cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2021-41499
2021-12-17T21:15:07.740
Buffer Overflow Vulnerability exists in ajaxsoundstudio.com n Pyo < 1.03 in the Server_debug function, which allows remote attackers to conduct DoS attacks by deliberately passing on an overlong audio file name.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/belangeo/pyo/issues/222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pyo_project:pyo:*:*:*:*:*:*:*:*", "matchCriteriaId": "DBFD19B6-2D7C-415D-823C-0627D116B27D", "versionEndExcluding": "1.03", "versionEndIncluding": null, "versionStartExcludin...
[ "120" ]
120
https://github.com/belangeo/pyo/issues/222
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "belangeo", "pyo" ]
### Code snippet ``` Server_start_rec_internal(Server *self, char *filename) { ................. Server_debug(self, "Recording filename path = %s\n", filename); ----> filename comes from external module, the length is indeterminate if (! (self->recfile = sf_open(filename, SFM_WRITE, &self-...
Insecure function vsprintf may cause write-overflow in function Server_debug
https://api.github.com/repos/belangeo/pyo/issues/222/comments
3
2021-05-27T06:14:03Z
2021-06-14T00:44:45Z
https://github.com/belangeo/pyo/issues/222
903,262,717
222
2,879
CVE-2021-41500
2021-12-17T21:15:07.777
Incomplete string comparison vulnerability exits in cvxopt.org cvxop <= 1.2.6 in APIs (cvxopt.cholmod.diag, cvxopt.cholmod.getfactor, cvxopt.cholmod.solve, cvxopt.cholmod.spsolve), which allows attackers to conduct Denial of Service attacks by construct fake Capsule objects.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cvxopt/cvxopt/issues/193" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/pack...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cvxopt_project:cvxopt:*:*:*:*:*:python:*:*", "matchCriteriaId": "09087B40-5FE5-41EC-9F26-55F2FE4B4575", "versionEndExcluding": null, "versionEndIncluding": "1.2.6", "versionS...
[ "697" ]
697
https://github.com/cvxopt/cvxopt/issues/193
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cvxopt", "cvxopt" ]
### Code snippet ``` static PyObject* solve(PyObject *self, PyObject *args, PyObject *kwrds) { ............ if (!PyArg_ParseTupleAndKeywords(args, kwrds, "OO|iiii", kwlist, &F, &B, &sys, &nrhs, &ldB, &oB)) return NULL; #if PY_MAJOR_VERSION >= 3 if (!PyCapsule_CheckExact...
Incomplete comparison with function strncmp
https://api.github.com/repos/cvxopt/cvxopt/issues/193/comments
4
2021-05-27T07:26:26Z
2021-09-20T10:01:22Z
https://github.com/cvxopt/cvxopt/issues/193
903,324,402
193
2,880
CVE-2021-45288
2021-12-21T17:15:08.630
A Double Free vulnerability exists in filedump.c in GPAC 1.0.1, which could cause a Denail of Service via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1956" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "415" ]
415
https://github.com/gpac/gpac/issues/1956
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [Yes ] I looked for a similar issue and couldn't find any. - [ Yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ Yes] I give en...
Double Free in filedump.c:199
https://api.github.com/repos/gpac/gpac/issues/1956/comments
0
2021-12-10T07:28:18Z
2021-12-10T10:01:22Z
https://github.com/gpac/gpac/issues/1956
1,076,525,998
1,956
2,881
CVE-2020-19770
2021-12-21T18:15:07.683
A cross-site scripting (XSS) vulnerability in the system bulletin component of WUZHI CMS v4.1.0 allows attackers to steal the admin's cookie.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/180" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wuzhicms:wuzhi_cms:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4749403-9C42-40DF-A695-A9E31BD37D84", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "79" ]
79
https://github.com/wuzhicms/wuzhicms/issues/180
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "wuzhicms", "wuzhicms" ]
This XSS vulnerability was found in the system bulletin(系统公告) in the background. **payload:** > </textarea>\<details open="" ontoggle=alert(document.cookie)>\<textarea> First we can write payload with a low-privileged user named 'test'.As an attacker, you can change a title to prompt an administrator to click...
A stored XSS vulnerability in WUZHI CMS v4.1.0
https://api.github.com/repos/wuzhicms/wuzhicms/issues/180/comments
0
2019-07-09T09:39:41Z
2019-07-09T09:44:26Z
https://github.com/wuzhicms/wuzhicms/issues/180
465,678,199
180
2,882
CVE-2021-45290
2021-12-21T18:15:08.220
A Denial of Service vulnerability exits in Binaryen 103 due to an assertion abort in wasm::handle_unreachable.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/binaryen/issues/4383" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/l...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:binaryen:103:*:*:*:*:*:*:*", "matchCriteriaId": "851AA3FC-CFB5-4A99-A10C-830974545702", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "617" ]
617
https://github.com/WebAssembly/binaryen/issues/4383
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "WebAssembly", "binaryen" ]
**Version:** ``` version_103 ``` **System information** Ubuntu 20.04.1 LTS, clang version 10.0.0-4ubuntu1 **command:** ``` ./wasm-opt POC1 ``` [POC1.zip](https://github.com/WebAssembly/binaryen/files/7695646/POC1.zip) **Result** ``` 2492902 abort ``` **GDB information** ``` Program receive...
An assertion abort in wasm::handle_unreachable(char const*, char const*, unsigned int) ()
https://api.github.com/repos/WebAssembly/binaryen/issues/4383/comments
0
2021-12-10T22:07:52Z
2021-12-16T17:39:18Z
https://github.com/WebAssembly/binaryen/issues/4383
1,077,269,909
4,383
2,883
CVE-2021-45291
2021-12-21T18:15:08.257
The gf_dump_setup function in GPAC 1.0.1 allows malicoius users to cause a denial of service (Invalid memory address dereference) via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1955" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "416" ]
416
https://github.com/gpac/gpac/issues/1955
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [Yes ] I looked for a similar issue and couldn't find any. - [ Yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ Yes] I give en...
A segmentation fault in gf_dump_setup() at scene_manager/scene_dump.c:243
https://api.github.com/repos/gpac/gpac/issues/1955/comments
0
2021-12-10T06:46:26Z
2021-12-10T10:01:21Z
https://github.com/gpac/gpac/issues/1955
1,076,499,514
1,955
2,884
CVE-2021-45292
2021-12-21T18:15:08.297
The gf_isom_hint_rtp_read function in GPAC 1.0.1 allows attackers to cause a denial of service (Invalid memory address dereference) via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1958" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/1958
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [Yes ] I looked for a similar issue and couldn't find any. - [ Yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ Yes] I give en...
A segmentation fault in gf_isom_hint_rtp_read () , isomedia/hinting.c:682
https://api.github.com/repos/gpac/gpac/issues/1958/comments
0
2021-12-10T08:22:50Z
2021-12-10T10:01:22Z
https://github.com/gpac/gpac/issues/1958
1,076,565,216
1,958
2,885
CVE-2021-45293
2021-12-21T18:15:08.333
A Denial of Service vulnerability exists in Binaryen 103 due to an Invalid memory address dereference in wasm::WasmBinaryBuilder::visitLet.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/binaryen/issues/4384" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/l...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:binaryen:103:*:*:*:*:*:*:*", "matchCriteriaId": "851AA3FC-CFB5-4A99-A10C-830974545702", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "119" ]
119
https://github.com/WebAssembly/binaryen/issues/4384
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "WebAssembly", "binaryen" ]
**Version:** ``` version_103 ``` **System information** Ubuntu 20.04.1 LTS, clang version 10.0.0-4ubuntu1 **command:** ``` ./wasm-dis POC2 ``` [POC2.zip](https://github.com/WebAssembly/binaryen/files/7695742/POC2.zip) **Result** ``` [28] 3932046 segmentation fault ./wasm-dis ``` **GDB infor...
Invalid memory address dereference in wasm::WasmBinaryBuilder::visitLet(wasm::Block*)
https://api.github.com/repos/WebAssembly/binaryen/issues/4384/comments
0
2021-12-10T22:22:07Z
2021-12-14T18:11:56Z
https://github.com/WebAssembly/binaryen/issues/4384
1,077,277,832
4,384
2,886
CVE-2021-45297
2021-12-21T19:15:08.100
An infinite loop vulnerability exists in Gpac 1.0.1 in gf_get_bit_size.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1973" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "56FF2AB9-517D-43A7-867E-9FB6B833194F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "835" ]
835
https://github.com/gpac/gpac/issues/1973
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [Yes ] I looked for a similar issue and couldn't find any. - [ Yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ Yes] I give en...
infinite loop in gf_get_bit_size()
https://api.github.com/repos/gpac/gpac/issues/1973/comments
2
2021-12-10T19:07:05Z
2021-12-14T10:36:54Z
https://github.com/gpac/gpac/issues/1973
1,077,148,119
1,973
2,887
CVE-2021-44918
2021-12-21T21:15:07.497
A Null Pointer Dereference vulnerability exists in gpac 1.1.0 in the gf_node_get_field function, which can cause a segmentation fault and application crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1968" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "56FF2AB9-517D-43A7-867E-9FB6B833194F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/1968
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
Null Pointer Dereference in gf_node_get_field()
https://api.github.com/repos/gpac/gpac/issues/1968/comments
0
2021-12-10T14:52:20Z
2021-12-13T13:22:07Z
https://github.com/gpac/gpac/issues/1968
1,076,928,345
1,968
2,888
CVE-2021-44919
2021-12-21T21:15:07.543
A Null Pointer Dereference vulnerability exists in the gf_sg_vrml_mf_alloc function in gpac 1.1.0-DEV, which causes a segmentation fault and application crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1963" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "56FF2AB9-517D-43A7-867E-9FB6B833194F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/1963
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
Null Pointer Dereference in gf_sg_vrml_mf_alloc()
https://api.github.com/repos/gpac/gpac/issues/1963/comments
1
2021-12-10T09:54:17Z
2021-12-10T10:17:26Z
https://github.com/gpac/gpac/issues/1963
1,076,656,843
1,963
2,889
CVE-2021-44920
2021-12-21T21:15:07.587
An invalid memory address dereference vulnerability exists in gpac 1.1.0 in the dump_od_to_saf.isra function, which causes a segmentation fault and application crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1957" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "56FF2AB9-517D-43A7-867E-9FB6B833194F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "119" ]
119
https://github.com/gpac/gpac/issues/1957
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
Invalid memory address dereference in dump_od_to_saf.isra()
https://api.github.com/repos/gpac/gpac/issues/1957/comments
0
2021-12-10T08:00:30Z
2021-12-10T10:01:22Z
https://github.com/gpac/gpac/issues/1957
1,076,547,293
1,957
2,890
CVE-2021-44921
2021-12-21T21:15:07.630
A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_isom_parse_movie_boxes_internal function, which causes a segmentation fault and application crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1964" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "56FF2AB9-517D-43A7-867E-9FB6B833194F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/1964
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
Null Pointer Dereference in gf_isom_parse_movie_boxes_internal()
https://api.github.com/repos/gpac/gpac/issues/1964/comments
0
2021-12-10T10:59:02Z
2021-12-13T13:22:06Z
https://github.com/gpac/gpac/issues/1964
1,076,718,691
1,964
2,891
CVE-2021-44922
2021-12-21T21:15:07.673
A null pointer dereference vulnerability exists in gpac 1.1.0 in the BD_CheckSFTimeOffset function, which causes a segmentation fault and application crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1969" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "56FF2AB9-517D-43A7-867E-9FB6B833194F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/1969
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
Null Pointer Dereference in BD_CheckSFTimeOffset()
https://api.github.com/repos/gpac/gpac/issues/1969/comments
1
2021-12-10T15:21:14Z
2021-12-13T13:23:49Z
https://github.com/gpac/gpac/issues/1969
1,076,957,223
1,969
2,892
CVE-2021-44923
2021-12-21T21:15:07.717
A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_dump_vrml_dyn_field.isra function, which causes a segmentation fault and application crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1962" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "56FF2AB9-517D-43A7-867E-9FB6B833194F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/1962
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
Null Pointer Dereference in gf_dump_vrml_dyn_field.isra()
https://api.github.com/repos/gpac/gpac/issues/1962/comments
0
2021-12-10T09:31:57Z
2021-12-10T10:16:34Z
https://github.com/gpac/gpac/issues/1962
1,076,623,517
1,962
2,893
CVE-2021-44924
2021-12-21T21:15:07.760
An infinite loop vulnerability exists in gpac 1.1.0 in the gf_log function, which causes a Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1959" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "56FF2AB9-517D-43A7-867E-9FB6B833194F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "835" ]
835
https://github.com/gpac/gpac/issues/1959
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
Infinite loop in gf_log()
https://api.github.com/repos/gpac/gpac/issues/1959/comments
0
2021-12-10T08:26:37Z
2021-12-10T10:01:22Z
https://github.com/gpac/gpac/issues/1959
1,076,568,297
1,959
2,894
CVE-2021-44925
2021-12-21T21:15:07.803
A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_svg_get_attribute_name function, which causes a segmentation fault and application crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1967" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "56FF2AB9-517D-43A7-867E-9FB6B833194F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/1967
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
Null Pointer Dereference in gf_svg_get_attribute_name()
https://api.github.com/repos/gpac/gpac/issues/1967/comments
0
2021-12-10T14:38:22Z
2021-12-13T13:22:06Z
https://github.com/gpac/gpac/issues/1967
1,076,915,355
1,967
2,895
CVE-2021-44926
2021-12-21T21:15:07.847
A null pointer dereference vulnerability exists in gpac 1.1.0-DEV in the gf_node_get_tag function, which causes a segmentation fault and application crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1961" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "56FF2AB9-517D-43A7-867E-9FB6B833194F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/1961
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
Null Pointer Dereference in gf_node_get_tag()
https://api.github.com/repos/gpac/gpac/issues/1961/comments
0
2021-12-10T09:26:26Z
2021-12-10T10:16:33Z
https://github.com/gpac/gpac/issues/1961
1,076,617,776
1,961
2,896
CVE-2021-44927
2021-12-21T21:15:07.890
A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_sg_vrml_mf_append function, which causes a segmentation fault and application crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1960" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "56FF2AB9-517D-43A7-867E-9FB6B833194F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/1960
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
Null Pointer Dereference in gf_sg_vrml_mf_append()
https://api.github.com/repos/gpac/gpac/issues/1960/comments
0
2021-12-10T08:38:06Z
2021-12-10T10:01:23Z
https://github.com/gpac/gpac/issues/1960
1,076,577,157
1,960
2,897
CVE-2021-45459
2021-12-22T06:15:07.130
lib/cmd.js in the node-windows package before 1.0.0-beta.6 for Node.js allows command injection via the PID parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/coreybutler/node-windows/compare/1.0.0-beta.5...1.0.0-beta.6" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:node-windows_project:node-windows:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "E0465900-004E-49F5-BAFB-9DC970F4722A", "versionEndExcluding": null, "versionEndIncluding": "0.1.14", ...
[ "77" ]
77
https://github.com/dwisiswant0/advisory/issues/4
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "dwisiswant0", "advisory" ]
## Description `lib/cmd.js` in the **node-windows** package before `1.0.0-beta.6` for Node.js allows command injection via the PID parameter. **CVE ID**: CVE-2021-45459 ## Proof of Concept ```js // poc.js var wincmd = require('node-windows'); wincmd.kill("12345; calc.exe", function(){ console.log(...
OS Command Injection in node-windows
https://api.github.com/repos/dwisiswant0/advisory/issues/4/comments
2
2021-08-05T09:12:53Z
2021-12-23T05:28:12Z
https://github.com/dwisiswant0/advisory/issues/4
961,614,989
4
2,898
CVE-2021-45258
2021-12-22T17:15:09.263
A stack overflow vulnerability exists in gpac 1.1.0 via the gf_bifs_dec_proto_list function, which causes a segmentation fault and application crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1970" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:dev:*:*:*:*:*:*", "matchCriteriaId": "A713E8C4-E079-4ECB-AF9C-DC0EC80D089D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "787" ]
787
https://github.com/gpac/gpac/issues/1970
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
Stack Overflow in gf_bifs_dec_proto_list()
https://api.github.com/repos/gpac/gpac/issues/1970/comments
0
2021-12-10T15:36:08Z
2021-12-13T13:22:07Z
https://github.com/gpac/gpac/issues/1970
1,076,972,078
1,970
2,899
CVE-2021-45259
2021-12-22T17:15:09.310
An Invalid pointer reference vulnerability exists in gpac 1.1.0 via the gf_svg_node_del function, which causes a segmentation fault and application crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1986" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:dev:*:*:*:*:*:*", "matchCriteriaId": "A713E8C4-E079-4ECB-AF9C-DC0EC80D089D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "476" ]
476
https://github.com/gpac/gpac/issues/1986
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
Invalid free in gf_svg_node_del()
https://api.github.com/repos/gpac/gpac/issues/1986/comments
1
2021-12-14T02:57:15Z
2021-12-14T10:38:08Z
https://github.com/gpac/gpac/issues/1986
1,079,248,712
1,986
2,900
CVE-2021-43155
2021-12-22T18:15:07.557
Projectsworlds Online Book Store PHP v1.0 is vulnerable to SQL injection via the "bookisbn" parameter in cart.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:projectworlds:online_book_store_project_in_php:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D4ABC369-3132-4E06-A9CA-C765C8497088", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/18
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "projectworldsofficial", "online-book-store-project-in-php" ]
# Author KhanhCM (@khanhchauminh) ## Version: 1.0 # Steps to reproduce 1. Go to any book detail page by clicking on that book's image. 2. Click on "**Purchase / Add to cart**" button. 3. Intercept the request and insert the payload in the value of the `bookisbn` parameter. Example payload: ``` ' or updatexm...
SQL Injection vulnerability via the "bookisbn" parameter in cart.php
https://api.github.com/repos/projectworldsofficial/online-book-store-project-in-php/issues/18/comments
0
2021-10-30T12:45:40Z
2021-11-08T04:45:57Z
https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/18
1,040,138,985
18
2,901
CVE-2021-43156
2021-12-22T18:15:07.600
In ProjectWorlds Online Book Store PHP 1.0 a CSRF vulnerability in admin_delete.php allows a remote attacker to delete any book.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/19" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:projectworlds:online_book_store_project_in_php:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D4ABC369-3132-4E06-A9CA-C765C8497088", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "352" ]
352
https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/19
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "projectworldsofficial", "online-book-store-project-in-php" ]
# Author KhanhCM (@khanhchauminh) ## Version: 1.0 # Details The GET request for deleting a book with `ISBN=12345` looks like this: ``` http://127.0.0.1:8888/admin_delete.php?bookisbn=12345 ``` Changing the value of the `bookisbn` parameter under admin privilege will delete the book with that ISBN. A remote att...
CSRF vulnerability in admin_delete.php allows a remote attacker to delete any book
https://api.github.com/repos/projectworldsofficial/online-book-store-project-in-php/issues/19/comments
0
2021-10-31T05:35:12Z
2021-11-08T04:50:51Z
https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/19
1,040,381,331
19
2,902
CVE-2021-43157
2021-12-22T18:15:07.643
Projectsworlds Online Shopping System PHP 1.0 is vulnerable to SQL injection via the id parameter in cart_remove.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/projectworldsofficial/online-shopping-webvsite-in-php/issues/1" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:projectworlds:online_shopping_system_in_php:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "34EA4FD7-C8A7-4D17-880A-2D7EFBD0BEED", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/projectworldsofficial/online-shopping-webvsite-in-php/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "projectworldsofficial", "online-shopping-webvsite-in-php" ]
# Author KhanhCM (@khanhchauminh) ## Version: 1.0 ### No login is required * Example payload: ``` ' or updatexml(1,concat(0x7e,(version())),0) -- a ``` # Proof-of-concept ``` http://127.0.0.1:8888/cart_remove.php?id=5%27%20or%20updatexml%281%2Cconcat%280x7e%2C%28version%28%29%29%29%2C0%29%20--%20a ``` #...
SQL Injection vulnerability via the "id" parameter in cart_remove.php
https://api.github.com/repos/projectworldsofficial/online-shopping-webvsite-in-php/issues/1/comments
0
2021-10-31T12:18:55Z
2021-11-08T08:03:09Z
https://github.com/projectworldsofficial/online-shopping-webvsite-in-php/issues/1
1,040,455,152
1
2,903
CVE-2021-43158
2021-12-22T18:15:07.687
In ProjectWorlds Online Shopping System PHP 1.0, a CSRF vulnerability in cart_remove.php allows a remote attacker to remove any product in the customer's cart.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/projectworldsofficial/online-shopping-webvsite-in-php/issues/2" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:projectworlds:online_shopping_system_in_php:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "34EA4FD7-C8A7-4D17-880A-2D7EFBD0BEED", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "352" ]
352
https://github.com/projectworldsofficial/online-shopping-webvsite-in-php/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "projectworldsofficial", "online-shopping-webvsite-in-php" ]
# Author KhanhCM (@khanhchauminh) ## Version: 1.0 # Details The GET request for removing a product with `id=1` looks like this: ``` http://127.0.0.1:8888/cart_remove.php?id=1 ``` Changing the value of the `id` parameter in the customer session will remove the product with that ID. A remote attacker can embed t...
CSRF vulnerability in cart_remove.php allows a remote attacker to remove any product in the customer's cart
https://api.github.com/repos/projectworldsofficial/online-shopping-webvsite-in-php/issues/2/comments
0
2021-10-31T12:31:11Z
2021-10-31T13:36:03Z
https://github.com/projectworldsofficial/online-shopping-webvsite-in-php/issues/2
1,040,457,812
2
2,904
CVE-2021-43628
2021-12-22T18:15:07.730
Projectworlds Hospital Management System v1.0 is vulnerable to SQL injection via the email parameter in hms-staff.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/2" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:projectworlds:hospital_management_system_in_php:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "82B97C8D-6AD6-4944-B57B-639B6E56B703", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "projectworldsofficial", "hospital-management-system-in-php" ]
# Author KhanhCM (@khanhchauminh) ## Version: 1.0 ### No login is required # Steps to reproduce 1. Go to **Staff Login** page 2. Input `username`, `password` and choose `Admin` in the **User Type** 2. Click on the **Login** button. 3. Intercept the request and insert the payload in the value of the `email` par...
SQL Injection vulnerability via the "email" parameter in hms-staff.php
https://api.github.com/repos/projectworldsofficial/hospital-management-system-in-php/issues/2/comments
0
2021-11-08T04:40:11Z
2021-11-08T08:28:41Z
https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/2
1,047,012,711
2
2,905
CVE-2021-43629
2021-12-22T18:15:07.770
Projectworlds Hospital Management System v1.0 is vulnerable to SQL injection via multiple parameters in admin_home.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/3" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:projectworlds:hospital_management_system_in_php:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "82B97C8D-6AD6-4944-B57B-639B6E56B703", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "projectworldsofficial", "hospital-management-system-in-php" ]
# Author KhanhCM (@khanhchauminh) ## Version: 1.0 ## Vulnerable parameters ### Staff Registration: * afullname * aemail * apassword ### Doctor Registration: * dfullname * demail * dpassword * dSpecialist ### Delete Clerks: * ClDelEmail ### Delete Doctor: * DrDelEmail # Steps to reproduce 1. Go to **...
SQL Injection vulnerability via multiple parameters in admin_home.php
https://api.github.com/repos/projectworldsofficial/hospital-management-system-in-php/issues/3/comments
0
2021-11-08T09:53:16Z
2021-11-08T09:53:16Z
https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/3
1,047,236,126
3
2,906
CVE-2021-43630
2021-12-22T18:15:07.813
Projectworlds Hospital Management System v1.0 is vulnerable to SQL injection via multiple parameters in add_patient.php. As a result, an authenticated malicious user can compromise the databases system and in some cases leverage this vulnerability to get remote code execution on the remote web server.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/4" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:projectworlds:hospital_management_system_in_php:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "82B97C8D-6AD6-4944-B57B-639B6E56B703", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/4
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "projectworldsofficial", "hospital-management-system-in-php" ]
# Author KhanhCM (@khanhchauminh) ## Version: 1.0 ## Vulnerable parameters * apfullname * apphone_no * apaddress * apSpecialist * apCondition # Steps to reproduce 1. Login to your patient account 2. On the next patient page, enter personal information into the form 3. Click on the **Submit** button 4. I...
SQL Injection vulnerability via multiple parameters in add_patient.php
https://api.github.com/repos/projectworldsofficial/hospital-management-system-in-php/issues/4/comments
0
2021-11-08T13:16:26Z
2021-11-08T13:16:26Z
https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/4
1,047,437,984
4
2,907
CVE-2021-43631
2021-12-22T18:15:07.857
Projectworlds Hospital Management System v1.0 is vulnerable to SQL injection via the appointment_no parameter in payment.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/5" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:projectworlds:hospital_management_system_in_php:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "82B97C8D-6AD6-4944-B57B-639B6E56B703", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/5
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "projectworldsofficial", "hospital-management-system-in-php" ]
# Author KhanhCM (@khanhchauminh) ## Version: 1.0 # Steps to reproduce 1. Go to **Staff Login** page 2. Login with **User Type = Clerk** 3. In the **All Appointments** page, click on a record in the list 4. Intercept the request and insert the payload in the value of the `appointment_no` parameter. 5. Forwar...
SQL Injection vulnerability via "appointment_no" parameter in payment.php
https://api.github.com/repos/projectworldsofficial/hospital-management-system-in-php/issues/5/comments
0
2021-11-08T14:00:14Z
2021-11-08T14:00:14Z
https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/5
1,047,485,856
5
2,908
CVE-2021-45260
2021-12-22T18:15:08.060
A null pointer dereference vulnerability exists in gpac 1.1.0 in the lsr_read_id.part function, which causes a segmentation fault and application crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1979" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:dev:*:*:*:*:*:*", "matchCriteriaId": "A713E8C4-E079-4ECB-AF9C-DC0EC80D089D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "476" ]
476
https://github.com/gpac/gpac/issues/1979
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
Null Pointer Dereference in lsr_read_id.part()
https://api.github.com/repos/gpac/gpac/issues/1979/comments
1
2021-12-11T09:14:24Z
2021-12-13T13:22:41Z
https://github.com/gpac/gpac/issues/1979
1,077,478,960
1,979
2,909
CVE-2021-45262
2021-12-22T18:15:08.140
An invalid free vulnerability exists in gpac 1.1.0 via the gf_sg_command_del function, which causes a segmentation fault and application crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1980" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:dev:*:*:*:*:*:*", "matchCriteriaId": "A713E8C4-E079-4ECB-AF9C-DC0EC80D089D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "416" ]
416
https://github.com/gpac/gpac/issues/1980
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
Invalid free in gf_sg_command_del()
https://api.github.com/repos/gpac/gpac/issues/1980/comments
0
2021-12-11T09:14:52Z
2021-12-13T13:22:09Z
https://github.com/gpac/gpac/issues/1980
1,077,479,083
1,980
2,910
CVE-2021-45263
2021-12-22T18:15:08.180
An invalid free vulnerability exists in gpac 1.1.0 via the gf_svg_delete_attribute_value function, which causes a segmentation fault and application crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1975" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:dev:*:*:*:*:*:*", "matchCriteriaId": "A713E8C4-E079-4ECB-AF9C-DC0EC80D089D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "416" ]
416
https://github.com/gpac/gpac/issues/1975
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
Invalid free in gf_svg_delete_attribute_value()
https://api.github.com/repos/gpac/gpac/issues/1975/comments
0
2021-12-11T01:07:09Z
2021-12-13T13:22:08Z
https://github.com/gpac/gpac/issues/1975
1,077,343,434
1,975
2,911
CVE-2021-45266
2021-12-22T18:15:08.220
A null pointer dereference vulnerability exists in gpac 1.1.0 via the lsr_read_anim_values_ex function, which causes a segmentation fault and application crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1985" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:dev:*:*:*:*:*:*", "matchCriteriaId": "A713E8C4-E079-4ECB-AF9C-DC0EC80D089D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "476" ]
476
https://github.com/gpac/gpac/issues/1985
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
Null Pointer Dereference in lsr_read_anim_values_ex()
https://api.github.com/repos/gpac/gpac/issues/1985/comments
0
2021-12-14T02:40:51Z
2021-12-14T10:36:54Z
https://github.com/gpac/gpac/issues/1985
1,079,241,422
1,985
2,912
CVE-2021-45267
2021-12-22T18:15:08.257
An invalid memory address dereference vulnerability exists in gpac 1.1.0 via the svg_node_start function, which causes a segmentation fault and application crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1965" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:dev:*:*:*:*:*:*", "matchCriteriaId": "A713E8C4-E079-4ECB-AF9C-DC0EC80D089D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "476" ]
476
https://github.com/gpac/gpac/issues/1965
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
Invalid memory address dereference in svg_node_start()
https://api.github.com/repos/gpac/gpac/issues/1965/comments
0
2021-12-10T10:59:40Z
2021-12-13T13:22:06Z
https://github.com/gpac/gpac/issues/1965
1,076,719,232
1,965
2,913
CVE-2020-20425
2021-12-22T23:15:07.453
S-CMS Government Station Building System v5.0 contains a cross-site scripting (XSS) vulnerability in the search function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://government.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Sea0o/vulnerability/issues/1" }, { "source": "cve@mitre.or...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:s-cms:s-cms:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "3797FECE-5F4C-4A17-B21E-15BE49A20B41", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "79" ]
79
https://github.com/Sea0o/vulnerability/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Sea0o", "vulnerability" ]
打开首页 ![a](https://user-images.githubusercontent.com/48739932/66971619-852bb080-f0c4-11e9-97b0-47935f04a810.png) 点击政府建站系统得预览,进入预览网站 ![b](https://user-images.githubusercontent.com/48739932/66971664-ab515080-f0c4-11e9-8f4c-5cb006d19255.png) 其中搜索功能处存在xss,过滤了on事件,但是使用payload:"><svg/onload=alert(1)>成功弹窗 ![d](https://use...
s-cms Government station building system exists XSS
https://api.github.com/repos/Str1am/vulnerability/issues/1/comments
0
2019-10-17T02:00:20Z
2019-10-17T02:00:20Z
https://github.com/Str1am/vulnerability/issues/1
508,187,386
1
2,914
CVE-2020-20426
2021-12-22T23:15:07.497
S-CMS Government Station Building System v5.0 contains a cross-site scripting (XSS) vulnerability in /function/booksave.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://government.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Sea0o/vulnerability/issues/2" }, { "source": "cve@mitre.or...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:s-cms:s-cms:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "3797FECE-5F4C-4A17-B21E-15BE49A20B41", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "79" ]
79
https://github.com/Sea0o/vulnerability/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Sea0o", "vulnerability" ]
in / function / booksave.php, ![1](https://user-images.githubusercontent.com/48739932/66975787-3422b900-f0d2-11e9-9d98-05582ce36e50.png) ![2](https://user-images.githubusercontent.com/48739932/66975790-36851300-f0d2-11e9-8738-76ecf4f8aec5.png) 只是简单得过滤了script,iframe,等标签,可以进行绕过 payload:http://127.0.0.1/CMS/scms//fu...
s-cms Multiple XSS exist in / function / booksave.php in Government station building system
https://api.github.com/repos/Str1am/vulnerability/issues/2/comments
0
2019-10-17T03:38:39Z
2019-10-17T03:38:39Z
https://github.com/Str1am/vulnerability/issues/2
508,214,246
2
2,915
CVE-2020-20595
2021-12-22T23:15:07.577
A cross-site request forgery (CSRF) in OPMS v1.3 and below allows attackers to arbitrarily add a user account via /user/add.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/lock-upme/OPMS/issues/25" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.co...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opms_project:opms:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "0D2CC07B-3FCD-4240-B8B4-BEBBBD6B22FD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "352" ]
352
https://github.com/lock-upme/OPMS/issues/25
[ "Exploit", "Third Party Advisory" ]
github.com
[ "lock-upme", "OPMS" ]
Place of backstage set up Organization management exists Csrf Vulnerability,attacker Structure a csrf payload,Once the administrator clicks on the malicious link, add a user CSRF Exp: ``` <html> <!-- CSRF PoC - generated by Burp Suite Professional --> <body> <script>history.pushState('', '', '/')</script>...
There is one CSRF vulnerability that can add the account
https://api.github.com/repos/lock-upme/OPMS/issues/25/comments
2
2019-10-14T15:18:42Z
2019-10-15T01:41:58Z
https://github.com/lock-upme/OPMS/issues/25
506,719,887
25
2,916
CVE-2020-20597
2021-12-22T23:15:07.613
A cross-site scripting (XSS) vulnerability in the potrtalItemName parameter in \web\PortalController.java of lemon V1.10.0 allows attackers to execute arbitrary web scripts or HTML.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/xuhuisheng/lemon/issues/198" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mossle:lemon:1.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "DBB13DD5-1039-4C54-96F6-D30E344C3611", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/xuhuisheng/lemon/issues/198
[ "Exploit", "Third Party Advisory" ]
github.com
[ "xuhuisheng", "lemon" ]
您好,我在lemon v1.10.0中编辑组件处发现存在存储型XSS **有效负荷:** <script>alert('cookie')</script> 文件名:src\main\java\com\mossle\portal\web\PortalController.java line : 96~151 代码: ``` @RequestMapping("save") public String save(@RequestParam(value = "id", required = false) Long id, @RequestParam("portalWidg...
lemon 存在存储型XSS
https://api.github.com/repos/xuhuisheng/lemon/issues/198/comments
0
2019-10-15T07:55:26Z
2019-10-15T08:31:30Z
https://github.com/xuhuisheng/lemon/issues/198
507,071,847
198
2,917
CVE-2020-20598
2021-12-22T23:15:07.653
A cross-site scripting (XSS) vulnerability in the Editing component of lemon V1.10.0 allows attackers to execute arbitrary web scripts or HTML.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/xuhuisheng/lemon/issues/199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mossle:lemon:1.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "DBB13DD5-1039-4C54-96F6-D30E344C3611", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/xuhuisheng/lemon/issues/199
[ "Exploit", "Third Party Advisory" ]
github.com
[ "xuhuisheng", "lemon" ]
Product Homepage: http://www.mossle.com/index.do Place of backstage exists Csrf Vulnerability,attacker Structure a csrf payload,Once the administrator clicks on the malicious link, the component information is automatically add. There is an xss in the place of Editing component ![1571127417546](https://user-ima...
Csrf + Xss combination Can be obtained user cookie
https://api.github.com/repos/xuhuisheng/lemon/issues/199/comments
0
2019-10-15T11:40:35Z
2019-10-15T17:10:02Z
https://github.com/xuhuisheng/lemon/issues/199
507,188,477
199
2,918
CVE-2020-20600
2021-12-22T23:15:07.690
MetInfo 7.0 beta contains a stored cross-site scripting (XSS) vulnerability in the $name parameter of admin/?n=column&c=index&a=doAddColumn.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/alixiaowei/cve_test/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://githu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:metinfo:metinfo:7.0.0:beta:*:*:*:*:*:*", "matchCriteriaId": "952CFCE9-04CC-478B-AE37-9CC18C6AAA02", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "79" ]
79
https://github.com/alixiaowei/cve_test/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "alixiaowei", "cve_test" ]
Vulnerability Name: Metinfo CMS stored XSS Vulnerability Product Homepage: https://www.metinfo.cn/ Software link: https://www.metinfo.cn/upload/file/MetInfo7.0.0beta.zip Version: V7.0.0 beta Payload:```<script>alert('xss_test')</script>``` file path: MetInfo7.0.0beta\app\system\column\admin\index.class.ph...
MetInfo7.0 beta stored Cross Site Scripting Vulnerability
https://api.github.com/repos/unknownerror-bot/cve_test/issues/2/comments
0
2019-10-16T10:06:25Z
2019-10-16T11:27:46Z
https://github.com/unknownerror-bot/cve_test/issues/2
507,750,155
2
2,919
CVE-2020-20605
2021-12-22T23:15:07.763
Blog CMS v1.0 contains a cross-site scripting (XSS) vulnerability in the /controller/CommentAdminController.java component.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/xuzijia/blog/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:personal_blog_cms_project:personal_blog_cms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEACCC75-43F1-4665-8912-FEE73E543831", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "79" ]
79
https://github.com/xuzijia/blog/issues/4
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "xuzijia", "blog" ]
未进行过滤以及实体化用户输入的内容 有效负荷: <script>alert/xss/)</script> 文件名:blog/src/main/java/com/xuzijia/admin/blog/controller/ CommentAdminController.java 代码: ![1](https://user-images.githubusercontent.com/45255270/67692034-83be8a00-f9da-11e9-804e-38056fd3c9c6.png) 结果: ![3](https://user-images.githubusercontent.com...
Blog CMS V1.0 feedback have a xss vulnerability
https://api.github.com/repos/xuzijia/blog/issues/4/comments
1
2019-09-26T08:15:10Z
2019-10-28T15:29:03Z
https://github.com/xuzijia/blog/issues/4
498,730,475
4
2,920
CVE-2021-44273
2021-12-23T12:15:07.387
e2guardian v5.4.x <= v5.4.3r is affected by missing SSL certificate validation in the SSL MITM engine. In standalone mode (i.e., acting as a proxy or a transparent proxy), with SSL MITM enabled, e2guardian, if built with OpenSSL v1.1.x, did not validate hostnames in certificates of the web servers that it connected to,...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/12/23/2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/e2guar...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:e2bn:e2guardian:*:*:*:*:*:*:*:*", "matchCriteriaId": "3215FB43-3E00-4B8F-B56A-15E689EB7464", "versionEndExcluding": null, "versionEndIncluding": "5.4.3r", "versionStartExclud...
[ "295" ]
295
https://github.com/e2guardian/e2guardian/issues/707
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "e2guardian", "e2guardian" ]
I tried e2guardian in a virtual machine today, running it as a standalone transparent proxy with SSL MITM, with the following iptables rules that redirect traffic to it (where 974 is the uid of the user that e2guardian runs as): ``` iptables -t nat -A OUTPUT -p tcp -m owner ! --uid-owner 974 -m tcp --dport 443 -j R...
v5.4: Missing SSL hostname check
https://api.github.com/repos/e2guardian/e2guardian/issues/707/comments
4
2021-11-20T21:40:29Z
2021-12-23T17:25:50Z
https://github.com/e2guardian/e2guardian/issues/707
1,059,235,171
707
2,921
CVE-2021-43854
2021-12-23T18:15:07.327
NLTK (Natural Language Toolkit) is a suite of open source Python modules, data sets, and tutorials supporting research and development in Natural Language Processing. Versions prior to 3.6.5 are vulnerable to regular expression denial of service (ReDoS) attacks. The vulnerability is present in PunktSentenceTokenizer, s...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nltk/nltk/commit/1405aad979c6b8080dbbc8e0858f89b2e3690341" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking",...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nltk:nltk:*:*:*:*:*:*:*:*", "matchCriteriaId": "355BC362-D4FF-4893-9F37-B97D23E48267", "versionEndExcluding": "3.6.5", "versionEndIncluding": null, "versionStartExcluding": n...
[ "400" ]
400
https://github.com/nltk/nltk/issues/2866
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nltk", "nltk" ]
Hi NLTK team, I have a string that I pass to `word_tokenize` (which uses `PunktSentenceTokenizer` under the hood), and the call hangs. The string in question is taken from Wikipedia and is the result of some vandalism. It can be generated by this ``` text = 'swirley thing w' + 'e' * (884779 - len('swirley thing ...
word_tokenize/EN hangs on incorrect strings
https://api.github.com/repos/nltk/nltk/issues/2866/comments
4
2021-10-26T21:56:15Z
2021-11-26T11:58:19Z
https://github.com/nltk/nltk/issues/2866
1,036,775,249
2,866
2,922
CVE-2021-23574
2021-12-24T20:15:08.077
All versions of package js-data are vulnerable to Prototype Pollution via the deepFillIn and the set functions. This is an incomplete fix of [CVE-2020-28442](https://snyk.io/vuln/SNYK-JS-JSDATA-1023655).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "report@snyk.io", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://github.com/js-data/js-data/blob/master/dist/js-data.js%23L472" }, { "source": "report@snyk.io", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ]...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:js-data:js-data:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "BEDE0A25-D433-44F3-A0DD-766C85A894B0", "versionEndExcluding": "3.0.11", "versionEndIncluding": null, "versionStart...
[ "1321" ]
1321
https://github.com/js-data/js-data/issues/576
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "js-data", "js-data" ]
👋 Hello, @jmdobry, @crobinson42, @stalniy - a potential high severity Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') (CWE-1321) vulnerability in your repository has been disclosed to us. #### Next Steps 1️⃣ Visit **https://huntr.dev/bounties/3-other-js-data/js-data** f...
🚨 Potential Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') (CWE-1321)
https://api.github.com/repos/js-data/js-data/issues/576/comments
3
2021-05-08T22:09:49Z
2021-07-30T19:48:06Z
https://github.com/js-data/js-data/issues/576
881,379,562
576
2,923
CVE-2021-23574
2021-12-24T20:15:08.077
All versions of package js-data are vulnerable to Prototype Pollution via the deepFillIn and the set functions. This is an incomplete fix of [CVE-2020-28442](https://snyk.io/vuln/SNYK-JS-JSDATA-1023655).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "report@snyk.io", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://github.com/js-data/js-data/blob/master/dist/js-data.js%23L472" }, { "source": "report@snyk.io", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ]...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:js-data:js-data:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "BEDE0A25-D433-44F3-A0DD-766C85A894B0", "versionEndExcluding": "3.0.11", "versionEndIncluding": null, "versionStart...
[ "1321" ]
1321
https://github.com/js-data/js-data/issues/577
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "js-data", "js-data" ]
👋 Hello, @jmdobry, @crobinson42, @stalniy - a potential high severity Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') (CWE-1321) vulnerability in your repository has been disclosed to us. #### Next Steps 1️⃣ Visit **https://huntr.dev/bounties/4-other-js-data/js-data** f...
🚨 Potential Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') (CWE-1321)
https://api.github.com/repos/js-data/js-data/issues/577/comments
7
2021-05-09T11:04:37Z
2022-01-10T21:01:10Z
https://github.com/js-data/js-data/issues/577
882,165,449
577
2,924
CVE-2021-43857
2021-12-27T19:15:08.683
Gerapy is a distributed crawler management framework. Gerapy prior to version 0.9.8 is vulnerable to remote code execution, and this issue is patched in version 0.9.8.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/165459/Gerapy-0.9.7-Remote-Code-Execution.html" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Par...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gerapy:gerapy:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D0D717F-412D-4BB2-940F-05640D17860E", "versionEndExcluding": "0.9.8", "versionEndIncluding": null, "versionStartExcluding...
[ "78" ]
78
https://github.com/Gerapy/Gerapy/issues/219
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Gerapy", "Gerapy" ]
delete
Gerapy 0.9.7 project_configure function exist remote code execute !!!
https://api.github.com/repos/Gerapy/Gerapy/issues/219/comments
2
2021-12-02T12:51:31Z
2021-12-26T11:27:32Z
https://github.com/Gerapy/Gerapy/issues/219
1,069,513,691
219
2,925
CVE-2021-45890
2021-12-27T20:15:07.480
basic/BasicAuthProvider.java in AuthGuard before 0.9.0 allows authentication via an inactive identifier.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/AuthGuard/AuthGuard/commit/9783b1143da6576028de23e15a1f198b1f937b82" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:authguard_project:authguard:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCDA41B2-8D24-4D67-8F20-0D97D4409E90", "versionEndExcluding": "0.9.0", "versionEndIncluding": null, "version...
[ "287" ]
287
https://github.com/AuthGuard/AuthGuard/issues/166
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "AuthGuard", "AuthGuard" ]
null
Authentication ignores inactive identifiers
https://api.github.com/repos/AuthGuard/AuthGuard/issues/166/comments
0
2021-08-23T19:06:49Z
2021-10-08T20:41:55Z
https://github.com/AuthGuard/AuthGuard/issues/166
977,335,169
166
2,926
CVE-2021-45884
2021-12-27T22:15:07.847
In Brave Desktop 1.17 through 1.33 before 1.33.106, when CNAME-based adblocking and a proxying extension with a SOCKS fallback are enabled, additional DNS requests are issued outside of the proxying extension using the system's DNS settings, resulting in information disclosure. NOTE: this issue exists because of an inc...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/brave/brave-browser/issues/19070" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Release Notes", "Thir...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:brave:brave:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D18AD5E-AE64-4719-82F2-6A5ED9C913C8", "versionEndExcluding": null, "versionEndIncluding": "1.33.106", "versionStartExcludin...
[ "200" ]
200
https://github.com/brave/brave-browser/issues/19070
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "brave", "brave-browser" ]
https://hackerone.com/reports/1377864
hackerone #1377864 - CNAME Uncloacking in SOCKS5 protocol
https://api.github.com/repos/brave/brave-browser/issues/19070/comments
9
2021-10-28T16:16:06Z
2021-12-13T17:11:52Z
https://github.com/brave/brave-browser/issues/19070
1,038,700,556
19,070
2,927
CVE-2021-45884
2021-12-27T22:15:07.847
In Brave Desktop 1.17 through 1.33 before 1.33.106, when CNAME-based adblocking and a proxying extension with a SOCKS fallback are enabled, additional DNS requests are issued outside of the proxying extension using the system's DNS settings, resulting in information disclosure. NOTE: this issue exists because of an inc...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/brave/brave-browser/issues/19070" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Release Notes", "Thir...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:brave:brave:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D18AD5E-AE64-4719-82F2-6A5ED9C913C8", "versionEndExcluding": null, "versionEndIncluding": "1.33.106", "versionStartExcludin...
[ "200" ]
200
https://github.com/brave/brave-browser/issues/20079
[ "Issue Tracking", "Release Notes", "Third Party Advisory" ]
github.com
[ "brave", "brave-browser" ]
### Release Notes - Upgrade from Chromium 96.0.4664.93 to Chromium 96.0.4664.110. ([#20077](https://github.com/brave/brave-browser/issues/20077)) - Improve formatting of input values (send and swap). ([#19855](https://github.com/brave/brave-browser/issues/19855)) - Full Fiat Balance not showing with ERC721 tokens. (...
[Desktop] Release notes for `1.33.x - Release`
https://api.github.com/repos/brave/brave-browser/issues/20079/comments
0
2021-12-13T20:42:44Z
2021-12-14T21:00:24Z
https://github.com/brave/brave-browser/issues/20079
1,078,997,214
20,079
2,928
CVE-2020-21238
2021-12-27T23:15:08.080
An issue in the user login box of CSCMS v4.0 allows attackers to hijack user accounts via brute force attacks.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chshcms/cscms/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chshcms:cscms:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "1322E111-92FB-4A3C-9CCC-60007621AA49", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "307" ]
307
https://github.com/chshcms/cscms/issues/5
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chshcms", "cscms" ]
cscmsV4.0-4.1 demourl:http://demo.chshcms.com/ In the user login box Sign in now without a verification code and prompt that the user does not exist,which makes it easier for remote attackers to hijack accounts via a brute-force approach. Capture the packet in burp to truncate the current request the current data p...
cscms demourl:http://demo.chshcms.com/ login have UserTraversal-Vulnerability
https://api.github.com/repos/chshcms/cscms/issues/5/comments
0
2019-11-15T01:15:46Z
2019-11-15T01:15:46Z
https://github.com/chshcms/cscms/issues/5
523,197,305
5
2,929
CVE-2021-43862
2021-12-30T15:15:07.470
jQuery Terminal Emulator is a plugin for creating command line interpreters in your applications. Versions prior to 2.31.1 contain a low impact and limited cross-site scripting (XSS) vulnerability. The code for XSS payload is always visible, but an attacker can use other techniques to hide the code the victim sees. If ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", ...
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/jcubic/jquery.terminal/commit/77eb044d0896e990d48a9157f0bc6648f81a84b5" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jquery.terminal_project:jquery.terminal:*:*:*:*:*:*:*:*", "matchCriteriaId": "199BA80C-8DDB-4FC3-AC04-5DDB7FD2ACCA", "versionEndExcluding": "2.31.1", "versionEndIncluding": null, ...
[ "79" ]
79
https://github.com/jcubic/jquery.terminal/issues/727
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jcubic", "jquery.terminal" ]
Self XSS is possible by typing something like "onclick="alert(1);" I think it's because data-text doesn't contain sanitized characters. Don't think it's critical but there you go regardless :)
Self XSS
https://api.github.com/repos/jcubic/jquery.terminal/issues/727/comments
3
2021-12-28T20:03:48Z
2021-12-30T13:11:00Z
https://github.com/jcubic/jquery.terminal/issues/727
1,090,101,891
727
2,930
CVE-2021-45944
2022-01-01T00:15:08.183
Ghostscript GhostPDL 9.50 through 9.53.3 has a use-after-free in sampled_data_sample (called from sampled_data_continue and interp).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=29903" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://bugs.chro...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*", "matchCriteriaId": "422A9350-1055-4C93-A976-98F68956E970", "versionEndExcluding": null, "versionEndIncluding": "9.53.3", "versionStartEx...
[ "416" ]
416
https://github.com/google/oss-fuzz-vulns/issues/16
[ "Issue Tracking" ]
github.com
[ "google", "oss-fuzz-vulns" ]
Hi https://github.com/google/oss-fuzz-vulns/blob/4e587fda3d822ca4e1f5d8d64c78fd909aef59f1/vulns/ghostscript/OSV-2021-237.yaml#L25 references a fixing commit which though only removes a documentation snipped. Unless my bisect done is wrong, then the following should be the fixing commit: https://git.ghostscrip...
Fixing commit from OSV-2021-237 seems wrong
https://api.github.com/repos/google/oss-fuzz-vulns/issues/16/comments
2
2022-01-04T20:58:23Z
2022-01-05T05:52:24Z
https://github.com/google/oss-fuzz-vulns/issues/16
1,093,747,732
16
2,931
CVE-2021-45958
2022-01-01T00:15:08.813
UltraJSON (aka ujson) through 5.1.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). Exploitation can, for example, use a large amount of indentation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36009" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ultrajson_project:ultrajson:*:*:*:*:*:python:*:*", "matchCriteriaId": "15EEF95D-A74F-47A0-8FAB-E11AAA99A049", "versionEndExcluding": "5.2.0", "versionEndIncluding": null, "ve...
[ "787" ]
787
https://github.com/ultrajson/ultrajson/issues/501
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ultrajson", "ultrajson" ]
### What did you do? `python3 -c 'import ujson; print(ujson.encode({"a": True}, indent=65539))' >/dev/null` This is the smallest value that triggers the segfault on my machine with this build of ujson. I'm sure it's no coincidence that it's slightly larger than 64 KiB. ### What did you expect to happen? Properl...
Segmentation fault with large indent
https://api.github.com/repos/ultrajson/ultrajson/issues/501/comments
3
2022-02-06T01:14:09Z
2022-10-19T05:50:15Z
https://github.com/ultrajson/ultrajson/issues/501
1,125,073,687
501
2,932
CVE-2021-45958
2022-01-01T00:15:08.813
UltraJSON (aka ujson) through 5.1.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). Exploitation can, for example, use a large amount of indentation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36009" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ultrajson_project:ultrajson:*:*:*:*:*:python:*:*", "matchCriteriaId": "15EEF95D-A74F-47A0-8FAB-E11AAA99A049", "versionEndExcluding": "5.2.0", "versionEndIncluding": null, "ve...
[ "787" ]
787
https://github.com/ultrajson/ultrajson/issues/502#issuecomment-1031747284
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ultrajson", "ultrajson" ]
Hi Recently [CVE-2021-45958](https://www.cve.org/CVERecord?id=CVE-2021-45958) was published which is an assignment due to the oss-fuzz report in https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36009 see as well https://github.com/google/oss-fuzz-vulns/blob/main/vulns/ujson/OSV-2021-955.yaml This refer...
CVE-2021-45958 from oss-fuzz report
https://api.github.com/repos/ultrajson/ultrajson/issues/502/comments
3
2022-02-07T16:43:38Z
2022-04-05T20:04:40Z
https://github.com/ultrajson/ultrajson/issues/502
1,126,236,427
502
2,933
CVE-2021-45928
2022-01-01T01:15:08.367
libjxl b02d6b9, as used in libvips 8.11 through 8.11.2 and other products, has an out-of-bounds write in jxl::ModularFrameDecoder::DecodeGroup (called from jxl::FrameDecoder::ProcessACGroup and jxl::ThreadPool::RunCallState<jxl::FrameDecoder::ProcessSections).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36456" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libjxl_project:libjxl:*:*:*:*:*:*:*:*", "matchCriteriaId": "31276DF0-678C-43E1-8692-DB21D38A5164", "versionEndExcluding": "0.6.1", "versionEndIncluding": null, "versionStartE...
[ "787" ]
787
https://github.com/libjxl/libjxl/issues/360
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "libjxl", "libjxl" ]
Hello, oss-fuzz is reporting an out of bounds write in libjxl master: ```   | AddressSanitizer:DEADLYSIGNAL   | =================================================================   | ==655724==ERROR: AddressSanitizer: SEGV on unknown address 0x000000001000 (pc 0x000002d55019 bp 0x7f4bc69f7a50 sp 0x7f4bc69f78c0 T2)...
Out of bounds write in master libjxl reported by oss-fuzz
https://api.github.com/repos/libjxl/libjxl/issues/360/comments
8
2021-07-26T11:42:15Z
2021-07-27T14:44:06Z
https://github.com/libjxl/libjxl/issues/360
952,813,258
360
2,934
CVE-2021-45960
2022-01-01T19:15:08.030
In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) places in the storeAtts function in xmlparse.c can lead to realloc misbehavior (e.g., allocating too few bytes, or only freeing memory).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/01/17/3" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Permissions Required", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A2FBF20-7B2C-49FF-83F8-1EF903078751", "versionEndExcluding": "2.4.3", "versionEndIncluding": null, "versionSt...
[ "682" ]
682
https://github.com/libexpat/libexpat/issues/531
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "libexpat", "libexpat" ]
Back in 2015, Tyson Smith (@tysmith) [reported](https://bugzilla.mozilla.org/show_bug.cgi?id=1217609) invalid left shifts at 5 places in libexpat to Mozilla. 3 of these bad shifts had also been [reported](https://sourceforge.net/p/expat/bugs/529/) by Dingbao Xie (@xiedingbao), and been fixed in commit 2106ee4050fd0d30e...
[CVE-2021-45960] A large number of prefixed XML attributes on a single tag can crash libexpat (troublesome left shifts by >=29 bits in function storeAtts)
https://api.github.com/repos/libexpat/libexpat/issues/531/comments
4
2021-12-30T19:24:38Z
2022-01-07T22:17:02Z
https://github.com/libexpat/libexpat/issues/531
1,091,269,578
531
2,935
CVE-2022-22293
2022-01-02T00:15:09.673
admin/limits.php in Dolibarr 7.0.2 allows HTML injection, as demonstrated by the MAIN_MAX_DECIMALS_TOT parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Dolibarr/dolibarr/issues/20237" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mustgundogdu/Re...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "05824B6D-C047-4328-8FE0-AC05ECC760FF", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ "79" ]
79
https://github.com/Dolibarr/dolibarr/issues/20237
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Dolibarr", "dolibarr" ]
### Bug There is a proof of concept for a XSS on admin/limits.php for Dolibarr 7.0.2 (see https://github.com/mustgundogdu/Research/tree/main/Dolibar_7.0.2-StoredXSS). It would be useful to have a check/ statement if the problem still exist in newer versions, or it is already fixed (and if so, in which version). ...
HTML injection in admin/limits.php, Dolibarr v 7.0.2
https://api.github.com/repos/Dolibarr/dolibarr/issues/20237/comments
2
2022-03-01T13:37:10Z
2022-03-01T14:08:39Z
https://github.com/Dolibarr/dolibarr/issues/20237
1,155,350,983
20,237
2,936
CVE-2021-45829
2022-01-03T22:15:11.153
HDF5 1.13.1-1 is affected by: segmentation fault, which causes a Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/HDFGroup/hdf5/issues/1317" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Par...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hdfgroup:hdf5:1.13.1-1:*:*:*:*:*:*:*", "matchCriteriaId": "3E27D5C4-8DAF-4738-9B3A-9C3E0E867F5E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "404" ]
404
https://github.com/HDFGroup/hdf5/issues/1317
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "HDFGroup", "hdf5" ]
**Version:** ``` Version 1.13.1-1 ``` **System information** ``` Ubuntu 20.04.1 LTS, gcc version 9.3.0 (Ubuntu 9.3.0-17ubuntu1~20.04) ``` **command:** ``` h5stat POC8 ``` [POC8.zip](https://github.com/HDFGroup/hdf5/files/7739339/POC8.zip) **result** ``` segmentation fault ``` **ASAN i...
segmentation fault in h5stat
https://api.github.com/repos/HDFGroup/hdf5/issues/1317/comments
2
2021-12-18T13:57:17Z
2022-11-21T21:47:13Z
https://github.com/HDFGroup/hdf5/issues/1317
1,083,838,419
1,317
2,937
CVE-2021-41043
2022-01-05T12:15:08.127
Use after free in tcpslice triggers AddressSanitizer, no other confirmed impact.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "security@tcpdump.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/the-tcpdump-group/tcpslice/issues/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tcpdump:tcpslice:*:*:*:*:*:*:*:*", "matchCriteriaId": "DDBBF07F-5EB3-4EA1-BE35-8BD711C50DF2", "versionEndExcluding": "1.5", "versionEndIncluding": null, "versionStartExcludin...
[ "416" ]
416
https://github.com/the-tcpdump-group/tcpslice/issues/11
[ "Exploit", "Third Party Advisory" ]
github.com
[ "the-tcpdump-group", "tcpslice" ]
### Tested on: version 1.5-PRE-GIT version 1.2a3 ### Command: tcpslice -w a.txt heap.pcap Segmentation fault ### Results: ==1676569==ERROR: AddressSanitizer: heap-use-after-free on address 0x617000000160 at pc 0x7ffff761fa7d bp 0x7fffffffd700 sp 0x7fffffffce90 WRITE of size 56 at 0x617000000160 thread T0 ...
Heap use after free
https://api.github.com/repos/the-tcpdump-group/tcpslice/issues/11/comments
4
2021-06-30T11:50:26Z
2025-02-07T21:36:36Z
https://github.com/the-tcpdump-group/tcpslice/issues/11
933,619,981
11
2,938
CVE-2021-43816
2022-01-05T19:15:08.717
containerd is an open source container runtime. On installations using SELinux, such as EL8 (CentOS, RHEL), Fedora, or SUSE MicroOS, with containerd since v1.5.0-beta.0 as the backing container runtime interface (CRI), an unprivileged pod scheduled to the node may bind mount, via hostPath volume, any privileged, regula...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6, "confidentialityImpact": "PART...
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/containerd/containerd/commit/a731039238c62be081eb8c31525b988415745eea" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:linuxfoundation:containerd:*:*:*:*:*:*:*:*", "matchCriteriaId": "43387595-2EE9-4BCB-BA40-899372BAFD60", "versionEndExcluding": "1.5.9", "versionEndIncluding": null, "versionS...
[ "281" ]
281
https://github.com/containerd/containerd/issues/6194
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "containerd", "containerd" ]
### Description When running rke2/k3s pointing at our bundled (or stock) containerd, one can apply an unprivileged pod that relabels `/etc/hosts` on the host by mounting a hostPath `/etc/hosts` volume at the same location in the container: ```yaml apiVersion: v1 kind: Pod metadata: name: test-agnhost spec: ...
cri + selinux: /etc/hosts from hostPath mount getting relabeled
https://api.github.com/repos/containerd/containerd/issues/6194/comments
3
2021-11-02T00:39:45Z
2022-09-12T18:05:10Z
https://github.com/containerd/containerd/issues/6194
1,041,776,782
6,194
2,939
CVE-2021-45830
2022-01-05T20:15:07.897
A heap-based buffer overflow vulnerability exists in HDF5 1.13.1-1 via H5F_addr_decode_len in /hdf5/src/H5Fint.c, which could cause a Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/HDFGroup/hdf5/issues/1314" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Par...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hdfgroup:hdf5:1.13.1-1:*:*:*:*:*:*:*", "matchCriteriaId": "3E27D5C4-8DAF-4738-9B3A-9C3E0E867F5E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "787" ]
787
https://github.com/HDFGroup/hdf5/issues/1314
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "HDFGroup", "hdf5" ]
**Version:** ``` Version 1.13.1-1 ``` **System information** ``` Ubuntu 20.04.1 LTS, gcc version 9.3.0 (Ubuntu 9.3.0-17ubuntu1~20.04) ``` **command:** ``` h5format_convert -n POC5 ``` [POC5.zip](https://github.com/HDFGroup/hdf5/files/7739297/POC5.zip) **result** ``` segmentation fault ``` ...
heap-buffer-overflow atH5F_addr_decode_len /hdf5/src/H5Fint.c:2855
https://api.github.com/repos/HDFGroup/hdf5/issues/1314/comments
2
2021-12-18T13:32:06Z
2023-05-04T18:44:39Z
https://github.com/HDFGroup/hdf5/issues/1314
1,083,833,839
1,314
2,940
CVE-2021-45831
2022-01-05T20:15:07.950
A Null Pointer Dereference vulnerability exitgs in GPAC 1.0.1 in MP4Box via __strlen_avx2, which causes a Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1990" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/1990
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [Yes ] I looked for a similar issue and couldn't find any. - [ Yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ Yes] I give en...
Null Pointer Dereference in __strlen_avx2 ()
https://api.github.com/repos/gpac/gpac/issues/1990/comments
3
2021-12-14T11:19:27Z
2021-12-15T08:50:11Z
https://github.com/gpac/gpac/issues/1990
1,079,632,902
1,990
2,941
CVE-2021-45832
2022-01-05T21:15:07.780
A Stack-based Buffer Overflow Vulnerability exists in HDF5 1.13.1-1 at at hdf5/src/H5Eint.c, which causes a Denial of Service (context-dependent).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/HDFGroup/hdf5/issues/1315" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Par...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hdfgroup:hdf5:1.13.1-1:*:*:*:*:*:*:*", "matchCriteriaId": "3E27D5C4-8DAF-4738-9B3A-9C3E0E867F5E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "674" ]
674
https://github.com/HDFGroup/hdf5/issues/1315
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "HDFGroup", "hdf5" ]
**Version:** ``` Version 1.13.1-1 ``` **System information** ``` Ubuntu 20.04.1 LTS, gcc version 9.3.0 (Ubuntu 9.3.0-17ubuntu1~20.04) ``` **command:** ``` h5format_convert -n POC6 ``` [POC6.zip](https://github.com/HDFGroup/hdf5/files/7739303/POC6.zip) **result** ``` segmentation fault ``` ...
stack overflow at hdf5/src/H5Eint.c
https://api.github.com/repos/HDFGroup/hdf5/issues/1315/comments
3
2021-12-18T13:38:31Z
2023-05-04T20:22:11Z
https://github.com/HDFGroup/hdf5/issues/1315
1,083,835,005
1,315
2,942
CVE-2021-45833
2022-01-05T21:15:07.833
A Stack-based Buffer Overflow Vulnerability exists in HDF5 1.13.1-1 via the H5D__create_chunk_file_map_hyper function in /hdf5/src/H5Dchunk.c, which causes a Denial of Service (context-dependent).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/HDFGroup/hdf5/issues/1313" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Par...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hdfgroup:hdf5:1.13.1-1:*:*:*:*:*:*:*", "matchCriteriaId": "3E27D5C4-8DAF-4738-9B3A-9C3E0E867F5E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "787" ]
787
https://github.com/HDFGroup/hdf5/issues/1313
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "HDFGroup", "hdf5" ]
**Version:** ``` h5dump: Version 1.13.1-1 ``` **System information** ``` Ubuntu 20.04.1 LTS, gcc version 9.3.0 (Ubuntu 9.3.0-17ubuntu1~20.04) ``` **command:** ``` h5dump POC3 ``` [POC3.zip](https://github.com/HDFGroup/hdf5/files/7739269/POC3.zip) **ASAN information** ``` =====================...
stack-buffer-overflow at H5D__create_chunk_file_map_hyper /hdf5/src/H5Dchunk.c:1927
https://api.github.com/repos/HDFGroup/hdf5/issues/1313/comments
2
2021-12-18T13:08:16Z
2023-05-04T20:17:45Z
https://github.com/HDFGroup/hdf5/issues/1313
1,083,829,532
1,313
2,943
CVE-2021-46038
2022-01-05T23:15:08.947
A Pointer Dereference vulnerability exists in GPAC 1.0.1 in unlink_chunk.isra, which causes a Denial of Service (context-dependent).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2000" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/2000
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [Yes ] I looked for a similar issue and couldn't find any. - [ Yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ Yes] I give en...
untrusted pointer dereference in unlink_chunk.isra
https://api.github.com/repos/gpac/gpac/issues/2000/comments
1
2021-12-22T15:49:42Z
2022-01-03T11:23:08Z
https://github.com/gpac/gpac/issues/2000
1,086,958,167
2,000
2,944
CVE-2021-46141
2022-01-06T04:15:06.917
An issue was discovered in uriparser before 0.9.6. It performs invalid free operations in uriFreeUriMembers and uriMakeOwner.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://blog.hartwork.org/posts/uriparser-096-with-security-fixes-released/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:uriparser_project:uriparser:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDD115F5-6128-4317-AC92-F0714B9C8E8A", "versionEndExcluding": "0.9.6", "versionEndIncluding": null, "version...
[ "416" ]
416
https://github.com/uriparser/uriparser/issues/121
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "uriparser", "uriparser" ]
A bug was found within the uriparser. Though it might not be an intended use of the relevant API, the bug can still produce critical issues within a program using uriparser. It would be best if the affected logic is checked beforehand. The bug was found with a fuzzer based on the test-code"TestNormalizeSyntaxMaskRequ...
[CVE-2021-46141] .hostText memory is not properly duped/freed in uriNormalizeSyntax*, uriMakeOwner*, uriFreeUriMembers* for some URIs
https://api.github.com/repos/uriparser/uriparser/issues/121/comments
11
2021-09-29T06:35:00Z
2022-01-06T15:33:24Z
https://github.com/uriparser/uriparser/issues/121
1,010,548,738
121
2,945
CVE-2021-46142
2022-01-06T04:15:06.967
An issue was discovered in uriparser before 0.9.6. It performs invalid free operations in uriNormalizeSyntax.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://blog.hartwork.org/posts/uriparser-096-with-security-fixes-released/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:uriparser_project:uriparser:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDD115F5-6128-4317-AC92-F0714B9C8E8A", "versionEndExcluding": "0.9.6", "versionEndIncluding": null, "version...
[ "416" ]
416
https://github.com/uriparser/uriparser/issues/122
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "uriparser", "uriparser" ]
A bug was found within the uriparser. Though it might not be an intended use of the relevant API, the bug can still produce critical issues within a program using uriparser. It would be best if the affected logic is checked beforehand. The bug was found with a fuzzer based on the test-code"NormalizeSyntaxExMm" _*...
[CVE-2021-46142] uriNormalizeSyntax* may free stack memory in out-of-memory situation when handling URIs containing empty segments
https://api.github.com/repos/uriparser/uriparser/issues/122/comments
5
2021-09-29T06:38:40Z
2022-01-06T15:30:41Z
https://github.com/uriparser/uriparser/issues/122
1,010,551,334
122
2,946
CVE-2021-46143
2022-01-06T04:15:07.017
In doProlog in xmlparse.c in Expat (aka libexpat) before 2.4.3, an integer overflow exists for m_groupSize.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/01/17/3" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://ce...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A2FBF20-7B2C-49FF-83F8-1EF903078751", "versionEndExcluding": "2.4.3", "versionEndIncluding": null, "versionSt...
[ "190" ]
190
https://github.com/libexpat/libexpat/issues/532
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "libexpat", "libexpat" ]
On 2021-12-24, a member of [Trend Micro Zero Day Initiative](https://www.zerodayinitiative.com/) ("ZDI") shared a vulnerability named `ZDI-CAN-16157` in libexpat with me that has been discovered by an anonymous individual working with Trend Micro ZDI. I would like to thank both Trend Micro and the anonymous individual ...
[CVE-2021-46143] Crafted XML file can cause integer overflow on m_groupSize in function doProlog
https://api.github.com/repos/libexpat/libexpat/issues/532/comments
4
2021-12-30T19:25:05Z
2022-01-14T16:53:34Z
https://github.com/libexpat/libexpat/issues/532
1,091,269,758
532
2,947
CVE-2021-44351
2022-01-06T12:15:08.087
An arbitrary file read vulnerability exists in NavigateCMS 2.9 via /navigate/navigate_download.php id parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/NavigateCMS/Navigate-CMS/issues/28" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https:/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:naviwebs:navigate_cms:2.9:*:*:*:*:*:*:*", "matchCriteriaId": "5B84FCB0-AA74-4258-B186-491AB6AC304D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "22" ]
22
https://github.com/NavigateCMS/Navigate-CMS/issues/28
[ "Exploit", "Third Party Advisory" ]
github.com
[ "NavigateCMS", "Navigate-CMS" ]
## exp after login ,we can see our sid in cookies ![image](https://user-images.githubusercontent.com/38547290/143457734-1d546b85-11a5-4115-ae76-69927d953736.png) for example my sid is 161099c65675803ecc8de95ae08d3e12 then you can get arbitrary file by `/navigate/navigate_download.php?sid=161099c65675803ecc8de95ae0...
arbitrary file read vulnerability in NavigateCMS 2.9
https://api.github.com/repos/NavigateCMS/Navigate-CMS/issues/28/comments
1
2021-11-25T14:27:44Z
2021-11-28T16:38:37Z
https://github.com/NavigateCMS/Navigate-CMS/issues/28
1,063,656,210
28
2,948
CVE-2021-44590
2022-01-06T14:15:07.867
In libming 0.4.8, a memory exhaustion vulnerability exist in the function cws2fws in util/main.c. Remote attackers could launch denial of service attacks by submitting a crafted SWF file that exploits this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/libming/libming" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/236" }, { "sourc...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "770" ]
770
https://github.com/libming/libming/issues/236
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
version: master(commit 04aee52 ) command: listswf $FILE ``` root:/path_to_libming/build/bin# ./listswf poc ==21798==WARNING: AddressSanitizer failed to allocate 0xffffffffb4b4b4b4 bytes ==21798==AddressSanitizer's allocator is terminating the process instead of returning 0 ==21798==If you don't like this behavi...
Memory allocation failure in cws2fws
https://api.github.com/repos/libming/libming/issues/236/comments
0
2021-12-01T06:02:37Z
2021-12-01T06:02:37Z
https://github.com/libming/libming/issues/236
1,067,997,303
236
2,949
CVE-2021-44591
2022-01-06T14:15:07.917
In libming 0.4.8, the parseSWF_DEFINELOSSLESS2 function in util/parser.c lacks a boundary check that would lead to denial-of-service attacks via a crafted SWF file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/libming/libming" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/235" }, { "sourc...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "770" ]
770
https://github.com/libming/libming/issues/235
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
version: master(commit [04aee52](https://github.com/libming/libming/commit/04aee52363688426eab74f5d6180c149654a6473) ) command: listswf $FILE ``` root:/path_to_libming/build/bin# ./listswf poc ==26225==WARNING: AddressSanitizer failed to allocate 0xfffffffffffffff9 bytes ==26225==AddressSanitizer's allocator is te...
Memory allocation failure caused by the missing boundary check in parseSWF_DEFINELOSSLESS2
https://api.github.com/repos/libming/libming/issues/235/comments
0
2021-12-01T05:31:44Z
2021-12-01T05:31:44Z
https://github.com/libming/libming/issues/235
1,067,981,255
235
2,950
CVE-2021-46039
2022-01-06T20:15:08.657
A Pointer Dereference Vulnerabilty exists in GPAC 1.0.1 via the shift_chunk_offsets.part function, which causes a Denial of Service (context-dependent).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1999" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/1999
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [Yes ] I looked for a similar issue and couldn't find any. - [ Yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ Yes] I give en...
Untrusted pointer dereference in shift_chunk_offsets.part ()
https://api.github.com/repos/gpac/gpac/issues/1999/comments
0
2021-12-22T12:55:57Z
2022-01-03T11:21:14Z
https://github.com/gpac/gpac/issues/1999
1,086,796,143
1,999
2,951
CVE-2021-46040
2022-01-06T20:15:08.723
A Pointer Dereference Vulnerabilty exists in GPAC 1.0.1 via the finplace_shift_moov_meta_offsets function, which causes a Denial of Servie (context-dependent).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2003" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/2003
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [Yes ] I looked for a similar issue and couldn't find any. - [ Yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ Yes] I give en...
Untrusted pointer dereference in inplace_shift_moov_meta_offsets ()
https://api.github.com/repos/gpac/gpac/issues/2003/comments
1
2021-12-22T16:27:40Z
2022-01-03T11:23:50Z
https://github.com/gpac/gpac/issues/2003
1,086,989,862
2,003
2,952
CVE-2021-46042
2022-01-06T20:15:08.843
A Pointer Dereference Vulnerability exists in GPAC 1.0.1 via the _fseeko function, which causes a Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2002" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/2002
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [Yes ] I looked for a similar issue and couldn't find any. - [ Yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ Yes] I give en...
Untrusted pointer dereference in __fseeko()
https://api.github.com/repos/gpac/gpac/issues/2002/comments
1
2021-12-22T16:16:38Z
2022-01-03T11:23:34Z
https://github.com/gpac/gpac/issues/2002
1,086,980,660
2,002
2,953
CVE-2021-46043
2022-01-06T21:15:08.130
A Pointer Dereference Vulnerability exits in GPAC 1.0.1 in the gf_list_count function, which causes a Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2001" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/2001
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [Yes ] I looked for a similar issue and couldn't find any. - [ Yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ Yes] I give en...
Untrusted Pointer Dereference in gf_list_count ()
https://api.github.com/repos/gpac/gpac/issues/2001/comments
1
2021-12-22T16:04:39Z
2022-01-03T11:23:21Z
https://github.com/gpac/gpac/issues/2001
1,086,970,623
2,001
2,954
CVE-2021-46044
2022-01-06T21:15:08.177
A Pointer Dereference Vulnerabilty exists in GPAC 1.0.1via ShiftMetaOffset.isra, which causes a Denial of Service (context-dependent).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2006" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/2006
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [Yes ] I looked for a similar issue and couldn't find any. - [ Yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ Yes] I give en...
Untrusted pointer dereference in ShiftMetaOffset.isra.0 ()
https://api.github.com/repos/gpac/gpac/issues/2006/comments
1
2021-12-22T18:20:11Z
2022-01-03T11:24:37Z
https://github.com/gpac/gpac/issues/2006
1,087,071,987
2,006
2,955
CVE-2021-25743
2022-01-07T00:15:07.817
kubectl does not neutralize escape, meta or control sequences contained in the raw data it outputs to a terminal. This includes but is not limited to the unstructured string fields in objects such as Events.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", ...
[ { "source": "jordan@liggitt.net", "tags": [ "Vendor Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/101695" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220217-0003/" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "ECA582BF-2777-4ABB-A12C-D1D226CC7D08", "versionEndExcluding": null, "versionEndIncluding": "1.18.0", "versionStart...
[ "150" ]
150
https://github.com/kubernetes/kubernetes/issues/101695
[ "Vendor Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
It is a security issue, but after contacting security@kubernetes.io, Tim and the team confirmed that they are comfortable posting it publicly. #### What happened: Kubernetes doesn't sanitize the 'message' field in the Event JSON objects. Notice that this is relevant only to JSON objects, not YAML objects. By ...
ANSI escape characters in kubectl output are not being filtered
https://api.github.com/repos/kubernetes/kubernetes/issues/101695/comments
31
2021-05-02T12:06:24Z
2023-10-31T11:37:13Z
https://github.com/kubernetes/kubernetes/issues/101695
873,925,774
101,695
2,956
CVE-2021-43579
2022-01-10T14:10:24.167
A stack-based buffer overflow in image_load_bmp() in HTMLDOC <= 1.9.13 results in remote code execution if the victim converts an HTML document linking to a crafted BMP file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/27d08989a5a567155d506ac870ae7d8cc88fa58b" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*", "matchCriteriaId": "88D3AD7A-B075-413C-B449-D52E8EBE160F", "versionEndExcluding": null, "versionEndIncluding": "1.9.13", "versionSta...
[ "787" ]
787
https://github.com/michaelrsweet/htmldoc/issues/453
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
In `image_load_bmp()`, the `colors_used` variable is read from the BMP file header and directly used to read into a fixed-size buffer. ```c static int /* O - 0 = success, -1 = fail */ image_load_bmp(image_t *img, /* I - Image to load into */ FILE *fp, /* I - File to read from */ int ...
Stack buffer overflow in image_load_bmp()
https://api.github.com/repos/michaelrsweet/htmldoc/issues/453/comments
3
2021-11-04T15:10:19Z
2021-11-15T08:04:53Z
https://github.com/michaelrsweet/htmldoc/issues/453
1,044,869,365
453
2,957
CVE-2021-43579
2022-01-10T14:10:24.167
A stack-based buffer overflow in image_load_bmp() in HTMLDOC <= 1.9.13 results in remote code execution if the victim converts an HTML document linking to a crafted BMP file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/27d08989a5a567155d506ac870ae7d8cc88fa58b" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*", "matchCriteriaId": "88D3AD7A-B075-413C-B449-D52E8EBE160F", "versionEndExcluding": null, "versionEndIncluding": "1.9.13", "versionSta...
[ "787" ]
787
https://github.com/michaelrsweet/htmldoc/issues/456
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
The fix for the issue [stack buffer overflow before 1.9.13](https://github.com/michaelrsweet/htmldoc/issues/453) does not completely protect against a stack buffer overflow in `image_load_bmp()`. It is possible to control the read in buffer `colormap` through the `colors_used` variable. The previous fix does not mit...
Stack Buffer Overflow with BMP files - Version 1.9.13
https://api.github.com/repos/michaelrsweet/htmldoc/issues/456/comments
2
2021-12-11T09:15:18Z
2021-12-18T12:44:27Z
https://github.com/michaelrsweet/htmldoc/issues/456
1,077,479,183
456
2,958
CVE-2021-46046
2022-01-10T14:11:16.600
A Pointer Derefernce Vulnerbility exists GPAC 1.0.1 the gf_isom_box_size function, which could cause a Denial of Service (context-dependent).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2005" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/2005
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [Yes ] I looked for a similar issue and couldn't find any. - [ Yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ Yes] I give en...
Untrusted pointer dereference in gf_isom_box_size ()
https://api.github.com/repos/gpac/gpac/issues/2005/comments
1
2021-12-22T17:52:53Z
2022-01-03T11:24:25Z
https://github.com/gpac/gpac/issues/2005
1,087,054,279
2,005
2,959
CVE-2021-46047
2022-01-10T14:11:17.010
A Pointer Dereference Vulnerability exists in GPAC 1.0.1 via the gf_hinter_finalize function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2008" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/2008
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [Yes ] I looked for a similar issue and couldn't find any. - [ Yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ Yes] I give en...
Untrusted pointer dereference in gf_hinter_finalize ()
https://api.github.com/repos/gpac/gpac/issues/2008/comments
0
2021-12-22T18:56:01Z
2022-01-03T11:21:14Z
https://github.com/gpac/gpac/issues/2008
1,087,094,002
2,008
2,960
CVE-2021-46048
2022-01-10T14:11:17.663
A Denial of Service vulnerability exists in Binaryen 104 due to an assertion abort in wasm::WasmBinaryBuilder::readFunctions.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/binaryen/issues/4412" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:binaryen:104:*:*:*:*:*:*:*", "matchCriteriaId": "C9EB2419-1D93-4BAA-83D1-1F6174CAB74E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "617" ]
617
https://github.com/WebAssembly/binaryen/issues/4412
[ "Exploit", "Third Party Advisory" ]
github.com
[ "WebAssembly", "binaryen" ]
**Version:** ``` version_104 ``` **command:** ``` wasm-opt POC7 ``` [POC7.zip](https://github.com/WebAssembly/binaryen/files/7775613/POC7.zip) **Result** ``` abort ``` **bt** ``` Program received signal SIGABRT, Aborted. [----------------------------------registers------------------...
A abort failure in wasm::WasmBinaryBuilder::readFunctions
https://api.github.com/repos/WebAssembly/binaryen/issues/4412/comments
3
2021-12-25T07:56:15Z
2025-01-09T11:07:38Z
https://github.com/WebAssembly/binaryen/issues/4412
1,088,564,595
4,412
2,961
CVE-2021-46049
2022-01-10T14:11:18.057
A Pointer Dereference Vulnerability exists in GPAC 1.0.1 via the gf_fileio_check function, which could cause a Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2013" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/2013
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [Yes ] I looked for a similar issue and couldn't find any. - [ Yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ Yes] I give en...
Untrusted pointer dereference in gf_fileio_check()
https://api.github.com/repos/gpac/gpac/issues/2013/comments
1
2021-12-24T07:13:51Z
2022-01-03T11:25:17Z
https://github.com/gpac/gpac/issues/2013
1,088,201,752
2,013
2,962
CVE-2021-46050
2022-01-10T14:11:18.467
A Stack Overflow vulnerability exists in Binaryen 103 via the printf_common function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/binaryen/issues/4391" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:binaryen:103:*:*:*:*:*:*:*", "matchCriteriaId": "851AA3FC-CFB5-4A99-A10C-830974545702", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "770" ]
770
https://github.com/WebAssembly/binaryen/issues/4391
[ "Exploit", "Third Party Advisory" ]
github.com
[ "WebAssembly", "binaryen" ]
**Version:** ``` version_103 ``` **System information** **command:** ``` ./bin/wasm-ctor-eval POC4 ``` [POC4.zip](https://github.com/WebAssembly/binaryen/files/7711678/POC4.zip) **Result** ``` 1887835 segmentation fault ./bin/wasm-ctor-eval ``` **GDB information** ``` Program received signal...
A stack-overflow in printf_common()
https://api.github.com/repos/WebAssembly/binaryen/issues/4391/comments
4
2021-12-14T12:41:56Z
2025-05-16T18:34:13Z
https://github.com/WebAssembly/binaryen/issues/4391
1,079,711,435
4,391
2,963
CVE-2021-46051
2022-01-10T14:11:19.437
A Pointer Dereference Vulnerability exists in GPAC 1.0.1 via the Media_IsSelfContained function, which could cause a Denial of Service. .
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2011" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/2011
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [Yes ] I looked for a similar issue and couldn't find any. - [ Yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ Yes] I give en...
Untrusted pointer dereference in Media_IsSelfContained ()
https://api.github.com/repos/gpac/gpac/issues/2011/comments
1
2021-12-24T06:14:20Z
2022-01-03T11:25:05Z
https://github.com/gpac/gpac/issues/2011
1,088,176,668
2,011
2,964
CVE-2021-46052
2022-01-10T14:11:20.443
A Denial of Service vulnerability exists in Binaryen 104 due to an assertion abort in wasm::Tuple::validate.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/binaryen/issues/4411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:binaryen:104:*:*:*:*:*:*:*", "matchCriteriaId": "C9EB2419-1D93-4BAA-83D1-1F6174CAB74E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "617" ]
617
https://github.com/WebAssembly/binaryen/issues/4411
[ "Exploit", "Third Party Advisory" ]
github.com
[ "WebAssembly", "binaryen" ]
**Version:** ``` version_104 ``` **command:** ``` wasm-as POC6 ``` [POC6.zip](https://github.com/WebAssembly/binaryen/files/7775594/POC6.zip) **Result** ``` Aborted. ``` **bt** ``` Program received signal SIGABRT, Aborted. [----------------------------------registers------------------------...
A abort failure in wasm::Tuple::validate ()
https://api.github.com/repos/WebAssembly/binaryen/issues/4411/comments
4
2021-12-25T07:43:44Z
2025-01-09T17:16:36Z
https://github.com/WebAssembly/binaryen/issues/4411
1,088,563,297
4,411
2,965
CVE-2021-46053
2022-01-10T14:11:21.647
A Denial of Service vulnerability exists in Binaryen 103. The program terminates with signal SIGKILL.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/binaryen/issues/4392" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:binaryen:103:*:*:*:*:*:*:*", "matchCriteriaId": "851AA3FC-CFB5-4A99-A10C-830974545702", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "119" ]
119
https://github.com/WebAssembly/binaryen/issues/4392
[ "Exploit", "Third Party Advisory" ]
github.com
[ "WebAssembly", "binaryen" ]
**Version:** ``` version_103 ``` **System information** **command:** ``` ./bin/wasm-ctor-eval POC5 ``` [POC5.zip](https://github.com/WebAssembly/binaryen/files/7711740/POC5.zip) **Result** ``` Program terminated with signal SIGKILL, Killed. ```
Program terminated with signal SIGKILL, Killed.
https://api.github.com/repos/WebAssembly/binaryen/issues/4392/comments
3
2021-12-14T12:53:22Z
2025-01-09T18:18:53Z
https://github.com/WebAssembly/binaryen/issues/4392
1,079,722,066
4,392
2,966
CVE-2021-46054
2022-01-10T14:11:22.437
A Denial of Service vulnerability exists in Binaryen 104 due to an assertion abort in wasm::WasmBinaryBuilder::visitRethrow(wasm::Rethrow*).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/binaryen/issues/4410" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:binaryen:104:*:*:*:*:*:*:*", "matchCriteriaId": "C9EB2419-1D93-4BAA-83D1-1F6174CAB74E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "617" ]
617
https://github.com/WebAssembly/binaryen/issues/4410
[ "Exploit", "Third Party Advisory" ]
github.com
[ "WebAssembly", "binaryen" ]
**Version:** ``` version_104 ``` **command:** ``` ./bin/wasm-ctor-eval POC5 ``` [POC5.zip](https://github.com/WebAssembly/binaryen/files/7775566/POC5.zip) **Result** ``` 76703 abort ``` **bt** ``` Program received signal SIGABRT, Aborted. [----------------------------------registers----...
A abort failure in wasm::WasmBinaryBuilder::visitRethrow(wasm::Rethrow*)
https://api.github.com/repos/WebAssembly/binaryen/issues/4410/comments
9
2021-12-25T07:10:11Z
2024-07-25T18:07:07Z
https://github.com/WebAssembly/binaryen/issues/4410
1,088,559,821
4,410
2,967
CVE-2021-46055
2022-01-10T14:11:22.887
A Denial of Service vulnerability exists in Binaryen 104 due to an assertion abort in wasm::WasmBinaryBuilder::visitRethrow(wasm::Rethrow*).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/binaryen/issues/4413" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:binaryen:104:*:*:*:*:*:*:*", "matchCriteriaId": "C9EB2419-1D93-4BAA-83D1-1F6174CAB74E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "617" ]
617
https://github.com/WebAssembly/binaryen/issues/4413
[ "Exploit", "Third Party Advisory" ]
github.com
[ "WebAssembly", "binaryen" ]
**Version:** ``` version_104 ``` **command:** ``` wasm-dis POC8 ``` [POC8.zip](https://github.com/WebAssembly/binaryen/files/7775621/POC8.zip) **Result** ``` Aborted. ``` **bt** ``` Program received signal SIGABRT, Aborted. [----------------------------------registers---------------------...
A abort failure in wasm::Builder::makeFunction
https://api.github.com/repos/WebAssembly/binaryen/issues/4413/comments
2
2021-12-25T08:10:49Z
2022-01-05T01:17:37Z
https://github.com/WebAssembly/binaryen/issues/4413
1,088,566,464
4,413
2,968
CVE-2022-22701
2022-01-10T14:12:48.547
PartKeepr versions up to v1.4.0, loads attachments using a URL while creating a part and allows the use of the 'file://' URI scheme, allowing an authenticated user to read local files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "help@fluidattacks.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://fluidattacks.com/advisories/hendrix/" }, { "source": "help@fluidattacks.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:partkeepr:partkeepr:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1BADC74-D7C6-49AC-AE9D-C3B8FB7FF958", "versionEndExcluding": null, "versionEndIncluding": "1.4.0", "versionStartExc...
[ "200" ]
200
https://github.com/partkeepr/PartKeepr/issues/1229
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "partkeepr", "PartKeepr" ]
[comment]: # (Hi and thanks for an issue. In order to help you best, please fill out the following information.) # Bug description In PartKeepr before **v1.4.0**, the functionality to load attachments using a URL when creating a part, allows the use of the **file://** URI scheme, allowing local files to be read. ...
The functionality add attachment to parts allows access to local files.
https://api.github.com/repos/partkeepr/PartKeepr/issues/1229/comments
3
2022-01-04T13:52:52Z
2022-01-13T14:05:45Z
https://github.com/partkeepr/PartKeepr/issues/1229
1,093,377,186
1,229
2,969
CVE-2022-22702
2022-01-10T14:12:48.993
PartKeepr versions up to v1.4.0, in the functionality to upload attachments using a URL when creating a part does not validate that requests can be made to local ports, allowing an authenticated user to carry out SSRF attacks and port enumeration.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "help@fluidattacks.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://fluidattacks.com/advisories/joplin/" }, { "source": "help@fluidattacks.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:partkeepr:partkeepr:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1BADC74-D7C6-49AC-AE9D-C3B8FB7FF958", "versionEndExcluding": null, "versionEndIncluding": "1.4.0", "versionStartExc...
[ "918" ]
918
https://github.com/partkeepr/PartKeepr/issues/1230
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "partkeepr", "PartKeepr" ]
[comment]: # (Hi and thanks for an issue. In order to help you best, please fill out the following information.) # Bug description In PartKeepr before **v1.4.0**, the functionality to upload attachments using a URL when creating a part, does not validate that requests can be send to local ports, allowing SSRF att...
The functionality add attachment to parts allows access to local ports (SSRF).
https://api.github.com/repos/partkeepr/PartKeepr/issues/1230/comments
1
2022-01-04T14:31:21Z
2022-09-21T12:13:30Z
https://github.com/partkeepr/PartKeepr/issues/1230
1,093,412,820
1,230
2,970
CVE-2021-44586
2022-01-10T15:15:08.183
An issue was discovered in dst-admin v1.3.0. The product has an unauthorized arbitrary file download vulnerability that can expose sensitive information.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/qinming99/dst-admin/issues/28" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dst-admin_project:dst-admin:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "86E1635B-3614-4F3D-8D67-B492F69BAF43", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ "22" ]
22
https://github.com/qinming99/dst-admin/issues/28
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "qinming99", "dst-admin" ]
Hi,guys! There is a **serious security problem** in your code. About a few weeks ago, I found a function point in your website background that can lead to arbitrary file download But it must use a account and password. However, I found a new way to download any file in **unauth.** That means I can download any fil...
A security issue
https://api.github.com/repos/qinming99/dst-admin/issues/28/comments
1
2021-11-30T11:26:05Z
2021-12-13T01:37:57Z
https://github.com/qinming99/dst-admin/issues/28
1,067,119,743
28
2,971
CVE-2022-21672
2022-01-10T21:15:08.043
make-ca is a utility to deliver and manage a complete PKI configuration for workstations and servers. Starting with version 0.9 and prior to version 1.10, make-ca misinterprets Mozilla certdata.txt and treats explicitly untrusted certificates like trusted ones, causing those explicitly untrusted certificates trusted by...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/lfs-book/make-ca/issues/19" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:linuxfromscratch:make-ca:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DF45D07-0CDF-49E7-B12B-1A17B3357573", "versionEndExcluding": "1.10", "versionEndIncluding": null, "versionStar...
[ "115" ]
115
https://github.com/lfs-book/make-ca/issues/19
[ "Issue Tracking", "Mitigation", "Third Party Advisory" ]
github.com
[ "lfs-book", "make-ca" ]
Reported by Robert Bartel via blfs-dev, and it also happens on my system: Just recently I noticed that the /etc/pki/tls/certs/ca-bundle.crt generated by make-ca 1.9 includes two explicitly distrusted certificates as indicated by their comments: ``` # Explicitly Distrust DigiNotar Root CA # Explicitly Distrust...
/etc/pki/tls and /etc/ssl/certs include distrusted certificates
https://api.github.com/repos/lfs-book/make-ca/issues/19/comments
0
2022-01-08T15:44:30Z
2023-10-03T10:06:38Z
https://github.com/lfs-book/make-ca/issues/19
1,096,962,233
19
2,972
CVE-2020-25427
2022-01-10T22:15:08.067
A Null pointer dereference vulnerability exits in MP4Box - GPAC version 0.8.0-rev177-g51a8ef874-master via the gf_isom_get_track_id function, which causes a denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/8e585e623b1d666b4ef736ed609264639cb27701" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/gpac/gp...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/1406
[ "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Command-: MP4Box -crypt test.xml $POC -out test.mp4 Version-: MP4Box - GPAC version 0.8.0-rev177-g51a8ef874-master Reproducer file-: [Reproducer](https://github.com/mannuJoshi/POCs/blob/master/POC) GDB-: ``` IsoMedia import id:000034,sig:11,src:000003,op:flip4,pos:8995 - track ID 1 - media type "sdsm:mp4s"...
Null pointer dereference in function gf_isom_get_track_id()
https://api.github.com/repos/gpac/gpac/issues/1406/comments
1
2020-02-08T13:37:09Z
2020-06-11T17:32:43Z
https://github.com/gpac/gpac/issues/1406
562,020,033
1,406
2,973
CVE-2021-35452
2022-01-10T22:15:08.197
An Incorrect Access Control vulnerability exists in libde265 v1.0.8 due to a SEGV in slice.cc.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/strukturag/libde265/issues/298" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mailing List" ], "url": "https://lists.debian.org/debian-lts-annou...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "125" ]
125
https://github.com/strukturag/libde265/issues/298
[ "Exploit", "Issue Tracking" ]
github.com
[ "strukturag", "libde265" ]
Hello, A SEGV has occurred when running program dec265, System info: Ubuntu 20.04.1 : clang 10.0.0 , gcc 9.3.0 Dec265 v1.0.8 [poc (1).zip](https://github.com/strukturag/libde265/files/6695106/poc.1.zip) Verification steps: 1.Get the source code of libde265 2.Compile ``` cd libde265 mkdir b...
SEGV in slice.cc
https://api.github.com/repos/strukturag/libde265/issues/298/comments
4
2021-06-22T14:49:43Z
2022-12-12T14:41:13Z
https://github.com/strukturag/libde265/issues/298
927,319,386
298
2,974
CVE-2021-36408
2022-01-10T23:15:08.963
An issue was discovered in libde265 v1.0.8.There is a Heap-use-after-free in intrapred.h when decoding file using dec265.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/strukturag/libde265/issues/299" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mailing List" ], "url": "https://lists.debian.org/debian-lts-annou...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "416" ]
416
https://github.com/strukturag/libde265/issues/299
[ "Exploit", "Issue Tracking" ]
github.com
[ "strukturag", "libde265" ]
Hello, A Heap-use-after-free has occurred when running program dec265 System info: Ubuntu 20.04.1 : clang 10.0.0 , gcc 9.3.0 Dec265 v1.0.8 [poc.zip](https://github.com/strukturag/libde265/files/6698738/poc.zip) Verification steps: 1.Get the source code of libde265 2.Compile ``` cd libde265 m...
Heap-use-after-free in intrapred.h when decoding file
https://api.github.com/repos/strukturag/libde265/issues/299/comments
4
2021-06-23T03:45:54Z
2022-10-01T10:45:53Z
https://github.com/strukturag/libde265/issues/299
927,828,249
299
2,975
CVE-2021-36409
2022-01-10T23:15:09.047
There is an Assertion `scaling_list_pred_matrix_id_delta==1' failed at sps.cc:925 in libde265 v1.0.8 when decoding file, which allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file or possibly have unspecified other impact.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/strukturag/libde265/issues/300" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mailing List" ], "url": "https://lists.debian.org/debian-lts-annou...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "617" ]
617
https://github.com/strukturag/libde265/issues/300
[ "Exploit", "Issue Tracking" ]
github.com
[ "strukturag", "libde265" ]
Hello, There is an Assertion `scaling_list_pred_matrix_id_delta==1' failed at sps.cc:925 in libde265 v1.0.8 when decoding file. System info: Ubuntu 20.04.1 : clang 10.0.0 , gcc 9.3.0 Dec265 v1.0.8 [poc (3).zip](https://github.com/strukturag/libde265/files/6709588/poc.3.zip) Verification steps: 1.Ge...
There is an Assertion failed at sps.cc
https://api.github.com/repos/strukturag/libde265/issues/300/comments
3
2021-06-24T13:41:11Z
2023-01-27T12:19:27Z
https://github.com/strukturag/libde265/issues/300
929,243,315
300
2,976
CVE-2021-36410
2022-01-10T23:15:09.093
A stack-buffer-overflow exists in libde265 v1.0.8 via fallback-motion.cc in function put_epel_hv_fallback when running program dec265.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/strukturag/libde265/issues/301" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mailing List" ], "url": "https://lists.debian.org/debian-lts-annou...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/strukturag/libde265/issues/301
[ "Exploit", "Issue Tracking" ]
github.com
[ "strukturag", "libde265" ]
Hello, A stack-buffer-overflow has occurred when running program dec265 System info: Ubuntu 20.04.1 : clang 10.0.0 , gcc 9.3.0 Dec265 v1.0.8 [poc (4).zip](https://github.com/strukturag/libde265/files/6710061/poc.4.zip) Verification steps: 1.Get the source code of libde265 2.Compile ``` cd ...
stack-buffer-overflow in fallback-motion.cc when decoding file
https://api.github.com/repos/strukturag/libde265/issues/301/comments
2
2021-06-24T14:47:49Z
2023-01-27T12:18:10Z
https://github.com/strukturag/libde265/issues/301
929,307,435
301
2,977
CVE-2021-36411
2022-01-10T23:15:09.133
An issue has been found in libde265 v1.0.8 due to incorrect access control. A SEGV caused by a READ memory access in function derive_boundaryStrength of deblock.cc has occurred. The vulnerability causes a segmentation fault and application crash, which leads to remote denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/strukturag/libde265/issues/302" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mailing List" ], "url": "https://lists.debian.org/debian-lts-annou...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "125" ]
125
https://github.com/strukturag/libde265/issues/302
[ "Exploit", "Issue Tracking" ]
github.com
[ "strukturag", "libde265" ]
Hello, A SEGV of deblock.cc in function derive_boundaryStrength has occurred when running program dec265, source code ``` 283 if ((edgeFlags & transformEdgeMask) && 284 (img->get_nonzero_coefficient(xDi ,yDi) || 285 img->get_nonzero_coefficient(xDiOpp,yDiOpp))) { 286 ...
A SEGV has occurred when running program dec265
https://api.github.com/repos/strukturag/libde265/issues/302/comments
3
2021-06-25T14:41:05Z
2023-01-27T12:50:07Z
https://github.com/strukturag/libde265/issues/302
930,239,357
302
2,978