"versionEndExcluding": null,
"versionEndIncluding": "1.5.7",
"versionStartExclu... | [
"434"
] | 434 | https://github.com/zenphoto/zenphoto/issues/1292 | [
"Third Party Advisory"
] | github.com | [
"zenphoto",
"zenphoto"
] | [CVE-2020-36079](https://nvd.nist.gov/vuln/detail/CVE-2020-36079) vulnerability description is:
```
Zenphoto through 1.5.7 is affected by authenticated arbitrary file upload, leading to remote code execution. The attacker must navigate to the uploader plugin, check the elFinder box, and then drag and drop files into ... | CVE-2020-36079 clarification needed | https://api.github.com/repos/zenphoto/zenphoto/issues/1292/comments | 2 | 2021-02-28T15:14:45Z | 2021-03-03T09:25:56Z | https://github.com/zenphoto/zenphoto/issues/1292 | 818,230,210 | 1,292 | 1,728 |
CVE-2021-27884 | 2021-03-01T23:15:13.267 | Weak JSON Web Token (JWT) signing secret generation in YMFE YApi through 1.9.2 allows recreation of other users' JWT tokens. This occurs because Math.random in Node.js is used. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.6,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/YMFE/yapi/issues/2117"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://securitylab.github.com/advisories/GHSL-2020-228-YMFE-yapi"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ymfe:yapi:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D457FF7A-2FFE-425F-A0B8-C6F292C4DA10",
"versionEndExcluding": null,
"versionEndIncluding": "1.9.2",
"versionStartExcluding": n... | [
"330"
] | 330 | https://github.com/YMFE/yapi/issues/2117 | [
"Third Party Advisory"
] | github.com | [
"YMFE",
"yapi"
] | ## Summary
Weak random number generator is used to sign JSON Web Token (JWT).
## Product
[YApi](https://github.com/YMFE/yapi)
## Tested Version
The latest commit to the date: [8e1f654](https://github.com/YMFE/yapi/tree/8e1f6546d52ad6a3f8d3ce3325eb1d0276209f4c).
## Details
### JWT signing
Functio... | GitHub Security Lab (GHSL) Vulnerability Report: `GHSL-2020-228` | https://api.github.com/repos/YMFE/yapi/issues/2117/comments | 0 | 2021-02-23T14:55:07Z | 2021-02-23T14:57:23Z | https://github.com/YMFE/yapi/issues/2117 | 814,540,386 | 2,117 | 1,729 |
CVE-2021-27886 | 2021-03-02T00:15:18.097 | rakibtg Docker Dashboard before 2021-02-28 allows command injection in backend/utilities/terminal.js via shell metacharacters in the command parameter of an API request. NOTE: this is NOT a Docker, Inc. product. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/163416/Docker-Dashboard-Remote-Command-Execution.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:docker_dashboard_project:docker_dashboard:*:*:*:*:*:*:*:*",
"matchCriteriaId": "44392BD7-3321-4E6C-AF23-CFE01B6FE298",
"versionEndExcluding": "2021-02-28",
"versionEndIncluding": null,
... | [
"78"
] | 78 | https://github.com/rakibtg/docker-web-gui/issues/23 | [
"Third Party Advisory"
] | github.com | [
"rakibtg",
"docker-web-gui"
] | For example, making GET requests such as the following results in arbitrary commands being executed on the server, outside of the intended docker process only. This is otherwise known as a remote command injection bug (especially since app.js listens on the network interface by default, accessible by anyone on the netw... | Security: lack of input validation in APIs leads to command injection | https://api.github.com/repos/rakibtg/docker-web-gui/issues/23/comments | 5 | 2021-01-31T02:00:31Z | 2021-03-02T08:10:35Z | https://github.com/rakibtg/docker-web-gui/issues/23 | 797,597,769 | 23 | 1,730 |
CVE-2021-21353 | 2021-03-03T02:15:13.143 | Pug is an npm package which is a high-performance template engine. In pug before version 3.0.1, if a remote attacker was able to control the `pretty` option of the pug compiler, e.g. if you spread a user provided object such as the query parameters of a request into the pug template inputs, it was possible for them to ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pugjs/pug/commit/991e78f7c4220b2f8da042877c6f0ef5a4683be0"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Patch",
"T... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pugjs:pug:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "AE43CE50-8DE8-4487-BCCB-9E3931241EB2",
"versionEndExcluding": "3.0.1",
"versionEndIncluding": null,
"versionStartExcludi... | [
"74"
] | 74 | https://github.com/pugjs/pug/issues/3312 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"pugjs",
"pug"
] | Hello,
I found that pug may allow an attacker to inject arbitrary javascript code if an attacker can control `options.pretty`.
**Pug Version:** 3.0.0
## Proof of concept
Here is an vulnerable example including 2 files: **app.js** and **index.pug**.
In the example, there is only one variable "pretty" that i... | Code injection vulnerability in visitMixin and visitMixinBlock through "pretty" option | https://api.github.com/repos/pugjs/pug/issues/3312/comments | 4 | 2021-02-10T06:17:12Z | 2021-04-17T22:42:32Z | https://github.com/pugjs/pug/issues/3312 | 805,211,096 | 3,312 | 1,731 |
CVE-2020-8296 | 2021-03-03T18:15:13.847 | Nextcloud Server prior to 20.0.0 stores passwords in a recoverable format even when external storage is not configured. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "support@hackerone.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nextcloud/server/issues/17439"
},
{
"source": "support@hackerone.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ne... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "00443127-F3B3-47FF-AC22-4B9BF23CCD4A",
"versionEndExcluding": "20.0.0",
"versionEndIncluding": null,
"version... | [
"521"
] | 521 | https://github.com/nextcloud/server/issues/17439 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"nextcloud",
"server"
] | Hi,
Can i get informations about the algorithm used to hash password inside oc_credentials.
I think this is synchronous hash because nextcloud need it with external storage but i’m not sure ?
Best regards
| Oc_credentials security? | https://api.github.com/repos/nextcloud/server/issues/17439/comments | 13 | 2019-10-07T11:19:59Z | 2020-05-19T10:09:23Z | https://github.com/nextcloud/server/issues/17439 | 503,388,023 | 17,439 | 1,732 |
CVE-2021-22877 | 2021-03-03T18:15:14.707 | A missing user check in Nextcloud prior to 20.0.6 inadvertently populates a user's own credentials for other users external storage configuration when not already configured yet. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"confidentialityImpact": "PARTIAL"... | [
{
"source": "support@hackerone.com",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nextcloud/server/issues/24600"
},
{
"source": "support@hackerone.com",
"tags": [
"Patch",
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6FEA4E5F-306F-4E45-AB46-C232BCB0F4EB",
"versionEndExcluding": "20.0.6",
"versionEndIncluding": null,
"version... | [
"862"
] | 862 | https://github.com/nextcloud/server/issues/24600 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"nextcloud",
"server"
] | <!--
Thanks for reporting issues back to Nextcloud!
Note: This is the **issue tracker of Nextcloud**, please do NOT use this to get 4answers to your questions or get help for fixing your installation. This is a place to report bugs to developers, after your server has been debugged. You can find help debugging your... | Wrong (malformed) external storage credentials saved in `oc_storages_credentials` | https://api.github.com/repos/nextcloud/server/issues/24600/comments | 3 | 2020-12-07T21:33:05Z | 2021-02-01T14:10:28Z | https://github.com/nextcloud/server/issues/24600 | 758,866,869 | 24,600 | 1,733 |
CVE-2021-27935 | 2021-03-03T20:15:12.437 | An issue was discovered in AdGuard before 0.105.2. An attacker able to get the user's cookie is able to bruteforce their password offline, because the hash of the password is stored in the cookie. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/AdguardTeam/AdGuardHome/issues/2470"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Thi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adguard:adguard_home:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8978CCDB-CABE-49C9-A3B7-9F55F8AF474F",
"versionEndExcluding": "0.105.2",
"versionEndIncluding": null,
"versionStart... | [
"522"
] | 522 | https://github.com/AdguardTeam/AdGuardHome/issues/2470 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"AdguardTeam",
"AdGuardHome"
] | It [seems]( https://github.com/AdguardTeam/AdGuardHome/blob/bdff46ec1dc8bfebaea236fef5e4ea64b4f21738/internal/home/auth.go#L279-L289 ) that the username as well as the bcrypt'ed password have their sha256 stored in the cookie.
This is a bit worrying, since an attacker able to get the cookie would not only gain acces... | Hash of the password stored in the cookies | https://api.github.com/repos/AdguardTeam/AdGuardHome/issues/2470/comments | 6 | 2020-12-21T18:37:22Z | 2021-03-03T21:30:06Z | https://github.com/AdguardTeam/AdGuardHome/issues/2470 | 772,381,498 | 2,470 | 1,734 |
CVE-2021-24031 | 2021-03-04T21:15:12.743 | In the Zstandard command-line utility prior to v1.4.1, output files were created with default permissions. Correct file permissions (matching the input) would only be set at completion time. Output files could therefore be readable or writable to unintended parties. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve-assign@fb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981404"
},
{
"source": "cve-assign@fb.com",
"tags": [
"Exploit",
"Issue Tracking... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:facebook:zstandard:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7BB54F72-0467-43BC-B73A-DA6DC8A55FD9",
"versionEndExcluding": "1.4.1",
"versionEndIncluding": null,
"versionStartExcl... | [
"276"
] | 276 | https://github.com/facebook/zstd/issues/1630 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"facebook",
"zstd"
] | While the final file mode is reflective of the input file, when compressing or uncompressing, the file can temporarily gain greater permissions than the input and potentially leading to security issues (especially if large files are being handled).
Example: `file` has mode 600 -> `zstd file` -> `file.zst` has mode 6... | zstd adds read permissions to files while being compressed or uncompressed | https://api.github.com/repos/facebook/zstd/issues/1630/comments | 13 | 2019-06-04T18:29:11Z | 2021-03-05T22:01:21Z | https://github.com/facebook/zstd/issues/1630 | 452,143,298 | 1,630 | 1,735 |
CVE-2021-24032 | 2021-03-04T21:15:12.963 | Beginning in v1.4.1 and prior to v1.4.9, due to an incomplete fix for CVE-2021-24031, the Zstandard command-line utility created output files with default permissions and restricted those permissions immediately afterwards. Output files could therefore momentarily be readable or writable to unintended parties. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve-assign@fb.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982519"
},
{
"source": "cve-assign@fb.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:facebook:zstandard:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D09560DA-1F1B-41AA-B96F-DABEE82C04D0",
"versionEndExcluding": "1.4.9",
"versionEndIncluding": null,
"versionStartExcl... | [
"276"
] | 276 | https://github.com/facebook/zstd/issues/2491 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"facebook",
"zstd"
] | The patches for #1630 still create the file with the default umask, before chmod'ing down to 0600, so an attacker could still open it in the meantime. inotify can for instance help automating such an attack.
zstd should either set the mode directly through open(2), or use umask(2) before creating the file.
This i... | Race condition allows attacker to access world-readable destination file | https://api.github.com/repos/facebook/zstd/issues/2491/comments | 2 | 2021-02-11T07:41:51Z | 2021-02-17T22:05:35Z | https://github.com/facebook/zstd/issues/2491 | 806,153,115 | 2,491 | 1,736 |
CVE-2021-3403 | 2021-03-04T22:15:14.577 | In ytnef 1.9.3, the TNEFSubjectHandler function in lib/ytnef.c allows remote attackers to cause a denial-of-service (and potentially code execution) due to a double free which can be triggered via a crafted file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1926967"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ytnef_project:ytnef:1.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0801E2DD-1A5E-47C8-8CF3-4B41CDE4B5D9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"415"
] | 415 | https://github.com/Yeraze/ytnef/issues/85 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Yeraze",
"ytnef"
] | While it seems there are many checks which ought to prevent various memory corruption situations it seems there's a double free that can be triggered still as of ecc9d87. With ASAN and some crafted input:
```
=================================================================
==2678633==ERROR: AddressSanitizer: atte... | Double free via TNEFSubjectHandler | https://api.github.com/repos/Yeraze/ytnef/issues/85/comments | 1 | 2021-01-30T11:51:22Z | 2021-03-05T14:06:10Z | https://github.com/Yeraze/ytnef/issues/85 | 797,400,586 | 85 | 1,737 |
CVE-2021-3404 | 2021-03-04T22:15:14.657 | In ytnef 1.9.3, the SwapWord function in lib/ytnef.c allows remote attackers to cause a denial-of-service (and potentially code execution) due to a heap buffer overflow which can be triggered via a crafted file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1926965"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ytnef_project:ytnef:1.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0801E2DD-1A5E-47C8-8CF3-4B41CDE4B5D9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"787"
] | 787 | https://github.com/Yeraze/ytnef/issues/86 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Yeraze",
"ytnef"
] | A heap buffer overflow can be triggered as of ecc9d87 with crafted input, despite `ytnef` recognizing that the provided input file is not valid:
```
ERROR: Checksum mismatch. Data corruption?:
```
However when built with ASAN we see that `SwapWord` attempts to read invalid memory before said error message can b... | Heap buffer overflow via TNEFVersion | https://api.github.com/repos/Yeraze/ytnef/issues/86/comments | 1 | 2021-01-30T11:51:28Z | 2021-03-05T14:05:15Z | https://github.com/Yeraze/ytnef/issues/86 | 797,400,610 | 86 | 1,738 |
CVE-2021-25313 | 2021-03-05T09:15:13.503 | A Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rancher allows remote attackers to execute JavaScript via malicious links. This issue affects: SUSE Rancher Rancher versions prior to 2.5.6. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "meissner@suse.de",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1181852"
},
{
"source": "meissner@suse.de",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:suse:rancher:*:*:*:*:*:*:*:*",
"matchCriteriaId": "409DC667-DF62-4860-B9C1-F8060D93631D",
"versionEndExcluding": "2.5.6",
"versionEndIncluding": null,
"versionStartExcluding"... | [
"79"
] | 79 | https://github.com/rancher/rancher/issues/31583 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"rancher",
"rancher"
] | When accessing the Rancher API with a browser, user input in the URL was not properly escaped and was vulnerable to an XSS attack. Specially crafted URLs to these API endpoints could include JavaScript which would be embedded in the page and execute in a browser. There is no direct mitigation. Avoid clicking on untrust... | XSS script execution vulnerability | https://api.github.com/repos/rancher/rancher/issues/31583/comments | 0 | 2021-03-04T05:15:24Z | 2021-06-02T12:03:29Z | https://github.com/rancher/rancher/issues/31583 | 821,761,554 | 31,583 | 1,739 |
CVE-2021-28040 | 2021-03-05T18:15:13.270 | An issue was discovered in OSSEC 3.6.0. An uncontrolled recursion vulnerability in os_xml.c occurs when a large number of opening and closing XML tags is used. Because recursion is used in _ReadElem without restriction, an attacker can trigger a segmentation fault once unmapped memory is reached. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ossec/ossec-hids/issues/1953"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ossec:ossec:3.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5194EBBE-813E-4C77-BE63-1302B9E88855",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"674"
] | 674 | https://github.com/ossec/ossec-hids/issues/1953 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ossec",
"ossec-hids"
] | # os_xml _ReadElem() - Uncontrolled recursion vulnerability
## INTRODUCTION
An Uncontrolled Recursion vulnerability has been identified in the `os_xml` XML parsing library used by OSSEC.
Through the `os_xml/examples/test.c` code, a flaw has been identified in `os_xml.c` that allows non-defined recursion cycles... | os_xml _ReadElem() - Uncontrolled recursion vulnerability leading to DoS (SIGSEGV) | https://api.github.com/repos/ossec/ossec-hids/issues/1953/comments | 3 | 2021-02-23T14:37:16Z | 2022-05-12T08:54:48Z | https://github.com/ossec/ossec-hids/issues/1953 | 814,524,956 | 1,953 | 1,740 |
CVE-2021-21361 | 2021-03-09T01:15:13.230 | The `com.bmuschko:gradle-vagrant-plugin` Gradle plugin contains an information disclosure vulnerability due to the logging of the system environment variables. When this Gradle plugin is executed in public CI/CD, this can lead to sensitive credentials being exposed to malicious actors. This is fixed in version 3.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"confidentialityImpact": "PART... | [
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-jpcm-4485-69p7"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Th... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vagrant_project:vagrant:*:*:*:*:*:gradle:*:*",
"matchCriteriaId": "3AFF2CD1-56CD-4765-AF25-F7B928781487",
"versionEndExcluding": "0.6",
"versionEndIncluding": null,
"versionS... | [
"532"
] | 532 | https://github.com/bmuschko/gradle-vagrant-plugin/issues/19 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"bmuschko",
"gradle-vagrant-plugin"
] | ## Problem
Currently if `environmentVariables` is set, this will cause the [whole environment from the Gradle process](https://github.com/bmuschko/gradle-vagrant-plugin/blob/630a33b2e16f0f9eced983ec3bfbad289b81201f/src/main/groovy/com/bmuschko/gradle/vagrant/utils/OsUtils.groovy#L28) to be inherited to the vagrant c... | Potential credentials leak when setting environmentVariables | https://api.github.com/repos/bmuschko/gradle-vagrant-plugin/issues/19/comments | 6 | 2021-02-15T18:01:12Z | 2021-03-08T17:45:17Z | https://github.com/bmuschko/gradle-vagrant-plugin/issues/19 | 808,729,863 | 19 | 1,741 |
CVE-2021-20245 | 2021-03-09T19:15:12.500 | A flaw was found in ImageMagick in coders/webp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE"... | [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928943"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advis... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "465FCAC7-2745-4B78-AF5C-58D7B3A8D424",
"versionEndExcluding": "6.9.11-62",
"versionEndIncluding": null,
"version... | [
"369"
] | 369 | https://github.com/ImageMagick/ImageMagick/issues/3176 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | When `image->ticks_per_second` was set to zero, a division by zero error would happen in line 961. So a crafted file may trigger undefined behavior in the form of division by zero. Maybe there need a `PerceptibleReciprocal()` to do division in line 961?
https://github.com/ImageMagick/ImageMagick/blob/74f8868c779a5bd... | Division by zero in WriteAnimatedWEBPImage() in coders/webp.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/3176/comments | 2 | 2021-02-02T06:03:44Z | 2021-02-17T07:16:38Z | https://github.com/ImageMagick/ImageMagick/issues/3176 | 798,961,516 | 3,176 | 1,742 |
CVE-2020-23721 | 2021-03-10T14:15:12.373 | An issue was discovered in FUEL CMS V1.4.7. An attacker can use a XSS payload and bypass a filter via /fuelCM/fuel/pages/edit/1?lang=english. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/559"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E8B64313-C2ED-4400-9EDE-2AC0DB753CBC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | [
"79"
] | 79 | https://github.com/daylightstudio/FUEL-CMS/issues/559 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"daylightstudio",
"FUEL-CMS"
] | HI:
The attacker bypasses the filter In this pages page!
POC:
`"><details/open/ontoggle=\u0061\u006c\u0065\u0072\u0074(/xss/)>`
<img width="842" alt="222" src="https://user-images.githubusercontent.com/12816285/85382827-eb30d780-b571-11ea-8a59-928afc638ae9.png">
<img width="698" alt="333" src="https://user-images... | bypass filter XSS vunerability | https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/559/comments | 0 | 2020-06-23T08:53:30Z | 2021-05-14T13:59:44Z | https://github.com/daylightstudio/FUEL-CMS/issues/559 | 643,655,458 | 559 | 1,743 |
CVE-2020-23722 | 2021-03-10T14:15:12.453 | An issue was discovered in FUEL CMS 1.4.7. There is a escalation of privilege vulnerability to obtain super admin privilege via the "id" and "fuel_id" parameters. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/560"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E8B64313-C2ED-4400-9EDE-2AC0DB753CBC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | [
"639"
] | 639 | https://github.com/daylightstudio/FUEL-CMS/issues/560 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"daylightstudio",
"FUEL-CMS"
] | General users can modify the administrator password and account infomation vulnerability .
for example:
The account test123 can chanage the admin password!!!
step 1:
log in test123:
<img width="958" alt="1" src="https://user-images.githubusercontent.com/12816285/85488214-81abda00-b600-11ea-9b6e-b8c0551322df.png">
... | General users can modify the administrator password vulnerability | https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/560/comments | 1 | 2020-06-24T02:12:08Z | 2020-07-02T15:18:03Z | https://github.com/daylightstudio/FUEL-CMS/issues/560 | 644,263,989 | 560 | 1,744 |
CVE-2020-24791 | 2021-03-10T14:15:12.547 | FUEL CMS 1.4.8 allows SQL injection via the 'fuel_replace_id' parameter in pages/replace/1. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/561"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https:... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "AB4A4A9E-CC08-4A74-A807-92843A9912E8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | [
"89"
] | 89 | https://github.com/daylightstudio/FUEL-CMS/issues/561 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"daylightstudio",
"FUEL-CMS"
] | FUEL CMS 1.4.8 allows SQL Injection via parameter 'fuel_replace_id' in pages/replace/1
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
POC:
POST /FUEL-CMS-1.4.8/fuel/pages/replace/1?inline=1 HTTP/1.1
... | FUEL CMS 1.4.8 allows SQL Injection via parameter 'fuel_replace_id' in pages/replace/1 | https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/561/comments | 0 | 2020-08-19T08:22:40Z | 2020-09-23T16:35:29Z | https://github.com/daylightstudio/FUEL-CMS/issues/561 | 681,646,072 | 561 | 1,745 |
CVE-2020-28705 | 2021-03-10T14:15:12.623 | FUEL CMS 1.4.13 contains a cross-site request forgery (CSRF) vulnerability that can delete a page via a post ID to /pages/delete/3. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/commit/fbf2d59215800f05d4359e8f984d5680d62f0f3b"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "22D4ECFB-0516-4086-83DA-AA5F1EE17D26",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | [
"352"
] | 352 | https://github.com/daylightstudio/FUEL-CMS/issues/576 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"daylightstudio",
"FUEL-CMS"
] | In /pages/delete/3 Cross-site request forgery (CSRF) vulnerability The Attacker can use this vulnerability to delete random pages!
<img width="536" alt="222png" src="https://user-images.githubusercontent.com/68934938/98192825-c0f71980-1f56-11eb-8c11-efb7a60f17ad.png">
POC:
 vulnerability | https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/576/comments | 0 | 2020-11-05T02:54:39Z | 2021-05-14T13:59:33Z | https://github.com/daylightstudio/FUEL-CMS/issues/576 | 736,567,837 | 576 | 1,746 |
CVE-2021-3224 | 2021-03-10T14:15:12.703 | A stored cross-site scripting (XSS) vulnerability in cszcms 1.2.9 exists in /admin/pages/new via the content parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cskaza/cszcms/issues/28"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://www.cszcms.com/"
},
{
"source":... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cszcms:csz_cms:1.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "0068F78B-C701-4A09-8978-A0D07EE14906",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"79"
] | 79 | https://github.com/cskaza/cszcms/issues/28 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cskaza",
"cszcms"
] | Hi,@cskaza
I found a Stored XSS Vulnerability In /admin/pages/new (release/1.2.9)
In content page ,The content Parameter are not filtered:

 | https://api.github.com/repos/cskaza/cszcms/issues/28/comments | 8 | 2021-01-13T02:19:45Z | 2021-12-04T09:23:31Z | https://github.com/cskaza/cszcms/issues/28 | 784,731,354 | 28 | 1,747 |
CVE-2021-28122 | 2021-03-10T15:15:12.930 | A request-validation issue was discovered in Open5GS 2.1.3 through 2.2.x before 2.2.1. The WebUI component allows an unauthenticated user to use a crafted HTTP API request to create, read, update, or delete entries in the subscriber database. For example, new administrative users can be added. The issue occurs because ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/open5gs/open5gs/compare/v2.2.0...v2.2.1"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/open5gs/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "34A2C732-AE91-433F-9A9E-3B28F7503E47",
"versionEndExcluding": null,
"versionEndIncluding": "2.2.0",
"versionStartExcludi... | [
"306"
] | 306 | https://github.com/open5gs/open5gs/issues/837 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"open5gs",
"open5gs"
] | An unauthenticated user can utilize information provided by the login page of the webui component to craft HTTP requests that will allow that user to create, read, update, and delete entries in the subscriber database. This includes the ability to add administrative users, add/modify/delete subscribers, and add/modify/... | Authentication Bypass in Webui | https://api.github.com/repos/open5gs/open5gs/issues/837/comments | 1 | 2021-03-10T13:18:52Z | 2023-03-21T22:35:28Z | https://github.com/open5gs/open5gs/issues/837 | 827,727,045 | 837 | 1,748 |
CVE-2021-26776 | 2021-03-11T17:15:12.843 | CSZ CMS 1.2.9 is affected by a cross-site scripting (XSS) vulnerability in multiple pages through the field name. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cskaza/cszcms/issues/29"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cszcms:csz_cms:1.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "0068F78B-C701-4A09-8978-A0D07EE14906",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"79"
] | 79 | https://github.com/cskaza/cszcms/issues/29 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cskaza",
"cszcms"
] | Multiple Stored XSS Cross-Site Scripting on CSZ CMS 1.2.9
Login with editor account with rights to Forms Builder, XML Plugin Widgets, Statistic for link, Banner Manager, Carousel Widget, Pages Content, Language, Plugin Manager.
```
Forms Builder
- Add or edit Forms Builder:
Forms Name: <noframes><p title="</... | Multiple Stored XSS Cross-Site Scripting on CSZ CMS 1.2.9 | https://api.github.com/repos/cskaza/cszcms/issues/29/comments | 2 | 2021-02-02T01:16:34Z | 2021-11-10T08:58:04Z | https://github.com/cskaza/cszcms/issues/29 | 798,839,047 | 29 | 1,749 |
CVE-2021-27677 | 2021-03-11T17:15:12.907 | Cross-site scripting (XSS) vulnerability in Galleries in Batflat CMS 1.3.6 allows remote attackers to inject arbitrary web script or HTML via the field name. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/sruupl/batflat/issues/105"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Par... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:batflat:batflat:1.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "CCD502D1-2B27-4BC5-9DF2-C71F42212D85",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"79"
] | 79 | https://github.com/sruupl/batflat/issues/105 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"sruupl",
"batflat"
] | Multiple Stored XSS Cross-Site Scripting on Batflat CMS 1.3.6
Login with editor account with rights to Navigation, Galleries, Snippets
<h2>Navigation</h2>
```
Add link
payload: "><img src=x onerror=alert(document.cookie)>
```
 through 4.6.0 allows arbitrary file access. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which manipulates the readFile and writeFile APIs. NOTE: the vendor states "The way we secured the app is that it does not allow any rem... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/camunda/camunda-modeler/issues/2143"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:camunda:modeler:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3E8FC2A3-2C9A-48E2-A874-9D63E2CB0E20",
"versionEndExcluding": null,
"versionEndIncluding": "4.6.0",
"versionStartExcludi... | [
"862"
] | 862 | https://github.com/camunda/camunda-modeler/issues/2143 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"camunda",
"camunda-modeler"
] | __Describe the Bug__
Hi,
Great work!
We did a security analysis and found that `app/lib/preload.js` directly expose risky ipcRenderer instance to unsafe renderer process, which enables a remote attacker to abuse sensitive methods in the main process by crafting malicious ipc message.
I notice that the app has ... | Arbitrary filesystem manipulation vulnerability introduced by IPC exposure | https://api.github.com/repos/camunda/camunda-modeler/issues/2143/comments | 5 | 2021-03-09T16:17:42Z | 2021-03-15T14:20:13Z | https://github.com/camunda/camunda-modeler/issues/2143 | 826,182,019 | 2,143 | 1,751 |
CVE-2020-36282 | 2021-03-12T01:15:12.373 | JMS Client for RabbitMQ 1.x before 1.15.2 and 2.x before 2.2.0 is vulnerable to unsafe deserialization that can result in code execution via crafted StreamMessage data. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rabbitmq/rabbitmq-jms-client/issues/135"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/ra... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rabbitmq:jms_client:*:*:*:*:*:rabbitmq:*:*",
"matchCriteriaId": "88DCB385-FDA7-44B3-B4DF-B3FAE97D5AE2",
"versionEndExcluding": "1.15.2",
"versionEndIncluding": null,
"version... | [
"502"
] | 502 | https://github.com/rabbitmq/rabbitmq-jms-client/issues/135 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"rabbitmq",
"rabbitmq-jms-client"
] | `StreamMessage` should use the same "white list" mechanism as `ObjectMessage` to avoid some arbitrary code execution on deserialization.
Even though `StreamMessage` is supposed to handle only primitive types, it is still to possible to send a message that contains an arbitrary serializable instance. The consuming ap... | Limit StreamMessage deserialization | https://api.github.com/repos/rabbitmq/rabbitmq-jms-client/issues/135/comments | 0 | 2020-11-02T10:38:12Z | 2020-11-02T12:10:38Z | https://github.com/rabbitmq/rabbitmq-jms-client/issues/135 | 734,391,983 | 135 | 1,752 |
CVE-2021-23354 | 2021-03-12T15:15:14.207 | The package printf before 0.6.1 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex string /\%(?:\(([\w_.]+)\)|([1-9]\d*)\$)?([0 +\-\]*)(\*|\d+)?(\.)?(\*|\d+)?[hlL]?([\%bscdeEfFgGioOuxX])/g in lib/printf.js. The vulnerable regular expression has cubic worst-case time complexity. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/adaltas/node-printf/issues/31"
},
{
"source": "report@snyk.io",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://git... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adaltas:printf:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "355FBD56-0D7A-4DB1-9517-BAD18C121E39",
"versionEndExcluding": "0.6.1",
"versionEndIncluding": null,
"versionStartEx... | [
"1333"
] | 1333 | https://github.com/adaltas/node-printf/issues/31 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"adaltas",
"node-printf"
] | Hi,
I would like to report two Regular Expression Denial of Service (REDoS) vulnerability in `printf`.
It allows cause a denial of service when using crafted invalid formats.
You can execute the code below to reproduce the vulnerability.
```JS
var printf = require("printf")
function build_attack(n) {... | ReDoS in printf | https://api.github.com/repos/adaltas/node-printf/issues/31/comments | 5 | 2021-02-09T11:49:09Z | 2021-02-12T12:21:35Z | https://github.com/adaltas/node-printf/issues/31 | 804,479,506 | 31 | 1,753 |
CVE-2021-28302 | 2021-03-12T15:15:14.377 | A stack overflow in pupnp before version 1.14.5 can cause the denial of service through the Parser_parseDocument() function. ixmlNode_free() will release a child node recursively, which will consume stack space and lead to a crash. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pupnp/pupnp/issues/249"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/pupnp/pupnp/rele... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pupnp_project:pupnp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AEB13C63-2F47-4A96-B84F-5226835BDCBF",
"versionEndExcluding": "1.14.5",
"versionEndIncluding": null,
"versionStartEx... | [
"770"
] | 770 | https://github.com/pupnp/pupnp/issues/249 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pupnp",
"pupnp"
] | hi, this poc caused a crash.
When parsing xml, if there if too many "<a>" in it ,that causes a crash.
The problem is in the function Parser_parseDocument() , After parses all < a >, it can't find the closed node, and finally enters the errorhandler. When using ixmlDocument_free(), When releases gRootDoc, ixmlNode_... | Too many nested tags will lead to stack space exhaustion, resulting in signal 11 (SIGSEGV) | https://api.github.com/repos/pupnp/pupnp/issues/249/comments | 15 | 2021-03-12T02:54:55Z | 2022-01-06T14:50:50Z | https://github.com/pupnp/pupnp/issues/249 | 829,708,638 | 249 | 1,754 |
CVE-2021-28161 | 2021-03-12T22:15:15.077 | In Eclipse Theia versions up to and including 1.8.0, in the debug console there is no HTML escaping, so arbitrary Javascript code can be injected. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "emo@eclipse.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/eclipse-theia/theia/issues/8794"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"T... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eclipse:theia:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F6229F48-421D-4A07-B017-8E6F07F4121E",
"versionEndExcluding": null,
"versionEndIncluding": "1.8.0",
"versionStartExcluding... | [
"79"
] | 79 | https://github.com/eclipse-theia/theia/issues/8794 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"eclipse-theia",
"theia"
] | ### Bug Description:
In the debug console there is no HTML escaping, so arbitrary Javascript code can be injected. I think the issue is `dangerouslySetInnerHTML` in [ansi-console-item.tsx](https://github.com/eclipse-theia/theia/blob/497452921c55fcda82e0ab50d79e4531fc1abf1b/packages/console/src/browser/ansi-console-i... | XSS in Debug Console [Theia v1.8.0] | https://api.github.com/repos/eclipse-theia/theia/issues/8794/comments | 6 | 2020-11-28T23:36:58Z | 2021-04-19T23:06:57Z | https://github.com/eclipse-theia/theia/issues/8794 | 752,791,480 | 8,794 | 1,755 |
CVE-2021-28162 | 2021-03-12T22:15:15.157 | In Eclipse Theia versions up to and including 0.16.0, in the notification messages there is no HTML escaping, so Javascript code can run. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "emo@eclipse.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/eclipse-theia/theia/issues/7283"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"T... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eclipse:theia:*:*:*:*:*:*:*:*",
"matchCriteriaId": "636CCCB3-F8BE-4506-84BA-8E7D21601BF0",
"versionEndExcluding": null,
"versionEndIncluding": "0.16.0",
"versionStartExcludin... | [
"829"
] | 829 | https://github.com/eclipse-theia/theia/issues/7283 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"eclipse-theia",
"theia"
] | ### Description
In the notification messages there is no an HTML escaping, so Javascript code can run. I'm not sure, but I think the issue is in [packages/messages/src/browser/notification-component.tsx:76](https://github.com/eclipse-theia/theia/blob/1ca3ec37c079a6b316278cf292609653e57b8151/packages/messages/src/bro... | Javascript injection via notification messages | https://api.github.com/repos/eclipse-theia/theia/issues/7283/comments | 5 | 2020-03-05T15:45:25Z | 2021-03-12T21:40:07Z | https://github.com/eclipse-theia/theia/issues/7283 | 576,347,925 | 7,283 | 1,756 |
CVE-2021-23357 | 2021-03-15T17:15:21.597 | All versions of package github.com/tyktechnologies/tyk/gateway are vulnerable to Directory Traversal via the handleAddOrUpdateApi function. This function is able to delete arbitrary JSON files on the disk where Tyk is running via the management API. The APIID is provided by the user and this value is then used to creat... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/TykTechnologies/tyk/issues/3390"
},
{
"source": "report@snyk.io",
"tags": [
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMTYKTEC... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tyk:tyk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "31F492C7-6DF7-4CCA-9B23-C2063688FDB8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
... | [
"22"
] | 22 | https://github.com/TykTechnologies/tyk/issues/3390 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"TykTechnologies",
"tyk"
] | **Branch/Environment/Version**
- Branch/Version: https://github.com/TykTechnologies/tyk/tree/v3.0.1
- Environment: On-Prem, Linux
**Describe the bug**
The function at https://github.com/TykTechnologies/tyk/blob/v3.0.1/gateway/api.go#L771 is able to delete arbitrary JSON files on disk where Tyk is running via the ... | [TT-1397] Security: Path Traversal Bug - Able to delete/modify arbitrary JSON files via management API | https://api.github.com/repos/TykTechnologies/tyk/issues/3390/comments | 1 | 2020-11-17T23:13:51Z | 2023-04-12T16:38:52Z | https://github.com/TykTechnologies/tyk/issues/3390 | 745,156,773 | 3,390 | 1,757 |
CVE-2020-24263 | 2021-03-16T15:15:12.530 | Portainer 1.24.1 and earlier is affected by an insecure permissions vulnerability that may lead to remote arbitrary code execution. A non-admin user is allowed to spawn new containers with critical capabilities such as SYS_MODULE, which can be used to take over the Docker host. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/portainer/portainer/issues/4105"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/portainer/portainer/issue... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:portainer:portainer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CA8836F8-EA3E-4DCB-9B6B-FA6111980475",
"versionEndExcluding": null,
"versionEndIncluding": "1.24.1",
"versionStartEx... | [
"732"
] | 732 | https://github.com/portainer/portainer/issues/4105 | [
"Third Party Advisory"
] | github.com | [
"portainer",
"portainer"
] | We currently provide the ability for a user to specify additional container capabilities when deploying a container, both using the container UX and also via a compose file. There are certain capabilities that could be escalate privilege higher than a user should need for reasonable activities, and therefore may be dee... | Disable Container Capabilities for non-admins | https://api.github.com/repos/portainer/portainer/issues/4105/comments | 3 | 2020-07-27T03:51:32Z | 2021-01-19T21:05:25Z | https://github.com/portainer/portainer/issues/4105 | 665,954,628 | 4,105 | 1,758 |
CVE-2020-24264 | 2021-03-16T15:15:12.607 | Portainer 1.24.1 and earlier is affected by incorrect access control that may lead to remote arbitrary code execution. The restriction checks for bind mounts are applied only on the client-side and not the server-side, which can lead to spawning a container with bind mount. Once such a container is spawned, it can be l... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10,
"confidentialityImpact": "COMPLETE"... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/portainer/portainer/issues/4106"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/portainer/portainer/issue... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:portainer:portainer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CA8836F8-EA3E-4DCB-9B6B-FA6111980475",
"versionEndExcluding": null,
"versionEndIncluding": "1.24.1",
"versionStartEx... | [
"863"
] | 863 | https://github.com/portainer/portainer/issues/4106 | [
"Third Party Advisory"
] | github.com | [
"portainer",
"portainer"
] | Right now we allow the Portainer administrator to "disable the use of bind mounts by non-admins", which is purely a front-end restriction, and is more of a "hide the capability". This feature stops using from selecting to use bind mounts in the container / service creation views, and stops the use of bind mounts when w... | enforce the security switch "disable the use of bind mounts" when set via API | https://api.github.com/repos/portainer/portainer/issues/4106/comments | 5 | 2020-07-27T03:57:20Z | 2021-03-17T19:42:13Z | https://github.com/portainer/portainer/issues/4106 | 665,956,241 | 4,106 | 1,759 |
CVE-2021-20218 | 2021-03-16T21:15:10.930 | A flaw was found in the fabric8 kubernetes-client in version 4.2.0 and after. This flaw allows a malicious pod/container to cause applications using the fabric8 kubernetes-client `copy` command to extract files outside the working path. The highest threat from this vulnerability is to integrity and system availability.... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "NONE... | [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923405"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/f... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:kubernetes-client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "396A03F1-9514-4805-9AB5-6B31FD4B4413",
"versionEndExcluding": "4.7.2",
"versionEndIncluding": null,
"versionSta... | [
"22"
] | 22 | https://github.com/fabric8io/kubernetes-client/issues/2715 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"fabric8io",
"kubernetes-client"
] | A recently found [vulnerability](https://seclists.org/oss-sec/2021/q1/19) was fixed in [another project](https://github.com/kubernetes-client/java/issues/1491) similar to this one. It might potentially affect [a similar implementation](https://github.com/fabric8io/kubernetes-client/blob/c9bf95da45f2560a7be7651fc37db525... | Potential CVE? | https://api.github.com/repos/fabric8io/kubernetes-client/issues/2715/comments | 2 | 2021-01-12T04:35:34Z | 2021-02-17T15:53:53Z | https://github.com/fabric8io/kubernetes-client/issues/2715 | 783,901,313 | 2,715 | 1,760 |
CVE-2021-28681 | 2021-03-18T04:15:14.617 | Pion WebRTC before 3.0.15 didn't properly tear down the DTLS Connection when certificate verification failed. The PeerConnectionState was set to failed, but a user could ignore that and continue to use the PeerConnection. )A WebRTC implementation shouldn't allow the user to continue if verification has failed.) | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pion/webrtc/issues/1708"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/pion/webrtc/security/adv... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:webrtc_project:webrtc:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6268E745-4C5D-4103-AD3F-0B16DBA1B1CD",
"versionEndExcluding": "3.0.15",
"versionEndIncluding": null,
"versionStart... | [
"863"
] | 863 | https://github.com/pion/webrtc/issues/1708 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"pion",
"webrtc"
] | <!--
Come join our community on Slack https://pion.ly/slack for quicker support and more resources
We also provide a Knowledge Base https://pion.ly/knowledge-base that covers Pion and general WebRTC
We maintain a FAQ of common issues and questions https://pion.ly/knowledge-base/pion-basics/faq/
Pleas... | DTLS Fingerprints in SDP Offer/Answer are not verified | https://api.github.com/repos/pion/webrtc/issues/1708/comments | 9 | 2021-03-17T22:26:36Z | 2021-03-18T00:41:08Z | https://github.com/pion/webrtc/issues/1708 | 834,225,058 | 1,708 | 1,761 |
CVE-2021-28417 | 2021-03-18T12:15:12.037 | A cross-site scripting (XSS) issue in Seo Panel 4.8.0 allows remote attackers to inject JavaScript via archive.php and the "search_name" parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/162914/Seo-Panel-4.8.0-Cross-Site-Scripting.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:seopanel:seo_panel:4.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA338EF9-AC8B-411D-8BE3-9F9A2E68F8E0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"79"
] | 79 | https://github.com/seopanel/Seo-Panel/issues/208 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"seopanel",
"Seo-Panel"
] | Hi team,
I would like to report XSS vulnerability.
**Description**
A cross-site scripting (XSS) issue in the SEO admin login panel version 4.8.0 allows remote attackers to inject JavaScript via the "redirect" parameter.
___
**XSS Payload:** x%22%20onmouseover%3dalert(document.cookie)%20x%3d%22
___
**Vuln... | XSS Vulnerability in "search_name" parameter | https://api.github.com/repos/seopanel/Seo-Panel/issues/208/comments | 0 | 2021-03-11T19:12:27Z | 2021-03-22T07:52:32Z | https://github.com/seopanel/Seo-Panel/issues/208 | 829,446,239 | 208 | 1,762 |
CVE-2021-28418 | 2021-03-18T12:15:12.100 | A cross-site scripting (XSS) issue in Seo Panel 4.8.0 allows remote attackers to inject JavaScript via settings.php and the "category" parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/162914/Seo-Panel-4.8.0-Cross-Site-Scripting.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:seopanel:seo_panel:4.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA338EF9-AC8B-411D-8BE3-9F9A2E68F8E0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"79"
] | 79 | https://github.com/seopanel/Seo-Panel/issues/207 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"seopanel",
"Seo-Panel"
] | Hi team,
I would like to report XSS vulnerability.
**Description**
A cross-site scripting (XSS) issue in the SEO admin login panel version 4.8.0 allows remote attackers to inject JavaScript via the "redirect" parameter.
___
**XSS Payload**: x%22%20onmouseover%3dalert(document.cookie)%20x%3d%22
___
**Vuln... | XSS Vulnerability in "category" parameter | https://api.github.com/repos/seopanel/Seo-Panel/issues/207/comments | 2 | 2021-03-11T19:08:43Z | 2021-03-24T09:02:13Z | https://github.com/seopanel/Seo-Panel/issues/207 | 829,443,724 | 207 | 1,763 |
CVE-2021-28419 | 2021-03-18T12:15:12.177 | The "order_col" parameter in archive.php of SEO Panel 4.8.0 is vulnerable to time-based blind SQL injection, which leads to the ability to retrieve all databases. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/162322/SEO-Panel-4.8.0-SQL-Injection.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:seopanel:seo_panel:4.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA338EF9-AC8B-411D-8BE3-9F9A2E68F8E0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"89"
] | 89 | https://github.com/seopanel/Seo-Panel/issues/209 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"seopanel",
"Seo-Panel"
] | Hi Team
I would like to report Time-based blind SQLI.
**Description:**
SQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might ... | Time-based blind SQLi Injection Vulnerability in "order_col" parameter | https://api.github.com/repos/seopanel/Seo-Panel/issues/209/comments | 1 | 2021-03-13T12:05:18Z | 2021-03-23T10:32:02Z | https://github.com/seopanel/Seo-Panel/issues/209 | 830,884,757 | 209 | 1,764 |
CVE-2021-28420 | 2021-03-18T12:15:12.240 | A cross-site scripting (XSS) issue in Seo Panel 4.8.0 allows remote attackers to inject JavaScript via alerts.php and the "from_time" parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/162914/Seo-Panel-4.8.0-Cross-Site-Scripting.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:seopanel:seo_panel:4.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA338EF9-AC8B-411D-8BE3-9F9A2E68F8E0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"79"
] | 79 | https://github.com/seopanel/Seo-Panel/issues/206 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"seopanel",
"Seo-Panel"
] | Hi team,
I would like to report XSS vulnerability.
**Description**
A cross-site scripting (XSS) issue in the SEO admin login panel in version 4.8.0 allows remote attackers to inject JavaScript via the "from_time" parameter.
___
**XSS Payload:** x%22%20onmouseover%3dalert(document.cookie)%20x%3d%2... | XSS Vulnerablity in "from_time" parameter | https://api.github.com/repos/seopanel/Seo-Panel/issues/206/comments | 0 | 2021-03-11T19:06:01Z | 2021-06-02T16:40:46Z | https://github.com/seopanel/Seo-Panel/issues/206 | 829,441,836 | 206 | 1,765 |
CVE-2020-36144 | 2021-03-18T20:15:13.020 | Redash 8.0.0 is affected by LDAP Injection. There is an information leak through the crafting of special queries, escaping the provided template since the username included in the search filter lacks sanitization. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/getredash/redash/issues/5426"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/getr... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redash:redash:8.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E99307EF-9777-4D61-AA36-E2EE410F9561",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"74"
] | 74 | https://github.com/getredash/redash/issues/5426 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"getredash",
"redash"
] | I've tried to contact the security team through `security@redash.io` but had no response. I'm attaching the CVE contents for a proper fix.
Suggested description
> Redash 8.0.0 is affected by LDAP Injection. There is an information leak through the crafting of special queries, escaping the provided template since th... | LDAP Injection | https://api.github.com/repos/getredash/redash/issues/5426/comments | 3 | 2021-03-14T02:16:09Z | 2024-02-01T19:57:52Z | https://github.com/getredash/redash/issues/5426 | 831,046,370 | 5,426 | 1,766 |
CVE-2021-27519 | 2021-03-19T19:15:13.913 | A cross-site scripting (XSS) issue in FUDForum 3.1.0 allows remote attackers to inject JavaScript via index.php in the "srch" parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/162942/FUDForum-3.1.0-Cross-Site-Scripting.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fudforum:fudforum:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F38C9CCE-ABB8-4093-9EED-D11EF11F8B07",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"79"
] | 79 | https://github.com/fudforum/FUDforum/issues/2 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"fudforum",
"FUDforum"
] | **What is XSS**
Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser-side script, to a different end-user. Flaw... | Cross Site Scripting | https://api.github.com/repos/fudforum/FUDforum/issues/2/comments | 1 | 2021-02-17T07:30:23Z | 2021-03-18T20:10:00Z | https://github.com/fudforum/FUDforum/issues/2 | 809,934,824 | 2 | 1,767 |
CVE-2021-27308 | 2021-03-22T15:15:14.160 | A cross-site scripting (XSS) vulnerability in the admin login panel in 4images version 1.8 allows remote attackers to inject JavaScript via the "redirect" parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/162946/4Images-1.8-Cross-Site-Scripting.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:4homepages:4images:1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "8D15DA7C-22D1-4281-951E-FD4F5BA2BE54",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"79"
] | 79 | https://github.com/4images/4images/issues/3 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"4images",
"4images"
] | **Vulnerable parameter**: redirect
**XSS sample Payload**: '"()%26%25<e><ScRiPt%20>alert(document.cookie)</ScRiPt>
**Steps to reproduce the vulnerability(POC)**:
1- Goto 4images admin panel page (demo instance:https://localhost/4images/admin/index.php)
2- Enter the credentials , Turn on the intercept and click ... | 4images v1.8 - 'Admin panel login' Cross-Site Scripting | https://api.github.com/repos/4images/4images/issues/3/comments | 1 | 2021-02-13T12:30:30Z | 2022-10-02T12:45:28Z | https://github.com/4images/4images/issues/3 | 807,740,811 | 3 | 1,768 |
CVE-2021-21401 | 2021-03-23T18:15:13.160 | Nanopb is a small code-size Protocol Buffers implementation in ansi C. In Nanopb before versions 0.3.9.8 and 0.4.5, decoding a specifically formed message can cause invalid `free()` or `realloc()` calls if the message type contains an `oneof` field, and the `oneof` directly contains both a pointer field and a non-point... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.5,
"confidentialityImpact": "NONE"... | [
{
"source": "security-advisories@github.com",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/nanopb/nanopb/blob/c9124132a604047d0ef97a09c0e99cd9bed2c818/CHANGELOG.txt#L1"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nanopb_project:nanopb:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A39AC3AB-38B5-453C-B7A8-AC4B55CA26B3",
"versionEndExcluding": "0.3.9.8",
"versionEndIncluding": null,
"versionStar... | [
"763"
] | 763 | https://github.com/nanopb/nanopb/issues/647 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"nanopb",
"nanopb"
] | This affects `0.3.9.7` (and probably lower versions, though I haven't checked) with `PB_ENABLE_MALLOC` enabled.
Specially crafted bytes can make `pb_decode` eventually call `pb_free` on an arbitrary pointer. Here's the smallest repro case I could make:
```cpp
/*
// Equivalent to:
syntax = "proto3";
message Re... | Ill-formed oneof message leads to calling free on an arbitrary pointer | https://api.github.com/repos/nanopb/nanopb/issues/647/comments | 3 | 2021-03-20T00:14:28Z | 2021-03-22T17:46:41Z | https://github.com/nanopb/nanopb/issues/647 | 836,515,067 | 647 | 1,769 |
CVE-2020-24994 | 2021-03-23T20:15:13.073 | Stack overflow in the parse_tag function in libass/ass_parse.c in libass before 0.15.0 allows remote attackers to cause a denial of service or remote code execution via a crafted file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/libass/libass/commit/6835731c2fe4164a0c50bc91d12c43b2a2b4e"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://gi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libass_project:libass:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EFE0DEE3-A9C6-4008-BB80-4B5A6D9B0B4E",
"versionEndExcluding": "0.15.0",
"versionEndIncluding": null,
"versionStart... | [
"770"
] | 770 | https://github.com/libass/libass/issues/422 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"libass",
"libass"
] | **Description**
A vulnerability was found in function parse_tag in ass_parse.c:234 ,which allow attackers to cause a denial of service or remote code execution via a crafted file.
test@test:~/libass-0.14.0/afl$ ./a.out crash/poc
======================= INFO =========================
This binary is built for AF... | stack-overflow on ass_parse.c:234 *parse_tag | https://api.github.com/repos/libass/libass/issues/422/comments | 5 | 2020-08-27T02:18:39Z | 2021-04-20T01:05:07Z | https://github.com/libass/libass/issues/422 | 686,885,373 | 422 | 1,770 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.