cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2021-44981
2022-01-24T13:15:08.177
In QuickBox Pro v2.5.8 and below, the config.php file has a variable which takes a GET parameter value and parses it into a shell_exec(''); function without properly sanitizing any shell arguments, therefore remote code execution is possible. Additionally, as the media server is running as root by default attackers can...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/QuickBox/QB/issues/202" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://websec.nl/blog/61b2b37a43a1...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:quickbox:quickbox:*:*:*:*:community:*:*:*", "matchCriteriaId": "539517B3-AB8A-42AE-AD72-D337662A5FA1", "versionEndExcluding": null, "versionEndIncluding": "2.5.8", "versionSt...
[ "78" ]
78
https://github.com/QuickBox/QB/issues/202
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "QuickBox", "QB" ]
Hey there! I belong to an open source security research community, and a member (@websecnl) has found an issue, but doesn’t know the best way to disclose it. If not a hassle, might you kindly add a `SECURITY.md` file with an email, or another contact method? GitHub [recommends](https://docs.github.com/en/code-securit...
Responsible disclosure policy
https://api.github.com/repos/QuickBox/QB/issues/202/comments
9
2021-12-09T10:22:21Z
2022-02-03T11:42:53Z
https://github.com/QuickBox/QB/issues/202
1,075,401,997
202
3,080
CVE-2022-21711
2022-01-24T20:15:08.657
elfspirit is an ELF static analysis and injection framework that parses, manipulates, and camouflages ELF files. When analyzing the ELF file format in versions prior to 1.1, there is an out-of-bounds read bug, which can lead to application crashes or information leakage. By constructing a special format ELF file, the i...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/liyansong2018/elfspirit/commit/c5b0f5a9a24f2451bbeda4751d67633bc375e608" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Is...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:elfspirit_project:elfspirit:*:*:*:*:*:*:*:*", "matchCriteriaId": "984FF703-F7AC-4EE2-A048-E5EE4DCC33F4", "versionEndExcluding": "1.1.0", "versionEndIncluding": null, "version...
[ "125" ]
125
https://github.com/liyansong2018/elfspirit/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "liyansong2018", "elfspirit" ]
poc ```shell $ ./elfspirit parse id_000000 ``` log ```shell [+] ELF Header e_type: 3 -> A shared object e_machine: 62 -> Intel 80386 e_version: 1 -> Current version e_entry: ...
Out-of-bounds read in elf parsing.
https://api.github.com/repos/secnotes/elfspirit/issues/1/comments
0
2022-01-23T12:32:42Z
2022-03-28T15:50:55Z
https://github.com/secnotes/elfspirit/issues/1
1,111,858,333
1
3,081
CVE-2021-44988
2022-01-25T01:15:07.640
Jerryscript v3.0.0 and below was discovered to contain a stack overflow via ecma_find_named_property in ecma-helpers.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4890" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "770" ]
770
https://github.com/jerryscript-project/jerryscript/issues/4891
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: [51da1551](https://github.com/jerryscript-project/jerryscript/commit/51da15516e1436184be9914314f76d596f14cd27) Version: v3.0.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 4.19.128-microsoft-standard x86_64) ###### Build steps ```bash ./tools/build.py --clea...
Stack-overflow in ecma_find_named_property (ecma-helpers.c)
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4891/comments
1
2021-12-09T14:33:33Z
2021-12-09T14:35:17Z
https://github.com/jerryscript-project/jerryscript/issues/4891
1,075,642,418
4,891
3,082
CVE-2021-44992
2022-01-25T01:15:07.690
There is an Assertion ''ecma_object_is_typedarray (obj_p)'' failed at /jerry-core/ecma/operations/ecma-typedarray-object.c in Jerryscript 3.0.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4875" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "https://security.samsungmobil...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "119" ]
119
https://github.com/jerryscript-project/jerryscript/issues/4875
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: [51da1551](https://github.com/jerryscript-project/jerryscript/commit/51da15516e1436184be9914314f76d596f14cd27) Version: v3.0.0 Commit: [8ba0d1b](https://github.com/jerryscript-project/jerryscript/commit/8ba0d1b6ee5a065a42f3b306771ad8e3c0d819bc) Version: v2.4.0 ###### B...
Assertion 'ecma_object_is_typedarray (obj_p)' failed in ecma-typedarray-object(ecma_get_typedarray_id)
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4875/comments
0
2021-12-09T09:08:53Z
2022-01-12T02:06:25Z
https://github.com/jerryscript-project/jerryscript/issues/4875
1,075,325,382
4,875
3,083
CVE-2021-44993
2022-01-25T01:15:07.730
There is an Assertion ''ecma_is_value_boolean (base_value)'' failed at /jerry-core/ecma/operations/ecma-get-put-value.c in Jerryscript 3.0.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4876" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "https://security.samsungmobil...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "617" ]
617
https://github.com/jerryscript-project/jerryscript/issues/4876
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: [51da1551](https://github.com/jerryscript-project/jerryscript/commit/51da15516e1436184be9914314f76d596f14cd27) Version: v3.0.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash ./tools/build.py --clean --deb...
Assertion 'ecma_is_value_boolean (base_value)' failed in ecma_op_get_value_object_base (ecma-get-put-value).
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4876/comments
0
2021-12-09T09:48:50Z
2022-01-12T02:06:45Z
https://github.com/jerryscript-project/jerryscript/issues/4876
1,075,367,669
4,876
3,084
CVE-2021-44994
2022-01-25T01:15:07.773
There is an Assertion ''JERRY_CONTEXT (jmem_heap_allocated_size) == 0'' failed at /jerry-core/jmem/jmem-heap.c in Jerryscript 3.0.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4894" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "617" ]
617
https://github.com/jerryscript-project/jerryscript/issues/4894
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
## JerryScript commit hash 55acdf2048b390d0f56f12e64dbfb2559f0e70ad ## Build platform Ubuntu 20.04 LTS ## Build steps ``` ./tools/build.py --clean --debug --compile-flag=-fsanitize=address \ --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer \ --compile-flag=-fno-common --compile-flag=-g \ --strip=...
Assertion 'JERRY_CONTEXT (jmem_heap_allocated_size) == 0' failed at /home/sakura/jerryscript/jerry-core/jmem/jmem-heap.c(jmem_heap_finalize):108.
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4894/comments
1
2021-12-09T14:53:08Z
2022-01-14T09:05:39Z
https://github.com/jerryscript-project/jerryscript/issues/4894
1,075,663,454
4,894
3,085
CVE-2021-44994
2022-01-25T01:15:07.773
There is an Assertion ''JERRY_CONTEXT (jmem_heap_allocated_size) == 0'' failed at /jerry-core/jmem/jmem-heap.c in Jerryscript 3.0.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4894" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "617" ]
617
https://github.com/jerryscript-project/jerryscript/issues/4895
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: [51da1551](https://github.com/jerryscript-project/jerryscript/commit/51da15516e1436184be9914314f76d596f14cd27) Version: v3.0.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash ./tools/build.py --clean --debug...
Assertion 'ecma_object_check_class_name_is_object (obj_p)' failed at ecma-objects.c(ecma_object_get_class_name)
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4895/comments
3
2021-12-09T14:58:57Z
2022-01-12T02:09:35Z
https://github.com/jerryscript-project/jerryscript/issues/4895
1,075,669,945
4,895
3,086
CVE-2021-46474
2022-01-25T01:15:07.817
Jsish v3.5.0 was discovered to contain a heap buffer overflow via jsiEvalCodeSub in src/jsiEval.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/57" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ],...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "787" ]
787
https://github.com/pcmacdon/jsish/issues/57
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-buffer-overflow src/jsiEval.c:1366 in jsiEvalCodeSub
https://api.github.com/repos/pcmacdon/jsish/issues/57/comments
1
2021-12-24T09:47:27Z
2022-01-12T02:12:21Z
https://github.com/pcmacdon/jsish/issues/57
1,088,279,556
57
3,087
CVE-2021-46475
2022-01-25T01:15:07.853
Jsish v3.5.0 was discovered to contain a heap buffer overflow via jsi_ArraySliceCmd in src/jsiArray.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/64" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ],...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "787" ]
787
https://github.com/pcmacdon/jsish/issues/64
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-buffer-overflow src/jsiArray.c:912 in jsi_ArraySliceCmd
https://api.github.com/repos/pcmacdon/jsish/issues/64/comments
0
2021-12-24T10:33:23Z
2021-12-26T17:16:57Z
https://github.com/pcmacdon/jsish/issues/64
1,088,304,005
64
3,088
CVE-2021-46477
2022-01-25T01:15:07.893
Jsish v3.5.0 was discovered to contain a heap buffer overflow via RegExp_constructor in src/jsiRegexp.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/63" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ],...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "787" ]
787
https://github.com/pcmacdon/jsish/issues/63
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-buffer-overflow src/jsiRegexp.c:176 in RegExp_constructor
https://api.github.com/repos/pcmacdon/jsish/issues/63/comments
0
2021-12-24T10:32:32Z
2022-01-12T02:13:42Z
https://github.com/pcmacdon/jsish/issues/63
1,088,303,589
63
3,089
CVE-2021-46478
2022-01-25T01:15:07.930
Jsish v3.5.0 was discovered to contain a heap buffer overflow via jsiClearStack in src/jsiEval.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/60" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ],...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "787" ]
787
https://github.com/pcmacdon/jsish/issues/60
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-buffer-overflow src/jsiEval.c:120 in jsiClearStack
https://api.github.com/repos/pcmacdon/jsish/issues/60/comments
0
2021-12-24T09:50:51Z
2022-01-12T02:12:56Z
https://github.com/pcmacdon/jsish/issues/60
1,088,281,295
60
3,090
CVE-2021-46480
2022-01-25T01:15:07.970
Jsish v3.5.0 was discovered to contain a heap buffer overflow via jsiValueObjDelete in src/jsiEval.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/61" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ],...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "787" ]
787
https://github.com/pcmacdon/jsish/issues/61
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-buffer-overflow src/jsiEval.c:464 in jsiValueObjDelete
https://api.github.com/repos/pcmacdon/jsish/issues/61/comments
0
2021-12-24T10:30:42Z
2022-01-12T02:13:11Z
https://github.com/pcmacdon/jsish/issues/61
1,088,302,674
61
3,091
CVE-2021-46481
2022-01-25T01:15:08.010
Jsish v3.5.0 was discovered to contain a memory leak via linenoise at src/linenoise.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/55" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ],...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "401" ]
401
https://github.com/pcmacdon/jsish/issues/55
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Memory leaks in linenoise src/linenoise.c:1061
https://api.github.com/repos/pcmacdon/jsish/issues/55/comments
0
2021-12-24T09:44:48Z
2022-01-12T02:11:57Z
https://github.com/pcmacdon/jsish/issues/55
1,088,278,241
55
3,092
CVE-2021-46482
2022-01-25T01:15:08.050
Jsish v3.5.0 was discovered to contain a heap buffer overflow via NumberConstructor at src/jsiNumber.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/66" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ],...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "787" ]
787
https://github.com/pcmacdon/jsish/issues/66
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-buffer-overflow src/jsiNumber.c:93 in NumberConstructor
https://api.github.com/repos/pcmacdon/jsish/issues/66/comments
0
2021-12-24T10:35:07Z
2022-01-12T02:14:08Z
https://github.com/pcmacdon/jsish/issues/66
1,088,304,812
66
3,093
CVE-2021-46483
2022-01-25T01:15:08.090
Jsish v3.5.0 was discovered to contain a heap buffer overflow via BooleanConstructor at src/jsiBool.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/62" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ],...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "787" ]
787
https://github.com/pcmacdon/jsish/issues/62
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-buffer-overflow src/jsiBool.c:17 in BooleanConstructor
https://api.github.com/repos/pcmacdon/jsish/issues/62/comments
0
2021-12-24T10:31:27Z
2022-01-12T02:13:25Z
https://github.com/pcmacdon/jsish/issues/62
1,088,303,083
62
3,094
CVE-2021-45340
2022-01-25T12:15:07.643
In Libsixel prior to and including v1.10.3, a NULL pointer dereference in the stb_image.h component of libsixel allows attackers to cause a denial of service (DOS) via a crafted PICT file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/libsixel/libsixel/issues/51" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking",...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4049A12-67EA-4961-9B1A-331D52D04E8D", "versionEndExcluding": null, "versionEndIncluding": "1.10.3", "versionS...
[ "476" ]
476
https://github.com/libsixel/libsixel/issues/51
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "libsixel", "libsixel" ]
This is a duplicate report of issue [160](https://github.com/saitoha/libsixel/issues/160) in the original project. I'm not sure where best to report this, but it affects both projects. ## Vulnerable versions * saitoha/libsixel at the latest (6a5be8b72d84037b83a5ea838e17bcf372ab1d5f) commit * libsixel/libsixel at t...
NULL pointer dereference in stb_image.h
https://api.github.com/repos/libsixel/libsixel/issues/51/comments
9
2021-12-14T22:08:42Z
2025-02-12T00:02:11Z
https://github.com/libsixel/libsixel/issues/51
1,080,342,756
51
3,095
CVE-2021-45341
2022-01-25T12:15:07.693
A buffer overflow vulnerability in CDataMoji of the jwwlib component of LibreCAD 2.2.0-rc3 and older allows an attacker to achieve Remote Code Execution using a crafted JWW document.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPL...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreCAD/LibreCAD/issues/1462" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:librecad:librecad:*:*:*:*:*:*:*:*", "matchCriteriaId": "952DEFEE-00FC-4BBC-8305-8611255AF7C3", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExclu...
[ "120" ]
120
https://github.com/LibreCAD/LibreCAD/issues/1462
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreCAD", "LibreCAD" ]
### Vulnerable Products * LibreCAD 2.2.0-rc3 and older * Jw_cad 8.24a and older ### Steps to reproduce or sample file 1. Start LibreCAD 2.2.0-rc3 in a debugger 2. File/Open... 3. Unzip and open the attached [proof of concept file](https://github.com/LibreCAD/LibreCAD/files/7739792/jww_cdatamoji.zip) 4. Obser...
Remote Code Execution vulnerability in LibreCAD 2.2.0-rc3 (JWW CDataMoji)
https://api.github.com/repos/LibreCAD/LibreCAD/issues/1462/comments
5
2021-12-18T19:01:27Z
2022-01-25T12:03:26Z
https://github.com/LibreCAD/LibreCAD/issues/1462
1,083,924,119
1,462
3,096
CVE-2021-45342
2022-01-25T13:15:07.830
A buffer overflow vulnerability in CDataList of the jwwlib component of LibreCAD 2.2.0-rc3 and older allows an attacker to achieve Remote Code Execution using a crafted JWW document.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreCAD/LibreCAD/issues/1464" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:librecad:librecad:*:*:*:*:*:*:*:*", "matchCriteriaId": "66E49DA1-2E98-4159-BCA0-DD5EAAEF049A", "versionEndExcluding": null, "versionEndIncluding": "2.1.3", "versionStartExclu...
[ "120" ]
120
https://github.com/LibreCAD/LibreCAD/issues/1464
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreCAD", "LibreCAD" ]
# Vulnerable Products * LibreCAD 2.2.0-rc3 and older ### Steps to reproduce or sample file 1. Start LibreCAD 2.2.0 in a debugger 2. File/Open... 3. Unzip and open the [attached proof-of-concept file](https://github.com/LibreCAD/LibreCAD/files/7740065/jww_cdatalist.zip) 4. Observe `ACCESS_VIOLATION` crash, w...
Remote Code Execution vulnerability in LibreCAD 2.2.0-rc3 (JWW CDataList)
https://api.github.com/repos/LibreCAD/LibreCAD/issues/1464/comments
2
2021-12-18T22:48:34Z
2022-01-25T12:09:59Z
https://github.com/LibreCAD/LibreCAD/issues/1464
1,083,960,819
1,464
3,097
CVE-2021-45343
2022-01-25T13:15:07.873
In LibreCAD 2.2.0, a NULL pointer dereference in the HATCH handling of libdxfrw allows an attacker to crash the application using a crafted DXF document.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreCAD/LibreCAD/issues/1468" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:librecad:librecad:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E51FA84F-21D7-4AFA-871C-488EF10C2092", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "476" ]
476
https://github.com/LibreCAD/LibreCAD/issues/1468
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreCAD", "LibreCAD" ]
### Steps to reproduce or sample file 1. Unzip and load the [attached proof of concept file](https://github.com/LibreCAD/LibreCAD/files/7741210/dxf_hatch93.zip) in LibreCAD 2.2.0-rc3 ### Cause The `std::shared_ptr` `DRW_Hatch::loop` is written to when loading a `HATCH` entity with code 93. If this occurs before a ...
NULL pointer dereference in DXF parser, HATCH code 93
https://api.github.com/repos/LibreCAD/LibreCAD/issues/1468/comments
2
2021-12-19T17:00:48Z
2022-01-25T12:25:06Z
https://github.com/LibreCAD/LibreCAD/issues/1468
1,084,144,167
1,468
3,098
CVE-2021-45846
2022-01-25T14:15:08.807
A flaw in the AMF parser of Slic3r libslic3r 1.3.0 allows an attacker to cause an application crash using a crafted AMF document, where a metadata tag lacks a "type" attribute.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/slic3r/Slic3r/issues/5117" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Par...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:slic3r:slic3r:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "A80F063E-875F-4590-B370-4A8795AF1F9F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "476" ]
476
https://github.com/slic3r/Slic3r/issues/5117
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "slic3r", "Slic3r" ]
### Summary A crafted AMF XML document can cause a crash due to a NULL pointer dereference during parsing. ### Vulnerable versions * Slic3r (commit b1a5500f427700ac3dffc0e7d9535ea65f993537) ### Step to reproduce 1. Create the proof-of-concept OBJ file (`nullptr_amf_metadata.amf.xml`): ``` <amf unit="millimet...
NULL pointer dereference in AMF XML parser (metadata tag without type attribute)
https://api.github.com/repos/slic3r/Slic3r/issues/5117/comments
2
2021-12-26T17:21:29Z
2022-02-01T23:28:44Z
https://github.com/slic3r/Slic3r/issues/5117
1,088,812,181
5,117
3,099
CVE-2021-45847
2022-01-25T14:15:08.860
Several missing input validations in the 3MF parser component of Slic3r libslic3r 1.3.0 can each allow an attacker to cause an application crash using a crafted 3MF input file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/slic3r/Slic3r/issues/5118" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mitigation", "Patch", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:slic3r:slic3r:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "A80F063E-875F-4590-B370-4A8795AF1F9F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "476" ]
476
https://github.com/slic3r/Slic3r/issues/5118
[ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ]
github.com
[ "slic3r", "Slic3r" ]
### Summary A crafted 3MF XML document can cause a crash due to a NULL pointer dereference during parsing. ### Vulnerable versions * Slic3r (commit b1a5500f427700ac3dffc0e7d9535ea65f993537) ### Step to reproduce 1. Create the proof-of-concept OBJ file (`3dmodel.3dmodel`): ```xml <model> <resources> <...
NULL pointer dereference in 3MF XML parser (vertex tag without x/y/z attribute)
https://api.github.com/repos/slic3r/Slic3r/issues/5118/comments
2
2021-12-26T20:32:19Z
2022-01-31T12:44:25Z
https://github.com/slic3r/Slic3r/issues/5118
1,088,840,391
5,118
3,100
CVE-2021-45847
2022-01-25T14:15:08.860
Several missing input validations in the 3MF parser component of Slic3r libslic3r 1.3.0 can each allow an attacker to cause an application crash using a crafted 3MF input file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/slic3r/Slic3r/issues/5118" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mitigation", "Patch", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:slic3r:slic3r:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "A80F063E-875F-4590-B370-4A8795AF1F9F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "476" ]
476
https://github.com/slic3r/Slic3r/issues/5119
[ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ]
github.com
[ "slic3r", "Slic3r" ]
### Summary A crafted 3MF XML document can cause a crash due to a NULL pointer dereference during parsing. ### Vulnerable versions * Slic3r (commit b1a5500f427700ac3dffc0e7d9535ea65f993537) ### Step to reproduce 1. Create the proof-of-concept OBJ file (`3dmodel.3dmodel`): ```xml <model> <resources> <...
NULL pointer dereference in 3MF XML parser (triangle tag without v1/v2/v3 attribute)
https://api.github.com/repos/slic3r/Slic3r/issues/5119/comments
2
2021-12-26T20:37:00Z
2022-01-31T12:45:37Z
https://github.com/slic3r/Slic3r/issues/5119
1,088,840,946
5,119
3,101
CVE-2021-45847
2022-01-25T14:15:08.860
Several missing input validations in the 3MF parser component of Slic3r libslic3r 1.3.0 can each allow an attacker to cause an application crash using a crafted 3MF input file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/slic3r/Slic3r/issues/5118" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mitigation", "Patch", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:slic3r:slic3r:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "A80F063E-875F-4590-B370-4A8795AF1F9F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "476" ]
476
https://github.com/slic3r/Slic3r/issues/5120
[ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ]
github.com
[ "slic3r", "Slic3r" ]
### Summary A crafted 3MF XML document can cause a crash due to a NULL pointer dereference during parsing. ### Vulnerable versions * Slic3r (commit b1a5500f427700ac3dffc0e7d9535ea65f993537) ### Step to reproduce 1. Create the proof-of-concept OBJ file (`3dmodel.3dmodel`): ```xml <model> <resources> <...
NULL pointer dereference in 3MF XML parser (slic3r:volume tag without ts/te/modifier attribute)
https://api.github.com/repos/slic3r/Slic3r/issues/5120/comments
2
2021-12-26T20:44:57Z
2022-01-31T12:46:34Z
https://github.com/slic3r/Slic3r/issues/5120
1,088,841,969
5,120
3,102
CVE-2021-46033
2022-01-25T15:15:08.160
In ForestBlog, as of 2021-12-28, File upload can bypass verification.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/saysky/ForestBlog/issues/69" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:forestblog_project:forestblog:-:*:*:*:*:*:*:*", "matchCriteriaId": "09674756-CCE5-44F4-9CEA-FEFB96615FA7", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "434" ]
434
https://github.com/saysky/ForestBlog/issues/69
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "saysky", "ForestBlog" ]
In this code, the verification suffix should verify the file type after the last point: public final String allowSuffix = ".bmp.jpg.jpeg.png.gif.pdf.doc.zip.rar.gz"; /** * 上传文件 * * @param file * @return * @throws IOException */ @RequestMapping(value = "/img", method = R...
File upload bypass exists
https://api.github.com/repos/saysky/ForestBlog/issues/69/comments
0
2021-12-28T07:42:20Z
2022-02-17T05:00:26Z
https://github.com/saysky/ForestBlog/issues/69
1,089,678,713
69
3,103
CVE-2021-46089
2022-01-25T15:15:08.203
In JeecgBoot 3.0, there is a SQL injection vulnerability that can operate the database with root privileges.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10, "confidentialityImpact": "COMPLETE"...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/3331" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Th...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "45720048-60C0-4FA8-AA09-16C8CF329FD3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "89" ]
89
https://github.com/jeecgboot/jeecg-boot/issues/3331
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
##### version: <=3.0 ##### precondition: After logged in the website,click 流程管理 proxy burp,the parameter "column" can be made SQL injection. ##### Screenshot & code : <img width="1240" alt="图片" src="https://user-images.githubusercontent.com/25843151/147641725-71a3c7a3-c4d4-41f8-af76-b875641e2cbf.png"> ...
There is an SQL injection vulnerability that can operate the database with root privileges.
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/3331/comments
3
2021-12-29T08:36:51Z
2022-01-21T02:04:30Z
https://github.com/jeecgboot/JeecgBoot/issues/3331
1,090,357,318
3,331
3,104
CVE-2021-46034
2022-01-25T16:15:08.797
A problem was found in ForestBlog, as of 2021-12-29, there is a XSS vulnerability that can be injected through the nickname input box.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/saysky/ForestBlog/issues/70" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:forestblog_project:forestblog:-:*:*:*:*:*:*:*", "matchCriteriaId": "09674756-CCE5-44F4-9CEA-FEFB96615FA7", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "79" ]
79
https://github.com/saysky/ForestBlog/issues/70
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "saysky", "ForestBlog" ]
There is no character verification for the nickname of the registration interface ![1640761829(1)](https://user-images.githubusercontent.com/92918668/147636720-189126a2-1b8b-4888-93dc-803d71e69c5e.jpg) The administrator clicks the user function to pop up the XSS prompt box ![image](https://user-images.githubusercont...
XSS vulnerability exists
https://api.github.com/repos/saysky/ForestBlog/issues/70/comments
0
2021-12-29T07:16:11Z
2022-02-17T05:00:14Z
https://github.com/saysky/ForestBlog/issues/70
1,090,318,764
70
3,105
CVE-2021-46085
2022-01-25T16:15:08.920
OneBlog <= 2.2.8 is vulnerable to Insecure Permissions. Low level administrators can delete high-level administrators beyond their authority.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zhangyd-c/OneBlog/issues/29" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oneblog_project:oneblog:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E0AB4B0-7F87-4DE4-9789-C27A8220F2E5", "versionEndExcluding": null, "versionEndIncluding": "2.2.8", "versionStar...
[ "276" ]
276
https://github.com/zhangyd-c/OneBlog/issues/29
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "zhangyd-c", "OneBlog" ]
[Suggested description] Insecure Permissions vulnerability exists in OneBlog.Low level administrators can delete high-level administrators beyond their authority (including administrators with the highest authority). [Vulnerability Type] Insecure Permissions [Vendor of Product] https://github.com/zhangyd-c/On...
There is a Insecure Permissions vulnerability exists in OneBlog <= 2.2.8
https://api.github.com/repos/zhangyd-c/OneBlog/issues/29/comments
0
2021-12-29T09:33:16Z
2021-12-29T09:33:16Z
https://github.com/zhangyd-c/OneBlog/issues/29
1,090,388,202
29
3,106
CVE-2021-46087
2022-01-25T16:15:09.013
In jfinal_cms >= 5.1 0, there is a storage XSS vulnerability in the background system of CMS. Because developers do not filter the parameters submitted by the user input form, any user with background permission can affect the system security by entering malicious code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/19" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jflyfox:jfinal_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EF2DC8E-81C2-4E53-A709-EC9490E00A3F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "79" ]
79
https://github.com/jflyfox/jfinal_cms/issues/19
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jflyfox", "jfinal_cms" ]
There is a storage XSS vulnerability in the modification of jfinal_CMS user's personal information. The attacker can insert malicious XSS code into the modification of personal information, and then successfully trigger XSS attack when the administrator user views the user's personal information. First, register a use...
A Stored XSS vulnerability exists in jfinal_cms v5.1.0
https://api.github.com/repos/jflyfox/jfinal_cms/issues/19/comments
1
2020-06-03T14:27:59Z
2021-06-15T03:31:10Z
https://github.com/jflyfox/jfinal_cms/issues/19
630,044,323
19
3,107
CVE-2021-4133
2022-01-25T20:15:08.607
A flaw was found in Keycloak in versions from 12.0.0 and before 15.1.1 which allows an attacker with any existing user account to create new default user accounts via the administrative REST API even when new user registration is disabled.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033602" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/keycloak/ke...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*", "matchCriteriaId": "A401BE6A-3227-4F4D-9FA8-35B61B86B79A", "versionEndExcluding": "15.1.1", "versionEndIncluding": null, "versionStartExclud...
[ "863" ]
863
https://github.com/keycloak/keycloak/issues/9247
[ "Third Party Advisory" ]
github.com
[ "keycloak", "keycloak" ]
### Describe the bug A incorrect authorization flaw was found in Keycloak 12.0.0, the flaw allows an attacker with any existing user account to create new default user accounts via the administrative REST API even where new user registration is disabled. Security advisory: * https://github.com/keycloak/keycloak/...
Incorrect authorization allows unpriviledged users to create other users
https://api.github.com/repos/keycloak/keycloak/issues/9247/comments
3
2021-12-20T12:37:38Z
2022-09-11T18:42:20Z
https://github.com/keycloak/keycloak/issues/9247
1,084,743,912
9,247
3,108
CVE-2019-25056
2022-01-26T05:15:08.847
In Bromite through 78.0.3904.130, there are adblock rules in the release APK; therefore, probing which resources are blocked and which aren't can identify the application version and defeat the User-Agent protection mechanism.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/bromite/bromite/issues/2#issuecomment-524102774" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/bromite/b...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bromite:bromite:*:*:*:*:*:*:*:*", "matchCriteriaId": "9364A5D1-99E3-4529-9B05-5B4A8B832070", "versionEndExcluding": null, "versionEndIncluding": "78.0.3904.130", "versionStar...
[ "203" ]
203
https://github.com/bromite/bromite/issues/2#issuecomment-524102774
[ "Third Party Advisory" ]
github.com
[ "bromite", "bromite" ]
This issue composes of multiple parts: * ~~a new tab/UI to manage the adblocking feature~~ will not implement this * logic to download the adblock filters and store them * logic to parse the adblock filters (or an intermediate format) * users can of course customize where the adblock filters come from (URLs) The...
Support user-specified adblock filters
https://api.github.com/repos/bromite/bromite/issues/2/comments
39
2017-10-11T14:19:01Z
2024-01-11T18:34:59Z
https://github.com/bromite/bromite/issues/2
264,605,079
2
3,109
CVE-2021-46117
2022-01-26T16:15:07.613
jpress 4.2.0 is vulnerable to remote code execution via io.jpress.module.page.PageNotifyKit#doSendEmail. The admin panel provides a function through which attackers can edit the email templates and inject some malicious code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://jpress.com" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/JPressProjects/jpress" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpress:jpress:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D2D7F379-C6D9-46F8-BD79-2512DE8F4784", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "94" ]
94
https://github.com/JPressProjects/jpress/issues/171
[ "Exploit", "Third Party Advisory" ]
github.com
[ "JPressProjects", "jpress" ]
# 审计过程 **与之前一篇不同,之前交过一个邮件模板注入的洞,之前那个触发点是在article的评论处,这次是在page的评论处,代码很相似,但不是同一份代码** jpress后台提供了**评论邮件通知管理员**功能,而且发送的邮件模板可控,官方给出了例子,告诉我们可以用`#(comment.id)`,那么猜测这里可能会存在模板渲染问题 ![image-20211222194033904](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222194033904.png) 接着,尝试发一条评论看看后端代码的执行流程,后端对应的代码是`io.jpr...
jpress后台存在命令执行漏洞-邮件模板page
https://api.github.com/repos/JPressProjects/jpress/issues/171/comments
1
2022-01-09T08:53:50Z
2022-08-07T09:53:07Z
https://github.com/JPressProjects/jpress/issues/171
1,097,141,191
171
3,110
CVE-2021-46115
2022-01-26T17:15:07.730
jpress 4.2.0 is vulnerable to RCE via io.jpress.web.admin._TemplateController#doUploadFile. The admin panel provides a function through which attackers can upload templates and inject some malicious code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://jpress.com" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/JPressProjects/jpress" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpress:jpress:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D2D7F379-C6D9-46F8-BD79-2512DE8F4784", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "434" ]
434
https://github.com/JPressProjects/jpress/issues/169
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "JPressProjects", "jpress" ]
# 审计过程 jpress后台存在模板上传功能,不过存在些许过滤,我们使用fastjson来辅助获取`ScriptEngineManager`,然后执行任意js代码,就可以实现rce,payload如下 ``` #set(x=com.alibaba.fastjson.parser.ParserConfig::getGlobalInstance()) #(x.setAutoTypeSupport(true)) #(x.addAccept("javax.script.ScriptEngineManager")) #set(x=com.alibaba.fastjson.JSON::parse('{"@type":"j...
jpress后台存在命令执行漏洞-模板上传
https://api.github.com/repos/JPressProjects/jpress/issues/169/comments
1
2022-01-09T08:49:15Z
2022-08-07T09:52:23Z
https://github.com/JPressProjects/jpress/issues/169
1,097,140,367
169
3,111
CVE-2021-46116
2022-01-26T17:15:07.780
jpress 4.2.0 is vulnerable to remote code execution via io.jpress.web.admin._TemplateController#doInstall. The admin panel provides a function through which attackers can install templates and inject some malicious code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://jpress.com" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/JPressProjects/jpress" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpress:jpress:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D2D7F379-C6D9-46F8-BD79-2512DE8F4784", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "434" ]
434
https://github.com/JPressProjects/jpress/issues/168
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "JPressProjects", "jpress" ]
# 审计过程 jpress后台存在模板安装功能,攻击者可以安装恶意模板造成rce。 在页面上点击安装模板 ![image-20211222111225666](https://user-images.githubusercontent.com/64583215/148675264-e46cc7be-3430-4df5-af4e-daca0ef16ab0.png) 上传恶意模板之后,程序运行到`io.jpress.web.admin._TemplateController#doInstall`,这个函数的作用是将上传的zip文件解压,然后存到classes/webapp/templates目录下,这个目录是专门用来...
jpress后台存在命令执行漏洞-模板安装
https://api.github.com/repos/JPressProjects/jpress/issues/168/comments
1
2022-01-09T08:44:35Z
2022-08-07T09:54:17Z
https://github.com/JPressProjects/jpress/issues/168
1,097,139,500
168
3,112
CVE-2021-46118
2022-01-26T17:15:07.820
jpress 4.2.0 is vulnerable to remote code execution via io.jpress.module.article.kit.ArticleNotifyKit#doSendEmail. The admin panel provides a function through which attackers can edit the email templates and inject some malicious code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://jpress.com" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/JPressProjects/jpress" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpress:jpress:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D2D7F379-C6D9-46F8-BD79-2512DE8F4784", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "94" ]
94
https://github.com/JPressProjects/jpress/issues/170
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "JPressProjects", "jpress" ]
# 审计过程 jpress后台提供了**评论邮件通知管理员**功能,而且发送的邮件模板可控,官方给出了例子,告诉我们可以用`#(comment.id)`,那么猜测这里可能会存在模板渲染问题 ![image-20211222172115997](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222172115997.png) 接着,尝试发一条评论看看后端代码的执行流程 ![image-20211222172326880](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222172326...
jpress后台存在命令执行漏洞-邮件模板article
https://api.github.com/repos/JPressProjects/jpress/issues/170/comments
1
2022-01-09T08:52:56Z
2022-08-07T09:53:35Z
https://github.com/JPressProjects/jpress/issues/170
1,097,141,030
170
3,113
CVE-2021-46114
2022-01-26T19:15:08.290
jpress v 4.2.0 is vulnerable to RCE via io.jpress.module.product.ProductNotifyKit#doSendEmail. The admin panel provides a function through which attackers can edit the email templates and inject some malicious code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://jpress.com" }, { "source": "cve@mitre.org", "tags": [ "Product", "Third Party Advisory" ], "url": "https://github.com/JPressProjects/jpress" }, { "source": "cve@mitre.org", "t...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpress:jpress:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D2D7F379-C6D9-46F8-BD79-2512DE8F4784", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "94" ]
94
https://github.com/JPressProjects/jpress/issues/172
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "JPressProjects", "jpress" ]
# 审计过程 **与之前两篇不同,之前交过两个邮件模板注入的洞,一个触发点是在article的评论处,一个是在page的评论处,这次是在product的评论处,代码很相似,但不是同一份代码** jpress后台提供了**评论邮件通知管理员**功能,而且发送的邮件模板可控,官方给出了例子,告诉我们可以用`#(comment.id)`,那么猜测这里可能会存在模板渲染问题 ![image-20211222195858075](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222195858075.png) 接着,尝试发一条评论看看后端代码的执行流程,后...
jpress后台存在命令执行漏洞-邮件模板product
https://api.github.com/repos/JPressProjects/jpress/issues/172/comments
1
2022-01-09T08:54:40Z
2022-08-07T09:52:47Z
https://github.com/JPressProjects/jpress/issues/172
1,097,141,322
172
3,114
CVE-2021-32849
2022-01-26T22:15:07.903
Gerapy is a distributed crawler management framework. Prior to version 0.9.9, an authenticated user could execute arbitrary commands. This issue is fixed in version 0.9.9. There are no known workarounds.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE...
[ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Gerapy/Gerapy/issues/197" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gerapy:gerapy:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC824765-CEAB-47C3-A20C-B263A40ABFDE", "versionEndExcluding": "0.9.9", "versionEndIncluding": null, "versionStartExcluding...
[ "77" ]
77
https://github.com/Gerapy/Gerapy/issues/197
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Gerapy", "Gerapy" ]
Hello, The [GitHub Security Lab team](https://securitylab.github.com/) has found a potential vulnerability in your project. Please create a [Security Advisory](https://docs.github.com/en/free-pro-team@latest/github/managing-security-vulnerabilities/creating-a-security-advisory) and invite me in to further disclose a...
GitHub Security Lab: Security Contact Needed
https://api.github.com/repos/Gerapy/Gerapy/issues/197/comments
1
2021-05-14T12:11:59Z
2021-12-26T11:17:19Z
https://github.com/Gerapy/Gerapy/issues/197
891,871,512
197
3,115
CVE-2021-32849
2022-01-26T22:15:07.903
Gerapy is a distributed crawler management framework. Prior to version 0.9.9, an authenticated user could execute arbitrary commands. This issue is fixed in version 0.9.9. There are no known workarounds.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE...
[ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Gerapy/Gerapy/issues/197" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gerapy:gerapy:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC824765-CEAB-47C3-A20C-B263A40ABFDE", "versionEndExcluding": "0.9.9", "versionEndIncluding": null, "versionStartExcluding...
[ "77" ]
77
https://github.com/Gerapy/Gerapy/issues/217
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Gerapy", "Gerapy" ]
The GitHub Security Lab reported a potential security vulnerability (GHSL-2021-076-gerapy) in your project on 2021/05/13. It has been 90 days since our initial report and as per our coordinated disclosure policy, we intend to publish a public advisory detailing this issue. If you do wish to further coordinate a respons...
Security Issue: GHSL-2021-076-gerapy
https://api.github.com/repos/Gerapy/Gerapy/issues/217/comments
2
2021-11-22T09:05:04Z
2022-01-09T21:14:47Z
https://github.com/Gerapy/Gerapy/issues/217
1,059,877,092
217
3,116
CVE-2021-46377
2022-01-27T18:15:07.813
There is a front-end sql injection vulnerability in cszcms 1.2.9 via cszcms/controllers/Member.php#viewUser
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cskaza/cszcms/issues/33" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cskaza:cszcms:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "A08F592A-91EF-4922-994E-A44A05BBA747", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "89" ]
89
https://github.com/cskaza/cszcms/issues/33
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cskaza", "cszcms" ]
Hi, I found a front-end sql injection vulnerability in cszcms-1.2.9 The vulnerable code is on `cszcms\controllers\Member.php#viewUser` The `$this->uri->segment(3)` parameter here can be controlled by the user ![image](https://user-images.githubusercontent.com/65856396/149486766-4872a527-7387-451b-86f2-6113fb41...
Bug Report: There is a front-end boolean-based sql injection vulnerability
https://api.github.com/repos/cskaza/cszcms/issues/33/comments
0
2022-01-14T09:13:29Z
2022-01-14T09:13:29Z
https://github.com/cskaza/cszcms/issues/33
1,103,315,429
33
3,117
CVE-2021-46484
2022-01-27T21:15:08.343
Jsish v3.5.0 was discovered to contain a heap-use-after-free via Jsi_IncrRefCount in src/jsiValue.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/73" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "416" ]
416
https://github.com/pcmacdon/jsish/issues/73
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-use-after-free src/jsiValue.c:34 in Jsi_IncrRefCount
https://api.github.com/repos/pcmacdon/jsish/issues/73/comments
1
2021-12-24T10:41:10Z
2021-12-28T03:39:04Z
https://github.com/pcmacdon/jsish/issues/73
1,088,307,699
73
3,118
CVE-2021-46489
2022-01-27T21:15:08.603
Jsish v3.5.0 was discovered to contain a heap-use-after-free via Jsi_DecrRefCount in src/jsiValue.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/74" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "416" ]
416
https://github.com/pcmacdon/jsish/issues/74
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-use-after-free src/jsiValue.c:41 in Jsi_DecrRefCount
https://api.github.com/repos/pcmacdon/jsish/issues/74/comments
0
2021-12-24T10:41:50Z
2021-12-27T15:24:09Z
https://github.com/pcmacdon/jsish/issues/74
1,088,308,024
74
3,119
CVE-2021-46494
2022-01-27T21:15:08.777
Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_ValueLookupBase in src/jsiValue.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/78" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "416" ]
416
https://github.com/pcmacdon/jsish/issues/78
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-use-after-free src/jsiValue.c:980 in jsi_ValueLookupBase
https://api.github.com/repos/pcmacdon/jsish/issues/78/comments
0
2021-12-24T10:45:48Z
2022-01-12T02:16:10Z
https://github.com/pcmacdon/jsish/issues/78
1,088,309,877
78
3,120
CVE-2021-46495
2022-01-27T21:15:08.827
Jsish v3.5.0 was discovered to contain a heap-use-after-free via DeleteTreeValue in src/jsiObj.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/82" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "416" ]
416
https://github.com/pcmacdon/jsish/issues/82
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-use-after-free src/jsiObj.c:176 in DeleteTreeValue
https://api.github.com/repos/pcmacdon/jsish/issues/82/comments
0
2021-12-24T10:48:59Z
2021-12-28T02:31:29Z
https://github.com/pcmacdon/jsish/issues/82
1,088,311,523
82
3,121
CVE-2021-46496
2022-01-27T21:15:08.870
Jsish v3.5.0 was discovered to contain a heap-use-after-free via Jsi_ObjFree in src/jsiObj.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/83" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "416" ]
416
https://github.com/pcmacdon/jsish/issues/83
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
MEMLEAK NOW: Heap-use-after-free src/jsiObj.c:339 in Jsi_ObjFree
https://api.github.com/repos/pcmacdon/jsish/issues/83/comments
2
2021-12-24T10:49:33Z
2021-12-28T02:31:03Z
https://github.com/pcmacdon/jsish/issues/83
1,088,311,780
83
3,122
CVE-2021-46497
2022-01-27T21:15:08.917
Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_UserObjDelete in src/jsiUserObj.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/84" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "416" ]
416
https://github.com/pcmacdon/jsish/issues/84
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-use-after-free src/jsiUserObj.c:32 in jsi_UserObjDelete
https://api.github.com/repos/pcmacdon/jsish/issues/84/comments
0
2021-12-24T10:50:28Z
2021-12-27T16:51:37Z
https://github.com/pcmacdon/jsish/issues/84
1,088,312,235
84
3,123
CVE-2021-46498
2022-01-27T21:15:08.957
Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_wswebsocketObjFree in src/jsiWebSocket.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/81" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "416" ]
416
https://github.com/pcmacdon/jsish/issues/81
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-use-after-free src/jsiWebSocket.c:3190 in jsi_wswebsocketObjFree
https://api.github.com/repos/pcmacdon/jsish/issues/81/comments
0
2021-12-24T10:48:23Z
2021-12-28T02:31:29Z
https://github.com/pcmacdon/jsish/issues/81
1,088,311,213
81
3,124
CVE-2021-46499
2022-01-27T21:15:09.003
Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_ValueCopyMove in src/jsiValue.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/76" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "416" ]
416
https://github.com/pcmacdon/jsish/issues/76
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-use-after-free src/jsiValue.c:245 in jsi_ValueCopyMove
https://api.github.com/repos/pcmacdon/jsish/issues/76/comments
0
2021-12-24T10:44:21Z
2022-01-12T02:15:38Z
https://github.com/pcmacdon/jsish/issues/76
1,088,309,178
76
3,125
CVE-2021-46500
2022-01-27T21:15:09.047
Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_ArgTypeCheck in src/jsiFunc.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/85" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "416" ]
416
https://github.com/pcmacdon/jsish/issues/85
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-use-after-free src/jsiFunc.c:207 in jsi_ArgTypeCheck
https://api.github.com/repos/pcmacdon/jsish/issues/85/comments
2
2021-12-24T10:51:56Z
2021-12-26T22:47:18Z
https://github.com/pcmacdon/jsish/issues/85
1,088,313,003
85
3,126
CVE-2021-46501
2022-01-27T21:15:09.097
Jsish v3.5.0 was discovered to contain a heap-use-after-free via SortSubCmd in src/jsiArray.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/86" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "416" ]
416
https://github.com/pcmacdon/jsish/issues/86
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-use-after-free src/jsiArray.c:958 in SortSubCmd
https://api.github.com/repos/pcmacdon/jsish/issues/86/comments
0
2021-12-24T10:52:55Z
2021-12-26T22:47:42Z
https://github.com/pcmacdon/jsish/issues/86
1,088,313,466
86
3,127
CVE-2021-46502
2022-01-27T21:15:09.143
Jsish v3.5.0 was discovered to contain a heap-use-after-free via /usr/lib/x86_64-linux-gnu/libasan.so.4+0x5166d. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/87" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "416" ]
416
https://github.com/pcmacdon/jsish/issues/87
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-use-after-free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x5166d)
https://api.github.com/repos/pcmacdon/jsish/issues/87/comments
0
2021-12-24T10:53:39Z
2021-12-26T22:08:17Z
https://github.com/pcmacdon/jsish/issues/87
1,088,313,832
87
3,128
CVE-2021-46503
2022-01-27T21:15:09.187
Jsish v3.5.0 was discovered to contain a heap-use-after-free via /usr/lib/x86_64-linux-gnu/libasan.so.4+0x79732. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/88" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "416" ]
416
https://github.com/pcmacdon/jsish/issues/88
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-use-after-free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x79732)
https://api.github.com/repos/pcmacdon/jsish/issues/88/comments
0
2021-12-24T10:54:21Z
2021-12-26T20:57:24Z
https://github.com/pcmacdon/jsish/issues/88
1,088,314,163
88
3,129
CVE-2021-46504
2022-01-27T21:15:09.233
There is an Assertion 'vp != resPtr' failed at jsiEval.c in Jsish v3.5.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/51" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "617" ]
617
https://github.com/pcmacdon/jsish/issues/51
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Assertion `vp != resPtr' failed at jsiEval.c:1020: jsiEvalSubscript.
https://api.github.com/repos/pcmacdon/jsish/issues/51/comments
0
2021-12-24T09:40:19Z
2022-01-12T02:02:10Z
https://github.com/pcmacdon/jsish/issues/51
1,088,275,965
51
3,130
CVE-2021-46505
2022-01-27T21:15:09.277
Jsish v3.5.0 was discovered to contain a stack overflow via /usr/lib/x86_64-linux-gnu/libasan.so.4+0x5b1e5.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "674" ]
674
https://github.com/pcmacdon/jsish/issues/53
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Stack-overflow in (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x5b1e5)
https://api.github.com/repos/pcmacdon/jsish/issues/53/comments
0
2021-12-24T09:43:02Z
2022-01-12T02:11:35Z
https://github.com/pcmacdon/jsish/issues/53
1,088,277,342
53
3,131
CVE-2021-46506
2022-01-27T21:15:09.323
There is an Assertion 'v->d.lval != v' failed at src/jsiValue.c in Jsish v3.5.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/52" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "617" ]
617
https://github.com/pcmacdon/jsish/issues/52
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Assertion `v->d.lval != v' failed at src/jsiValue.c:181: ValueFree.
https://api.github.com/repos/pcmacdon/jsish/issues/52/comments
0
2021-12-24T09:41:38Z
2022-01-12T02:03:28Z
https://github.com/pcmacdon/jsish/issues/52
1,088,276,639
52
3,132
CVE-2021-46507
2022-01-27T21:15:09.367
Jsish v3.5.0 was discovered to contain a stack overflow via Jsi_LogMsg at src/jsiUtils.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/54" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "674" ]
674
https://github.com/pcmacdon/jsish/issues/54
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Stack-overflow src/jsiUtils.c:151 in Jsi_LogMsg
https://api.github.com/repos/pcmacdon/jsish/issues/54/comments
0
2021-12-24T09:43:48Z
2022-01-12T02:11:46Z
https://github.com/pcmacdon/jsish/issues/54
1,088,277,734
54
3,133
CVE-2021-46508
2022-01-27T21:15:09.413
There is an Assertion `i < parts_cnt' failed at src/mjs_bcode.c in Cesanta MJS v2.20.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/188" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "617" ]
617
https://github.com/cesanta/mjs/issues/188
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_CLANG=clang $(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOURCE...
Assertion `i < parts_cnt' failed at src/mjs_bcode.c:121: struct mjs_bcode_part *mjs_bcode_part_get_by_offset(struct mjs *, size_t).
https://api.github.com/repos/cesanta/mjs/issues/188/comments
0
2021-12-31T05:23:32Z
2022-01-12T02:18:33Z
https://github.com/cesanta/mjs/issues/188
1,091,424,362
188
3,134
CVE-2021-46509
2022-01-27T21:15:09.460
Cesanta MJS v2.20.0 was discovered to contain a stack overflow via snquote at mjs/src/mjs_json.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/200" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "674" ]
674
https://github.com/cesanta/mjs/issues/200
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build steps ```bash vim Makefile DOCKER_CLANG=clang $(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG) # save the makefile then make make ``` ...
Stack-overflow mjs/src/mjs_json.c:102:7 in snquote
https://api.github.com/repos/cesanta/mjs/issues/200/comments
0
2021-12-31T05:43:04Z
2022-01-12T02:20:01Z
https://github.com/cesanta/mjs/issues/200
1,091,428,300
200
3,135
CVE-2021-46510
2022-01-27T21:15:09.507
There is an Assertion `s < mjs->owned_strings.buf + mjs->owned_strings.len' failed at src/mjs_gc.c in Cesanta MJS v2.20.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/185" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "617" ]
617
https://github.com/cesanta/mjs/issues/185
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc DOCKER_CLANG=clang $(DOCKER_GCC) $(CFLAGS) $(TOP_...
Assertion `s < mjs->owned_strings.buf + mjs->owned_strings.len' failed src/mjs_gc.c:354: gc_mark_string.
https://api.github.com/repos/cesanta/mjs/issues/185/comments
0
2021-12-31T05:20:39Z
2022-01-12T02:18:09Z
https://github.com/cesanta/mjs/issues/185
1,091,423,652
185
3,136
CVE-2021-46511
2022-01-27T21:15:09.550
There is an Assertion `m->len >= sizeof(v)' failed at src/mjs_core.c in Cesanta MJS v2.20.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/183" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "617" ]
617
https://github.com/cesanta/mjs/issues/183
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP...
Assertion `m->len >= sizeof(v)' failed at src/mjs_core.c:372: mjs_pop_val
https://api.github.com/repos/cesanta/mjs/issues/183/comments
0
2021-12-31T05:18:57Z
2022-01-12T02:17:55Z
https://github.com/cesanta/mjs/issues/183
1,091,423,222
183
3,137
CVE-2021-46513
2022-01-27T21:15:09.633
Cesanta MJS v2.20.0 was discovered to contain a global buffer overflow via mjs_mk_string at mjs/src/mjs_string.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/189" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "120" ]
120
https://github.com/cesanta/mjs/issues/189
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_CLANG=clang $(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOUR...
Global-buffer-overflow mjs/src/mjs_string.c:58:15 in mjs_mk_string
https://api.github.com/repos/cesanta/mjs/issues/189/comments
0
2021-12-31T05:24:24Z
2021-12-31T05:49:18Z
https://github.com/cesanta/mjs/issues/189
1,091,424,556
189
3,138
CVE-2021-46514
2022-01-27T21:15:09.677
There is an Assertion 'ppos != NULL && mjs_is_number(*ppos)' failed at src/mjs_core.c in Cesanta MJS v2.20.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/187" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "617" ]
617
https://github.com/cesanta/mjs/issues/187
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_CLANG=clang $(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOURCES)...
Assertion `ppos != NULL && mjs_is_number(*ppos)' failed at src/mjs_core.c:311: int mjs_getretvalpos(struct mjs *).
https://api.github.com/repos/cesanta/mjs/issues/187/comments
0
2021-12-31T05:22:41Z
2021-12-31T08:13:20Z
https://github.com/cesanta/mjs/issues/187
1,091,424,159
187
3,139
CVE-2021-46515
2022-01-27T21:15:09.723
There is an Assertion `mjs_stack_size(&mjs->scopes) >= scopes_len' failed at src/mjs_exec.c in Cesanta MJS v2.20.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/186" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "617" ]
617
https://github.com/cesanta/mjs/issues/186
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc DOCKER_CLANG=clang $(DOCKER_GCC) $(CFLAGS) $(...
Assertion `mjs_stack_size(&mjs->scopes) >= scopes_len' failed at src/mjs_exec.c:949: mjs_execute.
https://api.github.com/repos/cesanta/mjs/issues/186/comments
0
2021-12-31T05:21:24Z
2022-01-12T02:18:21Z
https://github.com/cesanta/mjs/issues/186
1,091,423,861
186
3,140
CVE-2021-46517
2022-01-27T21:15:09.813
There is an Assertion `mjs_stack_size(&mjs->scopes) > 0' failed at src/mjs_exec.c in Cesanta MJS v2.20.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/184" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "617" ]
617
https://github.com/cesanta/mjs/issues/184
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc DOCKER_CLANG=clang $(DOCKER_GCC) $(CFLAGS) $(...
Assertion `mjs_stack_size(&mjs->scopes) > 0' failed src/mjs_exec.c:725: mjs_execute.
https://api.github.com/repos/cesanta/mjs/issues/184/comments
0
2021-12-31T05:19:48Z
2021-12-31T05:46:31Z
https://github.com/cesanta/mjs/issues/184
1,091,423,443
184
3,141
CVE-2021-46518
2022-01-27T21:15:09.857
Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_disown at src/mjs_core.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "787" ]
787
https://github.com/cesanta/mjs/issues/195
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc DOCKER_CLANG=clang $(DOCKER_GCC) $(CFLAGS...
Heap-buffer-overflow src/mjs_core.c:288 in mjs_disown
https://api.github.com/repos/cesanta/mjs/issues/195/comments
0
2021-12-31T05:37:12Z
2022-01-12T02:18:56Z
https://github.com/cesanta/mjs/issues/195
1,091,427,107
195
3,142
CVE-2021-46519
2022-01-27T21:15:09.900
Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_array_length at src/mjs_array.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/194" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "787" ]
787
https://github.com/cesanta/mjs/issues/194
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $...
Heap-buffer-overflow src/mjs_array.c:83 in mjs_array_length
https://api.github.com/repos/cesanta/mjs/issues/194/comments
0
2021-12-31T05:36:16Z
2021-12-31T05:36:16Z
https://github.com/cesanta/mjs/issues/194
1,091,426,932
194
3,143
CVE-2021-46520
2022-01-27T21:15:09.947
Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_jprintf at src/mjs_util.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/193" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "787" ]
787
https://github.com/cesanta/mjs/issues/193
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES)...
Heap-buffer-overflow src/mjs_util.c:61 in mjs_jprintf
https://api.github.com/repos/cesanta/mjs/issues/193/comments
0
2021-12-31T05:35:03Z
2021-12-31T05:35:03Z
https://github.com/cesanta/mjs/issues/193
1,091,426,673
193
3,144
CVE-2021-46521
2022-01-27T21:15:09.990
Cesanta MJS v2.20.0 was discovered to contain a global buffer overflow via c_vsnprintf at mjs/src/common/str_util.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/190" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "120" ]
120
https://github.com/cesanta/mjs/issues/190
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_CLANG=clang $(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_...
Global-buffer-overflow mjs/src/common/str_util.c:180:14 in c_vsnprintf
https://api.github.com/repos/cesanta/mjs/issues/190/comments
0
2021-12-31T05:25:14Z
2022-01-12T02:18:45Z
https://github.com/cesanta/mjs/issues/190
1,091,424,729
190
3,145
CVE-2021-46522
2022-01-27T21:15:10.033
Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via /usr/lib/x86_64-linux-gnu/libasan.so.4+0xaff53.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/196" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "787" ]
787
https://github.com/cesanta/mjs/issues/196
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES)...
Heap-buffer-overflow (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xaff53)
https://api.github.com/repos/cesanta/mjs/issues/196/comments
0
2021-12-31T05:38:16Z
2022-01-12T02:19:08Z
https://github.com/cesanta/mjs/issues/196
1,091,427,319
196
3,146
CVE-2021-46523
2022-01-27T21:15:10.077
Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via to_json_or_debug at mjs/src/mjs_json.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/198" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "787" ]
787
https://github.com/cesanta/mjs/issues/198
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build steps ```bash vim Makefile DOCKER_CLANG=clang $(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG) # save the makefile then make make ``` ...
Heap-buffer-overflow mjs/src/mjs_json.c:154:13 in to_json_or_debug
https://api.github.com/repos/cesanta/mjs/issues/198/comments
0
2021-12-31T05:40:39Z
2022-01-12T02:19:30Z
https://github.com/cesanta/mjs/issues/198
1,091,427,798
198
3,147
CVE-2021-46524
2022-01-27T21:15:10.117
Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via snquote at mjs/src/mjs_json.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/192" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "787" ]
787
https://github.com/cesanta/mjs/issues/192
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES)...
Heap-buffer-overflow src/mjs_json.c:81 in snquote
https://api.github.com/repos/cesanta/mjs/issues/192/comments
0
2021-12-31T05:33:31Z
2021-12-31T05:33:31Z
https://github.com/cesanta/mjs/issues/192
1,091,426,355
192
3,148
CVE-2021-46525
2022-01-27T21:15:10.160
Cesanta MJS v2.20.0 was discovered to contain a heap-use-after-free via mjs_apply at src/mjs_exec.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "416" ]
416
https://github.com/cesanta/mjs/issues/199
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_C...
Heap-use-after-free src/mjs_exec.c:1156 in mjs_apply
https://api.github.com/repos/cesanta/mjs/issues/199/comments
0
2021-12-31T05:41:58Z
2022-01-12T02:19:47Z
https://github.com/cesanta/mjs/issues/199
1,091,428,077
199
3,149
CVE-2021-46526
2022-01-27T21:15:10.207
Cesanta MJS v2.20.0 was discovered to contain a global buffer overflow via snquote at src/mjs_json.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/191" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "120" ]
120
https://github.com/cesanta/mjs/issues/191
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(T...
Global-buffer-overflow src/mjs_json.c:81 in snquote
https://api.github.com/repos/cesanta/mjs/issues/191/comments
0
2021-12-31T05:31:36Z
2021-12-31T05:31:36Z
https://github.com/cesanta/mjs/issues/191
1,091,425,933
191
3,150
CVE-2021-46527
2022-01-27T21:15:10.250
Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_get_cstring at src/mjs_string.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/197" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "787" ]
787
https://github.com/cesanta/mjs/issues/197
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $...
Heap-buffer-overflow src/mjs_string.c:213 in mjs_get_cstring
https://api.github.com/repos/cesanta/mjs/issues/197/comments
0
2021-12-31T05:39:31Z
2022-01-12T02:19:19Z
https://github.com/cesanta/mjs/issues/197
1,091,427,555
197
3,151
CVE-2022-22868
2022-01-28T19:15:08.023
Gibbon CMS v22.0.01 was discovered to contain a cross-site scripting (XSS) vulnerability, that allows attackers to inject arbitrary script via name parameters.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GibbonEdu/core/issues/1594" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/truonghuuphuc/CVE" }, { "source": "cve@mitre....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gibbonedu:gibbon:22.0.01:*:*:*:*:*:*:*", "matchCriteriaId": "05336491-04BE-4BAC-BBE1-D96C7C734B3C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "79" ]
79
https://github.com/GibbonEdu/core/issues/1594
[ "Third Party Advisory" ]
github.com
[ "GibbonEdu", "core" ]
[ Content removed by admin to follow proper security disclosure measures ]
Notification for Gibbon version v22.0.01
https://api.github.com/repos/GibbonEdu/core/issues/1594/comments
1
2022-01-03T03:47:42Z
2022-01-11T06:22:11Z
https://github.com/GibbonEdu/core/issues/1594
1,092,200,332
1,594
3,152
CVE-2016-3735
2022-01-28T20:15:08.437
Piwigo is image gallery software written in PHP. When a criteria is not met on a host, piwigo defaults to usingmt_rand in order to generate password reset tokens. mt_rand output can be predicted after recovering the seed used to generate it. This low an unauthenticated attacker to take over an account providing they kn...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "secalert@redhat.com", "tags": null, "url": "http://piwigo.org/release-2.8.1%2C" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/commit/f51ee90c66527fd7ff634f3e8d414cb670da068d" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:*", "matchCriteriaId": "294E7F72-0D7D-4B0C-B05E-B58EFB07CF35", "versionEndExcluding": "2.8.1", "versionEndIncluding": null, "versionStartExcluding...
[ "335" ]
335
https://github.com/Piwigo/Piwigo/issues/470%2C
null
github.com
[ "Piwigo", "Piwigo" ]
Current functions used to generate random strings are not "that much random" (depending on the PHP version and operating system).
increase randomness on generate_key
https://api.github.com/repos/Piwigo/Piwigo/issues/470/comments
0
2016-04-26T09:03:40Z
2018-01-15T12:20:36Z
https://github.com/Piwigo/Piwigo/issues/470
151,080,998
470
3,153
CVE-2022-23887
2022-01-28T21:15:10.197
YzmCMS v6.3 was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily delete user accounts via /admin/admin_manage/delete.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/59" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yzmcms:yzmcms:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "33CDD39A-96DC-4CF3-9CFF-694DF09B47BB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "352" ]
352
https://github.com/yzmcms/yzmcms/issues/59
[ "Exploit", "Third Party Advisory" ]
github.com
[ "yzmcms", "yzmcms" ]
This vulnerability allows arbitrary users to be deleted, There is a user with ID 3, ![image](https://user-images.githubusercontent.com/89461075/150460342-a09eccf1-8611-42e2-a52d-336b307df441.png) Click delete and capture the package to generate the POC of CSRF, ![image](https://user-images.githubusercontent.com/8...
YzmCMS V6. 3. CSRF vulnerability exists in the official version(YzmCMS V6.3 正式版存在csrf漏洞)
https://api.github.com/repos/yzmcms/yzmcms/issues/59/comments
1
2022-01-21T03:30:48Z
2022-02-14T02:59:09Z
https://github.com/yzmcms/yzmcms/issues/59
1,110,013,040
59
3,154
CVE-2022-23888
2022-01-28T21:15:10.233
YzmCMS v6.3 was discovered to contain a Cross-Site Request Forgey (CSRF) via the component /yzmcms/comment/index/init.html.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/60" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yzmcms:yzmcms:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "33CDD39A-96DC-4CF3-9CFF-694DF09B47BB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "352" ]
352
https://github.com/yzmcms/yzmcms/issues/60
[ "Exploit", "Third Party Advisory" ]
github.com
[ "yzmcms", "yzmcms" ]
Prepare two accounts: test01 and test02, background settings allow users to contribute, Generate POC of CSRF with test01, First log in to test01 and comment on an article, and grab the request packet, ![image](https://user-images.githubusercontent.com/89461075/150620972-2b6b5173-9595-4c8a-a420-4bf73e6f77d2.png) ![im...
YzmCMSV6. 3. There is a CSRF vulnerability in the foreground in the official version(YzmCMS V6.3 正式版前台存在csrf漏洞)
https://api.github.com/repos/yzmcms/yzmcms/issues/60/comments
1
2022-01-22T02:18:45Z
2022-02-14T03:00:13Z
https://github.com/yzmcms/yzmcms/issues/60
1,111,188,217
60
3,155
CVE-2022-23889
2022-01-28T21:15:10.273
The comment function in YzmCMS v6.3 was discovered as being able to be operated concurrently, allowing attackers to create an unusually large number of comments.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/61" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yzmcms:yzmcms:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "33CDD39A-96DC-4CF3-9CFF-694DF09B47BB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "674" ]
674
https://github.com/yzmcms/yzmcms/issues/61
[ "Exploit", "Third Party Advisory" ]
github.com
[ "yzmcms", "yzmcms" ]
Prepare an account test01, comment at the bottom of an article, and grab the request package, ![image](https://user-images.githubusercontent.com/89461075/150621837-edf5796c-4954-4b74-8b9b-e58d9f6bd4e9.png) Send to repeater, ![image](https://user-images.githubusercontent.com/89461075/150621849-0020dd7d-776a-4271-a6...
YzmCMS V6. 3. There are concurrent operations in the front desk of the official version.(YzmCMS V6.3 正式版前台存在可并发操作。)
https://api.github.com/repos/yzmcms/yzmcms/issues/61/comments
3
2022-01-22T02:43:52Z
2025-02-28T13:16:04Z
https://github.com/yzmcms/yzmcms/issues/61
1,111,196,610
61
3,156
CVE-2022-24123
2022-01-29T23:15:07.497
MarkText through 0.16.3 does not sanitize the input of a mermaid block before rendering. This could lead to Remote Code Execution via a .md file containing a mutation Cross-Site Scripting (XSS) payload.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/marktext/marktext/issues/2946" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:marktext:marktext:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F071D01-841F-476E-BAF5-A29F31D88D58", "versionEndExcluding": null, "versionEndIncluding": "0.16.3", "versionStartExcl...
[ "79" ]
79
https://github.com/marktext/marktext/issues/2946
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "marktext", "marktext" ]
<!-- - Please search for issues that matches the one you want to file and use the thumbs up emoji. - Please make sure your application version is up to date. --> ### Description <!-- Description of the bug --> According to https://github.com/marktext/marktext/issues/2504 , it will add a closing element ...
XSS to RCE vulnerability in Mermaid rendered
https://api.github.com/repos/marktext/marktext/issues/2946/comments
1
2022-01-28T05:24:24Z
2022-01-31T05:51:37Z
https://github.com/marktext/marktext/issues/2946
1,117,015,576
2,946
3,157
CVE-2022-24124
2022-01-29T23:15:07.540
The query API in Casdoor before 1.13.1 has a SQL injection vulnerability related to the field and value parameters, as demonstrated by api/get-organizations.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/166163/Casdoor-1.13.0-SQL-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:casbin:casdoor:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB31AE79-CF12-4C1C-9480-4DE0A2A6375D", "versionEndExcluding": "1.13.1", "versionEndIncluding": null, "versionStartExcludi...
[ "89" ]
89
https://github.com/casdoor/casdoor/issues/439
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "casdoor", "casdoor" ]
The query API provides the `field` and `value` parameters to support query by field. It inserts the user's input into the raw SQL expression which can lead to a SQL injection vulnerability. ```go session = session.And(fmt.Sprintf("%s like ?", util.SnakeString(field)), fmt.Sprintf("%%%s%%", value)) ``` And the ...
SQL injection vulnerability in field filter
https://api.github.com/repos/casdoor/casdoor/issues/439/comments
7
2022-01-22T09:53:09Z
2022-01-31T05:53:51Z
https://github.com/casdoor/casdoor/issues/439
1,111,401,339
439
3,158
CVE-2021-44255
2022-01-31T12:15:07.767
Authenticated remote code execution in MotionEye <= 0.42.1 and MotioneEyeOS <= 20200606 allows a remote attacker to upload a configuration backup file containing a malicious python pickle file which will execute arbitrary code on the server.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ccrisan/motioneyeos/issues/2843" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.pizzapower.me/2021/10/09/self-h...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:motioneye_project:motioneye:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED345730-DFB3-43F6-95C1-D66CF0ADCE67", "versionEndExcluding": "0.42.1", "versionEndIncluding": null, "versio...
[ "306" ]
306
https://github.com/ccrisan/motioneyeos/issues/2843
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ccrisan", "motioneyeos" ]
As with many web-based apps, the admin user can run arbitrary code on the underlying system via the web-gui. While that may or may not be a security issue, and for meye use cases it probably isn’t, I feel that the lack of password on the admin account has left many publicly available systems open to exploitation. I...
Lack of admin password leaves many publicly available systems vulnerable to RCE
https://api.github.com/repos/motioneye-project/motioneyeos/issues/2843/comments
4
2021-11-21T15:35:01Z
2021-12-19T13:38:16Z
https://github.com/motioneye-project/motioneyeos/issues/2843
1,059,410,206
2,843
3,159
CVE-2020-36056
2022-01-31T13:15:07.787
Beetel 777VR1-DI Hardware Version REV.1.01 Firmware Version V01.00.09_55 was discovered to contain a cross-site scripting (XSS) vulnerability via the Ping diagnostic option.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/VivekPanday12/CVE-/issues/5" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.linkedin.com/in/vivek-panday-796768149" }, { "sourc...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:beetel:777vr1_firmware:01.00.09_55:*:*:*:*:*:*:*", "matchCriteriaId": "C25270C8-B8A7-47DD-933E-1D5628B411D9", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "79" ]
79
https://github.com/VivekPanday12/CVE-/issues/5
[ "Third Party Advisory" ]
github.com
[ "VivekPanday12", "CVE-" ]
# Exploit Title: beetel Moderm 777vr1 — Cross Site Scripting on the beetel 777vr1 via the Ping Diagnostic # Date: 2020–12–25 # Exploit Author: VIVEK PANDAY # Version: Firmware Version V01.00.09_55 777VR1 # Tested on Windows10 # Linkedln Contact: https:/...
CVE-2020-36056 beetel Moderm 777vr1 — Cross Site Scripting on the beetel 777vr1 via the Ping Diagnostic
https://api.github.com/repos/VivekPanday12/CVE-/issues/5/comments
0
2022-01-23T15:03:12Z
2022-01-23T15:03:12Z
https://github.com/VivekPanday12/CVE-/issues/5
1,111,895,260
5
3,160
CVE-2020-36064
2022-01-31T13:15:07.830
Online Course Registration v1.0 was discovered to contain hardcoded credentials in the source code which allows attackers access to the control panel if compromised.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/VivekPanday12/CVE-/issues/2" }, { "source": "cve@mitre.org", "tags": [ "Product", "Third Party Advisory" ], "url": "https://projectworlds.in/free-projects/php-projects/on...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:online_course_registration_project:online_course_registration:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "548C546F-53C6-45B2-B9ED-D573B83C1E22", "versionEndExcluding": null, "versionEndInclu...
[ "798" ]
798
https://github.com/VivekPanday12/CVE-/issues/2
[ "Third Party Advisory" ]
github.com
[ "VivekPanday12", "CVE-" ]
# Exploit Title: Online Course Registration — Use of Hard-coded Credentials in Source Code Leads to Admin Panel Access # Date: 2020–12–25 # Exploit Author: VIVEK PANDAY   # Vendor Homepage: https://www.sourcecodester.com/ # Software Link: https://www.sourcecodester.com/sites/default/files/download/razormist/online-...
CVE-2020-36064 Online Course Registration — Use of Hard-coded Credentials in Source Code Leads to Admin Panel Access
https://api.github.com/repos/VivekPanday12/CVE-/issues/2/comments
0
2022-01-23T14:03:54Z
2022-01-23T14:03:54Z
https://github.com/VivekPanday12/CVE-/issues/2
1,111,880,298
2
3,161
CVE-2022-24263
2022-01-31T22:15:07.733
Hospital Management System v4.0 was discovered to contain a SQL injection vulnerability in /Hospital-Management-System-master/func.php via the email parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/165882/Hospital-Management-System-4.0-SQL-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracki...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpgurukul:hospital_management_system:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "DA36E354-4DBF-4BE4-9BC4-CB00C6771BAF", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/kishan0725/Hospital-Management-System/issues/17
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kishan0725", "Hospital-Management-System" ]
## VULNERABLE: SQL Injection Authentication Bypass exists in Hospital-Management-System. An attacker can inject query in “/Hospital-Management-System-master/func.php" via the ‘email’ parameters. + Description: The vulnerability is present in the “/Hospital-Management-System-master/func.php " , and can be exploited t...
Bypass authentication with SQL Injection
https://api.github.com/repos/kishan0725/Hospital-Management-System/issues/17/comments
1
2022-01-25T17:07:00Z
2023-05-08T15:48:58Z
https://github.com/kishan0725/Hospital-Management-System/issues/17
1,114,148,255
17
3,162
CVE-2022-24264
2022-01-31T22:15:07.777
Cuppa CMS v1.0 was discovered to contain a SQL injection vulnerability in /administrator/components/table_manager/ via the search_word parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/13" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/truonghuuphuc/CVE" }, { "so...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "89" ]
89
https://github.com/CuppaCMS/CuppaCMS/issues/13
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
+ VULNERABLE: SQL injection vulnerability exists in CuppaCMS. An attacker can inject query in “/administrator/components/table_manager/" via the ‘search_word’ parameters. + Date: 3/1/2022 + Exploit Author: Trương Hữu Phúc + Contact me: + Github: https://github.com/truonghuuphuc + Email: phuctruong2k@gmail.com + ...
VULNERABLE: SQL injection vulnerability exists in CuppaCMS “/administrator/components/table_manager/" via the ‘search_word’ parameters.
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/13/comments
1
2022-01-03T11:13:24Z
2022-02-03T17:49:23Z
https://github.com/CuppaCMS/CuppaCMS/issues/13
1,092,421,818
13
3,163
CVE-2022-24265
2022-01-31T22:15:07.827
Cuppa CMS v1.0 was discovered to contain a SQL injection vulnerability in /administrator/components/menu/ via the path=component/menu/&menu_filter=3 parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/14" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/truonghuuphuc/CVE" }, { "so...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "89" ]
89
https://github.com/CuppaCMS/CuppaCMS/issues/14
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
+ VULNERABLE: SQL injection vulnerability exists in CuppaCMS. An attacker can inject query in “/administrator/components/menu/" via the ‘path=component/menu/&menu_filter=3’ parameters. + Date: 4/1/2022 + Exploit Author: Trương Hữu Phúc + Contact me: + Github: https://github.com/truonghuuphuc + Email: phuctruong2k...
SQL injection vulnerability exists in CuppaCMS /administrator/components/menu/
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/14/comments
0
2022-01-04T10:07:38Z
2022-01-29T01:26:08Z
https://github.com/CuppaCMS/CuppaCMS/issues/14
1,093,195,882
14
3,164
CVE-2022-24266
2022-01-31T22:15:07.880
Cuppa CMS v1.0 was discovered to contain a SQL injection vulnerability in /administrator/components/table_manager/ via the order_by parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/17" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/truonghuuphuc/CVE" }, { "source": "af854a3a-...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "89" ]
89
https://github.com/CuppaCMS/CuppaCMS/issues/17
[ "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
+ VULNERABLE: SQL injection vulnerability exists in CuppaCMS. An attacker can inject query in “/administrator/components/table_manager/" via the ‘order_by’ parameters. + Date: 6/1/2022 + Exploit Author: Trương Hữu Phúc + Contact me: + Github: https://github.com/truonghuuphuc + Facebook: https://www.facebook.com/D...
Time-based SQL Injection
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/17/comments
0
2022-01-06T15:19:45Z
2022-01-29T01:26:45Z
https://github.com/CuppaCMS/CuppaCMS/issues/17
1,095,419,505
17
3,165
CVE-2020-8562
2022-02-01T11:15:10.903
As mitigations to a report from 2019 and CVE-2020-8555, Kubernetes attempts to prevent proxied connections from accessing link-local or localhost networks when making user-driven connections to Services, Pods, Nodes, or StorageClass service providers. As part of this mitigation Kubernetes does a DNS name resolution che...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL"...
[ { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/101493" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ],...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BE1AD99-F12A-4F6E-8EA5-578F32A1F15F", "versionEndExcluding": null, "versionEndIncluding": "1.18.18", "versionStar...
[ "367" ]
367
https://github.com/kubernetes/kubernetes/issues/101493
[ "Issue Tracking", "Mitigation", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: **Low** ([CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N)) A security issue was discovered in Kubernetes where an authorized user may be able to access private networks on the Kubernetes control plane components. Kuber...
CVE-2020-8562: Bypass of Kubernetes API Server proxy TOCTOU
https://api.github.com/repos/kubernetes/kubernetes/issues/101493/comments
16
2021-04-26T19:18:04Z
2024-08-07T19:47:47Z
https://github.com/kubernetes/kubernetes/issues/101493
868,051,410
101,493
3,166
CVE-2022-23596
2022-02-01T12:15:08.257
Junrar is an open source java RAR archive library. In affected versions A carefully crafted RAR archive can trigger an infinite loop while extracting said archive. The impact depends solely on how the application uses the library, and whether files can be provided by malignant users. The problem is patched in 7.4.1. Th...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/junrar/junrar/commit/7b16b3d90b91445fd6af0adfed22c07413d4fab7" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracki...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:junrar_project:junrar:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB985B41-1018-4112-90D3-01036942F48B", "versionEndExcluding": "7.4.1", "versionEndIncluding": null, "versionStartE...
[ "835" ]
835
https://github.com/junrar/junrar/issues/73
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "junrar", "junrar" ]
**Describe the bug** A carefully crafted RAR archive can trigger an infinite loop while parsing the file. This could be used to mount a denial of service attack against services that use junrar. **To Reproduce** ``` String encodedString = "UmFyIRoHAM+Qcw4AAAAAKgAAAAAXF3QggE4ASwEAACICAAADZXUl9710qkIdNC4ApIEAAF9fTU...
[BUG]A carefully crafted RAR archive can trigger an infinite loop while parsing.
https://api.github.com/repos/junrar/junrar/issues/73/comments
10
2022-01-27T03:29:04Z
2022-03-25T01:33:31Z
https://github.com/junrar/junrar/issues/73
1,115,731,408
73
3,167
CVE-2021-41571
2022-02-01T13:15:09.663
In Apache Pulsar it is possible to access data from BookKeeper that does not belong to the topics accessible by the authenticated user. The Admin API get-message-by-id requires the user to input a topic and a ledger id. The ledger id is a pointer to the data, and it is supposed to be a valid it for the topic. Authorisa...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "security@apache.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/apache/pulsar/issues/11814" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Vendor Advisory" ],...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:pulsar:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7316A0A-1852-4DD2-926A-06FEA7D1D2FA", "versionEndExcluding": "2.6.4", "versionEndIncluding": null, "versionStartExcluding...
[ "863" ]
863
https://github.com/apache/pulsar/issues/11814
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "apache", "pulsar" ]
![image](https://user-images.githubusercontent.com/5668441/131091854-f756ba41-5ad3-4082-a541-6c78120285ab.png)
[Pulsar admin] admin command 'get-message-by-id' can get message by messageId regardless of topic name
https://api.github.com/repos/apache/pulsar/issues/11814/comments
10
2021-08-27T07:58:36Z
2021-09-08T19:04:55Z
https://github.com/apache/pulsar/issues/11814
980,981,768
11,814
3,168
CVE-2022-24223
2022-02-01T19:15:07.840
AtomCMS v2.0 was discovered to contain a SQL injection vulnerability via /admin/login.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/165922/Atom-CMS-2.0-SQL-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedigitalcraft:atomcms:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "8949C5AC-7D10-43A8-929D-B6FCFE9F2DC7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "89" ]
89
https://github.com/thedigicraft/Atom.CMS/issues/255
[ "Exploit", "Third Party Advisory" ]
github.com
[ "thedigicraft", "Atom.CMS" ]
In /admin/login.php: `<?php ..... if($_POST) { $q = "SELECT * FROM users WHERE email = '$_POST[email]' AND password = SHA1('$_POST[password]')"; $r = mysqli_query($dbc, $q); ..... ?>` When logging in at the background, you can log in at the background with the wrong password and account by the method of p...
Sql Injection in /admin/login.php
https://api.github.com/repos/thedigicraft/Atom.CMS/issues/255/comments
6
2022-01-28T11:37:41Z
2022-12-22T21:15:43Z
https://github.com/thedigicraft/Atom.CMS/issues/255
1,117,305,691
255
3,169
CVE-2020-26208
2022-02-02T12:15:07.783
JHEAD is a simple command line tool for displaying and some manipulation of EXIF header data embedded in Jpeg images from digital cameras. In affected versions there is a heap-buffer-overflow on jhead-3.04/jpgfile.c:285 ReadJpegSections. Crafted jpeg images can be provided to the user resulting in a program crash or po...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900821" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jhead_project:jhead:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4043AC5-DC93-4FE4-8675-6AB0B60A385C", "versionEndExcluding": "3.04", "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/Matthias-Wandel/jhead/issues/7
[ "Patch", "Third Party Advisory" ]
github.com
[ "Matthias-Wandel", "jhead" ]
poc:https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900821/+attachment/5424955/+files/poc%20%282%29 ``` fstark@fstark-virtual-machine:~/jhead$ ./jhead fuzz1\:id\:000015\,sig\:06\,src\:000476\,time\:412880\,op\:arith8\,pos\:31\,val\:+29 ================================================================= ==957=...
heap-buffer-overflow on jhead-3.04/jpgfile.c:285 ReadJpegSections
https://api.github.com/repos/Matthias-Wandel/jhead/issues/7/comments
3
2020-10-22T09:49:38Z
2020-10-23T13:18:57Z
https://github.com/Matthias-Wandel/jhead/issues/7
727,231,481
7
3,170
CVE-2021-44866
2022-02-03T14:15:07.903
An issue was discovered in Online-Movie-Ticket-Booking-System 1.0. The file about.php does not perform input validation on the 'id' paramter. An attacker can append SQL queries to the input to extract sensitive information from the database.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/projectworldsofficial/Online-Movie-Ticket-Booking-System-in-php/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exp...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:projectworlds:online_movie_ticket_booking_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "C5DE67C1-6787-49CD-8DFA-3747E0DCF7AF", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/projectworldsofficial/Online-Movie-Ticket-Booking-System-in-php/issues/6
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "projectworldsofficial", "Online-Movie-Ticket-Booking-System-in-php" ]
Hey,I think there is a SQL Injection vulnerability in this system. The file about.php does not perform input validation on the 'id' paramter. So An attacker can append SQL queries to the input to extract sensitive information from the database. 1.Navigate to the about page: Example:http://172.16.180.135:8022/about.p...
SQL Injection vulnerability via the "id" parameter in about.php
https://api.github.com/repos/projectworldsofficial/Online-Movie-Ticket-Booking-System-in-php/issues/6/comments
0
2021-12-06T08:59:58Z
2021-12-06T08:59:58Z
https://github.com/projectworldsofficial/Online-Movie-Ticket-Booking-System-in-php/issues/6
1,071,892,369
6
3,171
CVE-2022-23316
2022-02-04T12:15:07.673
An issue was discovered in taoCMS v3.0.2. There is an arbitrary file read vulnerability that can read any files via admin.php?action=file&ctrl=download&path=../../1.txt.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.co...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "552" ]
552
https://github.com/taogogo/taocms/issues/15
[ "Exploit", "Third Party Advisory" ]
github.com
[ "taogogo", "taocms" ]
# analysis The location of the vulnerability is line 55 in \taocms\include\Model\File.php and we can see that the path parameter is passed directly to file_get_contents function without filtering ![20220110154029](https://raw.githubusercontent.com/destinypwd/images/main/20220110154029.png) ![20220110154107](http...
arbitrary file read vulnerability
https://api.github.com/repos/taogogo/taocms/issues/15/comments
1
2022-01-10T07:43:07Z
2022-12-20T03:17:15Z
https://github.com/taogogo/taocms/issues/15
1,097,551,779
15
3,172
CVE-2021-44983
2022-02-04T14:15:08.330
In taocms 3.0.1 after logging in to the background, there is an Arbitrary file download vulnerability at the File Management column.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.co...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:taogogo:taocms:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E6755F50-8491-4D27-B3D7-C28CC606C41A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "552" ]
552
https://github.com/taogogo/taocms/issues/10
[ "Exploit", "Third Party Advisory" ]
github.com
[ "taogogo", "taocms" ]
First, we enter the background and use the administrator admin we created: ![image-20211210101406045](https://gitee.com/yecp/picgo/raw/master/20211210101406.png) Let's click "file management" on the left: ![image-20211210102337699](https://gitee.com/yecp/picgo/raw/master/20211210102337.png) Then use Bur...
There is a Arbitrary file download attack at " File Management column"(administrator authority)
https://api.github.com/repos/taogogo/taocms/issues/10/comments
0
2021-12-10T02:25:30Z
2021-12-10T02:25:30Z
https://github.com/taogogo/taocms/issues/10
1,076,352,526
10
3,173
CVE-2021-43635
2022-02-04T18:15:07.287
A Cross Site Scripting (XSS) vulnerability exists in Codex before 1.4.0 via Notebook/Page name field, which allows malicious users to execute arbitrary code via a crafted http code in a .json file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Product", "Third Party Advisory" ], "url": "https://github.com/jcv8000/Codex" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jcv8000/Codex/issues/8" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codex_project:codex:*:*:*:*:*:*:*:*", "matchCriteriaId": "A43C505F-D811-4731-880F-45CDDAC636AF", "versionEndExcluding": "1.4.0", "versionEndIncluding": null, "versionStartExc...
[ "79" ]
79
https://github.com/jcv8000/Codex/issues/8
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jcv8000", "Codex" ]
### Issue Cross-site scripting(XSS) on Codex Notebook/Page name lead to code execution. ### Reproduction 1. Open Codex 2. Create new Notebook 3. Insert payload on the Notebook(or page) name field On Mac `<a href=x onmouseover="require('electron').shell.openExternal('file:///System/Applications/Calculator.app')...
Code Execution vulnerability on Codex
https://api.github.com/repos/jcv8000/Codex/issues/8/comments
1
2021-09-10T09:06:09Z
2021-09-10T23:06:32Z
https://github.com/jcv8000/Codex/issues/8
993,038,886
8
3,174
CVE-2021-45429
2022-02-04T19:15:08.060
A Buffer Overflow vulnerablity exists in VirusTotal YARA git commit: 605b2edf07ed8eb9a2c61ba22eb2e7c362f47ba7 via yr_set_configuration in yara/libyara/libyara.c, which could cause a Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/VirusTotal/yara/issues/1616" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:virustotal:yara:*:*:*:*:*:*:*:*", "matchCriteriaId": "98D52101-1922-43B6-877D-A0AE6213E8F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "120" ]
120
https://github.com/VirusTotal/yara/issues/1616
[ "Exploit", "Third Party Advisory" ]
github.com
[ "VirusTotal", "yara" ]
version: master (commit https://github.com/VirusTotal/yara/commit/822e532c64759240b51ce8e439960ae4e90b71f0) command: yara $FILE strings PoC is a file that can contain any string, such as "hello". Here is the trace reported by ASAN: ``` root@d8a714203f6e:/path_to_yara/bin# ./yara PoC strings =======================...
Possible insecure pointer conversion in yr_set_configuration() leading to global-buffer-overflow
https://api.github.com/repos/VirusTotal/yara/issues/1616/comments
3
2021-12-15T18:01:26Z
2021-12-20T09:31:28Z
https://github.com/VirusTotal/yara/issues/1616
1,081,328,626
1,616
3,175
CVE-2022-24249
2022-02-04T19:15:08.100
A Null Pointer Dereference vulnerability exists in GPAC 1.1.0 via the xtra_box_write function in /box_code_base.c, which causes a Denial of Service. This vulnerability was fixed in commit 71f9871.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2081" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCC969A1-3F88-40F5-B4A1-54DA05DF081E", "versionEndExcluding": "2.0.0", "versionEndIncluding": null, "versionStartExcluding": n...
[ "476" ]
476
https://github.com/gpac/gpac/issues/2081
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
**version info**: ``` MP4Box - GPAC version 1.1.0-DEV-rev1678-g92faba3-master GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --prefix=/path_to_gpac/build --enable-debug --enable-sanitizer Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF G...
Null Pointer Dereference when dealing with XtraBox
https://api.github.com/repos/gpac/gpac/issues/2081/comments
0
2022-01-28T10:38:34Z
2022-01-28T16:00:46Z
https://github.com/gpac/gpac/issues/2081
1,117,248,312
2,081
3,176
CVE-2022-23562
2022-02-04T23:15:13.843
Tensorflow is an Open Source Machine Learning Framework. The implementation of `Range` suffers from integer overflows. These can trigger undefined behavior or, in some scenarios, extremely large allocations. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlo...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/f0147751fd5d2ff23251149ebad9af9f03010732" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "688150BF-477C-48FC-9AEF-A79AC57A6DDC", "versionEndExcluding": null, "versionEndIncluding": "2.5.2", "versionStartExclu...
[ "190" ]
190
https://github.com/tensorflow/tensorflow/issues/52676
[ "Third Party Advisory" ]
github.com
[ "tensorflow", "tensorflow" ]
<em>Please make sure that this is a bug. As per our [GitHub Policy](https://github.com/tensorflow/tensorflow/blob/master/ISSUES.md), we only address code/doc bugs, performance issues, feature requests and build/installation issues on GitHub. tag:bug_template</em> **System information** - Have I written custom co...
Undefined behaviour in Range
https://api.github.com/repos/tensorflow/tensorflow/issues/52676/comments
3
2021-10-26T11:38:05Z
2021-12-17T03:28:10Z
https://github.com/tensorflow/tensorflow/issues/52676
1,036,189,142
52,676
3,177
CVE-2021-44956
2022-02-08T15:15:07.643
Two Heap based buffer overflow vulnerabilities exist in ffjpeg through 01.01.2021. It is similar to CVE-2020-23852. Issues that are in the jfif_decode function at ffjpeg/src/jfif.c (line 552) could cause a Denial of Service by using a crafted jpeg file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/43" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC5B8CBB-E98C-4585-BE42-32D0114A7F48", "versionEndExcluding": null, "versionEndIncluding": "2021-01-01", "versionStartE...
[ "787" ]
787
https://github.com/rockcarry/ffjpeg/issues/43
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
**Describe** Two Heap-buffer-overflows were discovered in ffjpeg. The issues are being triggered in function jfif_decode at jfif.c:552:31 and 552:38. Found by **Cem Onat Karagun of Diesec** **System info** OS version : Ubuntu 21.04 ffjpeg Version : master [0fa4cf8a86](https://github.com/rockcarry/ffjpeg/commit...
Heap-buffer-overflows in jfif_decode() at jfif.c:552:31 and 552:38
https://api.github.com/repos/rockcarry/ffjpeg/issues/43/comments
1
2021-06-23T19:48:31Z
2021-12-07T20:05:06Z
https://github.com/rockcarry/ffjpeg/issues/43
928,585,823
43
3,178
CVE-2021-44957
2022-02-08T15:15:07.687
Global buffer overflow vulnerability exist in ffjpeg through 01.01.2021. It is similar to CVE-2020-23705. Issue is in the jfif_encode function at ffjpeg/src/jfif.c (line 708) could cause a Denial of Service by using a crafted jpeg file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/44" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC5B8CBB-E98C-4585-BE42-32D0114A7F48", "versionEndExcluding": null, "versionEndIncluding": "2021-01-01", "versionStartE...
[ "120" ]
120
https://github.com/rockcarry/ffjpeg/issues/44
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
**Describe** A global-buffer-overflow was discovered in ffjpeg. The issue is being triggered in function jfif_encode at jfif.c:708. Found by **Cem Onat Karagun of Diesec** **System info** OS version : Ubuntu 21.04 ffjpeg Version : master([0fa4cf8a86](https://github.com/rockcarry/ffjpeg/commit/0fa4cf8a86d7f23))...
global-buffer-overflow in function jfif_encode at jfif.c:708
https://api.github.com/repos/rockcarry/ffjpeg/issues/44/comments
4
2021-06-23T19:51:49Z
2021-12-07T20:05:15Z
https://github.com/rockcarry/ffjpeg/issues/44
928,587,983
44
3,179