cve_id stringlengths 13 16 | cve_published stringdate 2019-01-01 16:29:00 2025-02-25 20:15:37 | cve_descriptions stringlengths 34 2.6k | cve_metrics dict | cve_references listlengths 1 281 | cve_configurations listlengths 1 70 | cve_cwe_list listlengths 1 1 | cve_primary_cwe stringclasses 164
values | url stringlengths 36 97 | cve_tags listlengths 1 5 ⌀ | domain stringclasses 1
value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 198k ⌀ | issue_title stringlengths 1 335 | issue_comments_url stringlengths 55 116 | issue_comments_count int64 0 338 | issue_created_at stringdate 2012-06-06 09:34:24 2025-04-02 09:37:20 | issue_updated_at stringdate 2014-04-01 20:16:21 2025-06-16 12:26:58 | issue_html_url stringlengths 36 97 | issue_github_id int64 4.93M 2.97B | issue_number int64 1 199k | __index_level_0__ int64 0 6.55k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2021-45326 | 2022-02-08T15:15:07.767 | Cross Site Request Forgery (CSRF) vulnerability exists in Gitea before 1.5.2 via API routes.This can be dangerous especially with state altering POST requests. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://blog.gitea.io/2018/10/gitea-1.5.2-is-released/"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/go... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gitea:gitea:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C6BA0450-9E23-485E-8E8D-DABAAB75F206",
"versionEndExcluding": "1.5.2",
"versionEndIncluding": null,
"versionStartExcluding":... | [
"352"
] | 352 | https://github.com/go-gitea/gitea/issues/4838 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"go-gitea",
"gitea"
] | # The Vulnerabilities on GET Routes
For historical reasons some GET routes in Gitea do more than getting info and actually change state, for example /user/logout, and GET routes with action/:action in it. Current CSRF handler only checks POST routes, and thus leaves those GET routes vulnerable.
One particular ro... | [Proposal] CSRF checks on GET routes | https://api.github.com/repos/go-gitea/gitea/issues/4838/comments | 24 | 2018-09-01T00:19:24Z | 2020-11-24T00:06:48Z | https://github.com/go-gitea/gitea/issues/4838 | 356,154,901 | 4,838 | 3,180 |
CVE-2021-45328 | 2022-02-08T16:15:07.413 | Gitea before 1.4.3 is affected by URL Redirection to Untrusted Site ('Open Redirect') via internal URLs. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://blog.gitea.io/2018/06/release-of-1.4.3/"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/go-gitea/gitea/issues/4332"
},... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gitea:gitea:*:*:*:*:*:*:*:*",
"matchCriteriaId": "117B5786-635D-4D65-BE40-971E8B147C47",
"versionEndExcluding": "1.4.3",
"versionEndIncluding": null,
"versionStartExcluding":... | [
"601"
] | 601 | https://github.com/go-gitea/gitea/issues/4332 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"go-gitea",
"gitea"
] | <!--
1. Please speak English, this is the language all of us can speak and write.
2. Please ask questions or configuration/deploy problems on our Discord
server (https://discord.gg/NsatcWJ) or forum (https://discourse.gitea.io).
3. Please take a moment to check that your issue doesn't already ex... | Open Redirect vulnerability on internal links | https://api.github.com/repos/go-gitea/gitea/issues/4332/comments | 1 | 2018-06-28T14:02:25Z | 2020-11-24T01:58:06Z | https://github.com/go-gitea/gitea/issues/4332 | 336,635,224 | 4,332 | 3,181 |
CVE-2022-24676 | 2022-02-09T00:15:07.477 | update_code in Admin.php in HYBBS2 through 2.3.2 allows arbitrary file upload via a crafted ZIP archive. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/hyyyp/HYBBS2/issues/33"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hyphp:hybbs2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EB71B302-CAF8-495C-92E9-E3AEE02CB6DF",
"versionEndExcluding": "2.3.3",
"versionEndIncluding": null,
"versionStartExcluding"... | [
"434"
] | 434 | https://github.com/hyyyp/HYBBS2/issues/33 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"hyyyp",
"HYBBS2"
] | # There is an arbitrary file upload vulnerability in the HYBBS upload plugin function
## Vulnerability overview
There is an arbitrary file upload vulnerability in the upload plugin function of the HYBBS management background, which can lead to server permissions.
## Vulnerability scope
All versions prior to... | There is an arbitrary file upload vulnerability in the HYBBS upload plugin function | https://api.github.com/repos/hyyyp/HYBBS2/issues/33/comments | 1 | 2022-02-07T10:08:23Z | 2022-02-26T09:12:30Z | https://github.com/hyyyp/HYBBS2/issues/33 | 1,125,771,754 | 33 | 3,182 |
CVE-2021-46354 | 2022-02-09T14:15:07.793 | Thinfinity VirtualUI 2.1.28.0, 2.1.32.1 and 2.5.26.2, fixed in version 3.0 is affected by an information disclosure vulnerability in the parameter "Addr" in cmd site. The ability to send requests to other systems can allow the vulnerable server to filtrate the real IP of the web server or increase the attack surface. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/166069/Thinfinity-VirtualUI-2.5.26.2-Information-Disclosure.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "ht... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cybelesoft:thinfinity_virtualui:2.1.28.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E24716C8-13B0-4431-8BD4-45B9557333D7",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"668"
] | 668 | https://github.com/cybelesoft/virtualui/issues/3 | [
"Third Party Advisory"
] | github.com | [
"cybelesoft",
"virtualui"
] | Dear Cybele Software,
My name is Daniel Morales.
I have found a vulnerability in Thinfinity VirtualUI that could allow a malicious actor to trigger a server-side request to external endpoints.
### Summary
External service interaction arises when it is possible to induce an application to interact with an arbi... | Vulnerability - External Service Interaction | https://api.github.com/repos/cybelesoft/virtualui/issues/3/comments | 1 | 2022-01-11T11:40:02Z | 2022-02-01T22:23:04Z | https://github.com/cybelesoft/virtualui/issues/3 | 1,099,046,708 | 3 | 3,183 |
CVE-2021-44911 | 2022-02-09T16:15:14.260 | XE before 1.11.6 is vulnerable to Unrestricted file upload via modules/menu/menu.admin.controller.php. When uploading the Mouse over button and When selected button, there is no restriction on the file suffix, which leads to any file uploading to the files directory. Since .htaccess only restricts the PHP type, uploadi... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/xpressengine/xe-core/issues/2434"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xpressengine:xpressengine:*:*:*:*:*:*:*:*",
"matchCriteriaId": "35C2B095-1B22-40E7-97C1-23D48EA1AF29",
"versionEndExcluding": "1.11.6",
"versionEndIncluding": null,
"versionS... | [
"79"
] | 79 | https://github.com/xpressengine/xe-core/issues/2434 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"xpressengine",
"xe-core"
] | Affected version: XE before 1.11.6.
Vulnerable file: modules/menu/menu.admin.controller.php. #menu_hover_btn menu_active_btn
Causes of vulnerability:

When uploading the Mouse over button... | Unrestricted file upload vulnerability in Latest Release 3.3.16 | https://api.github.com/repos/xpressengine/xe-core/issues/2434/comments | 0 | 2021-12-08T00:38:20Z | 2022-01-10T09:21:07Z | https://github.com/xpressengine/xe-core/issues/2434 | 1,073,882,107 | 2,434 | 3,184 |
CVE-2021-44912 | 2022-02-09T16:15:14.300 | In XE 1.116, when uploading the Normal button, there is no restriction on the file suffix, which leads to any file uploading to the files directory. Since .htaccess only restricts the PHP type, uploading HTML-type files leads to stored XSS vulnerabilities. If the .htaccess configuration is improper, for example before ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/xpressengine/xe-core/issues/2433"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Th... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xpressengine:xpressengine:*:*:*:*:*:*:*:*",
"matchCriteriaId": "35C2B095-1B22-40E7-97C1-23D48EA1AF29",
"versionEndExcluding": "1.11.6",
"versionEndIncluding": null,
"versionS... | [
"79"
] | 79 | https://github.com/xpressengine/xe-core/issues/2433 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"xpressengine",
"xe-core"
] | Affected version: XE before 1.11.6.
Vulnerable file: modules/menu/menu.admin.controller.php. #menu_normal_btn
Causes of vulnerability:

When uploading the Normal button, there is no restric... | Unrestricted file upload vulnerability in Latest Release 3.3.16 /index.php?module=admin&act=dispMenuAdminSiteMap | https://api.github.com/repos/xpressengine/xe-core/issues/2433/comments | 0 | 2021-12-08T00:36:19Z | 2022-01-10T09:27:20Z | https://github.com/xpressengine/xe-core/issues/2433 | 1,073,880,895 | 2,433 | 3,185 |
CVE-2021-45330 | 2022-02-09T18:15:09.970 | An issue exsits in Gitea through 1.15.7, which could let a malicious user gain privileges due to client side cookies not being deleted and the session remains valid on the server side for reuse. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/go-gitea/gitea/issues/4336"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "h... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gitea:gitea:*:*:*:*:*:*:*:*",
"matchCriteriaId": "75A73D91-9EDD-467B-AA77-B8C21F0946BE",
"versionEndExcluding": null,
"versionEndIncluding": "1.15.7",
"versionStartExcluding"... | [
"459"
] | 459 | https://github.com/go-gitea/gitea/issues/4336 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"go-gitea",
"gitea"
] | <!--
1. Please speak English, this is the language all of us can speak and write.
2. Please ask questions or configuration/deploy problems on our Discord
server (https://discord.gg/NsatcWJ) or forum (https://discourse.gitea.io).
3. Please take a moment to check that your issue doesn't already ex... | [Security] Log out only deletes browser cookies | https://api.github.com/repos/go-gitea/gitea/issues/4336/comments | 2 | 2018-06-28T15:28:30Z | 2022-04-28T18:03:17Z | https://github.com/go-gitea/gitea/issues/4336 | 336,670,906 | 4,336 | 3,186 |
CVE-2022-0534 | 2022-02-09T23:15:16.767 | A vulnerability was found in htmldoc version 1.9.15 where the stack out-of-bounds read takes place in gif_get_code() and occurs when opening a malicious GIF file, which can result in a crash (segmentation fault). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "patrick@puiterwijk.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/michaelrsweet/htmldoc/commit/312f0f9c12f26fbe015cd0e6cefa40e4b99017d9"
},
{
"source": "patrick@puiterwijk.org",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:htmldoc_project:htmldoc:1.9.15:*:*:*:*:*:*:*",
"matchCriteriaId": "7FA48CA3-3C4E-46CA-8B5E-FDBF99FDD55F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"125"
] | 125 | https://github.com/michaelrsweet/htmldoc/issues/463 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"michaelrsweet",
"htmldoc"
] | In `gif_get_code()`, in [image.cxx](https://github.com/michaelrsweet/htmldoc/blob/master/htmldoc/image.cxx), there is a stack out-of-bounds read in the following code:
```C
267 curbit = (curbit - lastbit) + 8 * last_byte;
268 last_byte += (unsigned)count;
269 lastbit = last_byte * 8;
270 }
271
2... | Stack out-of-bounds read in gif_get_code() | https://api.github.com/repos/michaelrsweet/htmldoc/issues/463/comments | 5 | 2022-01-07T14:45:56Z | 2022-01-10T14:42:46Z | https://github.com/michaelrsweet/htmldoc/issues/463 | 1,096,381,389 | 463 | 3,187 |
CVE-2022-23047 | 2022-02-09T23:15:19.530 | Exponent CMS 2.6.0patch2 allows an authenticated admin user to inject persistent JavaScript code inside the "Site/Organization Name","Site Title" and "Site Header" parameters while updating the site settings on "/exponentcms/administration/configure_site" | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "help@fluidattacks.com",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://exponentcms.lighthouseapp.com/projects/61783/tickets/1459"
},
{
"source": "help@fluidattacks.com",
"tags": [
"Exploit",
"Issue Tracking",
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.6.0:patch2:*:*:*:*:*:*",
"matchCriteriaId": "5A643ED1-5F73-4CDE-A28A-D321EFCAC2F5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"79"
] | 79 | https://github.com/exponentcms/exponent-cms/issues/1546 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"exponentcms",
"exponent-cms"
] | I reported 3 vulnerabilities on Exponent 2.6.0 (patch2) using https://exponentcms.lighthouseapp.com/ but i didn't receive any update.
Attached below are the links to the tickets, advisories and our responsible disclosure policy respectively.
- [Ticket Stored XSS (Settings)](https://exponentcms.lighthouseapp.com/p... | Exponent-CMS Security Issues | https://api.github.com/repos/exponentcms/exponent-cms/issues/1546/comments | 2 | 2022-01-28T13:28:27Z | 2022-02-13T01:28:49Z | https://github.com/exponentcms/exponent-cms/issues/1546 | 1,117,406,764 | 1,546 | 3,188 |
CVE-2021-45357 | 2022-02-10T18:15:08.383 | Cross Site Scripting (XSS) vulnerability exists in Piwigo 12.x via the pwg_activity function in include/functions.inc.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Piwigo/Piwigo/issues/1582"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Par... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BDC77171-712D-461F-83B8-953EB077F285",
"versionEndExcluding": null,
"versionEndIncluding": "12.1.0",
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/Piwigo/Piwigo/issues/1582 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Piwigo",
"Piwigo"
] | I found that piwigo Front-End can trigger xss,it means when the system administrator can trigger xss after logging into the backend
Please see below for details of the analysis
at first,We found a global filter in `include/common.inc.php`
 vulnerability via the Management Column component. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/taogogo/taocms/issues/9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"79"
] | 79 | https://github.com/taogogo/taocms/issues/9 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"taogogo",
"taocms"
] | First, we enter the background and use the column administrator admin we created:

Let's click "add article" on the left:
 | https://api.github.com/repos/taogogo/taocms/issues/9/comments | 0 | 2021-12-09T12:19:43Z | 2021-12-09T12:21:34Z | https://github.com/taogogo/taocms/issues/9 | 1,075,509,639 | 9 | 3,190 |
CVE-2021-44970 | 2022-02-10T23:15:07.997 | MiniCMS v1.11 was discovered to contain a cross-site scripting (XSS) vulnerability via /mc-admin/page-edit.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/bg5sbk/MiniCMS/issues/43"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1234n:minicms:1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "EFF126BA-FB8A-4D2A-8B51-D19BF0F8C301",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"79"
] | 79 | https://github.com/bg5sbk/MiniCMS/issues/43 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"bg5sbk",
"MiniCMS"
] | First , Click to enter the creation page

Then, enter XSS payload in the content bar and Remember to choose publish

Intercept contact info and save contents into a text file(1.txt).

Run SQLmap
```
py... | VULNERABLE: SQL Injection exists in Hospital-Management-System. An attacker can inject query in “/Hospital-Management-System-master/contact.php" via the ‘txtMsg’ parameters. | https://api.github.com/repos/kishan0725/Hospital-Management-System/issues/18/comments | 1 | 2022-02-05T12:14:10Z | 2022-02-11T02:56:44Z | https://github.com/kishan0725/Hospital-Management-System/issues/18 | 1,124,915,004 | 18 | 3,192 |
CVE-2022-24647 | 2022-02-10T23:15:08.083 | Cuppa CMS v1.0 was discovered to contain an arbitrary file deletion vulnerability via the unlink() function. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.5,
"confidentialityImpact": "NONE"... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/CuppaCMS/CuppaCMS/issues/23"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third P... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"22"
] | 22 | https://github.com/CuppaCMS/CuppaCMS/issues/23 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"CuppaCMS",
"CuppaCMS"
] | Vulnerability Name: Multiple Arbitrary File Deletion
Date of Discovery: 06 Feb 2022
Product version:cuppaCMS v1.0[Download link](http://cuppacms.com/files/cuppa_cms.zip)
Author: lyy
Vulnerability Description: When unsanitized user input is supplied to a file deletion function, an arbitrary file deletion vul... | Multiple Unauthorized Arbitrary File Deletion vulnerabilities | https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/23/comments | 0 | 2022-02-05T17:14:57Z | 2022-02-05T17:17:36Z | https://github.com/CuppaCMS/CuppaCMS/issues/23 | 1,124,983,447 | 23 | 3,193 |
CVE-2020-36062 | 2022-02-11T16:15:08.557 | Dairy Farm Shop Management System v1.0 was discovered to contain hardcoded credentials in the source code which allows attackers access to the control panel if compromised. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/VivekPanday12/CVE-/issues/3"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://phpgurukul.com"
},
{
"source": "cve@mi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:phpgurukul:dairy_farm_shop_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6772CE9E-56D7-4CC7-9E1A-97E740D2D000",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"798"
] | 798 | https://github.com/VivekPanday12/CVE-/issues/3 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"VivekPanday12",
"CVE-"
] | Exploit Title: Dairy Farm Shop Management System — Use of Hard-coded Credentials in Source Code Leads to Admin Panel Access
# Date: 2020–12-25
# Exploit Author: VIVEK PANDAY
# Vendor Homepage: https://phpgurukul.com/
# Software Link: https://phpgurukul.com/dairy-farm-shop-management-system-using-php-and-mysql... | CVE:2020-36062 Dairy Farm Shop Management System — Use of Hard-coded Credentials in Source Code Leads to Admin Panel Access | https://api.github.com/repos/VivekPanday12/CVE-/issues/3/comments | 0 | 2022-01-23T14:55:24Z | 2022-01-23T14:55:24Z | https://github.com/VivekPanday12/CVE-/issues/3 | 1,111,893,238 | 3 | 3,194 |
CVE-2021-45385 | 2022-02-11T16:15:08.793 | A Null Pointer Dereference vulnerability exits in ffjpeg d5cfd49 (2021-12-06) in bmp_load(). When the size information in metadata of the bmp is out of range, it returns without assign memory buffer to `pb->pdata` and did not exit the program. So the program crashes when it tries to access the pb->data, in jfif_encode(... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/rockcarry/ffjpeg/issues/47"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rockcarry:ffjpeg:2021-12-06:*:*:*:*:*:*:*",
"matchCriteriaId": "A3438805-CAF0-41AE-BC2A-3A11A252D8E6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"476"
] | 476 | https://github.com/rockcarry/ffjpeg/issues/47 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"rockcarry",
"ffjpeg"
] | This segment fault error is because in `bmp_load()`, when bmp's size is out of range, it returns without assign memory buffer to `pb->pdata` and did not exit the program.
So the program crashes when it tries to access the `pb->data`, which is a invalid memory address.
## Test Environment
Ubuntu 16.04, 64bit
ff... | SEGV in jfif_encode() at jfif.c:763 | https://api.github.com/repos/rockcarry/ffjpeg/issues/47/comments | 0 | 2021-12-16T03:01:01Z | 2021-12-16T06:59:43Z | https://github.com/rockcarry/ffjpeg/issues/47 | 1,081,716,774 | 47 | 3,195 |
CVE-2021-45386 | 2022-02-11T17:15:08.090 | tcpreplay 4.3.4 has a Reachable Assertion in add_tree_ipv6() at tree.c | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/appneta/tcpreplay/issues/687"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:broadcom:tcpreplay:4.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "ED1DFB55-CDDC-476C-98B4-F8E2D3F4E1E9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"617"
] | 617 | https://github.com/appneta/tcpreplay/issues/687 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"appneta",
"tcpreplay"
] | **Describe the bug**
There are two reachable assertions in add_tree_ipv4() (tree.c:538) and add_tree_ipv6() (tree.c:561) when the user uses tcpprep to open a crafted pcap file.
**To Reproduce**
Steps to reproduce the behavior:
1. get the tcpreplay source code (master 0ca82e3) and build it
2. run the cmd: `$ tcpp... | [Bug] Two reachable assertions in add_tree_ipv4() and add_tree_ipv6() | https://api.github.com/repos/appneta/tcpreplay/issues/687/comments | 1 | 2021-12-17T07:24:34Z | 2022-01-25T17:41:33Z | https://github.com/appneta/tcpreplay/issues/687 | 1,082,964,158 | 687 | 3,196 |
CVE-2021-44111 | 2022-02-11T18:15:10.747 | A Directory Traversal vulnerability exists in S-Cart 6.7 via download in sc-admin/backup. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/s-cart/s-cart/issues/102"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:s-cart:s-cart:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F9EFE488-A72C-4245-BA4B-577C84851334",
"versionEndExcluding": "6.7.2",
"versionEndIncluding": null,
"versionStartExcluding... | [
"22"
] | 22 | https://github.com/s-cart/s-cart/issues/102 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"s-cart",
"s-cart"
] | **Describe the bug**
cod in vendor/s-cart/core/src/Admin/Controllers/AdminBackupController.php
```
$download = request('download') ?? '';
if ($download) {
$file = storage_path() . "/backups/" . $download;
if (file_exists($file)) {
$headers = array(
'Content-... | A bug that leads to Arbitrary file download | https://api.github.com/repos/s-cart/s-cart/issues/102/comments | 1 | 2021-11-17T08:46:35Z | 2021-11-17T22:28:10Z | https://github.com/s-cart/s-cart/issues/102 | 1,055,860,989 | 102 | 3,197 |
CVE-2021-46371 | 2022-02-14T16:15:07.747 | antd-admin 5.5.0 is affected by an incorrect access control vulnerability. Unauthorized access to some interfaces in the foreground leads to leakage of sensitive information. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/zuiidea/antd-admin/issues/1127"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://git... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:antd-admin_project:antd-admin:5.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "028BBB46-0A17-431D-8E82-286B2A0D32F4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"306"
] | 306 | https://github.com/zuiidea/antd-admin/issues/1127 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"zuiidea",
"antd-admin"
] | > 1. Unauthorized access to some interfaces in the foreground leads to leakage of sensitive information
> 2. Install according to the official documents

> 2.1
Unauthorized access is found on some interfa... | Unauthorized access to some interfaces in the foreground was found. Procedure | https://api.github.com/repos/zuiidea/antd-admin/issues/1127/comments | 1 | 2022-01-13T01:50:22Z | 2022-01-13T02:48:58Z | https://github.com/zuiidea/antd-admin/issues/1127 | 1,101,032,710 | 1,127 | 3,198 |
CVE-2021-45347 | 2022-02-14T19:15:07.857 | An Incorrect Access Control vulnerability exists in zzcms 8.2, which lets a malicious user bypass authentication by changing the user name in the cookie to use any password. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/forget-code/zzcms/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zzcms:zzcms:8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BECA005C-6415-4E3A-899F-238BF3517593",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"287"
] | 287 | https://github.com/forget-code/zzcms/issues/2 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"forget-code",
"zzcms"
] | If the user name in the cookie is changed to an existing user, any password can be used to bypass authentication

 vulnerability via the cmdarray parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/sanluan/PublicCMS/issues/59"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third P... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:publiccms:publiccms:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DA4CCE59-6A71-4BC4-86D4-3110B04C1082",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"78"
] | 78 | https://github.com/sanluan/PublicCMS/issues/59 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"sanluan",
"PublicCMS"
] | # PublicCMS v4.0 Value parameter has command execution vulnerability
## Vulnerability Type :
command execution
## Vulnerability Version :
4.0
##Vulnerability location:
PublicCMS-4.0.202107.c/publiccms-parent/publiccms-core/src/main/java/com/publiccms/co
ntroller/admin/sys/SysSiteAdminController.java:249
... | # | https://api.github.com/repos/sanluan/PublicCMS/issues/59/comments | 8 | 2021-11-25T10:38:25Z | 2022-10-21T01:53:25Z | https://github.com/sanluan/PublicCMS/issues/59 | 1,063,417,246 | 59 | 3,200 |
CVE-2022-23390 | 2022-02-14T21:15:09.683 | An issue in the getType function of BBS Forum v5.3 and below allows attackers to upload arbitrary files. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/diyhi/bbs/issues/51"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/diy... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:diyhi:bbs_forum:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D784CB4-D4A9-4DCC-AA13-4723AFE98832",
"versionEndExcluding": null,
"versionEndIncluding": "5.3",
"versionStartExcluding... | [
"434"
] | 434 | https://github.com/diyhi/bbs/issues/51 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"diyhi",
"bbs"
] | Hi,there are SEVEN high-risk vulnerabilities in the Administrator background。please fix it as soon as possible。
Five Arbitrary file upload vulnerabilities。
In HelpManageAction.java、MembershipCardManageAction.java、QuestionManageAction.java、TopicManageAction.java、ForumManageAction.java,there are fllowing insecure c... | SEVEN high-risk vulnerabilities | https://api.github.com/repos/diyhi/bbs/issues/51/comments | 1 | 2021-10-26T07:41:26Z | 2021-10-28T01:01:18Z | https://github.com/diyhi/bbs/issues/51 | 1,035,946,107 | 51 | 3,201 |
CVE-2022-23391 | 2022-02-14T21:15:09.730 | A cross-site scripting (XSS) vulnerability in Pybbs v6.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload inserted into the Search box. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/tomoya92/pybbs/issues/171"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Par... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pybbs_project:pybbs:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A787EBC3-8457-4A7E-BD7B-A1BE26AAF96C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"79"
] | 79 | https://github.com/tomoya92/pybbs/issues/171 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"tomoya92",
"pybbs"
] | ## The first is located at the home page search
Enter in the search box`11" onclick='alert(/xss/)'`

## The second vulnerability is located in the backend
In the topic editor in the background, enter`<img ... | This forum has a large number of xss vulnerabilities | https://api.github.com/repos/atjiu/pybbs/issues/171/comments | 1 | 2022-01-18T03:18:26Z | 2023-05-10T02:03:57Z | https://github.com/atjiu/pybbs/issues/171 | 1,106,433,462 | 171 | 3,202 |
CVE-2021-46461 | 2022-02-14T22:15:07.717 | njs through 0.7.0, used in NGINX, was discovered to contain an out-of-bounds array access via njs_vmcode_typeof in /src/njs_vmcode.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/nginx/njs/commit/d457c9545e7e71ebb5c0479eb16b9d33175855e2"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nginx:njs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3FD7035D-FB25-44D9-A1EA-345A65981E2B",
"versionEndExcluding": null,
"versionEndIncluding": "0.7.0",
"versionStartExcluding": n... | [
"119"
] | 119 | https://github.com/nginx/njs/issues/450 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | ## Env
```
Version : 0.7.0
Git Commit : 2da5d8b246b806bee6f74b575217ec3b61a25548
OS : Ubuntu 20.04
Configure : ./configure --address-sanitizer=YES
```
## POC
```
function main() {
const v2 = new ArrayBuffer();
const v3 = new DataView(v2);
const v5 = typeof v3;
}
main();
```
## St... | illegal memcpy during njs_vmcode_typeof in /njs/src/njs_vmcode.c:1521:18 | https://api.github.com/repos/nginx/njs/issues/450/comments | 2 | 2021-12-24T06:33:59Z | 2022-02-15T20:33:42Z | https://github.com/nginx/njs/issues/450 | 1,088,184,577 | 450 | 3,203 |
CVE-2021-46463 | 2022-02-14T22:15:07.793 | njs through 0.7.1, used in NGINX, was discovered to contain a control flow hijack caused by a Type Confusion vulnerability in njs_promise_perform_then(). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/commit/6a40a85ff239497c6458c7dbef18f6a2736fe992"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2DADC4D6-538B-4AC7-97B5-022B11495692",
"versionEndExcluding": null,
"versionEndIncluding": "0.7.1",
"versionStartExcluding": null... | [
"843"
] | 843 | https://github.com/nginx/njs/issues/447 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | ## Env
```cpp
Version : 0.7.0
Git Commit : bb796f7b3f3b65a78248f3ba86d0929eb292ca8e
OS : Ubuntu 20.04
Configure : ./Configure --address-sanitizer=YES
```
## Poc
```cpp
function main() {
function v0(v1,v2) {
return 1
}
var o = [1,2,3,4,5,6]
const v1 = new Promise(v0);
... | Control flow hijack caused by Type Confusion of Promise object | https://api.github.com/repos/nginx/njs/issues/447/comments | 1 | 2021-12-20T05:07:22Z | 2022-02-15T20:37:16Z | https://github.com/nginx/njs/issues/447 | 1,084,365,523 | 447 | 3,204 |
CVE-2022-25139 | 2022-02-14T22:15:08.317 | njs through 0.7.0, used in NGINX, was discovered to contain a heap use-after-free in njs_await_fulfilled. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/commit/6a07c2156a07ef307b6dcf3c2ca8571a5f1af7a6"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "98ABF5F9-B5AA-4A73-B525-5B89AE6BEA3E",
"versionEndExcluding": "0.7.2",
"versionEndIncluding": null,
"versionStartExcluding": null... | [
"416"
] | 416 | https://github.com/nginx/njs/issues/451 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | ## Env
```
Version : 0.7.0
Git Commit : 2da5d8b246b806bee6f74b575217ec3b61a25548
OS : Ubuntu 20.04
Configure : ./configure --address-sanitizer=YES
```
## POC
```
function main() {
async function v6(v7) {
const v10 = v7(v7);
const v11 = await "split";
Object.values();... | Heap UAF in njs_await_fulfilled | https://api.github.com/repos/nginx/njs/issues/451/comments | 3 | 2021-12-24T06:48:19Z | 2022-03-23T04:33:21Z | https://github.com/nginx/njs/issues/451 | 1,088,190,381 | 451 | 3,205 |
CVE-2022-23384 | 2022-02-15T13:15:07.680 | YzmCMS v6.3 is affected by Cross Site Request Forgery (CSRF) in /admin.add | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/yzmcms/yzmcms/issues/58"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yzmcms:yzmcms:6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "33CDD39A-96DC-4CF3-9CFF-694DF09B47BB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"352"
] | 352 | https://github.com/yzmcms/yzmcms/issues/58 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yzmcms",
"yzmcms"
] | After the administrator logged in, open the following one page
admin,add. http://local:8080/yzmcms-v6.3/admin/
/
<html>
<!-- CSRF PoC - generated by Burp Suite Professional -->
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://169.254.238.255/yzmcms-v6.3/yzmcms-v6.3/admi... | There is one CSRF vulnerability that can add the administrator account | https://api.github.com/repos/yzmcms/yzmcms/issues/58/comments | 1 | 2022-01-16T14:50:07Z | 2022-02-14T02:54:19Z | https://github.com/yzmcms/yzmcms/issues/58 | 1,105,072,186 | 58 | 3,206 |
CVE-2021-43734 | 2022-02-15T14:15:08.010 | kkFileview v4.0.0 has arbitrary file read through a directory traversal vulnerability which may lead to sensitive file leak on related host. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/kekingcn/kkFileView/issues/304"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Thir... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:keking:kkfileview:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "14029A50-34F9-451F-800A-5A21EE2822A0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"22"
] | 22 | https://github.com/kekingcn/kkFileView/issues/304 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"kekingcn",
"kkFileView"
] | ### kkFileView arbitrary file read vulnerability
**问题描述Description**
最近在公司内部渗透测试中发现某处引用的kkFileView 4.0.0存在任意文件读取漏洞,可通过漏洞读取主机任意文件,易造成敏感信息泄漏。
kkFileview v4.0.0 has arbitrary file read vulnerability which may lead to sensitive file leak on related host。
**漏洞位置vulerable code location**
``kkFileView/server/s... | arbitrary file read vulnerability | https://api.github.com/repos/kekingcn/kkFileView/issues/304/comments | 6 | 2021-11-14T13:08:01Z | 2025-03-17T01:26:08Z | https://github.com/kekingcn/kkFileView/issues/304 | 1,052,935,438 | 304 | 3,207 |
CVE-2021-44960 | 2022-02-15T16:15:08.460 | In SVGPP SVG++ library 1.3.0, the XMLDocument::getRoot function in the renderDocument function handled the XMLDocument object improperly, returning a null pointer in advance at the second if, resulting in a null pointer reference behind the renderDocument function. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/svgpp/svgpp/issues/101"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/svgpp... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:svgpp:svgpp:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0191EAF3-1028-4C2E-8FA3-7A0D21F3FB3B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"476"
] | 476 | https://github.com/svgpp/svgpp/issues/101 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"svgpp",
"svgpp"
] | [id_000015,sig_11,src_001176,time_147681735,op_arith8,pos_10,val_+3.zip](https://github.com/svgpp/svgpp/files/7662107/id_000015.sig_11.src_001176.time_147681735.op_arith8.pos_10.val_%2B3.zip)
在renderDocument函数中的XMLDocument::getRoot函数对XMLDocument对象处理不当,在第二个if处提前返回一个空指针,造成renderDocument函数后面有空指针引用。
The XMLDocument::getR... | New vulnerability | https://api.github.com/repos/svgpp/svgpp/issues/101/comments | 6 | 2021-12-06T16:55:10Z | 2022-10-01T08:59:21Z | https://github.com/svgpp/svgpp/issues/101 | 1,072,374,276 | 101 | 3,208 |
CVE-2021-44960 | 2022-02-15T16:15:08.460 | In SVGPP SVG++ library 1.3.0, the XMLDocument::getRoot function in the renderDocument function handled the XMLDocument object improperly, returning a null pointer in advance at the second if, resulting in a null pointer reference behind the renderDocument function. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/svgpp/svgpp/issues/101"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/svgpp... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:svgpp:svgpp:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0191EAF3-1028-4C2E-8FA3-7A0D21F3FB3B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"476"
] | 476 | https://github.com/svgpp/svgpp/issues/101.aa | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"svgpp",
"svgpp"
] | [id_000015,sig_11,src_001176,time_147681735,op_arith8,pos_10,val_+3.zip](https://github.com/svgpp/svgpp/files/7662107/id_000015.sig_11.src_001176.time_147681735.op_arith8.pos_10.val_%2B3.zip)
在renderDocument函数中的XMLDocument::getRoot函数对XMLDocument对象处理不当,在第二个if处提前返回一个空指针,造成renderDocument函数后面有空指针引用。
The XMLDocument::getR... | New vulnerability | https://api.github.com/repos/svgpp/svgpp/issues/101/comments | 6 | 2021-12-06T16:55:10Z | 2022-10-01T08:59:21Z | https://github.com/svgpp/svgpp/issues/101 | 1,072,374,276 | 101 | 3,209 |
CVE-2021-3242 | 2022-02-16T20:15:07.373 | DuxCMS v3.1.3 was discovered to contain a SQL injection vulnerability via the component s/tools/SendTpl/index?keyword=. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/duxphp/DuxCMS3/issues/4"
},
{
"source": "cve@mitre.org",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "http... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:duxcms_project:duxcms:3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DD11A8F8-BC93-4DA4-BD56-7868A9B314DE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"89"
] | 89 | https://github.com/duxphp/DuxCMS3/issues/4 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"duxphp",
"DuxCMS3"
] | sql injection vulnerability exists in tools SendTpl module, url is /s/tools/SendTpl/index?keyword=xxx,
please check SystemExtendAdmin.php 39-50
more details in https://www.star123.top/2021/01/16/duxcms3-1-3%E5%AE%A1%E8%AE%A1/#more | backend sql injection vulnerability | https://api.github.com/repos/duxphp/DuxCMS3/issues/4/comments | 0 | 2021-01-17T02:07:36Z | 2021-01-17T02:07:36Z | https://github.com/duxphp/DuxCMS3/issues/4 | 787,596,259 | 4 | 3,210 |
CVE-2022-22880 | 2022-02-16T22:15:07.677 | Jeecg-boot v3.0 was discovered to contain a SQL injection vulnerability via the code parameter in /jeecg-boot/sys/user/queryUserByDepId. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jeecgboot/jeecg-boot/issues/3347"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Th... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jeecg:jeecg_boot:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D5281A-1578-443B-921C-0CE7B9B36BA4",
"versionEndExcluding": null,
"versionEndIncluding": "3.0",
"versionStartExcludin... | [
"89"
] | 89 | https://github.com/jeecgboot/jeecg-boot/issues/3347 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jeecgboot",
"jeecg-boot"
] | ##### 版本号:
<=3.0
##### 问题描述:
After testing, it is found that the code parameter of /jeecg-boot/sys/user/queryUserByDepId interface of jeecg-boot has SQL injection
##### 截图&代码:
payload:/jeecg-boot/sys/user/queryUserByDepId?_t=1641263644&id=57197590443c44f083d42ae24ef26a2c&realname=%64%61%73%64%27%20%75%6e%69%6f... | SQL injection exists in /jeecg-boot/sys/user/queryUserByDepId | https://api.github.com/repos/jeecgboot/JeecgBoot/issues/3347/comments | 2 | 2022-01-04T06:28:26Z | 2022-01-18T02:56:58Z | https://github.com/jeecgboot/JeecgBoot/issues/3347 | 1,093,051,129 | 3,347 | 3,211 |
CVE-2022-22881 | 2022-02-16T22:15:07.723 | Jeecg-boot v3.0 was discovered to contain a SQL injection vulnerability via the code parameter in /sys/user/queryUserComponentData. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jeecgboot/jeecg-boot/issues/3348"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Th... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jeecg:jeecg_boot:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D5281A-1578-443B-921C-0CE7B9B36BA4",
"versionEndExcluding": null,
"versionEndIncluding": "3.0",
"versionStartExcludin... | [
"89"
] | 89 | https://github.com/jeecgboot/jeecg-boot/issues/3348 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jeecgboot",
"jeecg-boot"
] | ##### 版本号:
jeecg-boot<=3.0
##### 问题描述:
After testing, it is found that the code parameter of /sys/user/queryUserComponentData interface of jeecg-boot has SQL injection
Reuse https://github.com/jeecgboot/jeecg-boot After the source code of the project starts the project, click "custom component" and grab the pac... | SQL injection exists in /sys/user/queryUserComponentData | https://api.github.com/repos/jeecgboot/JeecgBoot/issues/3348/comments | 3 | 2022-01-04T08:36:23Z | 2022-02-21T13:29:22Z | https://github.com/jeecgboot/JeecgBoot/issues/3348 | 1,093,125,235 | 3,348 | 3,212 |
CVE-2022-22885 | 2022-02-16T22:15:07.773 | Hutool v5.7.18's HttpRequest was discovered to ignore all TLS/SSL certificate validation. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://apidoc.gitee.com/dromara/hutool/cn/hutool/http/ssl/DefaultSSLInfo.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url":... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hutool:hutool:5.7.18:*:*:*:*:*:*:*",
"matchCriteriaId": "4C9E9670-0982-49B3-A11D-D4F294D3B8CD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"295"
] | 295 | https://github.com/dromara/hutool/issues/2042 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"dromara",
"hutool"
] | ### 版本情况
JDK版本: corretto_8_312
hutool版本: 5.7.18(请确保最新尝试是否还有问题)
### 问题描述(包括截图)
注意到 hutool HttpUtil 中 HttpConnection#setHttpsInfo 默认传入的 HostnameVerifier 是 DefaultSSLInfo.TRUST_ANY_HOSTNAME_VERIFIER,即:
```java
package cn.hutool.http.ssl;
import javax.net.ssl.HostnameVerifier;
import javax.net.ssl.SSLS... | 默认的 HostnameVerifier 为什么选择 TrustAnyHostnameVerifier 呢? | https://api.github.com/repos/chinabugotech/hutool/issues/2042/comments | 2 | 2021-12-26T12:41:33Z | 2024-03-12T02:30:59Z | https://github.com/chinabugotech/hutool/issues/2042 | 1,088,763,905 | 2,042 | 3,213 |
CVE-2022-22901 | 2022-02-17T03:15:06.847 | There is an Assertion in 'context_p->next_scanner_info_p->type == SCANNER_TYPE_FUNCTION' failed at parser_parse_function_arguments in /js/js-parser.c of JerryScript commit a6ab5e9. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable",
"URL Repurposed"
],
"url": "http://jerryscript.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EB495C8-348F-4B04-B31F-1F4EE471CC22",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"617"
] | 617 | https://github.com/jerryscript-project/jerryscript/issues/4916 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ##### JerryScript commit hash
`a6ab5e9`
##### Build platform
Ubuntu 20.04 LTS
##### Build steps
./tools/build.py --clean --compile-flag=-fsanitize=address --lto=off --error-message=on --profile=es2015-subset --stack-limit=15 --debug --logging=on --line-info=on
##### poc
```js
function test(proxyTarget) {
v... | Assertion 'context_p->next_scanner_info_p->type == SCANNER_TYPE_FUNCTION' failed at /home/ubuntu/fuzz/jerryscript/jerry-core/parser/js/js-parser.c(parser_parse_function_arguments):1618 | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4916/comments | 0 | 2022-01-02T19:10:38Z | 2022-05-21T14:30:43Z | https://github.com/jerryscript-project/jerryscript/issues/4916 | 1,092,081,853 | 4,916 | 3,214 |
CVE-2022-23318 | 2022-02-17T13:15:07.813 | A heap-buffer-overflow in pcf2bdf, versions >= 1.05 allows an attacker to trigger unsafe memory access via a specially crafted PCF font file. This out-of-bound read may lead to an application crash, information disclosure via program memory or other context-dependent impact. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ganaware/pcf2bdf"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ganawar... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pcf2bdf_project:pcf2bdf:1.04:*:*:*:*:*:*:*",
"matchCriteriaId": "3C056252-FB4B-49C8-875B-597EDC1257F1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"787"
] | 787 | https://github.com/ganaware/pcf2bdf/issues/4 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ganaware",
"pcf2bdf"
] | Hello @ganaware, as discussed earlier:
I have compiled pcf2bdf with address sanitization and fuzz-tested inputs with `AFL`. The file attached causes a memory access violation. The actual input file is stored within the zipped folder attached.
Input:
`./pcf2bdf heap_overflow_read_40b`
Output:
```
gzip: heap_ov... | Heap-buffer-overflow in pcf2bdf | https://api.github.com/repos/ganaware/pcf2bdf/issues/4/comments | 2 | 2022-01-11T12:41:03Z | 2022-02-21T20:15:41Z | https://github.com/ganaware/pcf2bdf/issues/4 | 1,099,105,748 | 4 | 3,215 |
CVE-2022-23319 | 2022-02-17T14:15:08.073 | A segmentation fault during PCF file parsing in pcf2bdf versions >=1.05 allows an attacker to trigger a program crash via a specially crafted PCF font file. This crash affects the availability of the software and dependent downstream components. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ganaware/pcf2bdf"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ganawar... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pcf2bdf_project:pcf2bdf:1.04:*:*:*:*:*:*:*",
"matchCriteriaId": "3C056252-FB4B-49C8-875B-597EDC1257F1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"1284"
] | 1284 | https://github.com/ganaware/pcf2bdf/issues/5 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ganaware",
"pcf2bdf"
] | Hello @ganaware, as discussed earlier:
I have compiled pcf2bdf with address sanitization and fuzz-tested inputs with AFL. The file is partially parsed before the program crashes due to a segmentation fault. The actual input file is stored within the zipped folder attached.
Input:
`./pcf2bdf segfault_deadly_signal`... | Segmentation fault - ASAN Deadly Signal in pcf2bdf | https://api.github.com/repos/ganaware/pcf2bdf/issues/5/comments | 2 | 2022-01-11T12:45:15Z | 2022-02-21T20:14:57Z | https://github.com/ganaware/pcf2bdf/issues/5 | 1,099,109,611 | 5 | 3,216 |
CVE-2021-44868 | 2022-02-17T16:15:07.770 | A problem was found in ming-soft MCMS v5.1. There is a sql injection vulnerability in /ms/cms/content/list.do | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ming-soft/MCMS/issues/58"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mingsoft:mcms:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A4C9F9B5-3712-483B-8744-058E61788907",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"89"
] | 89 | https://github.com/ming-soft/MCMS/issues/58 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ming-soft",
"MCMS"
] | ### Vulnerability file:
/src/main/java/net/mingsoft/cms/biz/impl/ContentBizImpl.java
#Vulnerability tracking path:
```
1. MCMS-master/src/main/java/net/mingsoft/cms/biz/impl/CategoryBizImpl.java:72行 --The return value of call queryChildren() is tained
2. MCMS-master/src/main/java/net/mingsoft/cms/biz/impl/Categ... | MCMS V5.1 /src/main/java/net/mingsoft/cms/biz/impl/ContentBizImpl.java hava a SQL Injection Vulnerability | https://api.github.com/repos/ming-soft/MCMS/issues/58/comments | 0 | 2021-12-05T17:24:31Z | 2022-10-17T10:09:30Z | https://github.com/ming-soft/MCMS/issues/58 | 1,071,512,474 | 58 | 3,217 |
CVE-2022-22912 | 2022-02-17T19:15:08.120 | Prototype pollution vulnerability via .parse() in Plist before v3.0.4 allows attackers to cause a Denial of Service (DoS) and may lead to remote code execution. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/TooTallNate/plist.js/issues/114"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracki... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:plist_project:plist:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "ADC09244-E3D4-4E7E-807D-7017638CE736",
"versionEndExcluding": "3.0.6",
"versionEndIncluding": null,
"versionSt... | [
"1321"
] | 1321 | https://github.com/TooTallNate/plist.js/issues/114 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"TooTallNate",
"plist.js"
] | Hi, There's a prototype pollution in .parse() related to the xml that are being parsed in it. In the following example the prototype pollution will affect the `length` parameter.
```javascript
var plist = require('plist');
var xml = `
<plist version="1.0">
<key>metadata</key>
<dict>
<key>bundle... | Prototype Pollution using .parse() | https://api.github.com/repos/TooTallNate/plist.js/issues/114/comments | 7 | 2022-01-06T05:41:28Z | 2022-09-30T21:32:26Z | https://github.com/TooTallNate/plist.js/issues/114 | 1,094,987,879 | 114 | 3,218 |
CVE-2022-23375 | 2022-02-19T16:15:14.523 | WikiDocs version 0.1.18 has an authenticated remote code execution vulnerability. An attacker can upload a malicious file using the image upload form through index.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://demo.wikidocs.it/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Zavy86/WikiDocs"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wikidocs:wikidocs:0.1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "089CD7F3-905A-4050-A5BF-3BC1FBCBB92C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"434"
] | 434 | https://github.com/Zavy86/WikiDocs/issues/28 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Zavy86",
"WikiDocs"
] | # CVE-2022-23376 / Multiple reflected XSS vulnerabilities on different pages.
## 1. (Template.inc.php) - Reflected XSS Injection
First vulnerability in line 47:

Second is in line 210:
 has a double free. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/saitoha/libsixel/issues/158"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third P... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D78CB59C-7966-46E3-A325-A7508F0ED51D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"415"
] | 415 | https://github.com/saitoha/libsixel/issues/158 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"saitoha",
"libsixel"
] | Hi, I found a double free or corruption in the current master 6a5be8b,
OS: ubuntu 18.04
kernel: 5.4.0-87-generic
POC: [poc.zip](https://github.com/saitoha/libsixel/files/7492167/poc.zip)

- gdb ... | double free or corruption in encoder.c:831 | https://api.github.com/repos/saitoha/libsixel/issues/158/comments | 1 | 2021-11-07T11:26:43Z | 2024-05-04T16:25:26Z | https://github.com/saitoha/libsixel/issues/158 | 1,046,721,863 | 158 | 3,220 |
CVE-2021-46701 | 2022-02-20T21:15:07.437 | PreMiD 2.2.0 allows unintended access via the websocket transport. An attacker can receive events from a socket and emit events to a socket, potentially interfering with a victim's "now playing" status on Discord. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/PreMiD/PreMiD/issues/790"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "htt... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:premid:premid:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2004F0AD-9CE4-4968-9ABE-A3A54B6CE4CA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"346"
] | 346 | https://github.com/PreMiD/PreMiD/issues/790 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"PreMiD",
"PreMiD"
] | # Explanation
Some time ago, there was fix for allowing only chrome extension to connect to server (PreMiD app), but I noticed that I can still access server by just selecting transport as `websocket`. It works on localhost and can be done on websites. It allows to receive and emit events to socket. Related to #501
... | [Vulnerability] Server (socket.io) is possible to be accessed from socket.io client | https://api.github.com/repos/PreMiD/PreMiD/issues/790/comments | 1 | 2021-12-17T21:25:29Z | 2022-06-15T19:47:03Z | https://github.com/PreMiD/PreMiD/issues/790 | 1,083,625,693 | 790 | 3,221 |
CVE-2021-44568 | 2022-02-21T18:15:08.553 | Two heap-overflow vulnerabilities exist in openSUSE/libsolv libsolv through 13 Dec 2020 in the decisionmap variable via the resolve_dependencies function at src/solver.c (line 1940 & line 1995), which could cause a remote Denial of Service. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/openSUSE/libsolv/issues/425"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://githu... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:opensuse:libsolv:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C7DA98F7-E498-4C89-94F6-4A18D7BC2916",
"versionEndExcluding": "0.7.17",
"versionEndIncluding": null,
"versionStartExclu... | [
"787"
] | 787 | https://github.com/openSUSE/libsolv/issues/425 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"openSUSE",
"libsolv"
] | Description:
There is two heap-overflow vulnerability in function:
static int resolve_dependencies (Solver *solv, int level, int disablerules, Queue *dq)
at src/solver.c: line 1940 & line 1995
if (r->d == 0 || solv->decisionmap[-r->p] <= 0) // line 1940
if (solv->decisionmap[p] > 0) // line 1995
The first bu... | libsolv “resolve_dependencies” function two heap-overflow vulnerability | https://api.github.com/repos/openSUSE/libsolv/issues/425/comments | 7 | 2020-12-13T06:41:31Z | 2022-03-31T12:17:40Z | https://github.com/openSUSE/libsolv/issues/425 | 765,075,829 | 425 | 3,222 |
CVE-2022-23652 | 2022-02-22T20:15:07.763 | capsule-proxy is a reverse proxy for Capsule Operator which provides multi-tenancy in Kubernetes. In versions prior to 0.2.1 an attacker with a proper authentication mechanism may use a malicious `Connection` header to start a privilege escalation attack towards the Kubernetes API Server. This vulnerability allows for ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/clastix/capsule-proxy/commit/efe91f68ebf8a9e3d21491dc57da7b8a746415d8"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Issu... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:clastix:capsule-proxy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "67F30FEB-4C18-4522-9B33-D66E83DB8F13",
"versionEndExcluding": "0.2.1",
"versionEndIncluding": null,
"versionStartE... | [
"287"
] | 287 | https://github.com/clastix/capsule-proxy/issues/188 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"clastix",
"capsule-proxy"
] | A user crafting an API request directed at `capsule-proxy` can get a privilege escalation using the Service Account of the proxy itself.
This is done by passing the `Impersonate-User` or `Impersonate-Group` header in the `Connection` header, using the same exploit described here: https://github.com/rancher/rancher/s... | Privilege escalation vulnerability via malicious "Connection" header | https://api.github.com/repos/projectcapsule/capsule-proxy/issues/188/comments | 1 | 2022-02-18T19:53:04Z | 2022-02-20T21:45:50Z | https://github.com/projectcapsule/capsule-proxy/issues/188 | 1,143,674,082 | 188 | 3,223 |
CVE-2019-25058 | 2022-02-24T15:15:21.220 | An issue was discovered in USBGuard before 1.1.0. On systems with the usbguard-dbus daemon running, an unprivileged user could make USBGuard allow all USB devices to be connected in the future. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.4,
"confidentialityImpact": "PARTIA... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/USBGuard/usbguard/issues/273"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:usbguard_project:usbguard:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3D7EAA37-523F-452D-8E2C-A749E045591F",
"versionEndExcluding": "1.1.0",
"versionEndIncluding": null,
"versionSt... | [
"863"
] | 863 | https://github.com/USBGuard/usbguard/issues/273 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"USBGuard",
"usbguard"
] | Some of the methods exposed via dbus are not covered by the [current default policy](https://github.com/USBGuard/usbguard/blob/master/src/DBus/org.usbguard.policy). This includes the `getParameter` and `setParameter` methods.
On a default debian install, as unprivileged user:
```
$ usbguard get-parameter InsertedD... | No default ACL on some dbus methods | https://api.github.com/repos/USBGuard/usbguard/issues/273/comments | 4 | 2019-02-07T12:11:36Z | 2022-02-14T09:54:59Z | https://github.com/USBGuard/usbguard/issues/273 | 407,669,808 | 273 | 3,224 |
CVE-2019-25058 | 2022-02-24T15:15:21.220 | An issue was discovered in USBGuard before 1.1.0. On systems with the usbguard-dbus daemon running, an unprivileged user could make USBGuard allow all USB devices to be connected in the future. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.4,
"confidentialityImpact": "PARTIA... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/USBGuard/usbguard/issues/273"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:usbguard_project:usbguard:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3D7EAA37-523F-452D-8E2C-A749E045591F",
"versionEndExcluding": "1.1.0",
"versionEndIncluding": null,
"versionSt... | [
"863"
] | 863 | https://github.com/USBGuard/usbguard/issues/403 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"USBGuard",
"usbguard"
] | With new versions of Polkit, the value `auth_self_keep_session` is no more valid for the tags `<allow_any>`, `<allow_inactive>` and `<allow_active>`.
The [usbguard policy config](https://github.com/USBGuard/usbguard/blob/master/src/DBus/org.usbguard1.policy) is not parsed anymore by new versions of Polkit, and the def... | Polkit policy is not valid with newest versions of Polkit | https://api.github.com/repos/USBGuard/usbguard/issues/403/comments | 1 | 2020-08-07T17:54:42Z | 2022-02-14T09:54:59Z | https://github.com/USBGuard/usbguard/issues/403 | 675,176,585 | 403 | 3,225 |
CVE-2021-43724 | 2022-02-24T15:15:23.950 | A Cross Site Scripting (XSS) vulnerability exits in Subrion CMS through 4.2.1 in the Create Page functionality of the admin Account via a SGV file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/intelliants/subrion/issues/890"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Thir... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:intelliants:subrion_cms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "970BC2B7-56FC-43DA-92C7-083A0423D1EF",
"versionEndExcluding": null,
"versionEndIncluding": "4.2.1",
"versionStar... | [
"79"
] | 79 | https://github.com/intelliants/subrion/issues/890 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"intelliants",
"subrion"
] |
I have found Cross Site Scripting (XSS) bug in subrion CMS version 4.2.1 in the Create Page functionality of the admin Account.
Steps to Reproduce:
just login as admin and clink this url https://demos.subrion.org/?demo=core&admin=1
As an admin Create test page
In the Add a Page section go to the Page Conten... | this is Cross Site Scripting (XSS) | https://api.github.com/repos/intelliants/subrion/issues/890/comments | 2 | 2021-11-08T16:01:45Z | 2022-07-20T08:19:51Z | https://github.com/intelliants/subrion/issues/890 | 1,047,624,132 | 890 | 3,226 |
CVE-2021-44550 | 2022-02-24T15:15:24.067 | An Incorrect Access Control vulnerability exists in CoreNLP 4.3.2 via the classifier in NERServlet.java (lines 158 and 159). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/stanfordnlp/CoreNLP/issues/1222"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Thi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:stanford:corenlp:4.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B657A9FE-04C1-40B0-99A0-ED6CF72BA13B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"74"
] | 74 | https://github.com/stanfordnlp/CoreNLP/issues/1222 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"stanfordnlp",
"CoreNLP"
] | https://github.com/stanfordnlp/CoreNLP/blob/d147ba597bb13efeab5c567d677854bfc69104e6/src/edu/stanford/nlp/ie/ner/webapp/NERServlet.java#L152-L159
We found 'classifier' may be contaminated on line 152 of NERServlet.java.java.Including unvalidated data in an HTTP response header can enable cache-poisoning, cross-site ... | Header Manipulation | https://api.github.com/repos/stanfordnlp/CoreNLP/issues/1222/comments | 0 | 2021-11-26T09:00:27Z | 2022-02-24T06:17:09Z | https://github.com/stanfordnlp/CoreNLP/issues/1222 | 1,064,237,894 | 1,222 | 3,227 |
CVE-2021-44607 | 2022-02-24T15:15:24.237 | A Cross Site Scripting (XSS) vulnerability exists in FUEL-CMS 1.5.1 in the Assets page via an SVG file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/589"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F3A806A2-582F-49B6-B9EC-C0FB4B13ED3D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | [
"79"
] | 79 | https://github.com/daylightstudio/FUEL-CMS/issues/589 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"daylightstudio",
"FUEL-CMS"
] | A stored cross-site scripting (XSS) vulnerability exists in FUEL-CMS-1.5.1 that allows an authenticated user authorized to upload a malicious .svg file which acts as a stored XSS payload. If this stored XSS payload is triggered by an administrator it will trigger a XSS attack
1. login as admin .in the Assets page
... | A stored cross-site scripting (XSS) vulnerability exists in FUEL-CMS-1.5.1 | https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/589/comments | 0 | 2021-11-29T15:19:12Z | 2021-11-29T15:19:12Z | https://github.com/daylightstudio/FUEL-CMS/issues/589 | 1,066,165,915 | 589 | 3,228 |
CVE-2021-44608 | 2022-02-24T15:15:24.277 | Multiple Cross Site Scripting (XSS) vulnerabilities exists in bloofoxCMS 0.5.2.1 - 0.5.1 via the (1) file parameter and (2) type parameter in an edit action in index.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/alexlang24/bloofoxCMS/issues/12"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Thi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bloofox:bloofoxcms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DA028444-D83F-453D-99B1-FDE5B6C71C51",
"versionEndExcluding": null,
"versionEndIncluding": "0.5.2.1",
"versionStartEx... | [
"79"
] | 79 | https://github.com/alexlang24/bloofoxCMS/issues/12 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"alexlang24",
"bloofoxCMS"
] | I found two Authenticated Cross-Site Scripting in 'file' parameter and 'type' parameter
### Cross-Site Scripting in the parameter 'file'
```
http://localhost/bloofoxcms/admin/index.php?mode=content&page=media&action=edit&file=info.svg%27%3E%3CScRiPt%3Ealert(document.cookie)%3C/ScRiPt%3E&type=0
```
 (Authenticated) | https://api.github.com/repos/alexlang24/bloofoxCMS/issues/12/comments | 0 | 2021-12-01T15:46:38Z | 2021-12-01T15:46:38Z | https://github.com/alexlang24/bloofoxCMS/issues/12 | 1,068,569,062 | 12 | 3,229 |
CVE-2021-44610 | 2022-02-24T15:15:24.317 | Multiple SQL Injection vulnerabilities exist in bloofoxCMS 0.5.2.1 - 0.5.1 via the (1) URLs, (2) lang_id, (3) tmpl_id, (4) mod_rewrite (5) eta_doctype. (6) meta_charset, (7) default_group, and (8) page group parameters in the settings mode in admin/index.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/alexlang24/bloofoxCMS/issues/13"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Thi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bloofox:bloofoxcms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DA028444-D83F-453D-99B1-FDE5B6C71C51",
"versionEndExcluding": null,
"versionEndIncluding": "0.5.2.1",
"versionStartEx... | [
"89"
] | 89 | https://github.com/alexlang24/bloofoxCMS/issues/13 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"alexlang24",
"bloofoxCMS"
] | bloofoxCMS-0.5.2.1 have no security filtering of user input parameters in the admin center page. resulting in a large number of sql injection vulnerabilities
- http://localhost/admin/index.php?mode=settings&page=projects&action=new
We can use sqlmap to validate:
```
in the parameters: eta_doctype. tmpl_id. urls.lan... | Multiple SQL injection vulnerabilities | https://api.github.com/repos/alexlang24/bloofoxCMS/issues/13/comments | 0 | 2021-12-02T13:03:52Z | 2021-12-02T13:03:52Z | https://github.com/alexlang24/bloofoxCMS/issues/13 | 1,069,525,390 | 13 | 3,230 |
CVE-2021-45746 | 2022-02-24T15:15:24.770 | A Directory Traversal vulnerability exists in WeBankPartners wecube-platform 3.2.1 via the file variable in PluginPackageController.java. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/WeBankPartners/wecube-platform/issues/2297"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"I... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:webank:wecube:3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7A0D0496-F0EB-4054-B5C8-C3F5CBA50E7E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"22"
] | 22 | https://github.com/WeBankPartners/wecube-platform/issues/2297 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"WeBankPartners",
"wecube-platform"
] | https://github.com/WeBankPartners/wecube-platform/blob/15b004e0295c9466ac11c717bee27165fc5b13a9/platform-core/src/main/java/com/webank/wecube/platform/core/controller/plugin/PluginPackageController.java#L76-L84
https://github.com/WeBankPartners/wecube-platform/blob/15b004e0295c9466ac11c717bee27165fc5b13a9/platform-c... | Path Manipulation | https://api.github.com/repos/WeBankPartners/wecube-platform/issues/2297/comments | 1 | 2021-11-23T08:43:10Z | 2021-12-02T06:55:04Z | https://github.com/WeBankPartners/wecube-platform/issues/2297 | 1,060,968,991 | 2,297 | 3,231 |
CVE-2022-24599 | 2022-02-24T15:15:29.633 | In autofile Audio File Library 0.3.6, there exists one memory leak vulnerability in printfileinfo, in printinfo.c, which allows an attacker to leak sensitive information via a crafted file. The printfileinfo function calls the copyrightstring function to get data, however, it dosn't use zero bytes to truncate the data. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/mpruett/audiofile/issues/60"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List"
],
"url": "https://lists.debian.org/debian-lts-an... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:audio_file_library_project:audio_file_library:0.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "47CD841B-F23D-41F5-B31D-51A7B377BA75",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"401"
] | 401 | https://github.com/mpruett/audiofile/issues/60 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"mpruett",
"audiofile"
] | There exists one Memory-leak bug in printfileinfo, in printinfo.c, which allows an attacker to leak the address of heap or libc via a crafted file.
To reproduce with the attached poc file:
[poc.zip](https://github.com/mpruett/audiofile/files/7986695/poc.zip)
Heap address leak:
./sfinfo ./heapleak_poc.aiff
Resu... | Memory-leak bug in printfileinfo, in printinfo.c | https://api.github.com/repos/mpruett/audiofile/issues/60/comments | 2 | 2022-02-02T13:25:06Z | 2023-11-11T17:05:02Z | https://github.com/mpruett/audiofile/issues/60 | 1,121,923,970 | 60 | 3,232 |
CVE-2022-24613 | 2022-02-24T15:15:29.713 | metadata-extractor up to 2.16.0 can throw various uncaught exceptions while parsing a specially crafted JPEG file, which could result in an application crash. This could be used to mount a denial of service attack against services that use metadata-extractor library. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/drewnoakes/metadata-extractor/issues/561"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:metadata-extractor_project:metadata-extractor:*:*:*:*:*:*:*:*",
"matchCriteriaId": "61E89144-6999-46A1-B104-A545FBFF049B",
"versionEndExcluding": "2.16.0",
"versionEndIncluding": null,
... | [
"755"
] | 755 | https://github.com/drewnoakes/metadata-extractor/issues/561 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"drewnoakes",
"metadata-extractor"
] | ## 1. Unique Bugs Found
Recently we ([Zhang Cen](https://github.com/occia), [Huang Wenjie](https://github.com/ZanderHuang) and [Zhang Xiaohan](https://github.com/Han0nly)) discovered a series of bugs in latest metadta-extractor (2.16.0).
Every bug we reported in the following is unique and reproducable. We sorted ... | A list of bugs found (33 bugs in total) | https://api.github.com/repos/drewnoakes/metadata-extractor/issues/561/comments | 16 | 2021-12-10T19:26:48Z | 2022-05-05T11:46:07Z | https://github.com/drewnoakes/metadata-extractor/issues/561 | 1,077,162,492 | 561 | 3,233 |
CVE-2022-24615 | 2022-02-24T15:15:29.790 | zip4j up to v2.10.0 can throw various uncaught exceptions while parsing a specially crafted ZIP file, which could result in an application crash. This could be used to mount a denial of service attack against services that use zip4j library. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/srikanth-lingala/zip4j/issues/377"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.co... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zip4j_project:zip4j:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F277A8CA-DAFC-4465-BC83-4FC04FE63425",
"versionEndExcluding": "2.10.0",
"versionEndIncluding": null,
"versionStartEx... | [
"755"
] | 755 | https://github.com/srikanth-lingala/zip4j/issues/377 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"srikanth-lingala",
"zip4j"
] | Recently we ([Zhang Cen](https://github.com/occia) , [Huang Wenjie](https://github.com/ZanderHuang) and [Zhang Xiaohan](https://github.com/Han0nly)) found and submitted several bugs of latest zip4j (2.9.0).
For your convenience, here lists the bug summary for all reported bugs (will keep it updated).
Note that each i... | Collection of Recent Reported Bugs for zip4j (2.9.0) | https://api.github.com/repos/srikanth-lingala/zip4j/issues/377/comments | 23 | 2021-10-24T15:43:05Z | 2022-03-30T05:26:45Z | https://github.com/srikanth-lingala/zip4j/issues/377 | 1,034,447,276 | 377 | 3,234 |
CVE-2022-24615 | 2022-02-24T15:15:29.790 | zip4j up to v2.10.0 can throw various uncaught exceptions while parsing a specially crafted ZIP file, which could result in an application crash. This could be used to mount a denial of service attack against services that use zip4j library. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/srikanth-lingala/zip4j/issues/377"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.co... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zip4j_project:zip4j:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F277A8CA-DAFC-4465-BC83-4FC04FE63425",
"versionEndExcluding": "2.10.0",
"versionEndIncluding": null,
"versionStartEx... | [
"755"
] | 755 | https://github.com/srikanth-lingala/zip4j/issues/418 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"srikanth-lingala",
"zip4j"
] | According to the NVD description of [CVE-2022-24615](https://nvd.nist.gov/vuln/detail/CVE-2022-24615), CVE-2022-24615 affects up to v2.9.0 (excluded). Actually, v2.9.0 and v2.9.1 are also affected by CVE-2022-24615. Don't the versions affected by nvd-CVE-2022-24615 need to be modified? | Does CVE-2022-24615 affect versions v2.9.0 and v2.9.1? | https://api.github.com/repos/srikanth-lingala/zip4j/issues/418/comments | 5 | 2022-03-31T09:40:41Z | 2023-12-01T13:02:13Z | https://github.com/srikanth-lingala/zip4j/issues/418 | 1,187,800,949 | 418 | 3,235 |
CVE-2022-24620 | 2022-02-24T15:15:29.830 | Piwigo version 12.2.0 is vulnerable to stored cross-site scripting (XSS), which can lead to privilege escalation. In this way, admin can steal webmaster's cookies to get the webmaster's access. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Piwigo/Piwigo/issues/1605"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Par... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:piwigo:piwigo:12.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "81C2A86F-D640-455A-915C-B187ECB741AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"79"
] | 79 | https://github.com/Piwigo/Piwigo/issues/1605 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Piwigo",
"Piwigo"
] | Hi, I found Stored XSS in Piwigo version 12.2.0 (Not tested older versions).
**Proof Of Concept**:
1. Add an admin through webmaster's access.
2. Through the admin account open http://localhost/piwigo-12.2.0/piwigo/admin.php?page=cat_list
3. Add < svg onload=alert(1)> (Remove space) in the group name field.
... | Piwigo-12.2.0 Vulnerable For Stored XSS Which Is Leading To Privilege Escalation | https://api.github.com/repos/Piwigo/Piwigo/issues/1605/comments | 3 | 2022-02-02T19:14:54Z | 2022-07-05T16:00:16Z | https://github.com/Piwigo/Piwigo/issues/1605 | 1,122,294,432 | 1,605 | 3,236 |
CVE-2022-25104 | 2022-02-24T15:15:30.793 | HorizontCMS v1.0.0-beta.2 was discovered to contain an arbitrary file download vulnerability via the component /admin/file-manager/. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ttimot24/HorizontCMS/issues/43"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Thir... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:horizontcms_project:horizontcms:1.0.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "9840814D-4A55-468B-8F55-EEEE82D7EA29",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"552"
] | 552 | https://github.com/ttimot24/HorizontCMS/issues/43 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ttimot24",
"HorizontCMS"
] | Version:HorizontCMS v1.0.0-beta-2
Submit date: 2022-02-13
Description:Arbitrary file download vulnerability

POC:
```
GET /admin/file-manager/download?file=storage/images/header_images/../../../.... | Arbitrary file download vulnerability | https://api.github.com/repos/ttimot24/HorizontCMS/issues/43/comments | 0 | 2022-02-13T12:28:51Z | 2022-02-22T22:25:56Z | https://github.com/ttimot24/HorizontCMS/issues/43 | 1,135,773,425 | 43 | 3,237 |
CVE-2022-25838 | 2022-02-24T15:15:33.120 | Laravel Fortify before 1.11.1 allows reuse within a short time window, thus calling into question the "OT" part of the "TOTP" concept. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/laravel/fortify/issues/201#issuecomment-1009282153"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Adviso... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:laravel:fortify:*:*:*:*:*:*:*:*",
"matchCriteriaId": "302E12CE-FD88-4D66-A407-616ED2185CA7",
"versionEndExcluding": "1.11.1",
"versionEndIncluding": null,
"versionStartExclud... | [
"294"
] | 294 | https://github.com/laravel/fortify/issues/201#issuecomment-1009282153 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"laravel",
"fortify"
] | - Version: v1.7.4
- Laravel Version: v8.22.1
- PHP Version: v7.4.13
### Description:
The current two factor authentication solution sets 2fa to enabled without requiring a confirmation (via TOTP) that the authenticator app is actually set up.
### Steps To Reproduce:
The current solution works like this:... | Current 2FA solution can lock users out of their accounts | https://api.github.com/repos/laravel/fortify/issues/201/comments | 39 | 2021-01-17T19:39:15Z | 2022-02-28T15:24:44Z | https://github.com/laravel/fortify/issues/201 | 787,778,846 | 201 | 3,238 |
CVE-2021-3596 | 2022-02-24T19:15:09.063 | A NULL pointer dereference flaw was found in ImageMagick in versions prior to 7.0.10-31 in ReadSVGImage() in coders/svg.c. This issue is due to not checking the return value from libxml2's xmlCreatePushParserCtxt() and uses the value directly, which leads to a crash and segmentation fault. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970569"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5C99ED1A-DE49-4F83-B109-EE35F50E1717",
"versionEndExcluding": "7.0.10-31",
"versionEndIncluding": null,
"version... | [
"476"
] | 476 | https://github.com/ImageMagick/ImageMagick/issues/2624 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [Y ] I have written a descriptive issue title
- [Y] I have verified that I am using the latest version of ImageMagick
- [Y] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues t... | Null Pointer dereference caused by incomplete check of the return value from libxml2 in ReadSVGImage svg.c:3621 | https://api.github.com/repos/ImageMagick/ImageMagick/issues/2624/comments | 1 | 2020-09-25T05:56:46Z | 2020-09-25T18:07:35Z | https://github.com/ImageMagick/ImageMagick/issues/2624 | 708,663,828 | 2,624 | 3,239 |
CVE-2021-4021 | 2022-02-24T19:15:09.533 | A vulnerability was found in Radare2 in versions prior to 5.6.2, 5.6.0, 5.5.4 and 5.5.2. Mapping a huge section filled with zeros of an ELF64 binary for MIPS architecture can lead to uncontrolled resource consumption and DoS. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "patrick@puiterwijk.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/radareorg/radare2/issues/19436"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C7E4E86C-9AD4-46E6-8403-6424D989E389",
"versionEndExcluding": null,
"versionEndIncluding": "5.5.0",
"versionStartExcludin... | [
"834"
] | 834 | https://github.com/radareorg/radare2/issues/19436 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"radareorg",
"radare2"
] | ## Environment
```
$ date
mar 23 nov 2021 10:31:32 -03
$ r2 -v
radare2 5.5.0 1 @ linux-x86-64 git.
commit: b50c2c35acd266f1b18bbbcfe0c63d9d0331b09d build: 2021-11-14__22:46:21
$ uname -ms
Linux x86_64
```
## Description
We found with @OctavioGalland an ELF64 binary for MIPS architecture that hangs when ana... | DoS analysing ELF64 binary for MIPS architecture | https://api.github.com/repos/radareorg/radare2/issues/19436/comments | 3 | 2021-11-23T14:42:29Z | 2021-12-03T00:57:37Z | https://github.com/radareorg/radare2/issues/19436 | 1,061,367,190 | 19,436 | 3,240 |
CVE-2022-24594 | 2022-02-25T12:15:07.667 | In waline 1.6.1, an attacker can submit messages using X-Forwarded-For to forge any IP address. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/walinejs/waline/discussions/792"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://git... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:waline:waline:1.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3FAE4360-14FD-4778-98C5-965981912CA7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"862"
] | 862 | https://github.com/walinejs/waline/issues/785 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"walinejs",
"waline"
] | ### 问题描述 | Describe the bug
# waline-fake-any-ip-poc
A Proof-Of-Concept for the recently found [waline](https://github.com/walinejs/waline) fake any ip vulnerability.
In this repository we have made and example vulnerable application and proof-of-concept (POC) exploit of it.
## Proof-of-concept (POC)
As ... | [Bug]: waline fake any ip vulnerability | https://api.github.com/repos/walinejs/waline/issues/785/comments | 7 | 2022-01-30T01:15:54Z | 2022-03-13T09:26:09Z | https://github.com/walinejs/waline/issues/785 | 1,118,374,553 | 785 | 3,241 |
CVE-2022-24612 | 2022-02-25T12:15:07.713 | An authenticated user can upload an XML file containing an XSS via the ITSM module of EyesOfNetwork 5.3.11, resulting in a stored XSS. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/EyesOfNetworkCommunity/eonweb/issues/114"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "h... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyesofnetwork:eyesofnetwork:5.3-11:*:*:*:*:*:*:*",
"matchCriteriaId": "DBCEC519-5FE6-423B-919E-559F571B2152",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | [
"79"
] | 79 | https://github.com/EyesOfNetworkCommunity/eonweb/issues/114 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"EyesOfNetworkCommunity",
"eonweb"
] | Hello,
Il y a un petit soucis dans le contrôle des fichiers uploadés via le file upload du module ITSM.
La possibilité d'uploader du format XML devrait se suivre d'un contrôle du dit fichier, en l'état il est possible d'uploader (via un user authentifié), un document XML contenant une XSS ou d'autres joyeusetées... | /!\Security | https://api.github.com/repos/EyesOfNetworkCommunity/eonweb/issues/114/comments | 2 | 2022-02-03T00:58:30Z | 2022-03-02T00:00:09Z | https://github.com/EyesOfNetworkCommunity/eonweb/issues/114 | 1,122,542,910 | 114 | 3,242 |
CVE-2021-42244 | 2022-02-25T19:15:12.703 | A cross-site scripting (XSS) vulnerability in PaquitoSoftware Notimoo v1.2 allows attackers to execute arbitrary web scripts or HTML via a crafted title or message in a notification. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/PaquitoSoft/Notimoo/issues/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:notimoo_project:notimoo:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D6DEA6D3-6A74-4D85-9117-20519ED7B115",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"79"
] | 79 | https://github.com/PaquitoSoft/Notimoo/issues/3 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"PaquitoSoft",
"Notimoo"
] | notimoo.js 1.2 has an XSS vulnerability which is executed when a title or message containing Javascript code are set in a notification.

**POC**
Create a notification with a javascript payload:
```... | XSS via title, message | https://api.github.com/repos/PaquitoSoft/Notimoo/issues/3/comments | 0 | 2021-08-12T20:12:15Z | 2021-08-12T20:12:15Z | https://github.com/PaquitoSoft/Notimoo/issues/3 | 969,490,590 | 3 | 3,243 |
CVE-2022-0764 | 2022-02-26T15:15:07.910 | Arbitrary Command Injection in GitHub repository strapi/strapi prior to 4.1.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",... | [
{
"source": "security@huntr.dev",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c"
},
{
"source": "security@huntr.dev",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*",
"matchCriteriaId": "412D3B41-C0FD-4ED9-AD6B-00C83BEBC0C7",
"versionEndExcluding": "4.1.0",
"versionEndIncluding": null,
"versionStartExcluding... | [
"78"
] | 78 | https://github.com/strapi/strapi/issues/12879 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"strapi",
"strapi"
] | <!--
Hello 👋 Thank you for submitting an issue.
Before you start, please make sure your issue is understandable and reproducible.
To make your issue readable make sure you use valid Markdown syntax.
https://guides.github.com/features/mastering-markdown/
Please ensure you have also read and understand the co... | [V3] Fix CVE-2022-0764 | https://api.github.com/repos/strapi/strapi/issues/12879/comments | 2 | 2022-03-17T15:16:11Z | 2022-05-18T08:01:30Z | https://github.com/strapi/strapi/issues/12879 | 1,172,466,248 | 12,879 | 3,244 |
CVE-2021-43086 | 2022-02-28T15:15:07.983 | ARM astcenc 3.2.0 is vulnerable to Buffer Overflow. When the compression function of the astc-encoder project with -cl option was used, a stack-buffer-overflow occurred in function encode_ise() in function compress_symbolic_block_for_partition_2planes() in "/Source/astcenc_compress_symbolic.cpp". | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ARM-software/astc-encoder/issues/296."
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:arm:adaptive_scalable_texture_compression_encoder:3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DC0AA123-0F53-4A6E-980E-4539FBAB8242",
"versionEndExcluding": null,
"versionEndIncluding": nul... | [
"787"
] | 787 | https://github.com/ARM-software/astc-encoder/issues/296. | [
"Broken Link",
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ARM-software",
"astc-encoder"
] | # Version
```
astcenc v3.2.0, 64-bit sse2
```
# Environment
Ubuntu 18.04,64 bit
# Command
**Compile test program:**
```c++
$ mkdir build
$ cd build
$ cmake -G "Unix Makefiles" -DCMAKE_BUILD_TYPE=Release ..
$ make -j8
```
**Compile test program with address sanitizer:**
- Update Makefile:
... | stack-buffer-overflow in function compress_symbolic_block_for_partition_2planes() | https://api.github.com/repos/ARM-software/astc-encoder/issues/296/comments | 5 | 2021-10-22T05:18:39Z | 2022-05-02T05:20:47Z | https://github.com/ARM-software/astc-encoder/issues/296 | 1,033,189,620 | 296 | 3,245 |
CVE-2021-44334 | 2022-02-28T15:15:08.037 | David Brackeen ok-file-formats 97f78ca is vulnerable to Buffer Overflow. When the function of the ok-file-formats project is used, a heap-buffer-overflow occurs in function ok_jpg_convert_YCbCr_to_RGB() in "/ok_jpg.c:513" . | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/brackeen/ok-file-formats/issues/12"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ok-file-formats_project:ok-file-formats:2021-03-06:*:*:*:*:*:*:*",
"matchCriteriaId": "7221E38B-D190-4EC5-BD11-C4A84647DBED",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"787"
] | 787 | https://github.com/brackeen/ok-file-formats/issues/12 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"brackeen",
"ok-file-formats"
] | # Version
dev version, git clone https://github.com/brackeen/ok-file-formats.git
# Environment
Ubuntu 18.04, 64bit
# Testcase
```c
#include <stdio.h>
#include <stdlib.h>
#include "ok_jpg.h"
#include "ok_jpg.c"
int main(int _argc, char **_argv) {
FILE *file = fopen("_argv[1]", "rb");
ok_... | heap-buffer-overflow in functionok_jpg_convert_YCbCr_to_RGB() at ok_jpg.c:513 | https://api.github.com/repos/brackeen/ok-file-formats/issues/12/comments | 1 | 2021-03-26T08:44:18Z | 2021-04-05T22:46:03Z | https://github.com/brackeen/ok-file-formats/issues/12 | 841,726,465 | 12 | 3,246 |
CVE-2021-44339 | 2022-02-28T16:15:07.880 | David Brackeen ok-file-formats 203defd is vulnerable to Buffer Overflow. When the function of the ok-file-formats project is used, a heap-buffer-overflow occurred in function ok_png_transform_scanline() in "/ok_png.c:712". | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/brackeen/ok-file-formats/issues/15"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ok-file-formats_project:ok-file-formats:2021-06-05:*:*:*:*:*:*:*",
"matchCriteriaId": "FEF1A3E0-1854-4086-844E-05721E915556",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"787"
] | 787 | https://github.com/brackeen/ok-file-formats/issues/15 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"brackeen",
"ok-file-formats"
] | # Version
[203defd](https://github.com/brackeen/ok-file-formats/commit/203defdfb2c8b1207a392493a09145c1b54bb070)
# Environment
Ubuntu 18.04,64 bit
# Testcase
```c
#include <stdio.h>
#include <stdlib.h>
#include "ok_png.c"
#include "ok_png.h"
int main(int _argc, char **_argv) {
FILE *file = f... | heap-buffer-overflow in function ok_png_transform_scanline() at ok_png.c:712:13 | https://api.github.com/repos/brackeen/ok-file-formats/issues/15/comments | 1 | 2021-06-07T04:58:26Z | 2022-05-09T10:32:12Z | https://github.com/brackeen/ok-file-formats/issues/15 | 913,089,593 | 15 | 3,247 |
CVE-2021-44331 | 2022-02-28T17:15:09.923 | ARM astcenc 3.2.0 is vulnerable to Buffer Overflow in function encode_ise(). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ARM-software/astc-encoder/issues/294"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue T... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:arm:adaptive_scalable_texture_compression_encoder:3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DC0AA123-0F53-4A6E-980E-4539FBAB8242",
"versionEndExcluding": null,
"versionEndIncluding": nul... | [
"787"
] | 787 | https://github.com/ARM-software/astc-encoder/issues/294 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ARM-software",
"astc-encoder"
] | # Version
```
astcenc v3.2.0, 64-bit sse2
```
# Environment
Ubuntu 18.04,64 bit
# Command
**Compile test program:**
```c++
$ mkdir build
$ cd build
$ cmake -G "Unix Makefiles" -DCMAKE_BUILD_TYPE=Release ..
$ make -j8
```
**Compile test program with address sanitizer:**
- Update Makefile:
... | stack-buffer-overflow in function encode_ise() | https://api.github.com/repos/ARM-software/astc-encoder/issues/294/comments | 5 | 2021-10-22T05:11:46Z | 2021-10-27T12:31:03Z | https://github.com/ARM-software/astc-encoder/issues/294 | 1,033,185,978 | 294 | 3,248 |
CVE-2021-44342 | 2022-02-28T17:15:09.970 | David Brackeen ok-file-formats 203defd is vulnerable to Buffer Overflow via function ok_png_transform_scanline() in "/ok_png.c:494". | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/brackeen/ok-file-formats/issues/19"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ok-file-formats_project:ok-file-formats:2021-06-05:*:*:*:*:*:*:*",
"matchCriteriaId": "FEF1A3E0-1854-4086-844E-05721E915556",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"787"
] | 787 | https://github.com/brackeen/ok-file-formats/issues/19 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"brackeen",
"ok-file-formats"
] | # Version
[203defd](https://github.com/brackeen/ok-file-formats/commit/203defdfb2c8b1207a392493a09145c1b54bb070)
# Environment
Ubuntu 18.04,64 bit
# Testcase
```c
#include <stdio.h>
#include <stdlib.h>
#include "ok_png.c"
#include "ok_png.h"
int main(int _argc, char **_argv) {
FILE *file = f... | heap-buffer-overflow in function ok_png_transform_scanline() at ok_png.c:494:20 | https://api.github.com/repos/brackeen/ok-file-formats/issues/19/comments | 1 | 2021-06-07T05:05:25Z | 2022-05-09T10:33:54Z | https://github.com/brackeen/ok-file-formats/issues/19 | 913,093,988 | 19 | 3,249 |
CVE-2022-25013 | 2022-02-28T19:15:12.433 | Ice Hrm 30.0.0.OS was discovered to contain multiple reflected cross-site scripting (XSS) vulnerabilities via the "key" and "fm" parameters in the component login.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gamonoid/icehrm/issues/284"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:icehrm:icehrm:30.0.0.os:*:*:*:*:*:*:*",
"matchCriteriaId": "5CC48B8B-4DDC-44AC-A809-2F88B317605E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"79"
] | 79 | https://github.com/gamonoid/icehrm/issues/284 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gamonoid",
"icehrm"
] | # Important note :
This vulnerability was reported to the maintainers on **Nov 23rd, 2021**, and there has been no response yet. So, I infer it makes sense to publish it publicly here for the good sake of everyone who is using this software actively.
# Description
DOM XSS in login.php GET parameter `key`.
The in... | Reflected XSS vulnerabilities in login.php -- can be used to leak passwords | https://api.github.com/repos/gamonoid/icehrm/issues/284/comments | 1 | 2021-12-23T08:13:20Z | 2022-01-14T20:12:38Z | https://github.com/gamonoid/icehrm/issues/284 | 1,087,479,274 | 284 | 3,250 |
CVE-2022-25014 | 2022-02-28T19:15:12.480 | Ice Hrm 30.0.0.OS was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the "m" parameter in the Dashboard of the current user. This vulnerability allows attackers to compromise session credentials via user interaction with a crafted link. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gamonoid/icehrm/issues/283"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:icehrm:icehrm:30.0.0.os:*:*:*:*:*:*:*",
"matchCriteriaId": "5CC48B8B-4DDC-44AC-A809-2F88B317605E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"79"
] | 79 | https://github.com/gamonoid/icehrm/issues/283 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gamonoid",
"icehrm"
] | # Important note :
This vulnerability was reported to the maintainers on **Nov 23rd, 2021**, and there has been no response yet. So, I infer it makes sense to publish it publicly here for the good sake of everyone who is using this software actively.
# Description
The input sent to GET parameter `m` gets reflecte... | Reflected XSS vulnerability in the Dashboard page of logged-in user | https://api.github.com/repos/gamonoid/icehrm/issues/283/comments | 1 | 2021-12-23T08:09:18Z | 2022-02-08T10:13:15Z | https://github.com/gamonoid/icehrm/issues/283 | 1,087,476,492 | 283 | 3,251 |
CVE-2022-25015 | 2022-02-28T19:15:12.527 | A stored cross-site scripting (XSS) vulnerability in Ice Hrm 30.0.0.OS allows attackers to steal cookies via a crafted payload inserted into the First Name field. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gamonoid/icehrm/issues/285"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:icehrm:icehrm:30.0.0.os:*:*:*:*:*:*:*",
"matchCriteriaId": "5CC48B8B-4DDC-44AC-A809-2F88B317605E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"79"
] | 79 | https://github.com/gamonoid/icehrm/issues/285 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gamonoid",
"icehrm"
] | # Important note :
This vulnerability was reported to the maintainers on **Nov 23rd, 2021**, and there has been no response yet. So, I infer it makes sense to publish it publicly here for the good sake of everyone who is using this software actively.
# Description
An Authenticated user can set thier 'first name' ... | Stored XSS vulnerability in dashboard of any logged-in user | https://api.github.com/repos/gamonoid/icehrm/issues/285/comments | 1 | 2021-12-23T08:15:18Z | 2022-03-01T04:15:01Z | https://github.com/gamonoid/icehrm/issues/285 | 1,087,480,595 | 285 | 3,252 |
CVE-2022-25023 | 2022-02-28T19:15:12.573 | Audio File commit 004065d was discovered to contain a heap-buffer overflow in the function fouBytesToInt():AudioFile.h. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/adamstark/AudioFile/issues/58"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:audio_file_project:audio_file:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C2FF1257-FC62-4620-A576-3D6A9D05D91C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"787"
] | 787 | https://github.com/adamstark/AudioFile/issues/58 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"adamstark",
"AudioFile"
] | ### Description
A heap-buffer-overflow was discovered in function fouBytesToInt():AudioFile.h:1196
The issue is being triggered in function getIndexOfChunk()
### Version
Version [004065d](https://github.com/adamstark/AudioFile/commit/004065d01e9b7338580390d4fdbfbaa46adede4e) (Lastest commit)
### Environment
U... | [Bug]heap-buffer-overflow in function fouBytesToInt():AudioFile.h:1196 | https://api.github.com/repos/adamstark/AudioFile/issues/58/comments | 2 | 2022-02-08T12:21:52Z | 2022-08-01T20:41:30Z | https://github.com/adamstark/AudioFile/issues/58 | 1,127,185,345 | 58 | 3,253 |
CVE-2022-26181 | 2022-02-28T19:15:12.673 | Dropbox Lepton v1.2.1-185-g2a08b77 was discovered to contain a heap-buffer-overflow in the function aligned_dealloc():src/lepton/bitops.cc:108. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://drive.google.com/file/d/1bJlHozO37c5NZ1wI0NBWh0yHHyTcfaQL/view?usp=sharing"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/dropbox/lept... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dropbox:lepton:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6DCDBF54-A4B3-4D67-A014-6ECC38D58621",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"787"
] | 787 | https://github.com/dropbox/lepton/issues/154 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"dropbox",
"lepton"
] | ### Description
A heap-buffer-overflow was discovered in function aligned_dealloc():src/lepton/bitops.cc:108 The issue is being triggered in function reset_buffers() src/lepton/jpgcoder.cc:4373
### Version
lepton v1.0-1.2.1-185-g2a08b77 (Lastest Commit) url: https://github.com/dropbox/lepton
### Reproduce
```
... | [Bug]A heap-buffer-overflow was discovered in function aligned_dealloc():src/lepton/bitops.cc:108 | https://api.github.com/repos/dropbox/lepton/issues/154/comments | 0 | 2022-02-21T11:00:57Z | 2022-04-13T07:01:04Z | https://github.com/dropbox/lepton/issues/154 | 1,145,642,507 | 154 | 3,254 |
CVE-2022-26315 | 2022-02-28T19:15:12.717 | qrcp through 0.8.4, in receive mode, allows ../ Directory Traversal via the file name specified by the uploader. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/claudiodangelis/qrcp/issues/223"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Thi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:qrcp_project:qrcp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9127C471-EEAF-479B-9506-95C640914824",
"versionEndExcluding": null,
"versionEndIncluding": "0.8.4",
"versionStartExclu... | [
"22"
] | 22 | https://github.com/claudiodangelis/qrcp/issues/223 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"claudiodangelis",
"qrcp"
] | While qrcp works on receive mode, uploader can edit the file name in HTTP request and add "../". Meanwhile, qrcp doesn't check legality of file name which lead to directory traversal.
Env: qrcp-0.8.4, Windows 10 x86_64, Ubuntu 20.04 x86_64
Poc:
<img width="952" alt="image" src="https://user-images.githubusercontent.... | Directory Traversal Vulnerability | https://api.github.com/repos/claudiodangelis/qrcp/issues/223/comments | 2 | 2022-02-28T14:59:45Z | 2022-03-05T03:57:24Z | https://github.com/claudiodangelis/qrcp/issues/223 | 1,154,193,943 | 223 | 3,255 |
CVE-2022-25407 | 2022-02-28T23:15:12.647 | Hospital Management System v1.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Doctor parameter at /admin-panel1.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/kishan0725/Hospital-Management-System/issues/21"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Track... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hospital_management_system_project:hospital_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "36653204-5E38-44E3-B8FD-580F2D27E958",
"versionEndExcluding": null,
"versionEndInclu... | [
"79"
] | 79 | https://github.com/kishan0725/Hospital-Management-System/issues/21 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"kishan0725",
"Hospital-Management-System"
] | Add Doctor info payload to Doctor Name of Add Doctor page to target /admin-panel1.php ,then use burpsuite get requests datas,change the 'doctor' parameter to xss payload: `<sCrIpT>alert(1234)</ScRiPt>`
Add Doctor info payload to Doctor Name of Add Doctor page to target /admin-panel1.php ,then use burpsuite get r... | Persistent cross-site scripting (XSS) in targeted towards web admin through /admin-panel1.php at via the parameter doctor. | https://api.github.com/repos/kishan0725/Hospital-Management-System/issues/21/comments | 0 | 2022-02-13T15:55:55Z | 2022-02-13T15:55:55Z | https://github.com/kishan0725/Hospital-Management-System/issues/21 | 1,136,052,127 | 21 | 3,256 |
CVE-2022-25408 | 2022-02-28T23:15:12.687 | Hospital Management System v1.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the dpassword parameter at /admin-panel1.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/kishan0725/Hospital-Management-System/issues/22"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Track... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hospital_management_system_project:hospital_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "36653204-5E38-44E3-B8FD-580F2D27E958",
"versionEndExcluding": null,
"versionEndInclu... | [
"79"
] | 79 | https://github.com/kishan0725/Hospital-Management-System/issues/22 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"kishan0725",
"Hospital-Management-System"
] | Add Doctor info payload to Doctor Name of Add Doctor page to target /admin-panel1.php ,then use burpsuite get requests datas,change the 'dpassword' parameter to xss payload: `<sCrIpT>alert(7777)</ScRiPt>`
Steps to exploit:
1) Navigate to http://hospital.com/admin-panel1.php
2) click 'Add Doctors ', use burpsui... | Persistent cross-site scripting (XSS) in targeted towards web admin through /admin-panel1.php at via the parameter dpassword. | https://api.github.com/repos/kishan0725/Hospital-Management-System/issues/22/comments | 0 | 2022-02-13T15:57:12Z | 2022-02-13T15:58:44Z | https://github.com/kishan0725/Hospital-Management-System/issues/22 | 1,136,053,859 | 22 | 3,257 |
CVE-2022-25409 | 2022-02-28T23:15:12.727 | Hospital Management System v1.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the demail parameter at /admin-panel1.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/kishan0725/Hospital-Management-System/issues/20"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Track... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hospital_management_system_project:hospital_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "36653204-5E38-44E3-B8FD-580F2D27E958",
"versionEndExcluding": null,
"versionEndInclu... | [
"79"
] | 79 | https://github.com/kishan0725/Hospital-Management-System/issues/20 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"kishan0725",
"Hospital-Management-System"
] | Persistent cross-site scripting (XSS) in Hospital Management System v4.0 targeted towards web admin through /admin-panel1.php at via the parameter demail.
Add Doctor info payload to Doctor Name of Add Doctor page to target /admin-panel1.php ,then use burpsuite get requests datas,change the 'demail' parameter to... | Persistent cross-site scripting (XSS) targeted towards web admin through /admin-panel1.php at via the parameter demail. | https://api.github.com/repos/kishan0725/Hospital-Management-System/issues/20/comments | 0 | 2022-02-13T15:53:58Z | 2022-02-13T15:53:58Z | https://github.com/kishan0725/Hospital-Management-System/issues/20 | 1,136,049,571 | 20 | 3,258 |
CVE-2022-25410 | 2022-02-28T23:15:12.767 | Maxsite CMS v180 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the parameter f_file_description at /admin/files. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/maxsite/cms/issues/485"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:max-3000:maxsite_cms:108:*:*:*:*:*:*:*",
"matchCriteriaId": "EC356198-5D41-4152-90E2-AED880BAB522",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"79"
] | 79 | https://github.com/maxsite/cms/issues/485 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"maxsite",
"cms"
] | ### Stored-Cross-Site-Scripting (XSS) -2
a stored cross-site scripting (XSS) in maxsite cms targeted towards web admin through ~/admin/files at via the parameter f_file_description .
1. Navigate to admin page, go to http://localhost/admin/files,then update a xss.gif file
(authenticated) --2 | https://api.github.com/repos/maxsite/cms/issues/485/comments | 1 | 2022-02-17T16:01:55Z | 2022-02-17T16:20:15Z | https://github.com/maxsite/cms/issues/485 | 1,141,533,236 | 485 | 3,259 |
CVE-2022-25411 | 2022-02-28T23:15:12.810 | A Remote Code Execution (RCE) vulnerability at /admin/options in Maxsite CMS v180 allows attackers to execute arbitrary code via a crafted PHP file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/maxsite/cms/issues/487"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:max-3000:maxsite_cms:108:*:*:*:*:*:*:*",
"matchCriteriaId": "EC356198-5D41-4152-90E2-AED880BAB522",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"434"
] | 434 | https://github.com/maxsite/cms/issues/487 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"maxsite",
"cms"
] | ### Description of Vulnerability
The arbitrary file deletion vulnerability https://github.com/maxsite/cms/issues/486),we can delete ~/cms-108/uploads/.htaccess, and then in /admin/options add the types of files allowed to be uploaded, it will allows hacker to bypass the protection system protection
upload malicio... | Remote Code Execution Vulnerability In MaxSite CMS v180 | https://api.github.com/repos/maxsite/cms/issues/487/comments | 1 | 2022-02-17T17:15:18Z | 2022-02-17T19:03:19Z | https://github.com/maxsite/cms/issues/487 | 1,141,623,090 | 487 | 3,260 |
CVE-2022-25412 | 2022-02-28T23:15:12.850 | Maxsite CMS v180 was discovered to contain multiple arbitrary file deletion vulnerabilities in /admin_page/all-files-update-ajax.php via the dir and deletefile parameters. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.5,
"confidentialityImpact": "NONE"... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/maxsite/cms/issues/486"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:max-3000:maxsite_cms:108:*:*:*:*:*:*:*",
"matchCriteriaId": "EC356198-5D41-4152-90E2-AED880BAB522",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"22"
] | 22 | https://github.com/maxsite/cms/issues/486 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"maxsite",
"cms"
] |
#### Description of Vulnerability
Multiple Arbitrary File Deletion vulnerabilities in maxsite cms v 180 targeted towards web admin through admin/plugins/admin_page/all-files-update-ajax.php at the parameter dir and deletefile
#### affected source code:
at 15~34 in admin/plugins/admin_page/all-files-update-aja... | Multiple Arbitrary File Deletion vulnerabilities | https://api.github.com/repos/maxsite/cms/issues/486/comments | 1 | 2022-02-17T16:55:54Z | 2022-02-17T19:01:48Z | https://github.com/maxsite/cms/issues/486 | 1,141,600,693 | 486 | 3,261 |
CVE-2022-25413 | 2022-02-28T23:15:12.890 | Maxsite CMS v108 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the parameter f_tags at /admin/page_edit/3. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/maxsite/cms/issues/484"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:max-3000:maxsite_cms:108:*:*:*:*:*:*:*",
"matchCriteriaId": "EC356198-5D41-4152-90E2-AED880BAB522",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"79"
] | 79 | https://github.com/maxsite/cms/issues/484 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"maxsite",
"cms"
] | ### Stored-Cross-Site-Scripting (XSS)(authenticated)
a stored cross-site scripting (XSS) in maxsite cms version 108 targeted towards web admin through ~/admin/page_edit/3 at via the parameter f_tags.
1. Navigate to admin page, ~/admin/page_edit/ and make a new page
2. click in "Рубрики и метки">"Метки (через з... | Stored-Cross-Site-Scripting (XSS)-vulnerabilities(authenticated)--1 | https://api.github.com/repos/maxsite/cms/issues/484/comments | 1 | 2022-02-17T15:24:21Z | 2022-02-17T15:57:02Z | https://github.com/maxsite/cms/issues/484 | 1,141,483,156 | 484 | 3,262 |
CVE-2022-23380 | 2022-03-01T14:15:07.820 | There is a SQL injection vulnerability in the background of taocms 3.0.2 in parameter id:action=admin&id=2&ctrl=edit. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/taogogo/taocms/issues/16"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"89"
] | 89 | https://github.com/taogogo/taocms/issues/16 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"taogogo",
"taocms"
] | 

```
GET /admin/admin.php?action=admin&id=2+and(sleep(5))--+&ctrl=edit... | There is SQL blind injection at "Admin Edit" | https://api.github.com/repos/taogogo/taocms/issues/16/comments | 0 | 2022-01-15T18:16:58Z | 2022-01-16T03:13:12Z | https://github.com/taogogo/taocms/issues/16 | 1,104,805,848 | 16 | 3,263 |
CVE-2022-23387 | 2022-03-01T17:15:08.120 | An issue was discovered in taocms 3.0.2. This is a SQL blind injection that can obtain database data through the Comment Update field. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/taogogo/taocms/issues"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:taocms:taocms:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "98036B99-8DC6-4F7F-9450-763A199E6148",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"89"
] | 89 | https://github.com/taogogo/taocms/issues/23 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"taogogo",
"taocms"
] |
```
POST /admin/admin.php HTTP/1.1
Host: taocms.test
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8... | There is SQL blind injection at "Comment Update" | https://api.github.com/repos/taogogo/taocms/issues/23/comments | 0 | 2022-01-17T02:51:41Z | 2022-01-17T02:51:41Z | https://github.com/taogogo/taocms/issues/23 | 1,105,307,017 | 23 | 3,264 |
CVE-2021-41652 | 2022-03-01T23:15:08.397 | Insecure permissions in the file database.sdb of BatFlat CMS v1.3.6 allows attackers to dump the entire database. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "https://deathflash1411.github.io/blog/dumping-batflat-cms-database"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/sruupl/batflat/is... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:batflat:batflat:1.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "CCD502D1-2B27-4BC5-9DF2-C71F42212D85",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"276"
] | 276 | https://github.com/sruupl/batflat/issues/113 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"sruupl",
"batflat"
] | Improper access control leads to accessing the database file (database.sdb)
- https://leobreaker1411.github.io/blog/cve-2021-41652 | Improper access control | https://api.github.com/repos/sruupl/batflat/issues/113/comments | 1 | 2021-09-20T16:54:46Z | 2022-04-07T13:53:26Z | https://github.com/sruupl/batflat/issues/113 | 1,001,188,810 | 113 | 3,265 |
CVE-2021-45860 | 2022-03-02T00:15:08.030 | An integer overflow in DTSStreamReader::findFrame() of tsMuxer git-2678966 allows attackers to cause a Denial of Service (DoS) via a crafted file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/justdan96/tsMuxer/issues/510"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tsmuxer_project:tsmuxer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2022C236-72EE-451A-AA9D-5F3E2DA838E3",
"versionEndExcluding": "2021-12-21",
"versionEndIncluding": null,
"versio... | [
"190"
] | 190 | https://github.com/justdan96/tsMuxer/issues/510 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"justdan96",
"tsMuxer"
] | Hi, I found a integer overflow in DTSStreamReader::findFrame()
https://github.com/justdan96/tsMuxer/blob/380cca33a2fc68b1f9e7a7c79302b13274ededcd/tsMuxer/dtsStreamReader.cpp#L204-L212
**POC**
[poc.zip](https://github.com/justdan96/tsMuxer/files/7750896/poc.zip)
With this poc, the buffer is too small but the... | An Integer Overflow in DTSStreamReader::findFrame() | https://api.github.com/repos/justdan96/tsMuxer/issues/510/comments | 0 | 2021-12-21T08:53:16Z | 2022-06-23T07:12:55Z | https://github.com/justdan96/tsMuxer/issues/510 | 1,085,586,537 | 510 | 3,266 |
CVE-2021-45861 | 2022-03-02T00:15:08.080 | There is an Assertion `num <= INT_BIT' failed at BitStreamReader::skipBits in /bitStream.h:132 of tsMuxer git-c6a0277. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/justdan96/tsMuxer/issues/478"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tsmuxer_project:tsmuxer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "05AA1A0C-51F5-46F3-A82E-5E73923E2877",
"versionEndExcluding": "2021-10-19",
"versionEndIncluding": null,
"versio... | [
"617"
] | 617 | https://github.com/justdan96/tsMuxer/issues/478 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"justdan96",
"tsMuxer"
] | Hi, I Found an Assertion Failed error.
**Some info:**
```
Ubuntu 20.04.3 LTS
tsMuxeR version git-c6a0277
```
**To reproduce**
1. Compile tsMuxer
2. Run tsmuxer
```
tsmuxer ./poc
tsMuxeR version git-c6a0277. github.com/justdan96/tsMuxer
tsmuxer: tsMuxer/tsMuxer/bitStream.h:132: void BitStreamReader::skipBi... | Assertion Failed in bitStream.h:132 BitStreamReader::skipBits | https://api.github.com/repos/justdan96/tsMuxer/issues/478/comments | 1 | 2021-10-18T14:29:17Z | 2022-06-22T21:45:09Z | https://github.com/justdan96/tsMuxer/issues/478 | 1,029,196,897 | 478 | 3,267 |
CVE-2021-45863 | 2022-03-02T00:15:08.127 | tsMuxer git-2678966 was discovered to contain a heap-based buffer overflow via the function HevcUnit::updateBits in hevc.cpp. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/justdan96/tsMuxer/issues/509"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tsmuxer_project:tsmuxer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2022C236-72EE-451A-AA9D-5F3E2DA838E3",
"versionEndExcluding": "2021-12-21",
"versionEndIncluding": null,
"versio... | [
"787"
] | 787 | https://github.com/justdan96/tsMuxer/issues/509 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"justdan96",
"tsMuxer"
] | Hi, I found a heap-buffer-overflow error.
**Some Info**
```
Ubuntu 20.04.3 LTS
tsMuxeR version git-2678966.
```
**To reproduce**
1. Compile tsMuxer
2. run tsmuxer
```
tsmuxer ./poc
```
**Asan output**
```
$ tsMuxer-asan ./poc
tsMuxeR version git-2678966. github.com/justdan96/tsMuxer
This HEV... | heap-buffer-overflow in hevc.cpp:76 HevcUnit::updateBits | https://api.github.com/repos/justdan96/tsMuxer/issues/509/comments | 0 | 2021-12-21T08:06:40Z | 2022-06-22T21:43:07Z | https://github.com/justdan96/tsMuxer/issues/509 | 1,085,548,429 | 509 | 3,268 |
CVE-2021-45864 | 2022-03-02T00:15:08.173 | tsMuxer git-c6a0277 was discovered to contain a segmentation fault via DTSStreamReader::findFrame in dtsStreamReader.cpp. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/justdan96/tsMuxer/issues/476"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tsmuxer_project:tsmuxer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "05AA1A0C-51F5-46F3-A82E-5E73923E2877",
"versionEndExcluding": "2021-10-19",
"versionEndIncluding": null,
"versio... | [
"125"
] | 125 | https://github.com/justdan96/tsMuxer/issues/476 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"justdan96",
"tsMuxer"
] | Hi, I found a segmentation fault.
**Some info:**
```
Ubuntu 20.04.3 LTS
tsMuxeR version git-c6a0277
```
**To reproduce**
1. Compile tsMuxer
2. Run tsmuxer
```
tsmuxer ./poc
```
**POC**
[poc.zip](https://github.com/justdan96/tsMuxer/files/7365611/poc.zip)
**ASAN output:**
```
tsMuxeR version gi... | segmentation fault in dtsStreamReader.cpp:193 DTSStreamReader::findFrame | https://api.github.com/repos/justdan96/tsMuxer/issues/476/comments | 1 | 2021-10-18T14:12:22Z | 2022-06-23T07:14:29Z | https://github.com/justdan96/tsMuxer/issues/476 | 1,029,175,684 | 476 | 3,269 |
CVE-2022-25050 | 2022-03-02T00:15:08.250 | rtl_433 21.12 was discovered to contain a stack overflow in the function somfy_iohc_decode(). This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/merbanan/rtl_433/commit/2dad7b9fc67a1d0bfbe520fbd821678b8f8cc7a8"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rtl_433_project:rlt_433:21.12:*:*:*:*:*:*:*",
"matchCriteriaId": "706EE005-D69A-444F-9F6D-DFDB877D2A52",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"787"
] | 787 | https://github.com/merbanan/rtl_433/issues/1960 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"merbanan",
"rtl_433"
] | Hey there!
I belong to an open source security research community, and a member (@aug5t7) has found an issue, but doesn’t know the best way to disclose it.
If not a hassle, might you kindly add a `SECURITY.md` file with an email, or another contact method? GitHub [recommends](https://docs.github.com/en/code-security/... | Responsible disclosure policy | https://api.github.com/repos/merbanan/rtl_433/issues/1960/comments | 6 | 2022-01-24T12:23:29Z | 2022-02-03T10:53:20Z | https://github.com/merbanan/rtl_433/issues/1960 | 1,112,577,948 | 1,960 | 3,270 |
CVE-2022-25045 | 2022-03-02T21:15:08.313 | Home Owners Collection Management System v1.0 was discovered to contain hardcoded credentials which allows attackers to escalate privileges and access the admin panel. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/VivekPanday12/CVE-/issues/6"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.linkedin.com/in/vi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:home_owners_collection_management_system_project:home_owners_collection_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FDB75A84-7EE7-4D4A-9B5F-77365D793307",
"versionEndExcluding": null,
... | [
"798"
] | 798 | https://github.com/VivekPanday12/CVE-/issues/6 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"VivekPanday12",
"CVE-"
] | CVE-2022-25045 Exploit Title: Home Owners Collection Management System — Use of Hard-coded Credentials in Source Code Leads to Admin Panel Access
Exploit Author: VIVEK PANDAY
Vendor Homepage: https://www.sourcecodester.com/
Software Link: https://www.sourcecodester.com/php/15162/home-owners-collection-manage... | CVE-2022-25045 Home Owners Collection Management System — Use of Hard-coded Credentials in Source Code Leads to Admin Panel Access | https://api.github.com/repos/VivekPanday12/CVE-/issues/6/comments | 0 | 2022-02-09T09:00:10Z | 2022-05-18T10:22:16Z | https://github.com/VivekPanday12/CVE-/issues/6 | 1,128,242,995 | 6 | 3,271 |
CVE-2021-23180 | 2022-03-02T23:15:08.283 | A flaw was found in htmldoc in v1.9.12 and before. Null pointer dereference in file_extension(),in file.c may lead to execute arbitrary code and denial of service. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967041"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B9DD956F-44F8-4CB5-B9FD-9269C3E931F2",
"versionEndExcluding": null,
"versionEndIncluding": "1.9.12",
"versionSta... | [
"476"
] | 476 | https://github.com/michaelrsweet/htmldoc/issues/418 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"michaelrsweet",
"htmldoc"
] | Hello, While fuzzing htmldoc , I found aSEGV in file_extension function in file.c:337:29
- test platform
htmldoc Version 1.9.12 git [master 6898d0a]
OS :Ubuntu 20.04.1 LTS x86_64
kernel: 5.4.0-53-generic
compiler: clang version 10.0.0-4ubuntu1
reproduced:
htmldoc -f demo.pdf poc8.html
poc(zipped for up... | AddressSanitizer: SEGV in file_extension file.c:337:29 | https://api.github.com/repos/michaelrsweet/htmldoc/issues/418/comments | 2 | 2021-01-26T09:02:25Z | 2022-03-11T05:20:30Z | https://github.com/michaelrsweet/htmldoc/issues/418 | 794,056,743 | 418 | 3,272 |
CVE-2021-23191 | 2022-03-02T23:15:08.347 | A security issue was found in htmldoc v1.9.12 and before. A NULL pointer dereference in the function image_load_jpeg() in image.cxx may result in denial of service. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967022"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B9DD956F-44F8-4CB5-B9FD-9269C3E931F2",
"versionEndExcluding": null,
"versionEndIncluding": "1.9.12",
"versionSta... | [
"476"
] | 476 | https://github.com/michaelrsweet/htmldoc/issues/415 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"michaelrsweet",
"htmldoc"
] | Hello, While fuzzing htmldoc , I found SEGV on unknown address
test platform
htmldoc Version 1.9.12 git [master 6898d0a]
OS :Ubuntu 20.04.1 LTS x86_64
kernel: 5.4.0-53-generic
compiler: clang version 10.0.0-4ubuntu1
reproduced:
```
htmldoc -f demo.pdf poc4.html
```
poc(zipped for update):
[poc4.zip]... | AddressSanitizer: SEGV on unknown address 0x000000000014 | https://api.github.com/repos/michaelrsweet/htmldoc/issues/415/comments | 7 | 2021-01-26T08:50:41Z | 2022-03-11T05:12:06Z | https://github.com/michaelrsweet/htmldoc/issues/415 | 794,049,235 | 415 | 3,273 |
CVE-2021-23206 | 2022-03-02T23:15:08.460 | A flaw was found in htmldoc in v1.9.12 and prior. A stack buffer overflow in parse_table() in ps-pdf.cxx may lead to execute arbitrary code and denial of service. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967028"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B9DD956F-44F8-4CB5-B9FD-9269C3E931F2",
"versionEndExcluding": null,
"versionEndIncluding": "1.9.12",
"versionSta... | [
"787"
] | 787 | https://github.com/michaelrsweet/htmldoc/issues/416 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"michaelrsweet",
"htmldoc"
] | Hello, While fuzzing htmldoc , I found a stack-buffer-overflow in parse_table() ps-pdf.cxx:6611:25
- test platform
htmldoc Version 1.9.12 git [master 6898d0a]
OS :Ubuntu 20.04.1 LTS x86_64
kernel: 5.4.0-53-generic
compiler: clang version 10.0.0-4ubuntu1
reproduced:
```
htmldoc -f demo.pdf poc6.html
```... | AddressSanitizer: stack-buffer-overflow in parse_table ps-pdf.cxx:6611:25 | https://api.github.com/repos/michaelrsweet/htmldoc/issues/416/comments | 3 | 2021-01-26T08:54:36Z | 2022-03-11T05:14:48Z | https://github.com/michaelrsweet/htmldoc/issues/416 | 794,051,710 | 416 | 3,274 |
CVE-2021-44335 | 2022-03-03T00:15:08.157 | David Brackeen ok-file-formats 203defd is vulnerable to Buffer Overflow. When the function of the ok-file-formats project is used, a heap-buffer-overflow occurs in function ok_png_transform_scanline() in "/ok_png.c:533". | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/brackeen/ok-file-formats/issues/17"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ok-file-formats_project:ok-file-formats:2021-06-05:*:*:*:*:*:*:*",
"matchCriteriaId": "FEF1A3E0-1854-4086-844E-05721E915556",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"787"
] | 787 | https://github.com/brackeen/ok-file-formats/issues/17 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"brackeen",
"ok-file-formats"
] | ## Version
[203defd](https://github.com/brackeen/ok-file-formats/commit/203defdfb2c8b1207a392493a09145c1b54bb070)
# Environment
Ubuntu 18.04,64 bit
# Testcase
```c
#include <stdio.h>
#include <stdlib.h>
#include "ok_png.c"
#include "ok_png.h"
int main(int _argc, char **_argv) {
FILE *file = ... | heap-buffer-overflow in function ok_png_transform_scanline() at ok_png.c:533:20 | https://api.github.com/repos/brackeen/ok-file-formats/issues/17/comments | 1 | 2021-06-07T05:03:03Z | 2022-05-09T10:33:04Z | https://github.com/brackeen/ok-file-formats/issues/17 | 913,092,383 | 17 | 3,275 |
CVE-2021-44343 | 2022-03-03T00:15:08.200 | David Brackeen ok-file-formats 203defd is vulnerable to Buffer Overflow. When the function of the ok-file-formats project is used, a heap-buffer-overflow occurred in function ok_png_read_data() in "/ok_png.c". | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/brackeen/ok-file-formats/issues/18"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ok-file-formats_project:ok-file-formats:2021-06-05:*:*:*:*:*:*:*",
"matchCriteriaId": "FEF1A3E0-1854-4086-844E-05721E915556",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"120"
] | 120 | https://github.com/brackeen/ok-file-formats/issues/18 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"brackeen",
"ok-file-formats"
] | # Version
[203defd](https://github.com/brackeen/ok-file-formats/commit/203defdfb2c8b1207a392493a09145c1b54bb070)
# Environment
Ubuntu 18.04,64 bit
# Testcase
```c
#include <stdio.h>
#include <stdlib.h>
#include "ok_png.c"
#include "ok_png.h"
int main(int _argc, char **_argv) {
FILE *file = f... | heap-buffer-overflow in ‘/usr/lib/x86_64-linux-gnu/libasan.so.3+0x47dc3’ | https://api.github.com/repos/brackeen/ok-file-formats/issues/18/comments | 1 | 2021-06-07T05:04:12Z | 2022-05-09T10:33:29Z | https://github.com/brackeen/ok-file-formats/issues/18 | 913,093,151 | 18 | 3,276 |
CVE-2021-40635 | 2022-03-03T14:15:07.870 | OS4ED openSIS 8.0 is affected by SQL injection in ChooseCpSearch.php, ChooseRequestSearch.php. An attacker can inject a SQL query to extract information from the database. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/OS4ED/openSIS-Classic/issues/195"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Th... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:os4ed:opensis:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20B5286C-4CFF-4710-8D23-C76669FADFE7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"89"
] | 89 | https://github.com/OS4ED/openSIS-Classic/issues/195 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"OS4ED",
"openSIS-Classic"
] | Due to no security mechanism was implemented in parameter `id`, attacker can inject arbitrary SQL query and extract database informations

### Vulnerable code section
**Choo... | SQL Injection in id Parameter | https://api.github.com/repos/OS4ED/openSIS-Classic/issues/195/comments | 2 | 2021-09-01T15:52:40Z | 2021-09-09T22:20:42Z | https://github.com/OS4ED/openSIS-Classic/issues/195 | 985,319,720 | 195 | 3,277 |
CVE-2021-40636 | 2022-03-03T14:15:07.930 | OS4ED openSIS 8.0 is affected by SQL Injection in CheckDuplicateName.php, which can extract information from the database. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/OS4ED/openSIS-Classic/issues/198"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Th... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:os4ed:opensis:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20B5286C-4CFF-4710-8D23-C76669FADFE7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"89"
] | 89 | https://github.com/OS4ED/openSIS-Classic/issues/198 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"OS4ED",
"openSIS-Classic"
] | ### Description
Due to lack of protection, parameters `table_name`, `field_name`, `id`, `field_id` can be abused to injection SQL queries to extract information from databases some other SQLi tricks, parameter `msg` can be used to inject XSS payload and steal user's cookie (and even takeover user's account)
![Scre... | XSS and Error based SQL injection in CheckDuplicateName.php | https://api.github.com/repos/OS4ED/openSIS-Classic/issues/198/comments | 4 | 2021-09-05T08:05:52Z | 2022-03-05T02:40:45Z | https://github.com/OS4ED/openSIS-Classic/issues/198 | 988,449,754 | 198 | 3,278 |
CVE-2021-40637 | 2022-03-03T15:15:08.427 | OS4ED openSIS 8.0 is affected by cross-site scripting (XSS) in EmailCheckOthers.php. An attacker can inject JavaScript code to get the user's cookie and take over the working session of user. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/OS4ED/openSIS-Classic/issues/199"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Th... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:os4ed:opensis:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20B5286C-4CFF-4710-8D23-C76669FADFE7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"79"
] | 79 | https://github.com/OS4ED/openSIS-Classic/issues/199 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"OS4ED",
"openSIS-Classic"
] | ### Description
By injecting Javascript code, an attacker can steal the user's cookie and take over the user's account. This happened because of the lack of security implementation for`type` parameter. This was tested on demo website
### Exploitation
![Screenshot from 2021-09-05 14-06-22](https://user-images.g... | Reflected XSS in EmailCheckOthers.php | https://api.github.com/repos/OS4ED/openSIS-Classic/issues/199/comments | 1 | 2021-09-05T10:01:03Z | 2021-09-06T18:56:07Z | https://github.com/OS4ED/openSIS-Classic/issues/199 | 988,469,984 | 199 | 3,279 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.