cve_id stringlengths 13 16 | cve_published stringdate 2019-01-01 16:29:00 2025-02-25 20:15:37 | cve_descriptions stringlengths 34 2.6k | cve_metrics dict | cve_references listlengths 1 281 | cve_configurations listlengths 1 70 | cve_cwe_list listlengths 1 1 | cve_primary_cwe stringclasses 164
values | url stringlengths 36 97 | cve_tags listlengths 1 5 ⌀ | domain stringclasses 1
value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 198k ⌀ | issue_title stringlengths 1 335 | issue_comments_url stringlengths 55 116 | issue_comments_count int64 0 338 | issue_created_at stringdate 2012-06-06 09:34:24 2025-04-02 09:37:20 | issue_updated_at stringdate 2014-04-01 20:16:21 2025-06-16 12:26:58 | issue_html_url stringlengths 36 97 | issue_github_id int64 4.93M 2.97B | issue_number int64 1 199k | __index_level_0__ int64 0 6.55k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2021-44981 | 2022-01-24T13:15:08.177 | In QuickBox Pro v2.5.8 and below, the config.php file has a variable which takes a GET parameter value and parses it into a shell_exec(''); function without properly sanitizing any shell arguments, therefore remote code execution is possible. Additionally, as the media server is running as root by default attackers can... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9,
"confidentialityImpact": "COMPLETE... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/QuickBox/QB/issues/202"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://websec.nl/blog/61b2b37a43a1... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:quickbox:quickbox:*:*:*:*:community:*:*:*",
"matchCriteriaId": "539517B3-AB8A-42AE-AD72-D337662A5FA1",
"versionEndExcluding": null,
"versionEndIncluding": "2.5.8",
"versionSt... | [
"78"
] | 78 | https://github.com/QuickBox/QB/issues/202 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"QuickBox",
"QB"
] | Hey there!
I belong to an open source security research community, and a member (@websecnl) has found an issue, but doesn’t know the best way to disclose it.
If not a hassle, might you kindly add a `SECURITY.md` file with an email, or another contact method? GitHub [recommends](https://docs.github.com/en/code-securit... | Responsible disclosure policy | https://api.github.com/repos/QuickBox/QB/issues/202/comments | 9 | 2021-12-09T10:22:21Z | 2022-02-03T11:42:53Z | https://github.com/QuickBox/QB/issues/202 | 1,075,401,997 | 202 | 3,080 |
CVE-2022-21711 | 2022-01-24T20:15:08.657 | elfspirit is an ELF static analysis and injection framework that parses, manipulates, and camouflages ELF files. When analyzing the ELF file format in versions prior to 1.1, there is an out-of-bounds read bug, which can lead to application crashes or information leakage. By constructing a special format ELF file, the i... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PART... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/liyansong2018/elfspirit/commit/c5b0f5a9a24f2451bbeda4751d67633bc375e608"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Is... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:elfspirit_project:elfspirit:*:*:*:*:*:*:*:*",
"matchCriteriaId": "984FF703-F7AC-4EE2-A048-E5EE4DCC33F4",
"versionEndExcluding": "1.1.0",
"versionEndIncluding": null,
"version... | [
"125"
] | 125 | https://github.com/liyansong2018/elfspirit/issues/1 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"liyansong2018",
"elfspirit"
] | poc
```shell
$ ./elfspirit parse id_000000
```
log
```shell
[+] ELF Header
e_type: 3 -> A shared object
e_machine: 62 -> Intel 80386
e_version: 1 -> Current version
e_entry: ... | Out-of-bounds read in elf parsing. | https://api.github.com/repos/secnotes/elfspirit/issues/1/comments | 0 | 2022-01-23T12:32:42Z | 2022-03-28T15:50:55Z | https://github.com/secnotes/elfspirit/issues/1 | 1,111,858,333 | 1 | 3,081 |
CVE-2021-44988 | 2022-01-25T01:15:07.640 | Jerryscript v3.0.0 and below was discovered to contain a stack overflow via ecma_find_named_property in ecma-helpers.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4890"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"770"
] | 770 | https://github.com/jerryscript-project/jerryscript/issues/4891 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: [51da1551](https://github.com/jerryscript-project/jerryscript/commit/51da15516e1436184be9914314f76d596f14cd27)
Version: v3.0.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 4.19.128-microsoft-standard x86_64)
###### Build steps
```bash
./tools/build.py --clea... | Stack-overflow in ecma_find_named_property (ecma-helpers.c) | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4891/comments | 1 | 2021-12-09T14:33:33Z | 2021-12-09T14:35:17Z | https://github.com/jerryscript-project/jerryscript/issues/4891 | 1,075,642,418 | 4,891 | 3,082 |
CVE-2021-44992 | 2022-01-25T01:15:07.690 | There is an Assertion ''ecma_object_is_typedarray (obj_p)'' failed at /jerry-core/ecma/operations/ecma-typedarray-object.c in Jerryscript 3.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4875"
},
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
],
"url": "https://security.samsungmobil... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"119"
] | 119 | https://github.com/jerryscript-project/jerryscript/issues/4875 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: [51da1551](https://github.com/jerryscript-project/jerryscript/commit/51da15516e1436184be9914314f76d596f14cd27) Version: v3.0.0
Commit: [8ba0d1b](https://github.com/jerryscript-project/jerryscript/commit/8ba0d1b6ee5a065a42f3b306771ad8e3c0d819bc) Version: v2.4.0
###### B... | Assertion 'ecma_object_is_typedarray (obj_p)' failed in ecma-typedarray-object(ecma_get_typedarray_id) | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4875/comments | 0 | 2021-12-09T09:08:53Z | 2022-01-12T02:06:25Z | https://github.com/jerryscript-project/jerryscript/issues/4875 | 1,075,325,382 | 4,875 | 3,083 |
CVE-2021-44993 | 2022-01-25T01:15:07.730 | There is an Assertion ''ecma_is_value_boolean (base_value)'' failed at /jerry-core/ecma/operations/ecma-get-put-value.c in Jerryscript 3.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4876"
},
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
],
"url": "https://security.samsungmobil... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"617"
] | 617 | https://github.com/jerryscript-project/jerryscript/issues/4876 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: [51da1551](https://github.com/jerryscript-project/jerryscript/commit/51da15516e1436184be9914314f76d596f14cd27)
Version: v3.0.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
./tools/build.py --clean --deb... | Assertion 'ecma_is_value_boolean (base_value)' failed in ecma_op_get_value_object_base (ecma-get-put-value). | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4876/comments | 0 | 2021-12-09T09:48:50Z | 2022-01-12T02:06:45Z | https://github.com/jerryscript-project/jerryscript/issues/4876 | 1,075,367,669 | 4,876 | 3,084 |
CVE-2021-44994 | 2022-01-25T01:15:07.773 | There is an Assertion ''JERRY_CONTEXT (jmem_heap_allocated_size) == 0'' failed at /jerry-core/jmem/jmem-heap.c in Jerryscript 3.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4894"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"617"
] | 617 | https://github.com/jerryscript-project/jerryscript/issues/4894 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ## JerryScript commit hash
55acdf2048b390d0f56f12e64dbfb2559f0e70ad
## Build platform
Ubuntu 20.04 LTS
## Build steps
```
./tools/build.py --clean --debug --compile-flag=-fsanitize=address \
--compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer \
--compile-flag=-fno-common --compile-flag=-g \
--strip=... | Assertion 'JERRY_CONTEXT (jmem_heap_allocated_size) == 0' failed at /home/sakura/jerryscript/jerry-core/jmem/jmem-heap.c(jmem_heap_finalize):108. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4894/comments | 1 | 2021-12-09T14:53:08Z | 2022-01-14T09:05:39Z | https://github.com/jerryscript-project/jerryscript/issues/4894 | 1,075,663,454 | 4,894 | 3,085 |
CVE-2021-44994 | 2022-01-25T01:15:07.773 | There is an Assertion ''JERRY_CONTEXT (jmem_heap_allocated_size) == 0'' failed at /jerry-core/jmem/jmem-heap.c in Jerryscript 3.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4894"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"617"
] | 617 | https://github.com/jerryscript-project/jerryscript/issues/4895 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: [51da1551](https://github.com/jerryscript-project/jerryscript/commit/51da15516e1436184be9914314f76d596f14cd27)
Version: v3.0.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
./tools/build.py --clean --debug... | Assertion 'ecma_object_check_class_name_is_object (obj_p)' failed at ecma-objects.c(ecma_object_get_class_name) | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4895/comments | 3 | 2021-12-09T14:58:57Z | 2022-01-12T02:09:35Z | https://github.com/jerryscript-project/jerryscript/issues/4895 | 1,075,669,945 | 4,895 | 3,086 |
CVE-2021-46474 | 2022-01-25T01:15:07.817 | Jsish v3.5.0 was discovered to contain a heap buffer overflow via jsiEvalCodeSub in src/jsiEval.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/57"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"787"
] | 787 | https://github.com/pcmacdon/jsish/issues/57 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-buffer-overflow src/jsiEval.c:1366 in jsiEvalCodeSub | https://api.github.com/repos/pcmacdon/jsish/issues/57/comments | 1 | 2021-12-24T09:47:27Z | 2022-01-12T02:12:21Z | https://github.com/pcmacdon/jsish/issues/57 | 1,088,279,556 | 57 | 3,087 |
CVE-2021-46475 | 2022-01-25T01:15:07.853 | Jsish v3.5.0 was discovered to contain a heap buffer overflow via jsi_ArraySliceCmd in src/jsiArray.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/64"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"787"
] | 787 | https://github.com/pcmacdon/jsish/issues/64 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-buffer-overflow src/jsiArray.c:912 in jsi_ArraySliceCmd | https://api.github.com/repos/pcmacdon/jsish/issues/64/comments | 0 | 2021-12-24T10:33:23Z | 2021-12-26T17:16:57Z | https://github.com/pcmacdon/jsish/issues/64 | 1,088,304,005 | 64 | 3,088 |
CVE-2021-46477 | 2022-01-25T01:15:07.893 | Jsish v3.5.0 was discovered to contain a heap buffer overflow via RegExp_constructor in src/jsiRegexp.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/63"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"787"
] | 787 | https://github.com/pcmacdon/jsish/issues/63 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-buffer-overflow src/jsiRegexp.c:176 in RegExp_constructor | https://api.github.com/repos/pcmacdon/jsish/issues/63/comments | 0 | 2021-12-24T10:32:32Z | 2022-01-12T02:13:42Z | https://github.com/pcmacdon/jsish/issues/63 | 1,088,303,589 | 63 | 3,089 |
CVE-2021-46478 | 2022-01-25T01:15:07.930 | Jsish v3.5.0 was discovered to contain a heap buffer overflow via jsiClearStack in src/jsiEval.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/60"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"787"
] | 787 | https://github.com/pcmacdon/jsish/issues/60 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-buffer-overflow src/jsiEval.c:120 in jsiClearStack | https://api.github.com/repos/pcmacdon/jsish/issues/60/comments | 0 | 2021-12-24T09:50:51Z | 2022-01-12T02:12:56Z | https://github.com/pcmacdon/jsish/issues/60 | 1,088,281,295 | 60 | 3,090 |
CVE-2021-46480 | 2022-01-25T01:15:07.970 | Jsish v3.5.0 was discovered to contain a heap buffer overflow via jsiValueObjDelete in src/jsiEval.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/61"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"787"
] | 787 | https://github.com/pcmacdon/jsish/issues/61 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-buffer-overflow src/jsiEval.c:464 in jsiValueObjDelete | https://api.github.com/repos/pcmacdon/jsish/issues/61/comments | 0 | 2021-12-24T10:30:42Z | 2022-01-12T02:13:11Z | https://github.com/pcmacdon/jsish/issues/61 | 1,088,302,674 | 61 | 3,091 |
CVE-2021-46481 | 2022-01-25T01:15:08.010 | Jsish v3.5.0 was discovered to contain a memory leak via linenoise at src/linenoise.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/55"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"401"
] | 401 | https://github.com/pcmacdon/jsish/issues/55 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Memory leaks in linenoise src/linenoise.c:1061 | https://api.github.com/repos/pcmacdon/jsish/issues/55/comments | 0 | 2021-12-24T09:44:48Z | 2022-01-12T02:11:57Z | https://github.com/pcmacdon/jsish/issues/55 | 1,088,278,241 | 55 | 3,092 |
CVE-2021-46482 | 2022-01-25T01:15:08.050 | Jsish v3.5.0 was discovered to contain a heap buffer overflow via NumberConstructor at src/jsiNumber.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/66"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"787"
] | 787 | https://github.com/pcmacdon/jsish/issues/66 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-buffer-overflow src/jsiNumber.c:93 in NumberConstructor | https://api.github.com/repos/pcmacdon/jsish/issues/66/comments | 0 | 2021-12-24T10:35:07Z | 2022-01-12T02:14:08Z | https://github.com/pcmacdon/jsish/issues/66 | 1,088,304,812 | 66 | 3,093 |
CVE-2021-46483 | 2022-01-25T01:15:08.090 | Jsish v3.5.0 was discovered to contain a heap buffer overflow via BooleanConstructor at src/jsiBool.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/62"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"787"
] | 787 | https://github.com/pcmacdon/jsish/issues/62 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-buffer-overflow src/jsiBool.c:17 in BooleanConstructor | https://api.github.com/repos/pcmacdon/jsish/issues/62/comments | 0 | 2021-12-24T10:31:27Z | 2022-01-12T02:13:25Z | https://github.com/pcmacdon/jsish/issues/62 | 1,088,303,083 | 62 | 3,094 |
CVE-2021-45340 | 2022-01-25T12:15:07.643 | In Libsixel prior to and including v1.10.3, a NULL pointer dereference in the stb_image.h component of libsixel allows attackers to cause a denial of service (DOS) via a crafted PICT file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/libsixel/libsixel/issues/51"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libsixel_project:libsixel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F4049A12-67EA-4961-9B1A-331D52D04E8D",
"versionEndExcluding": null,
"versionEndIncluding": "1.10.3",
"versionS... | [
"476"
] | 476 | https://github.com/libsixel/libsixel/issues/51 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"libsixel",
"libsixel"
] | This is a duplicate report of issue [160](https://github.com/saitoha/libsixel/issues/160) in the original project. I'm not sure where best to report this, but it affects both projects.
## Vulnerable versions
* saitoha/libsixel at the latest (6a5be8b72d84037b83a5ea838e17bcf372ab1d5f) commit
* libsixel/libsixel at t... | NULL pointer dereference in stb_image.h | https://api.github.com/repos/libsixel/libsixel/issues/51/comments | 9 | 2021-12-14T22:08:42Z | 2025-02-12T00:02:11Z | https://github.com/libsixel/libsixel/issues/51 | 1,080,342,756 | 51 | 3,095 |
CVE-2021-45341 | 2022-01-25T12:15:07.693 | A buffer overflow vulnerability in CDataMoji of the jwwlib component of LibreCAD 2.2.0-rc3 and older allows an attacker to achieve Remote Code Execution using a crafted JWW document. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPL... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LibreCAD/LibreCAD/issues/1462"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:librecad:librecad:*:*:*:*:*:*:*:*",
"matchCriteriaId": "952DEFEE-00FC-4BBC-8305-8611255AF7C3",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExclu... | [
"120"
] | 120 | https://github.com/LibreCAD/LibreCAD/issues/1462 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreCAD",
"LibreCAD"
] | ### Vulnerable Products
* LibreCAD 2.2.0-rc3 and older
* Jw_cad 8.24a and older
### Steps to reproduce or sample file
1. Start LibreCAD 2.2.0-rc3 in a debugger
2. File/Open...
3. Unzip and open the attached [proof of concept file](https://github.com/LibreCAD/LibreCAD/files/7739792/jww_cdatamoji.zip)
4. Obser... | Remote Code Execution vulnerability in LibreCAD 2.2.0-rc3 (JWW CDataMoji) | https://api.github.com/repos/LibreCAD/LibreCAD/issues/1462/comments | 5 | 2021-12-18T19:01:27Z | 2022-01-25T12:03:26Z | https://github.com/LibreCAD/LibreCAD/issues/1462 | 1,083,924,119 | 1,462 | 3,096 |
CVE-2021-45342 | 2022-01-25T13:15:07.830 | A buffer overflow vulnerability in CDataList of the jwwlib component of LibreCAD 2.2.0-rc3 and older allows an attacker to achieve Remote Code Execution using a crafted JWW document. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LibreCAD/LibreCAD/issues/1464"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:librecad:librecad:*:*:*:*:*:*:*:*",
"matchCriteriaId": "66E49DA1-2E98-4159-BCA0-DD5EAAEF049A",
"versionEndExcluding": null,
"versionEndIncluding": "2.1.3",
"versionStartExclu... | [
"120"
] | 120 | https://github.com/LibreCAD/LibreCAD/issues/1464 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreCAD",
"LibreCAD"
] | # Vulnerable Products
* LibreCAD 2.2.0-rc3 and older
### Steps to reproduce or sample file
1. Start LibreCAD 2.2.0 in a debugger
2. File/Open...
3. Unzip and open the [attached proof-of-concept file](https://github.com/LibreCAD/LibreCAD/files/7740065/jww_cdatalist.zip)
4. Observe `ACCESS_VIOLATION` crash, w... | Remote Code Execution vulnerability in LibreCAD 2.2.0-rc3 (JWW CDataList) | https://api.github.com/repos/LibreCAD/LibreCAD/issues/1464/comments | 2 | 2021-12-18T22:48:34Z | 2022-01-25T12:09:59Z | https://github.com/LibreCAD/LibreCAD/issues/1464 | 1,083,960,819 | 1,464 | 3,097 |
CVE-2021-45343 | 2022-01-25T13:15:07.873 | In LibreCAD 2.2.0, a NULL pointer dereference in the HATCH handling of libdxfrw allows an attacker to crash the application using a crafted DXF document. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/LibreCAD/LibreCAD/issues/1468"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:librecad:librecad:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E51FA84F-21D7-4AFA-871C-488EF10C2092",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"476"
] | 476 | https://github.com/LibreCAD/LibreCAD/issues/1468 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"LibreCAD",
"LibreCAD"
] | ### Steps to reproduce or sample file
1. Unzip and load the [attached proof of concept file](https://github.com/LibreCAD/LibreCAD/files/7741210/dxf_hatch93.zip) in LibreCAD 2.2.0-rc3
### Cause
The `std::shared_ptr` `DRW_Hatch::loop` is written to when loading a `HATCH` entity with code 93. If this occurs before a ... | NULL pointer dereference in DXF parser, HATCH code 93 | https://api.github.com/repos/LibreCAD/LibreCAD/issues/1468/comments | 2 | 2021-12-19T17:00:48Z | 2022-01-25T12:25:06Z | https://github.com/LibreCAD/LibreCAD/issues/1468 | 1,084,144,167 | 1,468 | 3,098 |
CVE-2021-45846 | 2022-01-25T14:15:08.807 | A flaw in the AMF parser of Slic3r libslic3r 1.3.0 allows an attacker to cause an application crash using a crafted AMF document, where a metadata tag lacks a "type" attribute. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/slic3r/Slic3r/issues/5117"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Par... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:slic3r:slic3r:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A80F063E-875F-4590-B370-4A8795AF1F9F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"476"
] | 476 | https://github.com/slic3r/Slic3r/issues/5117 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"slic3r",
"Slic3r"
] | ### Summary
A crafted AMF XML document can cause a crash due to a NULL pointer dereference during parsing.
### Vulnerable versions
* Slic3r (commit b1a5500f427700ac3dffc0e7d9535ea65f993537)
### Step to reproduce
1. Create the proof-of-concept OBJ file (`nullptr_amf_metadata.amf.xml`):
```
<amf unit="millimet... | NULL pointer dereference in AMF XML parser (metadata tag without type attribute) | https://api.github.com/repos/slic3r/Slic3r/issues/5117/comments | 2 | 2021-12-26T17:21:29Z | 2022-02-01T23:28:44Z | https://github.com/slic3r/Slic3r/issues/5117 | 1,088,812,181 | 5,117 | 3,099 |
CVE-2021-45847 | 2022-01-25T14:15:08.860 | Several missing input validations in the 3MF parser component of Slic3r libslic3r 1.3.0 can each allow an attacker to cause an application crash using a crafted 3MF input file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/slic3r/Slic3r/issues/5118"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mitigation",
"Patch",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:slic3r:slic3r:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A80F063E-875F-4590-B370-4A8795AF1F9F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"476"
] | 476 | https://github.com/slic3r/Slic3r/issues/5118 | [
"Issue Tracking",
"Mitigation",
"Patch",
"Third Party Advisory"
] | github.com | [
"slic3r",
"Slic3r"
] | ### Summary
A crafted 3MF XML document can cause a crash due to a NULL pointer dereference during parsing.
### Vulnerable versions
* Slic3r (commit b1a5500f427700ac3dffc0e7d9535ea65f993537)
### Step to reproduce
1. Create the proof-of-concept OBJ file (`3dmodel.3dmodel`):
```xml
<model>
<resources>
<... | NULL pointer dereference in 3MF XML parser (vertex tag without x/y/z attribute) | https://api.github.com/repos/slic3r/Slic3r/issues/5118/comments | 2 | 2021-12-26T20:32:19Z | 2022-01-31T12:44:25Z | https://github.com/slic3r/Slic3r/issues/5118 | 1,088,840,391 | 5,118 | 3,100 |
CVE-2021-45847 | 2022-01-25T14:15:08.860 | Several missing input validations in the 3MF parser component of Slic3r libslic3r 1.3.0 can each allow an attacker to cause an application crash using a crafted 3MF input file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/slic3r/Slic3r/issues/5118"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mitigation",
"Patch",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:slic3r:slic3r:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A80F063E-875F-4590-B370-4A8795AF1F9F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"476"
] | 476 | https://github.com/slic3r/Slic3r/issues/5119 | [
"Issue Tracking",
"Mitigation",
"Patch",
"Third Party Advisory"
] | github.com | [
"slic3r",
"Slic3r"
] | ### Summary
A crafted 3MF XML document can cause a crash due to a NULL pointer dereference during parsing.
### Vulnerable versions
* Slic3r (commit b1a5500f427700ac3dffc0e7d9535ea65f993537)
### Step to reproduce
1. Create the proof-of-concept OBJ file (`3dmodel.3dmodel`):
```xml
<model>
<resources>
<... | NULL pointer dereference in 3MF XML parser (triangle tag without v1/v2/v3 attribute) | https://api.github.com/repos/slic3r/Slic3r/issues/5119/comments | 2 | 2021-12-26T20:37:00Z | 2022-01-31T12:45:37Z | https://github.com/slic3r/Slic3r/issues/5119 | 1,088,840,946 | 5,119 | 3,101 |
CVE-2021-45847 | 2022-01-25T14:15:08.860 | Several missing input validations in the 3MF parser component of Slic3r libslic3r 1.3.0 can each allow an attacker to cause an application crash using a crafted 3MF input file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/slic3r/Slic3r/issues/5118"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mitigation",
"Patch",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:slic3r:slic3r:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A80F063E-875F-4590-B370-4A8795AF1F9F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"476"
] | 476 | https://github.com/slic3r/Slic3r/issues/5120 | [
"Issue Tracking",
"Mitigation",
"Patch",
"Third Party Advisory"
] | github.com | [
"slic3r",
"Slic3r"
] | ### Summary
A crafted 3MF XML document can cause a crash due to a NULL pointer dereference during parsing.
### Vulnerable versions
* Slic3r (commit b1a5500f427700ac3dffc0e7d9535ea65f993537)
### Step to reproduce
1. Create the proof-of-concept OBJ file (`3dmodel.3dmodel`):
```xml
<model>
<resources>
<... | NULL pointer dereference in 3MF XML parser (slic3r:volume tag without ts/te/modifier attribute) | https://api.github.com/repos/slic3r/Slic3r/issues/5120/comments | 2 | 2021-12-26T20:44:57Z | 2022-01-31T12:46:34Z | https://github.com/slic3r/Slic3r/issues/5120 | 1,088,841,969 | 5,120 | 3,102 |
CVE-2021-46033 | 2022-01-25T15:15:08.160 | In ForestBlog, as of 2021-12-28, File upload can bypass verification. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/saysky/ForestBlog/issues/69"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third P... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:forestblog_project:forestblog:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09674756-CCE5-44F4-9CEA-FEFB96615FA7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"434"
] | 434 | https://github.com/saysky/ForestBlog/issues/69 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"saysky",
"ForestBlog"
] | In this code, the verification suffix should verify the file type after the last point:
public final String allowSuffix = ".bmp.jpg.jpeg.png.gif.pdf.doc.zip.rar.gz";
/**
* 上传文件
*
* @param file
* @return
* @throws IOException
*/
@RequestMapping(value = "/img", method = R... | File upload bypass exists | https://api.github.com/repos/saysky/ForestBlog/issues/69/comments | 0 | 2021-12-28T07:42:20Z | 2022-02-17T05:00:26Z | https://github.com/saysky/ForestBlog/issues/69 | 1,089,678,713 | 69 | 3,103 |
CVE-2021-46089 | 2022-01-25T15:15:08.203 | In JeecgBoot 3.0, there is a SQL injection vulnerability that can operate the database with root privileges. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10,
"confidentialityImpact": "COMPLETE"... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jeecgboot/jeecg-boot/issues/3331"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Th... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "45720048-60C0-4FA8-AA09-16C8CF329FD3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"89"
] | 89 | https://github.com/jeecgboot/jeecg-boot/issues/3331 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jeecgboot",
"jeecg-boot"
] | ##### version: <=3.0
##### precondition: After logged in the website,click 流程管理 proxy burp,the parameter "column" can be made SQL injection.
##### Screenshot & code :
<img width="1240" alt="图片" src="https://user-images.githubusercontent.com/25843151/147641725-71a3c7a3-c4d4-41f8-af76-b875641e2cbf.png">
... | There is an SQL injection vulnerability that can operate the database with root privileges. | https://api.github.com/repos/jeecgboot/JeecgBoot/issues/3331/comments | 3 | 2021-12-29T08:36:51Z | 2022-01-21T02:04:30Z | https://github.com/jeecgboot/JeecgBoot/issues/3331 | 1,090,357,318 | 3,331 | 3,104 |
CVE-2021-46034 | 2022-01-25T16:15:08.797 | A problem was found in ForestBlog, as of 2021-12-29, there is a XSS vulnerability that can be injected through the nickname input box. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/saysky/ForestBlog/issues/70"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third P... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:forestblog_project:forestblog:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09674756-CCE5-44F4-9CEA-FEFB96615FA7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"79"
] | 79 | https://github.com/saysky/ForestBlog/issues/70 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"saysky",
"ForestBlog"
] | There is no character verification for the nickname of the registration interface

The administrator clicks the user function to pop up the XSS prompt box
.
[Vulnerability Type]
Insecure Permissions
[Vendor of Product]
https://github.com/zhangyd-c/On... | There is a Insecure Permissions vulnerability exists in OneBlog <= 2.2.8 | https://api.github.com/repos/zhangyd-c/OneBlog/issues/29/comments | 0 | 2021-12-29T09:33:16Z | 2021-12-29T09:33:16Z | https://github.com/zhangyd-c/OneBlog/issues/29 | 1,090,388,202 | 29 | 3,106 |
CVE-2021-46087 | 2022-01-25T16:15:09.013 | In jfinal_cms >= 5.1 0, there is a storage XSS vulnerability in the background system of CMS. Because developers do not filter the parameters submitted by the user input form, any user with background permission can affect the system security by entering malicious code. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jflyfox/jfinal_cms/issues/19"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jflyfox:jfinal_cms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9EF2DC8E-81C2-4E53-A709-EC9490E00A3F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"79"
] | 79 | https://github.com/jflyfox/jfinal_cms/issues/19 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jflyfox",
"jfinal_cms"
] | There is a storage XSS vulnerability in the modification of jfinal_CMS user's personal information. The attacker can insert malicious XSS code into the modification of personal information, and then successfully trigger XSS attack when the administrator user views the user's personal information.
First, register a use... | A Stored XSS vulnerability exists in jfinal_cms v5.1.0 | https://api.github.com/repos/jflyfox/jfinal_cms/issues/19/comments | 1 | 2020-06-03T14:27:59Z | 2021-06-15T03:31:10Z | https://github.com/jflyfox/jfinal_cms/issues/19 | 630,044,323 | 19 | 3,107 |
CVE-2021-4133 | 2022-01-25T20:15:08.607 | A flaw was found in Keycloak in versions from 12.0.0 and before 15.1.1 which allows an attacker with any existing user account to create new default user accounts via the administrative REST API even when new user registration is disabled. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033602"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/keycloak/ke... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A401BE6A-3227-4F4D-9FA8-35B61B86B79A",
"versionEndExcluding": "15.1.1",
"versionEndIncluding": null,
"versionStartExclud... | [
"863"
] | 863 | https://github.com/keycloak/keycloak/issues/9247 | [
"Third Party Advisory"
] | github.com | [
"keycloak",
"keycloak"
] | ### Describe the bug
A incorrect authorization flaw was found in Keycloak 12.0.0, the flaw allows an attacker with any existing user account to create new default user accounts via the administrative REST API even where new user registration is disabled.
Security advisory:
* https://github.com/keycloak/keycloak/... | Incorrect authorization allows unpriviledged users to create other users | https://api.github.com/repos/keycloak/keycloak/issues/9247/comments | 3 | 2021-12-20T12:37:38Z | 2022-09-11T18:42:20Z | https://github.com/keycloak/keycloak/issues/9247 | 1,084,743,912 | 9,247 | 3,108 |
CVE-2019-25056 | 2022-01-26T05:15:08.847 | In Bromite through 78.0.3904.130, there are adblock rules in the release APK; therefore, probing which resources are blocked and which aren't can identify the application version and defeat the User-Agent protection mechanism. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/bromite/bromite/issues/2#issuecomment-524102774"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/bromite/b... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bromite:bromite:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9364A5D1-99E3-4529-9B05-5B4A8B832070",
"versionEndExcluding": null,
"versionEndIncluding": "78.0.3904.130",
"versionStar... | [
"203"
] | 203 | https://github.com/bromite/bromite/issues/2#issuecomment-524102774 | [
"Third Party Advisory"
] | github.com | [
"bromite",
"bromite"
] | This issue composes of multiple parts:
* ~~a new tab/UI to manage the adblocking feature~~ will not implement this
* logic to download the adblock filters and store them
* logic to parse the adblock filters (or an intermediate format)
* users can of course customize where the adblock filters come from (URLs)
The... | Support user-specified adblock filters | https://api.github.com/repos/bromite/bromite/issues/2/comments | 39 | 2017-10-11T14:19:01Z | 2024-01-11T18:34:59Z | https://github.com/bromite/bromite/issues/2 | 264,605,079 | 2 | 3,109 |
CVE-2021-46117 | 2022-01-26T16:15:07.613 | jpress 4.2.0 is vulnerable to remote code execution via io.jpress.module.page.PageNotifyKit#doSendEmail. The admin panel provides a function through which attackers can edit the email templates and inject some malicious code. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "http://jpress.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/JPressProjects/jpress"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jpress:jpress:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D2D7F379-C6D9-46F8-BD79-2512DE8F4784",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"94"
] | 94 | https://github.com/JPressProjects/jpress/issues/171 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"JPressProjects",
"jpress"
] | # 审计过程
**与之前一篇不同,之前交过一个邮件模板注入的洞,之前那个触发点是在article的评论处,这次是在page的评论处,代码很相似,但不是同一份代码**
jpress后台提供了**评论邮件通知管理员**功能,而且发送的邮件模板可控,官方给出了例子,告诉我们可以用`#(comment.id)`,那么猜测这里可能会存在模板渲染问题

接着,尝试发一条评论看看后端代码的执行流程,后端对应的代码是`io.jpr... | jpress后台存在命令执行漏洞-邮件模板page | https://api.github.com/repos/JPressProjects/jpress/issues/171/comments | 1 | 2022-01-09T08:53:50Z | 2022-08-07T09:53:07Z | https://github.com/JPressProjects/jpress/issues/171 | 1,097,141,191 | 171 | 3,110 |
CVE-2021-46115 | 2022-01-26T17:15:07.730 | jpress 4.2.0 is vulnerable to RCE via io.jpress.web.admin._TemplateController#doUploadFile. The admin panel provides a function through which attackers can upload templates and inject some malicious code. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "http://jpress.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/JPressProjects/jpress"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jpress:jpress:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D2D7F379-C6D9-46F8-BD79-2512DE8F4784",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"434"
] | 434 | https://github.com/JPressProjects/jpress/issues/169 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"JPressProjects",
"jpress"
] | # 审计过程
jpress后台存在模板上传功能,不过存在些许过滤,我们使用fastjson来辅助获取`ScriptEngineManager`,然后执行任意js代码,就可以实现rce,payload如下
```
#set(x=com.alibaba.fastjson.parser.ParserConfig::getGlobalInstance())
#(x.setAutoTypeSupport(true)) #(x.addAccept("javax.script.ScriptEngineManager"))
#set(x=com.alibaba.fastjson.JSON::parse('{"@type":"j... | jpress后台存在命令执行漏洞-模板上传 | https://api.github.com/repos/JPressProjects/jpress/issues/169/comments | 1 | 2022-01-09T08:49:15Z | 2022-08-07T09:52:23Z | https://github.com/JPressProjects/jpress/issues/169 | 1,097,140,367 | 169 | 3,111 |
CVE-2021-46116 | 2022-01-26T17:15:07.780 | jpress 4.2.0 is vulnerable to remote code execution via io.jpress.web.admin._TemplateController#doInstall. The admin panel provides a function through which attackers can install templates and inject some malicious code. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "http://jpress.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/JPressProjects/jpress"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jpress:jpress:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D2D7F379-C6D9-46F8-BD79-2512DE8F4784",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"434"
] | 434 | https://github.com/JPressProjects/jpress/issues/168 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"JPressProjects",
"jpress"
] | # 审计过程
jpress后台存在模板安装功能,攻击者可以安装恶意模板造成rce。
在页面上点击安装模板

上传恶意模板之后,程序运行到`io.jpress.web.admin._TemplateController#doInstall`,这个函数的作用是将上传的zip文件解压,然后存到classes/webapp/templates目录下,这个目录是专门用来... | jpress后台存在命令执行漏洞-模板安装 | https://api.github.com/repos/JPressProjects/jpress/issues/168/comments | 1 | 2022-01-09T08:44:35Z | 2022-08-07T09:54:17Z | https://github.com/JPressProjects/jpress/issues/168 | 1,097,139,500 | 168 | 3,112 |
CVE-2021-46118 | 2022-01-26T17:15:07.820 | jpress 4.2.0 is vulnerable to remote code execution via io.jpress.module.article.kit.ArticleNotifyKit#doSendEmail. The admin panel provides a function through which attackers can edit the email templates and inject some malicious code. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "http://jpress.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/JPressProjects/jpress"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jpress:jpress:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D2D7F379-C6D9-46F8-BD79-2512DE8F4784",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"94"
] | 94 | https://github.com/JPressProjects/jpress/issues/170 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"JPressProjects",
"jpress"
] | # 审计过程
jpress后台提供了**评论邮件通知管理员**功能,而且发送的邮件模板可控,官方给出了例子,告诉我们可以用`#(comment.id)`,那么猜测这里可能会存在模板渲染问题

接着,尝试发一条评论看看后端代码的执行流程
`,那么猜测这里可能会存在模板渲染问题

接着,尝试发一条评论看看后端代码的执行流程,后... | jpress后台存在命令执行漏洞-邮件模板product | https://api.github.com/repos/JPressProjects/jpress/issues/172/comments | 1 | 2022-01-09T08:54:40Z | 2022-08-07T09:52:47Z | https://github.com/JPressProjects/jpress/issues/172 | 1,097,141,322 | 172 | 3,114 |
CVE-2021-32849 | 2022-01-26T22:15:07.903 | Gerapy is a distributed crawler management framework. Prior to version 0.9.9, an authenticated user could execute arbitrary commands. This issue is fixed in version 0.9.9. There are no known workarounds. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9,
"confidentialityImpact": "COMPLETE... | [
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Gerapy/Gerapy/issues/197"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gerapy:gerapy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FC824765-CEAB-47C3-A20C-B263A40ABFDE",
"versionEndExcluding": "0.9.9",
"versionEndIncluding": null,
"versionStartExcluding... | [
"77"
] | 77 | https://github.com/Gerapy/Gerapy/issues/197 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Gerapy",
"Gerapy"
] | Hello,
The [GitHub Security Lab team](https://securitylab.github.com/) has found a potential vulnerability in your project. Please create a [Security Advisory](https://docs.github.com/en/free-pro-team@latest/github/managing-security-vulnerabilities/creating-a-security-advisory) and invite me in to further disclose a... | GitHub Security Lab: Security Contact Needed | https://api.github.com/repos/Gerapy/Gerapy/issues/197/comments | 1 | 2021-05-14T12:11:59Z | 2021-12-26T11:17:19Z | https://github.com/Gerapy/Gerapy/issues/197 | 891,871,512 | 197 | 3,115 |
CVE-2021-32849 | 2022-01-26T22:15:07.903 | Gerapy is a distributed crawler management framework. Prior to version 0.9.9, an authenticated user could execute arbitrary commands. This issue is fixed in version 0.9.9. There are no known workarounds. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9,
"confidentialityImpact": "COMPLETE... | [
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Gerapy/Gerapy/issues/197"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gerapy:gerapy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FC824765-CEAB-47C3-A20C-B263A40ABFDE",
"versionEndExcluding": "0.9.9",
"versionEndIncluding": null,
"versionStartExcluding... | [
"77"
] | 77 | https://github.com/Gerapy/Gerapy/issues/217 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Gerapy",
"Gerapy"
] | The GitHub Security Lab reported a potential security vulnerability (GHSL-2021-076-gerapy) in your project on 2021/05/13. It has been 90 days since our initial report and as per our coordinated disclosure policy, we intend to publish a public advisory detailing this issue. If you do wish to further coordinate a respons... | Security Issue: GHSL-2021-076-gerapy | https://api.github.com/repos/Gerapy/Gerapy/issues/217/comments | 2 | 2021-11-22T09:05:04Z | 2022-01-09T21:14:47Z | https://github.com/Gerapy/Gerapy/issues/217 | 1,059,877,092 | 217 | 3,116 |
CVE-2021-46377 | 2022-01-27T18:15:07.813 | There is a front-end sql injection vulnerability in cszcms 1.2.9 via cszcms/controllers/Member.php#viewUser | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cskaza/cszcms/issues/33"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cskaza:cszcms:1.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A08F592A-91EF-4922-994E-A44A05BBA747",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"89"
] | 89 | https://github.com/cskaza/cszcms/issues/33 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cskaza",
"cszcms"
] | Hi, I found a front-end sql injection vulnerability in cszcms-1.2.9
The vulnerable code is on `cszcms\controllers\Member.php#viewUser`
The `$this->uri->segment(3)` parameter here can be controlled by the user
. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/73"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"416"
] | 416 | https://github.com/pcmacdon/jsish/issues/73 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-use-after-free src/jsiValue.c:34 in Jsi_IncrRefCount | https://api.github.com/repos/pcmacdon/jsish/issues/73/comments | 1 | 2021-12-24T10:41:10Z | 2021-12-28T03:39:04Z | https://github.com/pcmacdon/jsish/issues/73 | 1,088,307,699 | 73 | 3,118 |
CVE-2021-46489 | 2022-01-27T21:15:08.603 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via Jsi_DecrRefCount in src/jsiValue.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/74"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"416"
] | 416 | https://github.com/pcmacdon/jsish/issues/74 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-use-after-free src/jsiValue.c:41 in Jsi_DecrRefCount | https://api.github.com/repos/pcmacdon/jsish/issues/74/comments | 0 | 2021-12-24T10:41:50Z | 2021-12-27T15:24:09Z | https://github.com/pcmacdon/jsish/issues/74 | 1,088,308,024 | 74 | 3,119 |
CVE-2021-46494 | 2022-01-27T21:15:08.777 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_ValueLookupBase in src/jsiValue.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/78"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"416"
] | 416 | https://github.com/pcmacdon/jsish/issues/78 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-use-after-free src/jsiValue.c:980 in jsi_ValueLookupBase | https://api.github.com/repos/pcmacdon/jsish/issues/78/comments | 0 | 2021-12-24T10:45:48Z | 2022-01-12T02:16:10Z | https://github.com/pcmacdon/jsish/issues/78 | 1,088,309,877 | 78 | 3,120 |
CVE-2021-46495 | 2022-01-27T21:15:08.827 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via DeleteTreeValue in src/jsiObj.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/82"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"416"
] | 416 | https://github.com/pcmacdon/jsish/issues/82 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-use-after-free src/jsiObj.c:176 in DeleteTreeValue | https://api.github.com/repos/pcmacdon/jsish/issues/82/comments | 0 | 2021-12-24T10:48:59Z | 2021-12-28T02:31:29Z | https://github.com/pcmacdon/jsish/issues/82 | 1,088,311,523 | 82 | 3,121 |
CVE-2021-46496 | 2022-01-27T21:15:08.870 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via Jsi_ObjFree in src/jsiObj.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/83"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"416"
] | 416 | https://github.com/pcmacdon/jsish/issues/83 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | MEMLEAK NOW: Heap-use-after-free src/jsiObj.c:339 in Jsi_ObjFree | https://api.github.com/repos/pcmacdon/jsish/issues/83/comments | 2 | 2021-12-24T10:49:33Z | 2021-12-28T02:31:03Z | https://github.com/pcmacdon/jsish/issues/83 | 1,088,311,780 | 83 | 3,122 |
CVE-2021-46497 | 2022-01-27T21:15:08.917 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_UserObjDelete in src/jsiUserObj.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/84"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"416"
] | 416 | https://github.com/pcmacdon/jsish/issues/84 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-use-after-free src/jsiUserObj.c:32 in jsi_UserObjDelete | https://api.github.com/repos/pcmacdon/jsish/issues/84/comments | 0 | 2021-12-24T10:50:28Z | 2021-12-27T16:51:37Z | https://github.com/pcmacdon/jsish/issues/84 | 1,088,312,235 | 84 | 3,123 |
CVE-2021-46498 | 2022-01-27T21:15:08.957 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_wswebsocketObjFree in src/jsiWebSocket.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/81"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"416"
] | 416 | https://github.com/pcmacdon/jsish/issues/81 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-use-after-free src/jsiWebSocket.c:3190 in jsi_wswebsocketObjFree | https://api.github.com/repos/pcmacdon/jsish/issues/81/comments | 0 | 2021-12-24T10:48:23Z | 2021-12-28T02:31:29Z | https://github.com/pcmacdon/jsish/issues/81 | 1,088,311,213 | 81 | 3,124 |
CVE-2021-46499 | 2022-01-27T21:15:09.003 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_ValueCopyMove in src/jsiValue.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/76"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"416"
] | 416 | https://github.com/pcmacdon/jsish/issues/76 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-use-after-free src/jsiValue.c:245 in jsi_ValueCopyMove | https://api.github.com/repos/pcmacdon/jsish/issues/76/comments | 0 | 2021-12-24T10:44:21Z | 2022-01-12T02:15:38Z | https://github.com/pcmacdon/jsish/issues/76 | 1,088,309,178 | 76 | 3,125 |
CVE-2021-46500 | 2022-01-27T21:15:09.047 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_ArgTypeCheck in src/jsiFunc.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/85"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"416"
] | 416 | https://github.com/pcmacdon/jsish/issues/85 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-use-after-free src/jsiFunc.c:207 in jsi_ArgTypeCheck | https://api.github.com/repos/pcmacdon/jsish/issues/85/comments | 2 | 2021-12-24T10:51:56Z | 2021-12-26T22:47:18Z | https://github.com/pcmacdon/jsish/issues/85 | 1,088,313,003 | 85 | 3,126 |
CVE-2021-46501 | 2022-01-27T21:15:09.097 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via SortSubCmd in src/jsiArray.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/86"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"416"
] | 416 | https://github.com/pcmacdon/jsish/issues/86 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-use-after-free src/jsiArray.c:958 in SortSubCmd | https://api.github.com/repos/pcmacdon/jsish/issues/86/comments | 0 | 2021-12-24T10:52:55Z | 2021-12-26T22:47:42Z | https://github.com/pcmacdon/jsish/issues/86 | 1,088,313,466 | 86 | 3,127 |
CVE-2021-46502 | 2022-01-27T21:15:09.143 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via /usr/lib/x86_64-linux-gnu/libasan.so.4+0x5166d. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/87"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"416"
] | 416 | https://github.com/pcmacdon/jsish/issues/87 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-use-after-free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x5166d) | https://api.github.com/repos/pcmacdon/jsish/issues/87/comments | 0 | 2021-12-24T10:53:39Z | 2021-12-26T22:08:17Z | https://github.com/pcmacdon/jsish/issues/87 | 1,088,313,832 | 87 | 3,128 |
CVE-2021-46503 | 2022-01-27T21:15:09.187 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via /usr/lib/x86_64-linux-gnu/libasan.so.4+0x79732. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/88"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"416"
] | 416 | https://github.com/pcmacdon/jsish/issues/88 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-use-after-free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x79732) | https://api.github.com/repos/pcmacdon/jsish/issues/88/comments | 0 | 2021-12-24T10:54:21Z | 2021-12-26T20:57:24Z | https://github.com/pcmacdon/jsish/issues/88 | 1,088,314,163 | 88 | 3,129 |
CVE-2021-46504 | 2022-01-27T21:15:09.233 | There is an Assertion 'vp != resPtr' failed at jsiEval.c in Jsish v3.5.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/51"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"617"
] | 617 | https://github.com/pcmacdon/jsish/issues/51 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Assertion `vp != resPtr' failed at jsiEval.c:1020: jsiEvalSubscript. | https://api.github.com/repos/pcmacdon/jsish/issues/51/comments | 0 | 2021-12-24T09:40:19Z | 2022-01-12T02:02:10Z | https://github.com/pcmacdon/jsish/issues/51 | 1,088,275,965 | 51 | 3,130 |
CVE-2021-46505 | 2022-01-27T21:15:09.277 | Jsish v3.5.0 was discovered to contain a stack overflow via /usr/lib/x86_64-linux-gnu/libasan.so.4+0x5b1e5. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/53"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"674"
] | 674 | https://github.com/pcmacdon/jsish/issues/53 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Stack-overflow in (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x5b1e5) | https://api.github.com/repos/pcmacdon/jsish/issues/53/comments | 0 | 2021-12-24T09:43:02Z | 2022-01-12T02:11:35Z | https://github.com/pcmacdon/jsish/issues/53 | 1,088,277,342 | 53 | 3,131 |
CVE-2021-46506 | 2022-01-27T21:15:09.323 | There is an Assertion 'v->d.lval != v' failed at src/jsiValue.c in Jsish v3.5.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/52"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"617"
] | 617 | https://github.com/pcmacdon/jsish/issues/52 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Assertion `v->d.lval != v' failed at src/jsiValue.c:181: ValueFree. | https://api.github.com/repos/pcmacdon/jsish/issues/52/comments | 0 | 2021-12-24T09:41:38Z | 2022-01-12T02:03:28Z | https://github.com/pcmacdon/jsish/issues/52 | 1,088,276,639 | 52 | 3,132 |
CVE-2021-46507 | 2022-01-27T21:15:09.367 | Jsish v3.5.0 was discovered to contain a stack overflow via Jsi_LogMsg at src/jsiUtils.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/54"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"674"
] | 674 | https://github.com/pcmacdon/jsish/issues/54 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Stack-overflow src/jsiUtils.c:151 in Jsi_LogMsg | https://api.github.com/repos/pcmacdon/jsish/issues/54/comments | 0 | 2021-12-24T09:43:48Z | 2022-01-12T02:11:46Z | https://github.com/pcmacdon/jsish/issues/54 | 1,088,277,734 | 54 | 3,133 |
CVE-2021-46508 | 2022-01-27T21:15:09.413 | There is an Assertion `i < parts_cnt' failed at src/mjs_bcode.c in Cesanta MJS v2.20.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/188"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"617"
] | 617 | https://github.com/cesanta/mjs/issues/188 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_CLANG=clang
$(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOURCE... | Assertion `i < parts_cnt' failed at src/mjs_bcode.c:121: struct mjs_bcode_part *mjs_bcode_part_get_by_offset(struct mjs *, size_t). | https://api.github.com/repos/cesanta/mjs/issues/188/comments | 0 | 2021-12-31T05:23:32Z | 2022-01-12T02:18:33Z | https://github.com/cesanta/mjs/issues/188 | 1,091,424,362 | 188 | 3,134 |
CVE-2021-46509 | 2022-01-27T21:15:09.460 | Cesanta MJS v2.20.0 was discovered to contain a stack overflow via snquote at mjs/src/mjs_json.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/200"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"674"
] | 674 | https://github.com/cesanta/mjs/issues/200 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build steps
```bash
vim Makefile
DOCKER_CLANG=clang
$(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)
# save the makefile then make
make
```
... | Stack-overflow mjs/src/mjs_json.c:102:7 in snquote | https://api.github.com/repos/cesanta/mjs/issues/200/comments | 0 | 2021-12-31T05:43:04Z | 2022-01-12T02:20:01Z | https://github.com/cesanta/mjs/issues/200 | 1,091,428,300 | 200 | 3,135 |
CVE-2021-46510 | 2022-01-27T21:15:09.507 | There is an Assertion `s < mjs->owned_strings.buf + mjs->owned_strings.len' failed at src/mjs_gc.c in Cesanta MJS v2.20.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/185"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"617"
] | 617 | https://github.com/cesanta/mjs/issues/185 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
DOCKER_CLANG=clang
$(DOCKER_GCC) $(CFLAGS) $(TOP_... | Assertion `s < mjs->owned_strings.buf + mjs->owned_strings.len' failed src/mjs_gc.c:354: gc_mark_string. | https://api.github.com/repos/cesanta/mjs/issues/185/comments | 0 | 2021-12-31T05:20:39Z | 2022-01-12T02:18:09Z | https://github.com/cesanta/mjs/issues/185 | 1,091,423,652 | 185 | 3,136 |
CVE-2021-46511 | 2022-01-27T21:15:09.550 | There is an Assertion `m->len >= sizeof(v)' failed at src/mjs_core.c in Cesanta MJS v2.20.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/183"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"617"
] | 617 | https://github.com/cesanta/mjs/issues/183 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
$(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP... | Assertion `m->len >= sizeof(v)' failed at src/mjs_core.c:372: mjs_pop_val | https://api.github.com/repos/cesanta/mjs/issues/183/comments | 0 | 2021-12-31T05:18:57Z | 2022-01-12T02:17:55Z | https://github.com/cesanta/mjs/issues/183 | 1,091,423,222 | 183 | 3,137 |
CVE-2021-46513 | 2022-01-27T21:15:09.633 | Cesanta MJS v2.20.0 was discovered to contain a global buffer overflow via mjs_mk_string at mjs/src/mjs_string.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/189"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"120"
] | 120 | https://github.com/cesanta/mjs/issues/189 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_CLANG=clang
$(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOUR... | Global-buffer-overflow mjs/src/mjs_string.c:58:15 in mjs_mk_string | https://api.github.com/repos/cesanta/mjs/issues/189/comments | 0 | 2021-12-31T05:24:24Z | 2021-12-31T05:49:18Z | https://github.com/cesanta/mjs/issues/189 | 1,091,424,556 | 189 | 3,138 |
CVE-2021-46514 | 2022-01-27T21:15:09.677 | There is an Assertion 'ppos != NULL && mjs_is_number(*ppos)' failed at src/mjs_core.c in Cesanta MJS v2.20.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/187"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"617"
] | 617 | https://github.com/cesanta/mjs/issues/187 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_CLANG=clang
$(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOURCES)... | Assertion `ppos != NULL && mjs_is_number(*ppos)' failed at src/mjs_core.c:311: int mjs_getretvalpos(struct mjs *). | https://api.github.com/repos/cesanta/mjs/issues/187/comments | 0 | 2021-12-31T05:22:41Z | 2021-12-31T08:13:20Z | https://github.com/cesanta/mjs/issues/187 | 1,091,424,159 | 187 | 3,139 |
CVE-2021-46515 | 2022-01-27T21:15:09.723 | There is an Assertion `mjs_stack_size(&mjs->scopes) >= scopes_len' failed at src/mjs_exec.c in Cesanta MJS v2.20.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/186"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"617"
] | 617 | https://github.com/cesanta/mjs/issues/186 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
DOCKER_CLANG=clang
$(DOCKER_GCC) $(CFLAGS) $(... | Assertion `mjs_stack_size(&mjs->scopes) >= scopes_len' failed at src/mjs_exec.c:949: mjs_execute. | https://api.github.com/repos/cesanta/mjs/issues/186/comments | 0 | 2021-12-31T05:21:24Z | 2022-01-12T02:18:21Z | https://github.com/cesanta/mjs/issues/186 | 1,091,423,861 | 186 | 3,140 |
CVE-2021-46517 | 2022-01-27T21:15:09.813 | There is an Assertion `mjs_stack_size(&mjs->scopes) > 0' failed at src/mjs_exec.c in Cesanta MJS v2.20.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/184"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"617"
] | 617 | https://github.com/cesanta/mjs/issues/184 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
DOCKER_CLANG=clang
$(DOCKER_GCC) $(CFLAGS) $(... | Assertion `mjs_stack_size(&mjs->scopes) > 0' failed src/mjs_exec.c:725: mjs_execute. | https://api.github.com/repos/cesanta/mjs/issues/184/comments | 0 | 2021-12-31T05:19:48Z | 2021-12-31T05:46:31Z | https://github.com/cesanta/mjs/issues/184 | 1,091,423,443 | 184 | 3,141 |
CVE-2021-46518 | 2022-01-27T21:15:09.857 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_disown at src/mjs_core.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/195"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"787"
] | 787 | https://github.com/cesanta/mjs/issues/195 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
DOCKER_CLANG=clang
$(DOCKER_GCC) $(CFLAGS... | Heap-buffer-overflow src/mjs_core.c:288 in mjs_disown | https://api.github.com/repos/cesanta/mjs/issues/195/comments | 0 | 2021-12-31T05:37:12Z | 2022-01-12T02:18:56Z | https://github.com/cesanta/mjs/issues/195 | 1,091,427,107 | 195 | 3,142 |
CVE-2021-46519 | 2022-01-27T21:15:09.900 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_array_length at src/mjs_array.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/194"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"787"
] | 787 | https://github.com/cesanta/mjs/issues/194 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
$(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $... | Heap-buffer-overflow src/mjs_array.c:83 in mjs_array_length | https://api.github.com/repos/cesanta/mjs/issues/194/comments | 0 | 2021-12-31T05:36:16Z | 2021-12-31T05:36:16Z | https://github.com/cesanta/mjs/issues/194 | 1,091,426,932 | 194 | 3,143 |
CVE-2021-46520 | 2022-01-27T21:15:09.947 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_jprintf at src/mjs_util.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/193"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"787"
] | 787 | https://github.com/cesanta/mjs/issues/193 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
$(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES)... | Heap-buffer-overflow src/mjs_util.c:61 in mjs_jprintf | https://api.github.com/repos/cesanta/mjs/issues/193/comments | 0 | 2021-12-31T05:35:03Z | 2021-12-31T05:35:03Z | https://github.com/cesanta/mjs/issues/193 | 1,091,426,673 | 193 | 3,144 |
CVE-2021-46521 | 2022-01-27T21:15:09.990 | Cesanta MJS v2.20.0 was discovered to contain a global buffer overflow via c_vsnprintf at mjs/src/common/str_util.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/190"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"120"
] | 120 | https://github.com/cesanta/mjs/issues/190 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_CLANG=clang
$(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_... | Global-buffer-overflow mjs/src/common/str_util.c:180:14 in c_vsnprintf | https://api.github.com/repos/cesanta/mjs/issues/190/comments | 0 | 2021-12-31T05:25:14Z | 2022-01-12T02:18:45Z | https://github.com/cesanta/mjs/issues/190 | 1,091,424,729 | 190 | 3,145 |
CVE-2021-46522 | 2022-01-27T21:15:10.033 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via /usr/lib/x86_64-linux-gnu/libasan.so.4+0xaff53. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/196"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"787"
] | 787 | https://github.com/cesanta/mjs/issues/196 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
$(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES)... | Heap-buffer-overflow (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xaff53) | https://api.github.com/repos/cesanta/mjs/issues/196/comments | 0 | 2021-12-31T05:38:16Z | 2022-01-12T02:19:08Z | https://github.com/cesanta/mjs/issues/196 | 1,091,427,319 | 196 | 3,146 |
CVE-2021-46523 | 2022-01-27T21:15:10.077 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via to_json_or_debug at mjs/src/mjs_json.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/198"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"787"
] | 787 | https://github.com/cesanta/mjs/issues/198 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build steps
```bash
vim Makefile
DOCKER_CLANG=clang
$(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)
# save the makefile then make
make
```
... | Heap-buffer-overflow mjs/src/mjs_json.c:154:13 in to_json_or_debug | https://api.github.com/repos/cesanta/mjs/issues/198/comments | 0 | 2021-12-31T05:40:39Z | 2022-01-12T02:19:30Z | https://github.com/cesanta/mjs/issues/198 | 1,091,427,798 | 198 | 3,147 |
CVE-2021-46524 | 2022-01-27T21:15:10.117 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via snquote at mjs/src/mjs_json.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/192"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"787"
] | 787 | https://github.com/cesanta/mjs/issues/192 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
$(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES)... | Heap-buffer-overflow src/mjs_json.c:81 in snquote | https://api.github.com/repos/cesanta/mjs/issues/192/comments | 0 | 2021-12-31T05:33:31Z | 2021-12-31T05:33:31Z | https://github.com/cesanta/mjs/issues/192 | 1,091,426,355 | 192 | 3,148 |
CVE-2021-46525 | 2022-01-27T21:15:10.160 | Cesanta MJS v2.20.0 was discovered to contain a heap-use-after-free via mjs_apply at src/mjs_exec.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/199"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"416"
] | 416 | https://github.com/cesanta/mjs/issues/199 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
$(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_C... | Heap-use-after-free src/mjs_exec.c:1156 in mjs_apply | https://api.github.com/repos/cesanta/mjs/issues/199/comments | 0 | 2021-12-31T05:41:58Z | 2022-01-12T02:19:47Z | https://github.com/cesanta/mjs/issues/199 | 1,091,428,077 | 199 | 3,149 |
CVE-2021-46526 | 2022-01-27T21:15:10.207 | Cesanta MJS v2.20.0 was discovered to contain a global buffer overflow via snquote at src/mjs_json.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/191"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"120"
] | 120 | https://github.com/cesanta/mjs/issues/191 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
$(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(T... | Global-buffer-overflow src/mjs_json.c:81 in snquote | https://api.github.com/repos/cesanta/mjs/issues/191/comments | 0 | 2021-12-31T05:31:36Z | 2021-12-31T05:31:36Z | https://github.com/cesanta/mjs/issues/191 | 1,091,425,933 | 191 | 3,150 |
CVE-2021-46527 | 2022-01-27T21:15:10.250 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_get_cstring at src/mjs_string.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/197"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"787"
] | 787 | https://github.com/cesanta/mjs/issues/197 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
$(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $... | Heap-buffer-overflow src/mjs_string.c:213 in mjs_get_cstring | https://api.github.com/repos/cesanta/mjs/issues/197/comments | 0 | 2021-12-31T05:39:31Z | 2022-01-12T02:19:19Z | https://github.com/cesanta/mjs/issues/197 | 1,091,427,555 | 197 | 3,151 |
CVE-2022-22868 | 2022-01-28T19:15:08.023 | Gibbon CMS v22.0.01 was discovered to contain a cross-site scripting (XSS) vulnerability, that allows attackers to inject arbitrary script via name parameters. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GibbonEdu/core/issues/1594"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/truonghuuphuc/CVE"
},
{
"source": "cve@mitre.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gibbonedu:gibbon:22.0.01:*:*:*:*:*:*:*",
"matchCriteriaId": "05336491-04BE-4BAC-BBE1-D96C7C734B3C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"79"
] | 79 | https://github.com/GibbonEdu/core/issues/1594 | [
"Third Party Advisory"
] | github.com | [
"GibbonEdu",
"core"
] | [ Content removed by admin to follow proper security disclosure measures ] | Notification for Gibbon version v22.0.01 | https://api.github.com/repos/GibbonEdu/core/issues/1594/comments | 1 | 2022-01-03T03:47:42Z | 2022-01-11T06:22:11Z | https://github.com/GibbonEdu/core/issues/1594 | 1,092,200,332 | 1,594 | 3,152 |
CVE-2016-3735 | 2022-01-28T20:15:08.437 | Piwigo is image gallery software written in PHP. When a criteria is not met on a host, piwigo defaults to usingmt_rand in order to generate password reset tokens. mt_rand output can be predicted after recovering the seed used to generate it. This low an unauthenticated attacker to take over an account providing they kn... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "secalert@redhat.com",
"tags": null,
"url": "http://piwigo.org/release-2.8.1%2C"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Piwigo/Piwigo/commit/f51ee90c66527fd7ff634f3e8d414cb670da068d"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "294E7F72-0D7D-4B0C-B05E-B58EFB07CF35",
"versionEndExcluding": "2.8.1",
"versionEndIncluding": null,
"versionStartExcluding... | [
"335"
] | 335 | https://github.com/Piwigo/Piwigo/issues/470%2C | null | github.com | [
"Piwigo",
"Piwigo"
] | Current functions used to generate random strings are not "that much random" (depending on the PHP version and operating system).
| increase randomness on generate_key | https://api.github.com/repos/Piwigo/Piwigo/issues/470/comments | 0 | 2016-04-26T09:03:40Z | 2018-01-15T12:20:36Z | https://github.com/Piwigo/Piwigo/issues/470 | 151,080,998 | 470 | 3,153 |
CVE-2022-23887 | 2022-01-28T21:15:10.197 | YzmCMS v6.3 was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily delete user accounts via /admin/admin_manage/delete. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/yzmcms/yzmcms/issues/59"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yzmcms:yzmcms:6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "33CDD39A-96DC-4CF3-9CFF-694DF09B47BB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"352"
] | 352 | https://github.com/yzmcms/yzmcms/issues/59 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"yzmcms",
"yzmcms"
] | This vulnerability allows arbitrary users to be deleted,
There is a user with ID 3,

Click delete and capture the package to generate the POC of CSRF,
 | https://api.github.com/repos/yzmcms/yzmcms/issues/59/comments | 1 | 2022-01-21T03:30:48Z | 2022-02-14T02:59:09Z | https://github.com/yzmcms/yzmcms/issues/59 | 1,110,013,040 | 59 | 3,154 |
CVE-2022-23888 | 2022-01-28T21:15:10.233 | YzmCMS v6.3 was discovered to contain a Cross-Site Request Forgey (CSRF) via the component /yzmcms/comment/index/init.html. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/yzmcms/yzmcms/issues/60"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yzmcms:yzmcms:6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "33CDD39A-96DC-4CF3-9CFF-694DF09B47BB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"352"
] | 352 | https://github.com/yzmcms/yzmcms/issues/60 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"yzmcms",
"yzmcms"
] | Prepare two accounts: test01 and test02, background settings allow users to contribute,
Generate POC of CSRF with test01, First log in to test01 and comment on an article, and grab the request packet,

![im... | YzmCMSV6. 3. There is a CSRF vulnerability in the foreground in the official version(YzmCMS V6.3 正式版前台存在csrf漏洞) | https://api.github.com/repos/yzmcms/yzmcms/issues/60/comments | 1 | 2022-01-22T02:18:45Z | 2022-02-14T03:00:13Z | https://github.com/yzmcms/yzmcms/issues/60 | 1,111,188,217 | 60 | 3,155 |
CVE-2022-23889 | 2022-01-28T21:15:10.273 | The comment function in YzmCMS v6.3 was discovered as being able to be operated concurrently, allowing attackers to create an unusually large number of comments. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/yzmcms/yzmcms/issues/61"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yzmcms:yzmcms:6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "33CDD39A-96DC-4CF3-9CFF-694DF09B47BB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"674"
] | 674 | https://github.com/yzmcms/yzmcms/issues/61 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"yzmcms",
"yzmcms"
] | Prepare an account test01, comment at the bottom of an article, and grab the request package,

Send to repeater,
 | https://api.github.com/repos/yzmcms/yzmcms/issues/61/comments | 3 | 2022-01-22T02:43:52Z | 2025-02-28T13:16:04Z | https://github.com/yzmcms/yzmcms/issues/61 | 1,111,196,610 | 61 | 3,156 |
CVE-2022-24123 | 2022-01-29T23:15:07.497 | MarkText through 0.16.3 does not sanitize the input of a mermaid block before rendering. This could lead to Remote Code Execution via a .md file containing a mutation Cross-Site Scripting (XSS) payload. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/marktext/marktext/issues/2946"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url":... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:marktext:marktext:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5F071D01-841F-476E-BAF5-A29F31D88D58",
"versionEndExcluding": null,
"versionEndIncluding": "0.16.3",
"versionStartExcl... | [
"79"
] | 79 | https://github.com/marktext/marktext/issues/2946 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"marktext",
"marktext"
] | <!--
- Please search for issues that matches the one you want to file and use the thumbs up emoji.
- Please make sure your application version is up to date.
-->
### Description
<!-- Description of the bug -->
According to https://github.com/marktext/marktext/issues/2504 , it will add a closing element ... | XSS to RCE vulnerability in Mermaid rendered | https://api.github.com/repos/marktext/marktext/issues/2946/comments | 1 | 2022-01-28T05:24:24Z | 2022-01-31T05:51:37Z | https://github.com/marktext/marktext/issues/2946 | 1,117,015,576 | 2,946 | 3,157 |
CVE-2022-24124 | 2022-01-29T23:15:07.540 | The query API in Casdoor before 1.13.1 has a SQL injection vulnerability related to the field and value parameters, as demonstrated by api/get-organizations. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/166163/Casdoor-1.13.0-SQL-Injection.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:casbin:casdoor:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EB31AE79-CF12-4C1C-9480-4DE0A2A6375D",
"versionEndExcluding": "1.13.1",
"versionEndIncluding": null,
"versionStartExcludi... | [
"89"
] | 89 | https://github.com/casdoor/casdoor/issues/439 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"casdoor",
"casdoor"
] | The query API provides the `field` and `value` parameters to support query by field.
It inserts the user's input into the raw SQL expression which can lead to a SQL injection vulnerability.
```go
session = session.And(fmt.Sprintf("%s like ?", util.SnakeString(field)), fmt.Sprintf("%%%s%%", value))
```
And the ... | SQL injection vulnerability in field filter | https://api.github.com/repos/casdoor/casdoor/issues/439/comments | 7 | 2022-01-22T09:53:09Z | 2022-01-31T05:53:51Z | https://github.com/casdoor/casdoor/issues/439 | 1,111,401,339 | 439 | 3,158 |
CVE-2021-44255 | 2022-01-31T12:15:07.767 | Authenticated remote code execution in MotionEye <= 0.42.1 and MotioneEyeOS <= 20200606 allows a remote attacker to upload a configuration backup file containing a malicious python pickle file which will execute arbitrary code on the server. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ccrisan/motioneyeos/issues/2843"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.pizzapower.me/2021/10/09/self-h... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:motioneye_project:motioneye:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ED345730-DFB3-43F6-95C1-D66CF0ADCE67",
"versionEndExcluding": "0.42.1",
"versionEndIncluding": null,
"versio... | [
"306"
] | 306 | https://github.com/ccrisan/motioneyeos/issues/2843 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ccrisan",
"motioneyeos"
] | As with many web-based apps, the admin user can run arbitrary code on the underlying system via the web-gui. While that may or may not be a security issue, and for meye use cases it probably isn’t, I feel that the lack of password on the admin account has left many publicly available systems open to exploitation.
I... | Lack of admin password leaves many publicly available systems vulnerable to RCE | https://api.github.com/repos/motioneye-project/motioneyeos/issues/2843/comments | 4 | 2021-11-21T15:35:01Z | 2021-12-19T13:38:16Z | https://github.com/motioneye-project/motioneyeos/issues/2843 | 1,059,410,206 | 2,843 | 3,159 |
CVE-2020-36056 | 2022-01-31T13:15:07.787 | Beetel 777VR1-DI Hardware Version REV.1.01 Firmware Version V01.00.09_55 was discovered to contain a cross-site scripting (XSS) vulnerability via the Ping diagnostic option. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/VivekPanday12/CVE-/issues/5"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.linkedin.com/in/vivek-panday-796768149"
},
{
"sourc... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:beetel:777vr1_firmware:01.00.09_55:*:*:*:*:*:*:*",
"matchCriteriaId": "C25270C8-B8A7-47DD-933E-1D5628B411D9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | [
"79"
] | 79 | https://github.com/VivekPanday12/CVE-/issues/5 | [
"Third Party Advisory"
] | github.com | [
"VivekPanday12",
"CVE-"
] | # Exploit Title: beetel Moderm 777vr1 — Cross Site Scripting on the beetel 777vr1 via the Ping Diagnostic
# Date: 2020–12–25
# Exploit Author: VIVEK PANDAY
# Version: Firmware Version V01.00.09_55 777VR1
# Tested on Windows10
# Linkedln Contact: https:/... | CVE-2020-36056 beetel Moderm 777vr1 — Cross Site Scripting on the beetel 777vr1 via the Ping Diagnostic | https://api.github.com/repos/VivekPanday12/CVE-/issues/5/comments | 0 | 2022-01-23T15:03:12Z | 2022-01-23T15:03:12Z | https://github.com/VivekPanday12/CVE-/issues/5 | 1,111,895,260 | 5 | 3,160 |
CVE-2020-36064 | 2022-01-31T13:15:07.830 | Online Course Registration v1.0 was discovered to contain hardcoded credentials in the source code which allows attackers access to the control panel if compromised. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/VivekPanday12/CVE-/issues/2"
},
{
"source": "cve@mitre.org",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://projectworlds.in/free-projects/php-projects/on... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:online_course_registration_project:online_course_registration:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "548C546F-53C6-45B2-B9ED-D573B83C1E22",
"versionEndExcluding": null,
"versionEndInclu... | [
"798"
] | 798 | https://github.com/VivekPanday12/CVE-/issues/2 | [
"Third Party Advisory"
] | github.com | [
"VivekPanday12",
"CVE-"
] | # Exploit Title: Online Course Registration — Use of Hard-coded Credentials in Source Code Leads to Admin Panel Access
# Date: 2020–12–25
# Exploit Author: VIVEK PANDAY
# Vendor Homepage: https://www.sourcecodester.com/
# Software Link: https://www.sourcecodester.com/sites/default/files/download/razormist/online-... | CVE-2020-36064 Online Course Registration — Use of Hard-coded Credentials in Source Code Leads to Admin Panel Access | https://api.github.com/repos/VivekPanday12/CVE-/issues/2/comments | 0 | 2022-01-23T14:03:54Z | 2022-01-23T14:03:54Z | https://github.com/VivekPanday12/CVE-/issues/2 | 1,111,880,298 | 2 | 3,161 |
CVE-2022-24263 | 2022-01-31T22:15:07.733 | Hospital Management System v4.0 was discovered to contain a SQL injection vulnerability in /Hospital-Management-System-master/func.php via the email parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/165882/Hospital-Management-System-4.0-SQL-Injection.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracki... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:phpgurukul:hospital_management_system:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DA36E354-4DBF-4BE4-9BC4-CB00C6771BAF",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/kishan0725/Hospital-Management-System/issues/17 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"kishan0725",
"Hospital-Management-System"
] | ## VULNERABLE: SQL Injection Authentication Bypass exists in Hospital-Management-System. An attacker can inject query in “/Hospital-Management-System-master/func.php" via the ‘email’ parameters.
+ Description: The vulnerability is present in the “/Hospital-Management-System-master/func.php " , and can be exploited t... | Bypass authentication with SQL Injection | https://api.github.com/repos/kishan0725/Hospital-Management-System/issues/17/comments | 1 | 2022-01-25T17:07:00Z | 2023-05-08T15:48:58Z | https://github.com/kishan0725/Hospital-Management-System/issues/17 | 1,114,148,255 | 17 | 3,162 |
CVE-2022-24264 | 2022-01-31T22:15:07.777 | Cuppa CMS v1.0 was discovered to contain a SQL injection vulnerability in /administrator/components/table_manager/ via the search_word parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "COMPLETE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CuppaCMS/CuppaCMS/issues/13"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/truonghuuphuc/CVE"
},
{
"so... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"89"
] | 89 | https://github.com/CuppaCMS/CuppaCMS/issues/13 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CuppaCMS",
"CuppaCMS"
] | + VULNERABLE: SQL injection vulnerability exists in CuppaCMS. An attacker can inject query in
“/administrator/components/table_manager/" via the ‘search_word’ parameters.
+ Date: 3/1/2022
+ Exploit Author: Trương Hữu Phúc
+ Contact me:
+ Github: https://github.com/truonghuuphuc
+ Email: phuctruong2k@gmail.com
+ ... | VULNERABLE: SQL injection vulnerability exists in CuppaCMS “/administrator/components/table_manager/" via the ‘search_word’ parameters. | https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/13/comments | 1 | 2022-01-03T11:13:24Z | 2022-02-03T17:49:23Z | https://github.com/CuppaCMS/CuppaCMS/issues/13 | 1,092,421,818 | 13 | 3,163 |
CVE-2022-24265 | 2022-01-31T22:15:07.827 | Cuppa CMS v1.0 was discovered to contain a SQL injection vulnerability in /administrator/components/menu/ via the path=component/menu/&menu_filter=3 parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "COMPLETE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CuppaCMS/CuppaCMS/issues/14"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/truonghuuphuc/CVE"
},
{
"so... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"89"
] | 89 | https://github.com/CuppaCMS/CuppaCMS/issues/14 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CuppaCMS",
"CuppaCMS"
] | + VULNERABLE: SQL injection vulnerability exists in CuppaCMS. An attacker can inject query in
“/administrator/components/menu/" via the ‘path=component/menu/&menu_filter=3’ parameters.
+ Date: 4/1/2022
+ Exploit Author: Trương Hữu Phúc
+ Contact me:
+ Github: https://github.com/truonghuuphuc
+ Email: phuctruong2k... | SQL injection vulnerability exists in CuppaCMS /administrator/components/menu/ | https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/14/comments | 0 | 2022-01-04T10:07:38Z | 2022-01-29T01:26:08Z | https://github.com/CuppaCMS/CuppaCMS/issues/14 | 1,093,195,882 | 14 | 3,164 |
CVE-2022-24266 | 2022-01-31T22:15:07.880 | Cuppa CMS v1.0 was discovered to contain a SQL injection vulnerability in /administrator/components/table_manager/ via the order_by parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "COMPLETE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/CuppaCMS/CuppaCMS/issues/17"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/truonghuuphuc/CVE"
},
{
"source": "af854a3a-... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"89"
] | 89 | https://github.com/CuppaCMS/CuppaCMS/issues/17 | [
"Third Party Advisory"
] | github.com | [
"CuppaCMS",
"CuppaCMS"
] | + VULNERABLE: SQL injection vulnerability exists in CuppaCMS. An attacker can inject query in
“/administrator/components/table_manager/" via the ‘order_by’ parameters.
+ Date: 6/1/2022
+ Exploit Author: Trương Hữu Phúc
+ Contact me:
+ Github: https://github.com/truonghuuphuc
+ Facebook: https://www.facebook.com/D... | Time-based SQL Injection | https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/17/comments | 0 | 2022-01-06T15:19:45Z | 2022-01-29T01:26:45Z | https://github.com/CuppaCMS/CuppaCMS/issues/17 | 1,095,419,505 | 17 | 3,165 |
CVE-2020-8562 | 2022-02-01T11:15:10.903 | As mitigations to a report from 2019 and CVE-2020-8555, Kubernetes attempts to prevent proxied connections from accessing link-local or localhost networks when making user-driven connections to Services, Pods, Nodes, or StorageClass service providers. As part of this mitigation Kubernetes does a DNS name resolution che... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "PARTIAL"... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/101493"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List",
"Third Party Advisory"
],... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7BE1AD99-F12A-4F6E-8EA5-578F32A1F15F",
"versionEndExcluding": null,
"versionEndIncluding": "1.18.18",
"versionStar... | [
"367"
] | 367 | https://github.com/kubernetes/kubernetes/issues/101493 | [
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: **Low** ([CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N))
A security issue was discovered in Kubernetes where an authorized user may be able to access private networks on the Kubernetes control plane components. Kuber... | CVE-2020-8562: Bypass of Kubernetes API Server proxy TOCTOU | https://api.github.com/repos/kubernetes/kubernetes/issues/101493/comments | 16 | 2021-04-26T19:18:04Z | 2024-08-07T19:47:47Z | https://github.com/kubernetes/kubernetes/issues/101493 | 868,051,410 | 101,493 | 3,166 |
CVE-2022-23596 | 2022-02-01T12:15:08.257 | Junrar is an open source java RAR archive library. In affected versions A carefully crafted RAR archive can trigger an infinite loop while extracting said archive. The impact depends solely on how the application uses the library, and whether files can be provided by malignant users. The problem is patched in 7.4.1. Th... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/junrar/junrar/commit/7b16b3d90b91445fd6af0adfed22c07413d4fab7"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Issue Tracki... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:junrar_project:junrar:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EB985B41-1018-4112-90D3-01036942F48B",
"versionEndExcluding": "7.4.1",
"versionEndIncluding": null,
"versionStartE... | [
"835"
] | 835 | https://github.com/junrar/junrar/issues/73 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"junrar",
"junrar"
] | **Describe the bug**
A carefully crafted RAR archive can trigger an infinite loop while parsing the file. This could be used to mount a denial of service attack against services that use junrar.
**To Reproduce**
```
String encodedString = "UmFyIRoHAM+Qcw4AAAAAKgAAAAAXF3QggE4ASwEAACICAAADZXUl9710qkIdNC4ApIEAAF9fTU... | [BUG]A carefully crafted RAR archive can trigger an infinite loop while parsing. | https://api.github.com/repos/junrar/junrar/issues/73/comments | 10 | 2022-01-27T03:29:04Z | 2022-03-25T01:33:31Z | https://github.com/junrar/junrar/issues/73 | 1,115,731,408 | 73 | 3,167 |
CVE-2021-41571 | 2022-02-01T13:15:09.663 | In Apache Pulsar it is possible to access data from BookKeeper that does not belong to the topics accessible by the authenticated user. The Admin API get-message-by-id requires the user to input a topic and a ledger id. The ledger id is a pointer to the data, and it is supposed to be a valid it for the topic. Authorisa... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "security@apache.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/apache/pulsar/issues/11814"
},
{
"source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
],... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:pulsar:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E7316A0A-1852-4DD2-926A-06FEA7D1D2FA",
"versionEndExcluding": "2.6.4",
"versionEndIncluding": null,
"versionStartExcluding... | [
"863"
] | 863 | https://github.com/apache/pulsar/issues/11814 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"apache",
"pulsar"
] | 
| [Pulsar admin] admin command 'get-message-by-id' can get message by messageId regardless of topic name | https://api.github.com/repos/apache/pulsar/issues/11814/comments | 10 | 2021-08-27T07:58:36Z | 2021-09-08T19:04:55Z | https://github.com/apache/pulsar/issues/11814 | 980,981,768 | 11,814 | 3,168 |
CVE-2022-24223 | 2022-02-01T19:15:07.840 | AtomCMS v2.0 was discovered to contain a SQL injection vulnerability via /admin/login.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/165922/Atom-CMS-2.0-SQL-Injection.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thedigitalcraft:atomcms:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8949C5AC-7D10-43A8-929D-B6FCFE9F2DC7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"89"
] | 89 | https://github.com/thedigicraft/Atom.CMS/issues/255 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"thedigicraft",
"Atom.CMS"
] | In /admin/login.php:
`<?php
.....
if($_POST) {
$q = "SELECT * FROM users WHERE email = '$_POST[email]' AND password = SHA1('$_POST[password]')";
$r = mysqli_query($dbc, $q);
.....
?>`
When logging in at the background, you can log in at the background with the wrong password and account by the method of p... | Sql Injection in /admin/login.php | https://api.github.com/repos/thedigicraft/Atom.CMS/issues/255/comments | 6 | 2022-01-28T11:37:41Z | 2022-12-22T21:15:43Z | https://github.com/thedigicraft/Atom.CMS/issues/255 | 1,117,305,691 | 255 | 3,169 |
CVE-2020-26208 | 2022-02-02T12:15:07.783 | JHEAD is a simple command line tool for displaying and some manipulation of EXIF header data embedded in Jpeg images from digital cameras. In affected versions there is a heap-buffer-overflow on jhead-3.04/jpgfile.c:285 ReadJpegSections. Crafted jpeg images can be provided to the user resulting in a program crash or po... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PART... | [
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900821"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jhead_project:jhead:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F4043AC5-DC93-4FE4-8675-6AB0B60A385C",
"versionEndExcluding": "3.04",
"versionEndIncluding": null,
"versionStartExcl... | [
"787"
] | 787 | https://github.com/Matthias-Wandel/jhead/issues/7 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"Matthias-Wandel",
"jhead"
] |
poc:https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900821/+attachment/5424955/+files/poc%20%282%29
```
fstark@fstark-virtual-machine:~/jhead$ ./jhead fuzz1\:id\:000015\,sig\:06\,src\:000476\,time\:412880\,op\:arith8\,pos\:31\,val\:+29
=================================================================
==957=... | heap-buffer-overflow on jhead-3.04/jpgfile.c:285 ReadJpegSections | https://api.github.com/repos/Matthias-Wandel/jhead/issues/7/comments | 3 | 2020-10-22T09:49:38Z | 2020-10-23T13:18:57Z | https://github.com/Matthias-Wandel/jhead/issues/7 | 727,231,481 | 7 | 3,170 |
CVE-2021-44866 | 2022-02-03T14:15:07.903 | An issue was discovered in Online-Movie-Ticket-Booking-System 1.0. The file about.php does not perform input validation on the 'id' paramter. An attacker can append SQL queries to the input to extract sensitive information from the database. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/projectworldsofficial/Online-Movie-Ticket-Booking-System-in-php/issues/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exp... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:projectworlds:online_movie_ticket_booking_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C5DE67C1-6787-49CD-8DFA-3747E0DCF7AF",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/projectworldsofficial/Online-Movie-Ticket-Booking-System-in-php/issues/6 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"projectworldsofficial",
"Online-Movie-Ticket-Booking-System-in-php"
] | Hey,I think there is a SQL Injection vulnerability in this system.
The file about.php does not perform input validation on the 'id' paramter. So An attacker can append SQL queries to the input to extract sensitive information from the database.
1.Navigate to the about page:
Example:http://172.16.180.135:8022/about.p... | SQL Injection vulnerability via the "id" parameter in about.php | https://api.github.com/repos/projectworldsofficial/Online-Movie-Ticket-Booking-System-in-php/issues/6/comments | 0 | 2021-12-06T08:59:58Z | 2021-12-06T08:59:58Z | https://github.com/projectworldsofficial/Online-Movie-Ticket-Booking-System-in-php/issues/6 | 1,071,892,369 | 6 | 3,171 |
CVE-2022-23316 | 2022-02-04T12:15:07.673 | An issue was discovered in taoCMS v3.0.2. There is an arbitrary file read vulnerability that can read any files via admin.php?action=file&ctrl=download&path=../../1.txt. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/taogogo/taocms/issues/15"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.co... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"552"
] | 552 | https://github.com/taogogo/taocms/issues/15 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"taogogo",
"taocms"
] | # analysis
The location of the vulnerability is line 55 in \taocms\include\Model\File.php and we can see that the path parameter is passed directly to file_get_contents function without filtering


Let's click "file management" on the left:

Then use Bur... | There is a Arbitrary file download attack at " File Management column"(administrator authority) | https://api.github.com/repos/taogogo/taocms/issues/10/comments | 0 | 2021-12-10T02:25:30Z | 2021-12-10T02:25:30Z | https://github.com/taogogo/taocms/issues/10 | 1,076,352,526 | 10 | 3,173 |
CVE-2021-43635 | 2022-02-04T18:15:07.287 | A Cross Site Scripting (XSS) vulnerability exists in Codex before 1.4.0 via Notebook/Page name field, which allows malicious users to execute arbitrary code via a crafted http code in a .json file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://github.com/jcv8000/Codex"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jcv8000/Codex/issues/8"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codex_project:codex:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A43C505F-D811-4731-880F-45CDDAC636AF",
"versionEndExcluding": "1.4.0",
"versionEndIncluding": null,
"versionStartExc... | [
"79"
] | 79 | https://github.com/jcv8000/Codex/issues/8 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"jcv8000",
"Codex"
] | ### Issue
Cross-site scripting(XSS) on Codex Notebook/Page name lead to code execution.
### Reproduction
1. Open Codex
2. Create new Notebook
3. Insert payload on the Notebook(or page) name field
On Mac
`<a href=x onmouseover="require('electron').shell.openExternal('file:///System/Applications/Calculator.app')... | Code Execution vulnerability on Codex | https://api.github.com/repos/jcv8000/Codex/issues/8/comments | 1 | 2021-09-10T09:06:09Z | 2021-09-10T23:06:32Z | https://github.com/jcv8000/Codex/issues/8 | 993,038,886 | 8 | 3,174 |
CVE-2021-45429 | 2022-02-04T19:15:08.060 | A Buffer Overflow vulnerablity exists in VirusTotal YARA git commit: 605b2edf07ed8eb9a2c61ba22eb2e7c362f47ba7 via yr_set_configuration in yara/libyara/libyara.c, which could cause a Denial of Service. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/VirusTotal/yara/issues/1616"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:virustotal:yara:*:*:*:*:*:*:*:*",
"matchCriteriaId": "98D52101-1922-43B6-877D-A0AE6213E8F3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"120"
] | 120 | https://github.com/VirusTotal/yara/issues/1616 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"VirusTotal",
"yara"
] | version: master (commit https://github.com/VirusTotal/yara/commit/822e532c64759240b51ce8e439960ae4e90b71f0)
command: yara $FILE strings
PoC is a file that can contain any string, such as "hello". Here is the trace reported by ASAN:
```
root@d8a714203f6e:/path_to_yara/bin# ./yara PoC strings
=======================... | Possible insecure pointer conversion in yr_set_configuration() leading to global-buffer-overflow | https://api.github.com/repos/VirusTotal/yara/issues/1616/comments | 3 | 2021-12-15T18:01:26Z | 2021-12-20T09:31:28Z | https://github.com/VirusTotal/yara/issues/1616 | 1,081,328,626 | 1,616 | 3,175 |
CVE-2022-24249 | 2022-02-04T19:15:08.100 | A Null Pointer Dereference vulnerability exists in GPAC 1.1.0 via the xtra_box_write function in /box_code_base.c, which causes a Denial of Service. This vulnerability was fixed in commit 71f9871. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2081"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CCC969A1-3F88-40F5-B4A1-54DA05DF081E",
"versionEndExcluding": "2.0.0",
"versionEndIncluding": null,
"versionStartExcluding": n... | [
"476"
] | 476 | https://github.com/gpac/gpac/issues/2081 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | **version info**:
```
MP4Box - GPAC version 1.1.0-DEV-rev1678-g92faba3-master
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --prefix=/path_to_gpac/build --enable-debug --enable-sanitizer
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF G... | Null Pointer Dereference when dealing with XtraBox | https://api.github.com/repos/gpac/gpac/issues/2081/comments | 0 | 2022-01-28T10:38:34Z | 2022-01-28T16:00:46Z | https://github.com/gpac/gpac/issues/2081 | 1,117,248,312 | 2,081 | 3,176 |
CVE-2022-23562 | 2022-02-04T23:15:13.843 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `Range` suffers from integer overflows. These can trigger undefined behavior or, in some scenarios, extremely large allocations. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlo... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/f0147751fd5d2ff23251149ebad9af9f03010732"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "688150BF-477C-48FC-9AEF-A79AC57A6DDC",
"versionEndExcluding": null,
"versionEndIncluding": "2.5.2",
"versionStartExclu... | [
"190"
] | 190 | https://github.com/tensorflow/tensorflow/issues/52676 | [
"Third Party Advisory"
] | github.com | [
"tensorflow",
"tensorflow"
] | <em>Please make sure that this is a bug. As per our
[GitHub Policy](https://github.com/tensorflow/tensorflow/blob/master/ISSUES.md),
we only address code/doc bugs, performance issues, feature requests and
build/installation issues on GitHub. tag:bug_template</em>
**System information**
- Have I written custom co... | Undefined behaviour in Range | https://api.github.com/repos/tensorflow/tensorflow/issues/52676/comments | 3 | 2021-10-26T11:38:05Z | 2021-12-17T03:28:10Z | https://github.com/tensorflow/tensorflow/issues/52676 | 1,036,189,142 | 52,676 | 3,177 |
CVE-2021-44956 | 2022-02-08T15:15:07.643 | Two Heap based buffer overflow vulnerabilities exist in ffjpeg through 01.01.2021. It is similar to CVE-2020-23852. Issues that are in the jfif_decode function at ffjpeg/src/jfif.c (line 552) could cause a Denial of Service by using a crafted jpeg file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/rockcarry/ffjpeg/issues/43"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FC5B8CBB-E98C-4585-BE42-32D0114A7F48",
"versionEndExcluding": null,
"versionEndIncluding": "2021-01-01",
"versionStartE... | [
"787"
] | 787 | https://github.com/rockcarry/ffjpeg/issues/43 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"rockcarry",
"ffjpeg"
] | **Describe**
Two Heap-buffer-overflows were discovered in ffjpeg. The issues are being triggered in function jfif_decode at jfif.c:552:31 and 552:38.
Found by **Cem Onat Karagun of Diesec**
**System info**
OS version : Ubuntu 21.04
ffjpeg Version : master [0fa4cf8a86](https://github.com/rockcarry/ffjpeg/commit... | Heap-buffer-overflows in jfif_decode() at jfif.c:552:31 and 552:38 | https://api.github.com/repos/rockcarry/ffjpeg/issues/43/comments | 1 | 2021-06-23T19:48:31Z | 2021-12-07T20:05:06Z | https://github.com/rockcarry/ffjpeg/issues/43 | 928,585,823 | 43 | 3,178 |
CVE-2021-44957 | 2022-02-08T15:15:07.687 | Global buffer overflow vulnerability exist in ffjpeg through 01.01.2021. It is similar to CVE-2020-23705. Issue is in the jfif_encode function at ffjpeg/src/jfif.c (line 708) could cause a Denial of Service by using a crafted jpeg file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/rockcarry/ffjpeg/issues/44"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FC5B8CBB-E98C-4585-BE42-32D0114A7F48",
"versionEndExcluding": null,
"versionEndIncluding": "2021-01-01",
"versionStartE... | [
"120"
] | 120 | https://github.com/rockcarry/ffjpeg/issues/44 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"rockcarry",
"ffjpeg"
] | **Describe**
A global-buffer-overflow was discovered in ffjpeg. The issue is being triggered in function jfif_encode at jfif.c:708.
Found by **Cem Onat Karagun of Diesec**
**System info**
OS version : Ubuntu 21.04
ffjpeg Version : master([0fa4cf8a86](https://github.com/rockcarry/ffjpeg/commit/0fa4cf8a86d7f23))... | global-buffer-overflow in function jfif_encode at jfif.c:708 | https://api.github.com/repos/rockcarry/ffjpeg/issues/44/comments | 4 | 2021-06-23T19:51:49Z | 2021-12-07T20:05:15Z | https://github.com/rockcarry/ffjpeg/issues/44 | 928,587,983 | 44 | 3,179 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.