cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2021-45326
2022-02-08T15:15:07.767
Cross Site Request Forgery (CSRF) vulnerability exists in Gitea before 1.5.2 via API routes.This can be dangerous especially with state altering POST requests.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://blog.gitea.io/2018/10/gitea-1.5.2-is-released/" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/go...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gitea:gitea:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6BA0450-9E23-485E-8E8D-DABAAB75F206", "versionEndExcluding": "1.5.2", "versionEndIncluding": null, "versionStartExcluding":...
[ "352" ]
352
https://github.com/go-gitea/gitea/issues/4838
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "go-gitea", "gitea" ]
# The Vulnerabilities on GET Routes For historical reasons some GET routes in Gitea do more than getting info and actually change state, for example /user/logout, and GET routes with action/:action in it. Current CSRF handler only checks POST routes, and thus leaves those GET routes vulnerable. One particular ro...
[Proposal] CSRF checks on GET routes
https://api.github.com/repos/go-gitea/gitea/issues/4838/comments
24
2018-09-01T00:19:24Z
2020-11-24T00:06:48Z
https://github.com/go-gitea/gitea/issues/4838
356,154,901
4,838
3,180
CVE-2021-45328
2022-02-08T16:15:07.413
Gitea before 1.4.3 is affected by URL Redirection to Untrusted Site ('Open Redirect') via internal URLs.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://blog.gitea.io/2018/06/release-of-1.4.3/" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/go-gitea/gitea/issues/4332" },...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gitea:gitea:*:*:*:*:*:*:*:*", "matchCriteriaId": "117B5786-635D-4D65-BE40-971E8B147C47", "versionEndExcluding": "1.4.3", "versionEndIncluding": null, "versionStartExcluding":...
[ "601" ]
601
https://github.com/go-gitea/gitea/issues/4332
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "go-gitea", "gitea" ]
<!-- 1. Please speak English, this is the language all of us can speak and write. 2. Please ask questions or configuration/deploy problems on our Discord server (https://discord.gg/NsatcWJ) or forum (https://discourse.gitea.io). 3. Please take a moment to check that your issue doesn't already ex...
Open Redirect vulnerability on internal links
https://api.github.com/repos/go-gitea/gitea/issues/4332/comments
1
2018-06-28T14:02:25Z
2020-11-24T01:58:06Z
https://github.com/go-gitea/gitea/issues/4332
336,635,224
4,332
3,181
CVE-2022-24676
2022-02-09T00:15:07.477
update_code in Admin.php in HYBBS2 through 2.3.2 allows arbitrary file upload via a crafted ZIP archive.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hyyyp/HYBBS2/issues/33" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hyphp:hybbs2:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB71B302-CAF8-495C-92E9-E3AEE02CB6DF", "versionEndExcluding": "2.3.3", "versionEndIncluding": null, "versionStartExcluding"...
[ "434" ]
434
https://github.com/hyyyp/HYBBS2/issues/33
[ "Exploit", "Third Party Advisory" ]
github.com
[ "hyyyp", "HYBBS2" ]
# There is an arbitrary file upload vulnerability in the HYBBS upload plugin function ## Vulnerability overview There is an arbitrary file upload vulnerability in the upload plugin function of the HYBBS management background, which can lead to server permissions. ## Vulnerability scope All versions prior to...
There is an arbitrary file upload vulnerability in the HYBBS upload plugin function
https://api.github.com/repos/hyyyp/HYBBS2/issues/33/comments
1
2022-02-07T10:08:23Z
2022-02-26T09:12:30Z
https://github.com/hyyyp/HYBBS2/issues/33
1,125,771,754
33
3,182
CVE-2021-46354
2022-02-09T14:15:07.793
Thinfinity VirtualUI 2.1.28.0, 2.1.32.1 and 2.5.26.2, fixed in version 3.0 is affected by an information disclosure vulnerability in the parameter "Addr" in cmd site. The ability to send requests to other systems can allow the vulnerable server to filtrate the real IP of the web server or increase the attack surface.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/166069/Thinfinity-VirtualUI-2.5.26.2-Information-Disclosure.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "ht...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cybelesoft:thinfinity_virtualui:2.1.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "E24716C8-13B0-4431-8BD4-45B9557333D7", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "668" ]
668
https://github.com/cybelesoft/virtualui/issues/3
[ "Third Party Advisory" ]
github.com
[ "cybelesoft", "virtualui" ]
Dear Cybele Software, My name is Daniel Morales. I have found a vulnerability in Thinfinity VirtualUI that could allow a malicious actor to trigger a server-side request to external endpoints. ### Summary External service interaction arises when it is possible to induce an application to interact with an arbi...
Vulnerability - External Service Interaction
https://api.github.com/repos/cybelesoft/virtualui/issues/3/comments
1
2022-01-11T11:40:02Z
2022-02-01T22:23:04Z
https://github.com/cybelesoft/virtualui/issues/3
1,099,046,708
3
3,183
CVE-2021-44911
2022-02-09T16:15:14.260
XE before 1.11.6 is vulnerable to Unrestricted file upload via modules/menu/menu.admin.controller.php. When uploading the Mouse over button and When selected button, there is no restriction on the file suffix, which leads to any file uploading to the files directory. Since .htaccess only restricts the PHP type, uploadi...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/xpressengine/xe-core/issues/2434" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xpressengine:xpressengine:*:*:*:*:*:*:*:*", "matchCriteriaId": "35C2B095-1B22-40E7-97C1-23D48EA1AF29", "versionEndExcluding": "1.11.6", "versionEndIncluding": null, "versionS...
[ "79" ]
79
https://github.com/xpressengine/xe-core/issues/2434
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "xpressengine", "xe-core" ]
Affected version: XE before 1.11.6. Vulnerable file: modules/menu/menu.admin.controller.php. #menu_hover_btn menu_active_btn Causes of vulnerability: ![1638921811742](https://user-images.githubusercontent.com/61731702/145127509-b495ce05-0a6f-4718-b24d-f0b648909d54.png) When uploading the Mouse over button...
Unrestricted file upload vulnerability in Latest Release 3.3.16
https://api.github.com/repos/xpressengine/xe-core/issues/2434/comments
0
2021-12-08T00:38:20Z
2022-01-10T09:21:07Z
https://github.com/xpressengine/xe-core/issues/2434
1,073,882,107
2,434
3,184
CVE-2021-44912
2022-02-09T16:15:14.300
In XE 1.116, when uploading the Normal button, there is no restriction on the file suffix, which leads to any file uploading to the files directory. Since .htaccess only restricts the PHP type, uploading HTML-type files leads to stored XSS vulnerabilities. If the .htaccess configuration is improper, for example before ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xpressengine/xe-core/issues/2433" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Th...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xpressengine:xpressengine:*:*:*:*:*:*:*:*", "matchCriteriaId": "35C2B095-1B22-40E7-97C1-23D48EA1AF29", "versionEndExcluding": "1.11.6", "versionEndIncluding": null, "versionS...
[ "79" ]
79
https://github.com/xpressengine/xe-core/issues/2433
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "xpressengine", "xe-core" ]
Affected version: XE before 1.11.6. Vulnerable file: modules/menu/menu.admin.controller.php. #menu_normal_btn Causes of vulnerability: ![1638921811742](https://user-images.githubusercontent.com/61731702/145127355-3d7b6bad-3e3e-43e4-84b0-1f942a5e46ac.png) When uploading the Normal button, there is no restric...
Unrestricted file upload vulnerability in Latest Release 3.3.16 /index.php?module=admin&act=dispMenuAdminSiteMap
https://api.github.com/repos/xpressengine/xe-core/issues/2433/comments
0
2021-12-08T00:36:19Z
2022-01-10T09:27:20Z
https://github.com/xpressengine/xe-core/issues/2433
1,073,880,895
2,433
3,185
CVE-2021-45330
2022-02-09T18:15:09.970
An issue exsits in Gitea through 1.15.7, which could let a malicious user gain privileges due to client side cookies not being deleted and the session remains valid on the server side for reuse.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/go-gitea/gitea/issues/4336" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "h...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gitea:gitea:*:*:*:*:*:*:*:*", "matchCriteriaId": "75A73D91-9EDD-467B-AA77-B8C21F0946BE", "versionEndExcluding": null, "versionEndIncluding": "1.15.7", "versionStartExcluding"...
[ "459" ]
459
https://github.com/go-gitea/gitea/issues/4336
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "go-gitea", "gitea" ]
<!-- 1. Please speak English, this is the language all of us can speak and write. 2. Please ask questions or configuration/deploy problems on our Discord server (https://discord.gg/NsatcWJ) or forum (https://discourse.gitea.io). 3. Please take a moment to check that your issue doesn't already ex...
[Security] Log out only deletes browser cookies
https://api.github.com/repos/go-gitea/gitea/issues/4336/comments
2
2018-06-28T15:28:30Z
2022-04-28T18:03:17Z
https://github.com/go-gitea/gitea/issues/4336
336,670,906
4,336
3,186
CVE-2022-0534
2022-02-09T23:15:16.767
A vulnerability was found in htmldoc version 1.9.15 where the stack out-of-bounds read takes place in gif_get_code() and occurs when opening a malicious GIF file, which can result in a crash (segmentation fault).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "patrick@puiterwijk.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/312f0f9c12f26fbe015cd0e6cefa40e4b99017d9" }, { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:1.9.15:*:*:*:*:*:*:*", "matchCriteriaId": "7FA48CA3-3C4E-46CA-8B5E-FDBF99FDD55F", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "125" ]
125
https://github.com/michaelrsweet/htmldoc/issues/463
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
In `gif_get_code()`, in [image.cxx](https://github.com/michaelrsweet/htmldoc/blob/master/htmldoc/image.cxx), there is a stack out-of-bounds read in the following code: ```C 267 curbit = (curbit - lastbit) + 8 * last_byte; 268 last_byte += (unsigned)count; 269 lastbit = last_byte * 8; 270 } 271 2...
Stack out-of-bounds read in gif_get_code()
https://api.github.com/repos/michaelrsweet/htmldoc/issues/463/comments
5
2022-01-07T14:45:56Z
2022-01-10T14:42:46Z
https://github.com/michaelrsweet/htmldoc/issues/463
1,096,381,389
463
3,187
CVE-2022-23047
2022-02-09T23:15:19.530
Exponent CMS 2.6.0patch2 allows an authenticated admin user to inject persistent JavaScript code inside the "Site/Organization Name","Site Title" and "Site Header" parameters while updating the site settings on "/exponentcms/administration/configure_site"
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "help@fluidattacks.com", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://exponentcms.lighthouseapp.com/projects/61783/tickets/1459" }, { "source": "help@fluidattacks.com", "tags": [ "Exploit", "Issue Tracking", "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.6.0:patch2:*:*:*:*:*:*", "matchCriteriaId": "5A643ED1-5F73-4CDE-A28A-D321EFCAC2F5", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "79" ]
79
https://github.com/exponentcms/exponent-cms/issues/1546
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "exponentcms", "exponent-cms" ]
I reported 3 vulnerabilities on Exponent 2.6.0 (patch2) using https://exponentcms.lighthouseapp.com/ but i didn't receive any update. Attached below are the links to the tickets, advisories and our responsible disclosure policy respectively. - [Ticket Stored XSS (Settings)](https://exponentcms.lighthouseapp.com/p...
Exponent-CMS Security Issues
https://api.github.com/repos/exponentcms/exponent-cms/issues/1546/comments
2
2022-01-28T13:28:27Z
2022-02-13T01:28:49Z
https://github.com/exponentcms/exponent-cms/issues/1546
1,117,406,764
1,546
3,188
CVE-2021-45357
2022-02-10T18:15:08.383
Cross Site Scripting (XSS) vulnerability exists in Piwigo 12.x via the pwg_activity function in include/functions.inc.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1582" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Par...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDC77171-712D-461F-83B8-953EB077F285", "versionEndExcluding": null, "versionEndIncluding": "12.1.0", "versionStartExcludin...
[ "79" ]
79
https://github.com/Piwigo/Piwigo/issues/1582
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
I found that piwigo Front-End can trigger xss,it means when the system administrator can trigger xss after logging into the backend Please see below for details of the analysis at first,We found a global filter in `include/common.inc.php` ![1](https://user-images.githubusercontent.com/56486273/146197712-471d...
[Version <= 12.1.0]XSS vulnerability in the frontend
https://api.github.com/repos/Piwigo/Piwigo/issues/1582/comments
1
2021-12-15T13:48:11Z
2022-02-10T23:29:34Z
https://github.com/Piwigo/Piwigo/issues/1582
1,081,062,458
1,582
3,189
CVE-2021-44969
2022-02-10T23:15:07.957
Taocms v3.0.2 was discovered to contain a cross-site scripting (XSS) vulnerability via the Management Column component.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "79" ]
79
https://github.com/taogogo/taocms/issues/9
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "taogogo", "taocms" ]
First, we enter the background and use the column administrator admin we created: ![image](https://user-images.githubusercontent.com/73013511/145394597-d8b9668d-d214-400c-858a-b5f0c9cf9815.png) Let's click "add article" on the left: ![image](https://user-images.githubusercontent.com/73013511/145394730-a937a5d6-f21c-...
There is a storage type cross site scripting attack at "Management column"(Column administrator authority)
https://api.github.com/repos/taogogo/taocms/issues/9/comments
0
2021-12-09T12:19:43Z
2021-12-09T12:21:34Z
https://github.com/taogogo/taocms/issues/9
1,075,509,639
9
3,190
CVE-2021-44970
2022-02-10T23:15:07.997
MiniCMS v1.11 was discovered to contain a cross-site scripting (XSS) vulnerability via /mc-admin/page-edit.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bg5sbk/MiniCMS/issues/43" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1234n:minicms:1.11:*:*:*:*:*:*:*", "matchCriteriaId": "EFF126BA-FB8A-4D2A-8B51-D19BF0F8C301", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "79" ]
79
https://github.com/bg5sbk/MiniCMS/issues/43
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "bg5sbk", "MiniCMS" ]
First , Click to enter the creation page ![image](https://user-images.githubusercontent.com/73013511/145502664-b71365dd-4432-49bd-8131-a68c7329d10a.png) Then, enter XSS payload in the content bar and Remember to choose publish ![image](https://user-images.githubusercontent.com/73013511/145502794-fabeef7a-02a2-4aaf-...
An xss vulnerability was found where my Page was posted
https://api.github.com/repos/bg5sbk/MiniCMS/issues/43/comments
0
2021-12-10T01:40:31Z
2021-12-10T01:40:31Z
https://github.com/bg5sbk/MiniCMS/issues/43
1,076,310,311
43
3,191
CVE-2022-24646
2022-02-10T23:15:08.043
Hospital Management System v4.0 was discovered to contain a SQL injection vulnerability in /Hospital-Management-System-master/contact.php via the txtMsg parameters.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kishan0725/Hospital-Management-System/issues/18" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpgurukul:hospital_management_system:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "DA36E354-4DBF-4BE4-9BC4-CB00C6771BAF", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/kishan0725/Hospital-Management-System/issues/18
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kishan0725", "Hospital-Management-System" ]
![image](https://user-images.githubusercontent.com/73013511/152641599-35c88429-f152-4343-9166-8da4da1fa7a9.png) Intercept contact info and save contents into a text file(1.txt). ![image](https://user-images.githubusercontent.com/73013511/152641606-ac0cd465-3a4a-4a43-9011-89e085134863.png) Run SQLmap ``` py...
VULNERABLE: SQL Injection exists in Hospital-Management-System. An attacker can inject query in “/Hospital-Management-System-master/contact.php" via the ‘txtMsg’ parameters.
https://api.github.com/repos/kishan0725/Hospital-Management-System/issues/18/comments
1
2022-02-05T12:14:10Z
2022-02-11T02:56:44Z
https://github.com/kishan0725/Hospital-Management-System/issues/18
1,124,915,004
18
3,192
CVE-2022-24647
2022-02-10T23:15:08.083
Cuppa CMS v1.0 was discovered to contain an arbitrary file deletion vulnerability via the unlink() function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE"...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/23" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "22" ]
22
https://github.com/CuppaCMS/CuppaCMS/issues/23
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
Vulnerability Name: Multiple Arbitrary File Deletion Date of Discovery: 06 Feb 2022 Product version:cuppaCMS v1.0[Download link](http://cuppacms.com/files/cuppa_cms.zip) Author: lyy Vulnerability Description: When unsanitized user input is supplied to a file deletion function, an arbitrary file deletion vul...
Multiple Unauthorized Arbitrary File Deletion vulnerabilities
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/23/comments
0
2022-02-05T17:14:57Z
2022-02-05T17:17:36Z
https://github.com/CuppaCMS/CuppaCMS/issues/23
1,124,983,447
23
3,193
CVE-2020-36062
2022-02-11T16:15:08.557
Dairy Farm Shop Management System v1.0 was discovered to contain hardcoded credentials in the source code which allows attackers access to the control panel if compromised.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/VivekPanday12/CVE-/issues/3" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://phpgurukul.com" }, { "source": "cve@mi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpgurukul:dairy_farm_shop_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6772CE9E-56D7-4CC7-9E1A-97E740D2D000", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "798" ]
798
https://github.com/VivekPanday12/CVE-/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "VivekPanday12", "CVE-" ]
Exploit Title: Dairy Farm Shop Management System  — Use of Hard-coded Credentials in Source Code Leads to Admin Panel Access # Date: 2020–12-25 # Exploit Author: VIVEK PANDAY     # Vendor Homepage: https://phpgurukul.com/ # Software Link: https://phpgurukul.com/dairy-farm-shop-management-system-using-php-and-mysql...
CVE:2020-36062 Dairy Farm Shop Management System — Use of Hard-coded Credentials in Source Code Leads to Admin Panel Access
https://api.github.com/repos/VivekPanday12/CVE-/issues/3/comments
0
2022-01-23T14:55:24Z
2022-01-23T14:55:24Z
https://github.com/VivekPanday12/CVE-/issues/3
1,111,893,238
3
3,194
CVE-2021-45385
2022-02-11T16:15:08.793
A Null Pointer Dereference vulnerability exits in ffjpeg d5cfd49 (2021-12-06) in bmp_load(). When the size information in metadata of the bmp is out of range, it returns without assign memory buffer to `pb->pdata` and did not exit the program. So the program crashes when it tries to access the pb->data, in jfif_encode(...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/47" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:2021-12-06:*:*:*:*:*:*:*", "matchCriteriaId": "A3438805-CAF0-41AE-BC2A-3A11A252D8E6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "476" ]
476
https://github.com/rockcarry/ffjpeg/issues/47
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
This segment fault error is because in `bmp_load()`, when bmp's size is out of range, it returns without assign memory buffer to `pb->pdata` and did not exit the program. So the program crashes when it tries to access the `pb->data`, which is a invalid memory address. ## Test Environment Ubuntu 16.04, 64bit ff...
SEGV in jfif_encode() at jfif.c:763
https://api.github.com/repos/rockcarry/ffjpeg/issues/47/comments
0
2021-12-16T03:01:01Z
2021-12-16T06:59:43Z
https://github.com/rockcarry/ffjpeg/issues/47
1,081,716,774
47
3,195
CVE-2021-45386
2022-02-11T17:15:08.090
tcpreplay 4.3.4 has a Reachable Assertion in add_tree_ipv6() at tree.c
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/appneta/tcpreplay/issues/687" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "ED1DFB55-CDDC-476C-98B4-F8E2D3F4E1E9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "617" ]
617
https://github.com/appneta/tcpreplay/issues/687
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "appneta", "tcpreplay" ]
**Describe the bug** There are two reachable assertions in add_tree_ipv4() (tree.c:538) and add_tree_ipv6() (tree.c:561) when the user uses tcpprep to open a crafted pcap file. **To Reproduce** Steps to reproduce the behavior: 1. get the tcpreplay source code (master 0ca82e3) and build it 2. run the cmd: `$ tcpp...
[Bug] Two reachable assertions in add_tree_ipv4() and add_tree_ipv6()
https://api.github.com/repos/appneta/tcpreplay/issues/687/comments
1
2021-12-17T07:24:34Z
2022-01-25T17:41:33Z
https://github.com/appneta/tcpreplay/issues/687
1,082,964,158
687
3,196
CVE-2021-44111
2022-02-11T18:15:10.747
A Directory Traversal vulnerability exists in S-Cart 6.7 via download in sc-admin/backup.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/s-cart/s-cart/issues/102" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:s-cart:s-cart:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9EFE488-A72C-4245-BA4B-577C84851334", "versionEndExcluding": "6.7.2", "versionEndIncluding": null, "versionStartExcluding...
[ "22" ]
22
https://github.com/s-cart/s-cart/issues/102
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "s-cart", "s-cart" ]
**Describe the bug** cod in vendor/s-cart/core/src/Admin/Controllers/AdminBackupController.php ``` $download = request('download') ?? ''; if ($download) { $file = storage_path() . "/backups/" . $download; if (file_exists($file)) { $headers = array( 'Content-...
A bug that leads to Arbitrary file download
https://api.github.com/repos/s-cart/s-cart/issues/102/comments
1
2021-11-17T08:46:35Z
2021-11-17T22:28:10Z
https://github.com/s-cart/s-cart/issues/102
1,055,860,989
102
3,197
CVE-2021-46371
2022-02-14T16:15:07.747
antd-admin 5.5.0 is affected by an incorrect access control vulnerability. Unauthorized access to some interfaces in the foreground leads to leakage of sensitive information.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/zuiidea/antd-admin/issues/1127" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://git...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:antd-admin_project:antd-admin:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "028BBB46-0A17-431D-8E82-286B2A0D32F4", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "306" ]
306
https://github.com/zuiidea/antd-admin/issues/1127
[ "Exploit", "Third Party Advisory" ]
github.com
[ "zuiidea", "antd-admin" ]
> 1. Unauthorized access to some interfaces in the foreground leads to leakage of sensitive information > 2. Install according to the official documents ![image](https://user-images.githubusercontent.com/55682875/149249553-8f7732de-21b4-4895-a53f-cd2751405adc.png) > 2.1 Unauthorized access is found on some interfa...
Unauthorized access to some interfaces in the foreground was found. Procedure
https://api.github.com/repos/zuiidea/antd-admin/issues/1127/comments
1
2022-01-13T01:50:22Z
2022-01-13T02:48:58Z
https://github.com/zuiidea/antd-admin/issues/1127
1,101,032,710
1,127
3,198
CVE-2021-45347
2022-02-14T19:15:07.857
An Incorrect Access Control vulnerability exists in zzcms 8.2, which lets a malicious user bypass authentication by changing the user name in the cookie to use any password.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/forget-code/zzcms/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zzcms:zzcms:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "BECA005C-6415-4E3A-899F-238BF3517593", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "287" ]
287
https://github.com/forget-code/zzcms/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "forget-code", "zzcms" ]
If the user name in the cookie is changed to an existing user, any password can be used to bypass authentication ![1](https://user-images.githubusercontent.com/88693653/146115653-efddc00f-3875-4c4b-ada6-91156ecf0c18.png) ![2](https://user-images.githubusercontent.com/88693653/146115670-7a583483-db96-4be3-bc06-376db78...
Authentication can be bypassed by changing the user name in the cookie to use any password
https://api.github.com/repos/forget-code/zzcms/issues/2/comments
0
2021-12-15T03:07:23Z
2021-12-15T03:07:23Z
https://github.com/forget-code/zzcms/issues/2
1,080,510,893
2
3,199
CVE-2022-23389
2022-02-14T21:15:09.627
PublicCMS v4.0 was discovered to contain a remote code execution (RCE) vulnerability via the cmdarray parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sanluan/PublicCMS/issues/59" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:publiccms:publiccms:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "DA4CCE59-6A71-4BC4-86D4-3110B04C1082", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "78" ]
78
https://github.com/sanluan/PublicCMS/issues/59
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sanluan", "PublicCMS" ]
# PublicCMS v4.0 Value parameter has command execution vulnerability ## Vulnerability Type : command execution ## Vulnerability Version : 4.0 ##Vulnerability location: PublicCMS-4.0.202107.c/publiccms-parent/publiccms-core/src/main/java/com/publiccms/co ntroller/admin/sys/SysSiteAdminController.java:249 ...
#
https://api.github.com/repos/sanluan/PublicCMS/issues/59/comments
8
2021-11-25T10:38:25Z
2022-10-21T01:53:25Z
https://github.com/sanluan/PublicCMS/issues/59
1,063,417,246
59
3,200
CVE-2022-23390
2022-02-14T21:15:09.683
An issue in the getType function of BBS Forum v5.3 and below allows attackers to upload arbitrary files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/diyhi/bbs/issues/51" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/diy...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:diyhi:bbs_forum:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D784CB4-D4A9-4DCC-AA13-4723AFE98832", "versionEndExcluding": null, "versionEndIncluding": "5.3", "versionStartExcluding...
[ "434" ]
434
https://github.com/diyhi/bbs/issues/51
[ "Exploit", "Third Party Advisory" ]
github.com
[ "diyhi", "bbs" ]
Hi,there are SEVEN high-risk vulnerabilities in the Administrator background。please fix it as soon as possible。 Five Arbitrary file upload vulnerabilities。 In HelpManageAction.java、MembershipCardManageAction.java、QuestionManageAction.java、TopicManageAction.java、ForumManageAction.java,there are fllowing insecure c...
SEVEN high-risk vulnerabilities
https://api.github.com/repos/diyhi/bbs/issues/51/comments
1
2021-10-26T07:41:26Z
2021-10-28T01:01:18Z
https://github.com/diyhi/bbs/issues/51
1,035,946,107
51
3,201
CVE-2022-23391
2022-02-14T21:15:09.730
A cross-site scripting (XSS) vulnerability in Pybbs v6.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload inserted into the Search box.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tomoya92/pybbs/issues/171" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Par...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pybbs_project:pybbs:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "A787EBC3-8457-4A7E-BD7B-A1BE26AAF96C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "79" ]
79
https://github.com/tomoya92/pybbs/issues/171
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "tomoya92", "pybbs" ]
## The first is located at the home page search Enter in the search box`11" onclick='alert(/xss/)'` ![image](https://user-images.githubusercontent.com/51900604/149858294-9fdb13ca-5575-44d3-9c93-b8a4c0f7f6a1.png) ## The second vulnerability is located in the backend In the topic editor in the background, enter`<img ...
This forum has a large number of xss vulnerabilities
https://api.github.com/repos/atjiu/pybbs/issues/171/comments
1
2022-01-18T03:18:26Z
2023-05-10T02:03:57Z
https://github.com/atjiu/pybbs/issues/171
1,106,433,462
171
3,202
CVE-2021-46461
2022-02-14T22:15:07.717
njs through 0.7.0, used in NGINX, was discovered to contain an out-of-bounds array access via njs_vmcode_typeof in /src/njs_vmcode.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/nginx/njs/commit/d457c9545e7e71ebb5c0479eb16b9d33175855e2" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nginx:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FD7035D-FB25-44D9-A1EA-345A65981E2B", "versionEndExcluding": null, "versionEndIncluding": "0.7.0", "versionStartExcluding": n...
[ "119" ]
119
https://github.com/nginx/njs/issues/450
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
## Env ``` Version : 0.7.0 Git Commit : 2da5d8b246b806bee6f74b575217ec3b61a25548 OS : Ubuntu 20.04 Configure : ./configure --address-sanitizer=YES ``` ## POC ``` function main() { const v2 = new ArrayBuffer(); const v3 = new DataView(v2); const v5 = typeof v3; } main(); ``` ## St...
illegal memcpy during njs_vmcode_typeof in /njs/src/njs_vmcode.c:1521:18
https://api.github.com/repos/nginx/njs/issues/450/comments
2
2021-12-24T06:33:59Z
2022-02-15T20:33:42Z
https://github.com/nginx/njs/issues/450
1,088,184,577
450
3,203
CVE-2021-46463
2022-02-14T22:15:07.793
njs through 0.7.1, used in NGINX, was discovered to contain a control flow hijack caused by a Type Confusion vulnerability in njs_promise_perform_then().
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/commit/6a40a85ff239497c6458c7dbef18f6a2736fe992" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DADC4D6-538B-4AC7-97B5-022B11495692", "versionEndExcluding": null, "versionEndIncluding": "0.7.1", "versionStartExcluding": null...
[ "843" ]
843
https://github.com/nginx/njs/issues/447
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
## Env ```cpp Version : 0.7.0 Git Commit : bb796f7b3f3b65a78248f3ba86d0929eb292ca8e OS : Ubuntu 20.04 Configure : ./Configure --address-sanitizer=YES ``` ## Poc ```cpp function main() { function v0(v1,v2) { return 1 } var o = [1,2,3,4,5,6] const v1 = new Promise(v0); ...
Control flow hijack caused by Type Confusion of Promise object
https://api.github.com/repos/nginx/njs/issues/447/comments
1
2021-12-20T05:07:22Z
2022-02-15T20:37:16Z
https://github.com/nginx/njs/issues/447
1,084,365,523
447
3,204
CVE-2022-25139
2022-02-14T22:15:08.317
njs through 0.7.0, used in NGINX, was discovered to contain a heap use-after-free in njs_await_fulfilled.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/commit/6a07c2156a07ef307b6dcf3c2ca8571a5f1af7a6" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "98ABF5F9-B5AA-4A73-B525-5B89AE6BEA3E", "versionEndExcluding": "0.7.2", "versionEndIncluding": null, "versionStartExcluding": null...
[ "416" ]
416
https://github.com/nginx/njs/issues/451
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
## Env ``` Version : 0.7.0 Git Commit : 2da5d8b246b806bee6f74b575217ec3b61a25548 OS : Ubuntu 20.04 Configure : ./configure --address-sanitizer=YES ``` ## POC ``` function main() { async function v6(v7) { const v10 = v7(v7); const v11 = await "split"; Object.values();...
Heap UAF in njs_await_fulfilled
https://api.github.com/repos/nginx/njs/issues/451/comments
3
2021-12-24T06:48:19Z
2022-03-23T04:33:21Z
https://github.com/nginx/njs/issues/451
1,088,190,381
451
3,205
CVE-2022-23384
2022-02-15T13:15:07.680
YzmCMS v6.3 is affected by Cross Site Request Forgery (CSRF) in /admin.add
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/58" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yzmcms:yzmcms:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "33CDD39A-96DC-4CF3-9CFF-694DF09B47BB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "352" ]
352
https://github.com/yzmcms/yzmcms/issues/58
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yzmcms", "yzmcms" ]
After the administrator logged in, open the following one page admin,add. http://local:8080/yzmcms-v6.3/admin/ / <html> <!-- CSRF PoC - generated by Burp Suite Professional --> <body> <script>history.pushState('', '', '/')</script> <form action="http://169.254.238.255/yzmcms-v6.3/yzmcms-v6.3/admi...
There is one CSRF vulnerability that can add the administrator account
https://api.github.com/repos/yzmcms/yzmcms/issues/58/comments
1
2022-01-16T14:50:07Z
2022-02-14T02:54:19Z
https://github.com/yzmcms/yzmcms/issues/58
1,105,072,186
58
3,206
CVE-2021-43734
2022-02-15T14:15:08.010
kkFileview v4.0.0 has arbitrary file read through a directory traversal vulnerability which may lead to sensitive file leak on related host.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kekingcn/kkFileView/issues/304" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thir...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:keking:kkfileview:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "14029A50-34F9-451F-800A-5A21EE2822A0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "22" ]
22
https://github.com/kekingcn/kkFileView/issues/304
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kekingcn", "kkFileView" ]
### kkFileView arbitrary file read vulnerability **问题描述Description** 最近在公司内部渗透测试中发现某处引用的kkFileView 4.0.0存在任意文件读取漏洞,可通过漏洞读取主机任意文件,易造成敏感信息泄漏。 kkFileview v4.0.0 has arbitrary file read vulnerability which may lead to sensitive file leak on related host。 **漏洞位置vulerable code location** ``kkFileView/server/s...
arbitrary file read vulnerability
https://api.github.com/repos/kekingcn/kkFileView/issues/304/comments
6
2021-11-14T13:08:01Z
2025-03-17T01:26:08Z
https://github.com/kekingcn/kkFileView/issues/304
1,052,935,438
304
3,207
CVE-2021-44960
2022-02-15T16:15:08.460
In SVGPP SVG++ library 1.3.0, the XMLDocument::getRoot function in the renderDocument function handled the XMLDocument object improperly, returning a null pointer in advance at the second if, resulting in a null pointer reference behind the renderDocument function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/svgpp/svgpp/issues/101" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/svgpp...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:svgpp:svgpp:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0191EAF3-1028-4C2E-8FA3-7A0D21F3FB3B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "476" ]
476
https://github.com/svgpp/svgpp/issues/101
[ "Exploit", "Issue Tracking" ]
github.com
[ "svgpp", "svgpp" ]
[id_000015,sig_11,src_001176,time_147681735,op_arith8,pos_10,val_+3.zip](https://github.com/svgpp/svgpp/files/7662107/id_000015.sig_11.src_001176.time_147681735.op_arith8.pos_10.val_%2B3.zip) 在renderDocument函数中的XMLDocument::getRoot函数对XMLDocument对象处理不当,在第二个if处提前返回一个空指针,造成renderDocument函数后面有空指针引用。 The XMLDocument::getR...
New vulnerability
https://api.github.com/repos/svgpp/svgpp/issues/101/comments
6
2021-12-06T16:55:10Z
2022-10-01T08:59:21Z
https://github.com/svgpp/svgpp/issues/101
1,072,374,276
101
3,208
CVE-2021-44960
2022-02-15T16:15:08.460
In SVGPP SVG++ library 1.3.0, the XMLDocument::getRoot function in the renderDocument function handled the XMLDocument object improperly, returning a null pointer in advance at the second if, resulting in a null pointer reference behind the renderDocument function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/svgpp/svgpp/issues/101" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/svgpp...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:svgpp:svgpp:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0191EAF3-1028-4C2E-8FA3-7A0D21F3FB3B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "476" ]
476
https://github.com/svgpp/svgpp/issues/101.aa
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "svgpp", "svgpp" ]
[id_000015,sig_11,src_001176,time_147681735,op_arith8,pos_10,val_+3.zip](https://github.com/svgpp/svgpp/files/7662107/id_000015.sig_11.src_001176.time_147681735.op_arith8.pos_10.val_%2B3.zip) 在renderDocument函数中的XMLDocument::getRoot函数对XMLDocument对象处理不当,在第二个if处提前返回一个空指针,造成renderDocument函数后面有空指针引用。 The XMLDocument::getR...
New vulnerability
https://api.github.com/repos/svgpp/svgpp/issues/101/comments
6
2021-12-06T16:55:10Z
2022-10-01T08:59:21Z
https://github.com/svgpp/svgpp/issues/101
1,072,374,276
101
3,209
CVE-2021-3242
2022-02-16T20:15:07.373
DuxCMS v3.1.3 was discovered to contain a SQL injection vulnerability via the component s/tools/SendTpl/index?keyword=.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/duxphp/DuxCMS3/issues/4" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "http...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:duxcms_project:duxcms:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "DD11A8F8-BC93-4DA4-BD56-7868A9B314DE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "89" ]
89
https://github.com/duxphp/DuxCMS3/issues/4
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "duxphp", "DuxCMS3" ]
sql injection vulnerability exists in tools SendTpl module, url is /s/tools/SendTpl/index?keyword=xxx, please check SystemExtendAdmin.php 39-50 more details in https://www.star123.top/2021/01/16/duxcms3-1-3%E5%AE%A1%E8%AE%A1/#more
backend sql injection vulnerability
https://api.github.com/repos/duxphp/DuxCMS3/issues/4/comments
0
2021-01-17T02:07:36Z
2021-01-17T02:07:36Z
https://github.com/duxphp/DuxCMS3/issues/4
787,596,259
4
3,210
CVE-2022-22880
2022-02-16T22:15:07.677
Jeecg-boot v3.0 was discovered to contain a SQL injection vulnerability via the code parameter in /jeecg-boot/sys/user/queryUserByDepId.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/3347" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Th...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6D5281A-1578-443B-921C-0CE7B9B36BA4", "versionEndExcluding": null, "versionEndIncluding": "3.0", "versionStartExcludin...
[ "89" ]
89
https://github.com/jeecgboot/jeecg-boot/issues/3347
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
##### 版本号: <=3.0 ##### 问题描述: After testing, it is found that the code parameter of /jeecg-boot/sys/user/queryUserByDepId interface of jeecg-boot has SQL injection ##### 截图&代码: payload:/jeecg-boot/sys/user/queryUserByDepId?_t=1641263644&id=57197590443c44f083d42ae24ef26a2c&realname=%64%61%73%64%27%20%75%6e%69%6f...
SQL injection exists in /jeecg-boot/sys/user/queryUserByDepId
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/3347/comments
2
2022-01-04T06:28:26Z
2022-01-18T02:56:58Z
https://github.com/jeecgboot/JeecgBoot/issues/3347
1,093,051,129
3,347
3,211
CVE-2022-22881
2022-02-16T22:15:07.723
Jeecg-boot v3.0 was discovered to contain a SQL injection vulnerability via the code parameter in /sys/user/queryUserComponentData.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/3348" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Th...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6D5281A-1578-443B-921C-0CE7B9B36BA4", "versionEndExcluding": null, "versionEndIncluding": "3.0", "versionStartExcludin...
[ "89" ]
89
https://github.com/jeecgboot/jeecg-boot/issues/3348
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
##### 版本号: jeecg-boot<=3.0 ##### 问题描述: After testing, it is found that the code parameter of /sys/user/queryUserComponentData interface of jeecg-boot has SQL injection Reuse https://github.com/jeecgboot/jeecg-boot After the source code of the project starts the project, click "custom component" and grab the pac...
SQL injection exists in /sys/user/queryUserComponentData
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/3348/comments
3
2022-01-04T08:36:23Z
2022-02-21T13:29:22Z
https://github.com/jeecgboot/JeecgBoot/issues/3348
1,093,125,235
3,348
3,212
CVE-2022-22885
2022-02-16T22:15:07.773
Hutool v5.7.18's HttpRequest was discovered to ignore all TLS/SSL certificate validation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://apidoc.gitee.com/dromara/hutool/cn/hutool/http/ssl/DefaultSSLInfo.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hutool:hutool:5.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "4C9E9670-0982-49B3-A11D-D4F294D3B8CD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "295" ]
295
https://github.com/dromara/hutool/issues/2042
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "dromara", "hutool" ]
### 版本情况 JDK版本: corretto_8_312 hutool版本: 5.7.18(请确保最新尝试是否还有问题) ### 问题描述(包括截图) 注意到 hutool HttpUtil 中 HttpConnection#setHttpsInfo 默认传入的 HostnameVerifier 是 DefaultSSLInfo.TRUST_ANY_HOSTNAME_VERIFIER,即: ```java package cn.hutool.http.ssl; import javax.net.ssl.HostnameVerifier; import javax.net.ssl.SSLS...
默认的 HostnameVerifier 为什么选择 TrustAnyHostnameVerifier 呢?
https://api.github.com/repos/chinabugotech/hutool/issues/2042/comments
2
2021-12-26T12:41:33Z
2024-03-12T02:30:59Z
https://github.com/chinabugotech/hutool/issues/2042
1,088,763,905
2,042
3,213
CVE-2022-22901
2022-02-17T03:15:06.847
There is an Assertion in 'context_p->next_scanner_info_p->type == SCANNER_TYPE_FUNCTION' failed at parser_parse_function_arguments in /js/js-parser.c of JerryScript commit a6ab5e9.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable", "URL Repurposed" ], "url": "http://jerryscript.com" }, { "source": "cve@mitre.org", "tags": [ "Product", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EB495C8-348F-4B04-B31F-1F4EE471CC22", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "617" ]
617
https://github.com/jerryscript-project/jerryscript/issues/4916
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
##### JerryScript commit hash `a6ab5e9` ##### Build platform Ubuntu 20.04 LTS ##### Build steps ./tools/build.py --clean --compile-flag=-fsanitize=address --lto=off --error-message=on --profile=es2015-subset --stack-limit=15 --debug --logging=on --line-info=on ##### poc ```js function test(proxyTarget) { v...
Assertion 'context_p->next_scanner_info_p->type == SCANNER_TYPE_FUNCTION' failed at /home/ubuntu/fuzz/jerryscript/jerry-core/parser/js/js-parser.c(parser_parse_function_arguments):1618
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4916/comments
0
2022-01-02T19:10:38Z
2022-05-21T14:30:43Z
https://github.com/jerryscript-project/jerryscript/issues/4916
1,092,081,853
4,916
3,214
CVE-2022-23318
2022-02-17T13:15:07.813
A heap-buffer-overflow in pcf2bdf, versions >= 1.05 allows an attacker to trigger unsafe memory access via a specially crafted PCF font file. This out-of-bound read may lead to an application crash, information disclosure via program memory or other context-dependent impact.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ganaware/pcf2bdf" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ganawar...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pcf2bdf_project:pcf2bdf:1.04:*:*:*:*:*:*:*", "matchCriteriaId": "3C056252-FB4B-49C8-875B-597EDC1257F1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "787" ]
787
https://github.com/ganaware/pcf2bdf/issues/4
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ganaware", "pcf2bdf" ]
Hello @ganaware, as discussed earlier: I have compiled pcf2bdf with address sanitization and fuzz-tested inputs with `AFL`. The file attached causes a memory access violation. The actual input file is stored within the zipped folder attached. Input: `./pcf2bdf heap_overflow_read_40b` Output: ``` gzip: heap_ov...
Heap-buffer-overflow in pcf2bdf
https://api.github.com/repos/ganaware/pcf2bdf/issues/4/comments
2
2022-01-11T12:41:03Z
2022-02-21T20:15:41Z
https://github.com/ganaware/pcf2bdf/issues/4
1,099,105,748
4
3,215
CVE-2022-23319
2022-02-17T14:15:08.073
A segmentation fault during PCF file parsing in pcf2bdf versions >=1.05 allows an attacker to trigger a program crash via a specially crafted PCF font file. This crash affects the availability of the software and dependent downstream components.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ganaware/pcf2bdf" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ganawar...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pcf2bdf_project:pcf2bdf:1.04:*:*:*:*:*:*:*", "matchCriteriaId": "3C056252-FB4B-49C8-875B-597EDC1257F1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "1284" ]
1284
https://github.com/ganaware/pcf2bdf/issues/5
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ganaware", "pcf2bdf" ]
Hello @ganaware, as discussed earlier: I have compiled pcf2bdf with address sanitization and fuzz-tested inputs with AFL. The file is partially parsed before the program crashes due to a segmentation fault. The actual input file is stored within the zipped folder attached. Input: `./pcf2bdf segfault_deadly_signal`...
Segmentation fault - ASAN Deadly Signal in pcf2bdf
https://api.github.com/repos/ganaware/pcf2bdf/issues/5/comments
2
2022-01-11T12:45:15Z
2022-02-21T20:14:57Z
https://github.com/ganaware/pcf2bdf/issues/5
1,099,109,611
5
3,216
CVE-2021-44868
2022-02-17T16:15:07.770
A problem was found in ming-soft MCMS v5.1. There is a sql injection vulnerability in /ms/cms/content/list.do
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ming-soft/MCMS/issues/58" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mingsoft:mcms:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "A4C9F9B5-3712-483B-8744-058E61788907", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "89" ]
89
https://github.com/ming-soft/MCMS/issues/58
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ming-soft", "MCMS" ]
### Vulnerability file: /src/main/java/net/mingsoft/cms/biz/impl/ContentBizImpl.java #Vulnerability tracking path: ``` 1. MCMS-master/src/main/java/net/mingsoft/cms/biz/impl/CategoryBizImpl.java:72行 --The return value of call queryChildren() is tained 2. MCMS-master/src/main/java/net/mingsoft/cms/biz/impl/Categ...
MCMS V5.1 /src/main/java/net/mingsoft/cms/biz/impl/ContentBizImpl.java hava a SQL Injection Vulnerability
https://api.github.com/repos/ming-soft/MCMS/issues/58/comments
0
2021-12-05T17:24:31Z
2022-10-17T10:09:30Z
https://github.com/ming-soft/MCMS/issues/58
1,071,512,474
58
3,217
CVE-2022-22912
2022-02-17T19:15:08.120
Prototype pollution vulnerability via .parse() in Plist before v3.0.4 allows attackers to cause a Denial of Service (DoS) and may lead to remote code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/TooTallNate/plist.js/issues/114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracki...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:plist_project:plist:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "ADC09244-E3D4-4E7E-807D-7017638CE736", "versionEndExcluding": "3.0.6", "versionEndIncluding": null, "versionSt...
[ "1321" ]
1321
https://github.com/TooTallNate/plist.js/issues/114
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "TooTallNate", "plist.js" ]
Hi, There's a prototype pollution in .parse() related to the xml that are being parsed in it. In the following example the prototype pollution will affect the `length` parameter. ```javascript var plist = require('plist'); var xml = ` <plist version="1.0"> <key>metadata</key> <dict> <key>bundle...
Prototype Pollution using .parse()
https://api.github.com/repos/TooTallNate/plist.js/issues/114/comments
7
2022-01-06T05:41:28Z
2022-09-30T21:32:26Z
https://github.com/TooTallNate/plist.js/issues/114
1,094,987,879
114
3,218
CVE-2022-23375
2022-02-19T16:15:14.523
WikiDocs version 0.1.18 has an authenticated remote code execution vulnerability. An attacker can upload a malicious file using the image upload form through index.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://demo.wikidocs.it/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Zavy86/WikiDocs" }, { "source": "cve@mitre.org", "tags": [ "Exploit"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wikidocs:wikidocs:0.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "089CD7F3-905A-4050-A5BF-3BC1FBCBB92C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "434" ]
434
https://github.com/Zavy86/WikiDocs/issues/28
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Zavy86", "WikiDocs" ]
# CVE-2022-23376 / Multiple reflected XSS vulnerabilities on different pages. ## 1. (Template.inc.php) - Reflected XSS Injection First vulnerability in line 47: ![image](https://user-images.githubusercontent.com/64528432/154803087-0a3f5eaa-a220-419d-97d1-35dd7645f4f4.png) Second is in line 210: ![image](https://u...
Multiple Vulnerabilities in WikiDocs 0.1.18
https://api.github.com/repos/Zavy86/WikiDocs/issues/28/comments
8
2022-02-19T13:50:49Z
2023-05-10T14:12:25Z
https://github.com/Zavy86/WikiDocs/issues/28
1,144,714,811
28
3,219
CVE-2021-46700
2022-02-19T19:15:10.960
In libsixel 1.8.6, sixel_encoder_output_without_macro (called from sixel_encoder_encode_frame in encoder.c) has a double free.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/158" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "D78CB59C-7966-46E3-A325-A7508F0ED51D", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "415" ]
415
https://github.com/saitoha/libsixel/issues/158
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
Hi, I found a double free or corruption in the current master 6a5be8b, OS: ubuntu 18.04 kernel: 5.4.0-87-generic POC: [poc.zip](https://github.com/saitoha/libsixel/files/7492167/poc.zip) ![image](https://user-images.githubusercontent.com/23655229/140643369-d02accea-8d38-484c-b2d1-8788a6ff0dbf.png) - gdb ...
double free or corruption in encoder.c:831
https://api.github.com/repos/saitoha/libsixel/issues/158/comments
1
2021-11-07T11:26:43Z
2024-05-04T16:25:26Z
https://github.com/saitoha/libsixel/issues/158
1,046,721,863
158
3,220
CVE-2021-46701
2022-02-20T21:15:07.437
PreMiD 2.2.0 allows unintended access via the websocket transport. An attacker can receive events from a socket and emit events to a socket, potentially interfering with a victim's "now playing" status on Discord.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/PreMiD/PreMiD/issues/790" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "htt...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:premid:premid:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "2004F0AD-9CE4-4968-9ABE-A3A54B6CE4CA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "346" ]
346
https://github.com/PreMiD/PreMiD/issues/790
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "PreMiD", "PreMiD" ]
# Explanation Some time ago, there was fix for allowing only chrome extension to connect to server (PreMiD app), but I noticed that I can still access server by just selecting transport as `websocket`. It works on localhost and can be done on websites. It allows to receive and emit events to socket. Related to #501 ...
[Vulnerability] Server (socket.io) is possible to be accessed from socket.io client
https://api.github.com/repos/PreMiD/PreMiD/issues/790/comments
1
2021-12-17T21:25:29Z
2022-06-15T19:47:03Z
https://github.com/PreMiD/PreMiD/issues/790
1,083,625,693
790
3,221
CVE-2021-44568
2022-02-21T18:15:08.553
Two heap-overflow vulnerabilities exist in openSUSE/libsolv libsolv through 13 Dec 2020 in the decisionmap variable via the resolve_dependencies function at src/solver.c (line 1940 & line 1995), which could cause a remote Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/openSUSE/libsolv/issues/425" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://githu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensuse:libsolv:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7DA98F7-E498-4C89-94F6-4A18D7BC2916", "versionEndExcluding": "0.7.17", "versionEndIncluding": null, "versionStartExclu...
[ "787" ]
787
https://github.com/openSUSE/libsolv/issues/425
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "openSUSE", "libsolv" ]
Description: There is two heap-overflow vulnerability in function: static int resolve_dependencies (Solver *solv, int level, int disablerules, Queue *dq) at src/solver.c: line 1940 & line 1995 if (r->d == 0 || solv->decisionmap[-r->p] <= 0) // line 1940 if (solv->decisionmap[p] > 0) // line 1995 The first bu...
libsolv “resolve_dependencies” function two heap-overflow vulnerability
https://api.github.com/repos/openSUSE/libsolv/issues/425/comments
7
2020-12-13T06:41:31Z
2022-03-31T12:17:40Z
https://github.com/openSUSE/libsolv/issues/425
765,075,829
425
3,222
CVE-2022-23652
2022-02-22T20:15:07.763
capsule-proxy is a reverse proxy for Capsule Operator which provides multi-tenancy in Kubernetes. In versions prior to 0.2.1 an attacker with a proper authentication mechanism may use a malicious `Connection` header to start a privilege escalation attack towards the Kubernetes API Server. This vulnerability allows for ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/clastix/capsule-proxy/commit/efe91f68ebf8a9e3d21491dc57da7b8a746415d8" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clastix:capsule-proxy:*:*:*:*:*:*:*:*", "matchCriteriaId": "67F30FEB-4C18-4522-9B33-D66E83DB8F13", "versionEndExcluding": "0.2.1", "versionEndIncluding": null, "versionStartE...
[ "287" ]
287
https://github.com/clastix/capsule-proxy/issues/188
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "clastix", "capsule-proxy" ]
A user crafting an API request directed at `capsule-proxy` can get a privilege escalation using the Service Account of the proxy itself. This is done by passing the `Impersonate-User` or `Impersonate-Group` header in the `Connection` header, using the same exploit described here: https://github.com/rancher/rancher/s...
Privilege escalation vulnerability via malicious "Connection" header
https://api.github.com/repos/projectcapsule/capsule-proxy/issues/188/comments
1
2022-02-18T19:53:04Z
2022-02-20T21:45:50Z
https://github.com/projectcapsule/capsule-proxy/issues/188
1,143,674,082
188
3,223
CVE-2019-25058
2022-02-24T15:15:21.220
An issue was discovered in USBGuard before 1.1.0. On systems with the usbguard-dbus daemon running, an unprivileged user could make USBGuard allow all USB devices to be connected in the future.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIA...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/USBGuard/usbguard/issues/273" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:usbguard_project:usbguard:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D7EAA37-523F-452D-8E2C-A749E045591F", "versionEndExcluding": "1.1.0", "versionEndIncluding": null, "versionSt...
[ "863" ]
863
https://github.com/USBGuard/usbguard/issues/273
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "USBGuard", "usbguard" ]
Some of the methods exposed via dbus are not covered by the [current default policy](https://github.com/USBGuard/usbguard/blob/master/src/DBus/org.usbguard.policy). This includes the `getParameter` and `setParameter` methods. On a default debian install, as unprivileged user: ``` $ usbguard get-parameter InsertedD...
No default ACL on some dbus methods
https://api.github.com/repos/USBGuard/usbguard/issues/273/comments
4
2019-02-07T12:11:36Z
2022-02-14T09:54:59Z
https://github.com/USBGuard/usbguard/issues/273
407,669,808
273
3,224
CVE-2019-25058
2022-02-24T15:15:21.220
An issue was discovered in USBGuard before 1.1.0. On systems with the usbguard-dbus daemon running, an unprivileged user could make USBGuard allow all USB devices to be connected in the future.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIA...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/USBGuard/usbguard/issues/273" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:usbguard_project:usbguard:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D7EAA37-523F-452D-8E2C-A749E045591F", "versionEndExcluding": "1.1.0", "versionEndIncluding": null, "versionSt...
[ "863" ]
863
https://github.com/USBGuard/usbguard/issues/403
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "USBGuard", "usbguard" ]
With new versions of Polkit, the value `auth_self_keep_session` is no more valid for the tags `<allow_any>`, `<allow_inactive>` and `<allow_active>`. The [usbguard policy config](https://github.com/USBGuard/usbguard/blob/master/src/DBus/org.usbguard1.policy) is not parsed anymore by new versions of Polkit, and the def...
Polkit policy is not valid with newest versions of Polkit
https://api.github.com/repos/USBGuard/usbguard/issues/403/comments
1
2020-08-07T17:54:42Z
2022-02-14T09:54:59Z
https://github.com/USBGuard/usbguard/issues/403
675,176,585
403
3,225
CVE-2021-43724
2022-02-24T15:15:23.950
A Cross Site Scripting (XSS) vulnerability exits in Subrion CMS through 4.2.1 in the Create Page functionality of the admin Account via a SGV file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/intelliants/subrion/issues/890" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thir...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intelliants:subrion_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "970BC2B7-56FC-43DA-92C7-083A0423D1EF", "versionEndExcluding": null, "versionEndIncluding": "4.2.1", "versionStar...
[ "79" ]
79
https://github.com/intelliants/subrion/issues/890
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "intelliants", "subrion" ]
I have found Cross Site Scripting (XSS) bug in subrion CMS version 4.2.1 in the Create Page functionality of the admin Account. Steps to Reproduce: just login as admin and clink this url https://demos.subrion.org/?demo=core&admin=1 As an admin Create test page In the Add a Page section go to the Page Conten...
this is Cross Site Scripting (XSS)
https://api.github.com/repos/intelliants/subrion/issues/890/comments
2
2021-11-08T16:01:45Z
2022-07-20T08:19:51Z
https://github.com/intelliants/subrion/issues/890
1,047,624,132
890
3,226
CVE-2021-44550
2022-02-24T15:15:24.067
An Incorrect Access Control vulnerability exists in CoreNLP 4.3.2 via the classifier in NERServlet.java (lines 158 and 159).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/stanfordnlp/CoreNLP/issues/1222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stanford:corenlp:4.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "B657A9FE-04C1-40B0-99A0-ED6CF72BA13B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "74" ]
74
https://github.com/stanfordnlp/CoreNLP/issues/1222
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "stanfordnlp", "CoreNLP" ]
https://github.com/stanfordnlp/CoreNLP/blob/d147ba597bb13efeab5c567d677854bfc69104e6/src/edu/stanford/nlp/ie/ner/webapp/NERServlet.java#L152-L159 We found 'classifier' may be contaminated on line 152 of NERServlet.java.java.Including unvalidated data in an HTTP response header can enable cache-poisoning, cross-site ...
Header Manipulation
https://api.github.com/repos/stanfordnlp/CoreNLP/issues/1222/comments
0
2021-11-26T09:00:27Z
2022-02-24T06:17:09Z
https://github.com/stanfordnlp/CoreNLP/issues/1222
1,064,237,894
1,222
3,227
CVE-2021-44607
2022-02-24T15:15:24.237
A Cross Site Scripting (XSS) vulnerability exists in FUEL-CMS 1.5.1 in the Assets page via an SVG file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/589" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F3A806A2-582F-49B6-B9EC-C0FB4B13ED3D", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "79" ]
79
https://github.com/daylightstudio/FUEL-CMS/issues/589
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
A stored cross-site scripting (XSS) vulnerability exists in FUEL-CMS-1.5.1 that allows an authenticated user authorized to upload a malicious .svg file which acts as a stored XSS payload. If this stored XSS payload is triggered by an administrator it will trigger a XSS attack 1. login as admin .in the Assets page ...
A stored cross-site scripting (XSS) vulnerability exists in FUEL-CMS-1.5.1
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/589/comments
0
2021-11-29T15:19:12Z
2021-11-29T15:19:12Z
https://github.com/daylightstudio/FUEL-CMS/issues/589
1,066,165,915
589
3,228
CVE-2021-44608
2022-02-24T15:15:24.277
Multiple Cross Site Scripting (XSS) vulnerabilities exists in bloofoxCMS 0.5.2.1 - 0.5.1 via the (1) file parameter and (2) type parameter in an edit action in index.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/alexlang24/bloofoxCMS/issues/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bloofox:bloofoxcms:*:*:*:*:*:*:*:*", "matchCriteriaId": "DA028444-D83F-453D-99B1-FDE5B6C71C51", "versionEndExcluding": null, "versionEndIncluding": "0.5.2.1", "versionStartEx...
[ "79" ]
79
https://github.com/alexlang24/bloofoxCMS/issues/12
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "alexlang24", "bloofoxCMS" ]
I found two Authenticated Cross-Site Scripting in 'file' parameter and 'type' parameter ### Cross-Site Scripting in the parameter 'file' ``` http://localhost/bloofoxcms/admin/index.php?mode=content&page=media&action=edit&file=info.svg%27%3E%3CScRiPt%3Ealert(document.cookie)%3C/ScRiPt%3E&type=0 ``` ![image](h...
'Multiple' Cross-Site Scripting (XSS) (Authenticated)
https://api.github.com/repos/alexlang24/bloofoxCMS/issues/12/comments
0
2021-12-01T15:46:38Z
2021-12-01T15:46:38Z
https://github.com/alexlang24/bloofoxCMS/issues/12
1,068,569,062
12
3,229
CVE-2021-44610
2022-02-24T15:15:24.317
Multiple SQL Injection vulnerabilities exist in bloofoxCMS 0.5.2.1 - 0.5.1 via the (1) URLs, (2) lang_id, (3) tmpl_id, (4) mod_rewrite (5) eta_doctype. (6) meta_charset, (7) default_group, and (8) page group parameters in the settings mode in admin/index.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/alexlang24/bloofoxCMS/issues/13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bloofox:bloofoxcms:*:*:*:*:*:*:*:*", "matchCriteriaId": "DA028444-D83F-453D-99B1-FDE5B6C71C51", "versionEndExcluding": null, "versionEndIncluding": "0.5.2.1", "versionStartEx...
[ "89" ]
89
https://github.com/alexlang24/bloofoxCMS/issues/13
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "alexlang24", "bloofoxCMS" ]
bloofoxCMS-0.5.2.1 have no security filtering of user input parameters in the admin center page. resulting in a large number of sql injection vulnerabilities - http://localhost/admin/index.php?mode=settings&page=projects&action=new We can use sqlmap to validate: ``` in the parameters: eta_doctype. tmpl_id. urls.lan...
Multiple SQL injection vulnerabilities
https://api.github.com/repos/alexlang24/bloofoxCMS/issues/13/comments
0
2021-12-02T13:03:52Z
2021-12-02T13:03:52Z
https://github.com/alexlang24/bloofoxCMS/issues/13
1,069,525,390
13
3,230
CVE-2021-45746
2022-02-24T15:15:24.770
A Directory Traversal vulnerability exists in WeBankPartners wecube-platform 3.2.1 via the file variable in PluginPackageController.java.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/WeBankPartners/wecube-platform/issues/2297" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "I...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webank:wecube:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A0D0496-F0EB-4054-B5C8-C3F5CBA50E7E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "22" ]
22
https://github.com/WeBankPartners/wecube-platform/issues/2297
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "WeBankPartners", "wecube-platform" ]
https://github.com/WeBankPartners/wecube-platform/blob/15b004e0295c9466ac11c717bee27165fc5b13a9/platform-core/src/main/java/com/webank/wecube/platform/core/controller/plugin/PluginPackageController.java#L76-L84 https://github.com/WeBankPartners/wecube-platform/blob/15b004e0295c9466ac11c717bee27165fc5b13a9/platform-c...
Path Manipulation
https://api.github.com/repos/WeBankPartners/wecube-platform/issues/2297/comments
1
2021-11-23T08:43:10Z
2021-12-02T06:55:04Z
https://github.com/WeBankPartners/wecube-platform/issues/2297
1,060,968,991
2,297
3,231
CVE-2022-24599
2022-02-24T15:15:29.633
In autofile Audio File Library 0.3.6, there exists one memory leak vulnerability in printfileinfo, in printinfo.c, which allows an attacker to leak sensitive information via a crafted file. The printfileinfo function calls the copyrightstring function to get data, however, it dosn't use zero bytes to truncate the data.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mpruett/audiofile/issues/60" }, { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "https://lists.debian.org/debian-lts-an...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:audio_file_library_project:audio_file_library:0.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "47CD841B-F23D-41F5-B31D-51A7B377BA75", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "401" ]
401
https://github.com/mpruett/audiofile/issues/60
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "mpruett", "audiofile" ]
There exists one Memory-leak bug in printfileinfo, in printinfo.c, which allows an attacker to leak the address of heap or libc via a crafted file. To reproduce with the attached poc file: [poc.zip](https://github.com/mpruett/audiofile/files/7986695/poc.zip) Heap address leak: ./sfinfo ./heapleak_poc.aiff Resu...
Memory-leak bug in printfileinfo, in printinfo.c
https://api.github.com/repos/mpruett/audiofile/issues/60/comments
2
2022-02-02T13:25:06Z
2023-11-11T17:05:02Z
https://github.com/mpruett/audiofile/issues/60
1,121,923,970
60
3,232
CVE-2022-24613
2022-02-24T15:15:29.713
metadata-extractor up to 2.16.0 can throw various uncaught exceptions while parsing a specially crafted JPEG file, which could result in an application crash. This could be used to mount a denial of service attack against services that use metadata-extractor library.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/drewnoakes/metadata-extractor/issues/561" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:metadata-extractor_project:metadata-extractor:*:*:*:*:*:*:*:*", "matchCriteriaId": "61E89144-6999-46A1-B104-A545FBFF049B", "versionEndExcluding": "2.16.0", "versionEndIncluding": null, ...
[ "755" ]
755
https://github.com/drewnoakes/metadata-extractor/issues/561
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "drewnoakes", "metadata-extractor" ]
## 1. Unique Bugs Found Recently we ([Zhang Cen](https://github.com/occia), [Huang Wenjie](https://github.com/ZanderHuang) and [Zhang Xiaohan](https://github.com/Han0nly)) discovered a series of bugs in latest metadta-extractor (2.16.0). Every bug we reported in the following is unique and reproducable. We sorted ...
A list of bugs found (33 bugs in total)
https://api.github.com/repos/drewnoakes/metadata-extractor/issues/561/comments
16
2021-12-10T19:26:48Z
2022-05-05T11:46:07Z
https://github.com/drewnoakes/metadata-extractor/issues/561
1,077,162,492
561
3,233
CVE-2022-24615
2022-02-24T15:15:29.790
zip4j up to v2.10.0 can throw various uncaught exceptions while parsing a specially crafted ZIP file, which could result in an application crash. This could be used to mount a denial of service attack against services that use zip4j library.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/srikanth-lingala/zip4j/issues/377" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.co...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zip4j_project:zip4j:*:*:*:*:*:*:*:*", "matchCriteriaId": "F277A8CA-DAFC-4465-BC83-4FC04FE63425", "versionEndExcluding": "2.10.0", "versionEndIncluding": null, "versionStartEx...
[ "755" ]
755
https://github.com/srikanth-lingala/zip4j/issues/377
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "srikanth-lingala", "zip4j" ]
Recently we ([Zhang Cen](https://github.com/occia) , [Huang Wenjie](https://github.com/ZanderHuang) and [Zhang Xiaohan](https://github.com/Han0nly)) found and submitted several bugs of latest zip4j (2.9.0). For your convenience, here lists the bug summary for all reported bugs (will keep it updated). Note that each i...
Collection of Recent Reported Bugs for zip4j (2.9.0)
https://api.github.com/repos/srikanth-lingala/zip4j/issues/377/comments
23
2021-10-24T15:43:05Z
2022-03-30T05:26:45Z
https://github.com/srikanth-lingala/zip4j/issues/377
1,034,447,276
377
3,234
CVE-2022-24615
2022-02-24T15:15:29.790
zip4j up to v2.10.0 can throw various uncaught exceptions while parsing a specially crafted ZIP file, which could result in an application crash. This could be used to mount a denial of service attack against services that use zip4j library.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/srikanth-lingala/zip4j/issues/377" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.co...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zip4j_project:zip4j:*:*:*:*:*:*:*:*", "matchCriteriaId": "F277A8CA-DAFC-4465-BC83-4FC04FE63425", "versionEndExcluding": "2.10.0", "versionEndIncluding": null, "versionStartEx...
[ "755" ]
755
https://github.com/srikanth-lingala/zip4j/issues/418
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "srikanth-lingala", "zip4j" ]
According to the NVD description of [CVE-2022-24615](https://nvd.nist.gov/vuln/detail/CVE-2022-24615), CVE-2022-24615 affects up to v2.9.0 (excluded). Actually, v2.9.0 and v2.9.1 are also affected by CVE-2022-24615. Don't the versions affected by nvd-CVE-2022-24615 need to be modified?
Does CVE-2022-24615 affect versions v2.9.0 and v2.9.1?
https://api.github.com/repos/srikanth-lingala/zip4j/issues/418/comments
5
2022-03-31T09:40:41Z
2023-12-01T13:02:13Z
https://github.com/srikanth-lingala/zip4j/issues/418
1,187,800,949
418
3,235
CVE-2022-24620
2022-02-24T15:15:29.830
Piwigo version 12.2.0 is vulnerable to stored cross-site scripting (XSS), which can lead to privilege escalation. In this way, admin can steal webmaster's cookies to get the webmaster's access.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1605" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Par...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:12.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "81C2A86F-D640-455A-915C-B187ECB741AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "79" ]
79
https://github.com/Piwigo/Piwigo/issues/1605
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
Hi, I found Stored XSS in Piwigo version 12.2.0 (Not tested older versions). **Proof Of Concept**: 1. Add an admin through webmaster's access. 2. Through the admin account open http://localhost/piwigo-12.2.0/piwigo/admin.php?page=cat_list 3. Add < svg onload=alert(1)> (Remove space) in the group name field. ...
Piwigo-12.2.0 Vulnerable For Stored XSS Which Is Leading To Privilege Escalation
https://api.github.com/repos/Piwigo/Piwigo/issues/1605/comments
3
2022-02-02T19:14:54Z
2022-07-05T16:00:16Z
https://github.com/Piwigo/Piwigo/issues/1605
1,122,294,432
1,605
3,236
CVE-2022-25104
2022-02-24T15:15:30.793
HorizontCMS v1.0.0-beta.2 was discovered to contain an arbitrary file download vulnerability via the component /admin/file-manager/.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ttimot24/HorizontCMS/issues/43" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thir...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:horizontcms_project:horizontcms:1.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "9840814D-4A55-468B-8F55-EEEE82D7EA29", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "552" ]
552
https://github.com/ttimot24/HorizontCMS/issues/43
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ttimot24", "HorizontCMS" ]
Version:HorizontCMS v1.0.0-beta-2 Submit date: 2022-02-13 Description:Arbitrary file download vulnerability ![image](https://user-images.githubusercontent.com/72428049/153753045-cec9352b-9a0c-4a66-a899-683a58714833.png) POC: ``` GET /admin/file-manager/download?file=storage/images/header_images/../../../....
Arbitrary file download vulnerability
https://api.github.com/repos/ttimot24/HorizontCMS/issues/43/comments
0
2022-02-13T12:28:51Z
2022-02-22T22:25:56Z
https://github.com/ttimot24/HorizontCMS/issues/43
1,135,773,425
43
3,237
CVE-2022-25838
2022-02-24T15:15:33.120
Laravel Fortify before 1.11.1 allows reuse within a short time window, thus calling into question the "OT" part of the "TOTP" concept.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/laravel/fortify/issues/201#issuecomment-1009282153" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Adviso...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:laravel:fortify:*:*:*:*:*:*:*:*", "matchCriteriaId": "302E12CE-FD88-4D66-A407-616ED2185CA7", "versionEndExcluding": "1.11.1", "versionEndIncluding": null, "versionStartExclud...
[ "294" ]
294
https://github.com/laravel/fortify/issues/201#issuecomment-1009282153
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "laravel", "fortify" ]
- Version: v1.7.4 - Laravel Version: v8.22.1 - PHP Version: v7.4.13 ### Description: The current two factor authentication solution sets 2fa to enabled without requiring a confirmation (via TOTP) that the authenticator app is actually set up. ### Steps To Reproduce: The current solution works like this:...
Current 2FA solution can lock users out of their accounts
https://api.github.com/repos/laravel/fortify/issues/201/comments
39
2021-01-17T19:39:15Z
2022-02-28T15:24:44Z
https://github.com/laravel/fortify/issues/201
787,778,846
201
3,238
CVE-2021-3596
2022-02-24T19:15:09.063
A NULL pointer dereference flaw was found in ImageMagick in versions prior to 7.0.10-31 in ReadSVGImage() in coders/svg.c. This issue is due to not checking the return value from libxml2's xmlCreatePushParserCtxt() and uses the value directly, which leads to a crash and segmentation fault.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970569" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C99ED1A-DE49-4F83-B109-EE35F50E1717", "versionEndExcluding": "7.0.10-31", "versionEndIncluding": null, "version...
[ "476" ]
476
https://github.com/ImageMagick/ImageMagick/issues/2624
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [Y ] I have written a descriptive issue title - [Y] I have verified that I am using the latest version of ImageMagick - [Y] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues t...
Null Pointer dereference caused by incomplete check of the return value from libxml2 in ReadSVGImage svg.c:3621
https://api.github.com/repos/ImageMagick/ImageMagick/issues/2624/comments
1
2020-09-25T05:56:46Z
2020-09-25T18:07:35Z
https://github.com/ImageMagick/ImageMagick/issues/2624
708,663,828
2,624
3,239
CVE-2021-4021
2022-02-24T19:15:09.533
A vulnerability was found in Radare2 in versions prior to 5.6.2, 5.6.0, 5.5.4 and 5.5.2. Mapping a huge section filled with zeros of an ELF64 binary for MIPS architecture can lead to uncontrolled resource consumption and DoS.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/issues/19436" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7E4E86C-9AD4-46E6-8403-6424D989E389", "versionEndExcluding": null, "versionEndIncluding": "5.5.0", "versionStartExcludin...
[ "834" ]
834
https://github.com/radareorg/radare2/issues/19436
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "radareorg", "radare2" ]
## Environment ``` $ date mar 23 nov 2021 10:31:32 -03 $ r2 -v radare2 5.5.0 1 @ linux-x86-64 git. commit: b50c2c35acd266f1b18bbbcfe0c63d9d0331b09d build: 2021-11-14__22:46:21 $ uname -ms Linux x86_64 ``` ## Description We found with @OctavioGalland an ELF64 binary for MIPS architecture that hangs when ana...
DoS analysing ELF64 binary for MIPS architecture
https://api.github.com/repos/radareorg/radare2/issues/19436/comments
3
2021-11-23T14:42:29Z
2021-12-03T00:57:37Z
https://github.com/radareorg/radare2/issues/19436
1,061,367,190
19,436
3,240
CVE-2022-24594
2022-02-25T12:15:07.667
In waline 1.6.1, an attacker can submit messages using X-Forwarded-For to forge any IP address.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/walinejs/waline/discussions/792" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://git...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:waline:waline:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "3FAE4360-14FD-4778-98C5-965981912CA7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "862" ]
862
https://github.com/walinejs/waline/issues/785
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "walinejs", "waline" ]
### 问题描述 | Describe the bug # waline-fake-any-ip-poc A Proof-Of-Concept for the recently found [waline](https://github.com/walinejs/waline) fake any ip vulnerability. In this repository we have made and example vulnerable application and proof-of-concept (POC) exploit of it. ## Proof-of-concept (POC) As ...
[Bug]: waline fake any ip vulnerability
https://api.github.com/repos/walinejs/waline/issues/785/comments
7
2022-01-30T01:15:54Z
2022-03-13T09:26:09Z
https://github.com/walinejs/waline/issues/785
1,118,374,553
785
3,241
CVE-2022-24612
2022-02-25T12:15:07.713
An authenticated user can upload an XML file containing an XSS via the ITSM module of EyesOfNetwork 5.3.11, resulting in a stored XSS.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/EyesOfNetworkCommunity/eonweb/issues/114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "h...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyesofnetwork:eyesofnetwork:5.3-11:*:*:*:*:*:*:*", "matchCriteriaId": "DBCEC519-5FE6-423B-919E-559F571B2152", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "79" ]
79
https://github.com/EyesOfNetworkCommunity/eonweb/issues/114
[ "Exploit", "Third Party Advisory" ]
github.com
[ "EyesOfNetworkCommunity", "eonweb" ]
Hello, Il y a un petit soucis dans le contrôle des fichiers uploadés via le file upload du module ITSM. La possibilité d'uploader du format XML devrait se suivre d'un contrôle du dit fichier, en l'état il est possible d'uploader (via un user authentifié), un document XML contenant une XSS ou d'autres joyeusetées...
/!\Security
https://api.github.com/repos/EyesOfNetworkCommunity/eonweb/issues/114/comments
2
2022-02-03T00:58:30Z
2022-03-02T00:00:09Z
https://github.com/EyesOfNetworkCommunity/eonweb/issues/114
1,122,542,910
114
3,242
CVE-2021-42244
2022-02-25T19:15:12.703
A cross-site scripting (XSS) vulnerability in PaquitoSoftware Notimoo v1.2 allows attackers to execute arbitrary web scripts or HTML via a crafted title or message in a notification.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/PaquitoSoft/Notimoo/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:notimoo_project:notimoo:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "D6DEA6D3-6A74-4D85-9117-20519ED7B115", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "79" ]
79
https://github.com/PaquitoSoft/Notimoo/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "PaquitoSoft", "Notimoo" ]
notimoo.js 1.2 has an XSS vulnerability which is executed when a title or message containing Javascript code are set in a notification. ![image](https://user-images.githubusercontent.com/45259951/129262588-6bb16c4e-c2d7-4431-868a-bb40d49d0337.png) **POC** Create a notification with a javascript payload: ```...
XSS via title, message
https://api.github.com/repos/PaquitoSoft/Notimoo/issues/3/comments
0
2021-08-12T20:12:15Z
2021-08-12T20:12:15Z
https://github.com/PaquitoSoft/Notimoo/issues/3
969,490,590
3
3,243
CVE-2022-0764
2022-02-26T15:15:07.910
Arbitrary Command Injection in GitHub repository strapi/strapi prior to 4.1.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE",...
[ { "source": "security@huntr.dev", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c" }, { "source": "security@huntr.dev", "tags": [ "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", "matchCriteriaId": "412D3B41-C0FD-4ED9-AD6B-00C83BEBC0C7", "versionEndExcluding": "4.1.0", "versionEndIncluding": null, "versionStartExcluding...
[ "78" ]
78
https://github.com/strapi/strapi/issues/12879
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strapi", "strapi" ]
<!-- Hello 👋 Thank you for submitting an issue. Before you start, please make sure your issue is understandable and reproducible. To make your issue readable make sure you use valid Markdown syntax. https://guides.github.com/features/mastering-markdown/ Please ensure you have also read and understand the co...
[V3] Fix CVE-2022-0764
https://api.github.com/repos/strapi/strapi/issues/12879/comments
2
2022-03-17T15:16:11Z
2022-05-18T08:01:30Z
https://github.com/strapi/strapi/issues/12879
1,172,466,248
12,879
3,244
CVE-2021-43086
2022-02-28T15:15:07.983
ARM astcenc 3.2.0 is vulnerable to Buffer Overflow. When the compression function of the astc-encoder project with -cl option was used, a stack-buffer-overflow occurred in function encode_ise() in function compress_symbolic_block_for_partition_2planes() in "/Source/astcenc_compress_symbolic.cpp".
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ARM-software/astc-encoder/issues/296." }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:arm:adaptive_scalable_texture_compression_encoder:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC0AA123-0F53-4A6E-980E-4539FBAB8242", "versionEndExcluding": null, "versionEndIncluding": nul...
[ "787" ]
787
https://github.com/ARM-software/astc-encoder/issues/296.
[ "Broken Link", "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ARM-software", "astc-encoder" ]
# Version ``` astcenc v3.2.0, 64-bit sse2 ``` # Environment Ubuntu 18.04,64 bit # Command **Compile test program:** ```c++ $ mkdir build $ cd build $ cmake -G "Unix Makefiles" -DCMAKE_BUILD_TYPE=Release .. $ make -j8 ``` **Compile test program with address sanitizer:** - Update Makefile: ...
stack-buffer-overflow in function compress_symbolic_block_for_partition_2planes()
https://api.github.com/repos/ARM-software/astc-encoder/issues/296/comments
5
2021-10-22T05:18:39Z
2022-05-02T05:20:47Z
https://github.com/ARM-software/astc-encoder/issues/296
1,033,189,620
296
3,245
CVE-2021-44334
2022-02-28T15:15:08.037
David Brackeen ok-file-formats 97f78ca is vulnerable to Buffer Overflow. When the function of the ok-file-formats project is used, a heap-buffer-overflow occurs in function ok_jpg_convert_YCbCr_to_RGB() in "/ok_jpg.c:513" .
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/brackeen/ok-file-formats/issues/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ok-file-formats_project:ok-file-formats:2021-03-06:*:*:*:*:*:*:*", "matchCriteriaId": "7221E38B-D190-4EC5-BD11-C4A84647DBED", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "787" ]
787
https://github.com/brackeen/ok-file-formats/issues/12
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "brackeen", "ok-file-formats" ]
# Version dev version, git clone https://github.com/brackeen/ok-file-formats.git # Environment Ubuntu 18.04, 64bit # Testcase ```c #include <stdio.h> #include <stdlib.h> #include "ok_jpg.h" #include "ok_jpg.c" int main(int _argc, char **_argv) { FILE *file = fopen("_argv[1]", "rb"); ok_...
heap-buffer-overflow in functionok_jpg_convert_YCbCr_to_RGB() at ok_jpg.c:513
https://api.github.com/repos/brackeen/ok-file-formats/issues/12/comments
1
2021-03-26T08:44:18Z
2021-04-05T22:46:03Z
https://github.com/brackeen/ok-file-formats/issues/12
841,726,465
12
3,246
CVE-2021-44339
2022-02-28T16:15:07.880
David Brackeen ok-file-formats 203defd is vulnerable to Buffer Overflow. When the function of the ok-file-formats project is used, a heap-buffer-overflow occurred in function ok_png_transform_scanline() in "/ok_png.c:712".
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/brackeen/ok-file-formats/issues/15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ok-file-formats_project:ok-file-formats:2021-06-05:*:*:*:*:*:*:*", "matchCriteriaId": "FEF1A3E0-1854-4086-844E-05721E915556", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "787" ]
787
https://github.com/brackeen/ok-file-formats/issues/15
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "brackeen", "ok-file-formats" ]
# Version [203defd](https://github.com/brackeen/ok-file-formats/commit/203defdfb2c8b1207a392493a09145c1b54bb070) # Environment Ubuntu 18.04,64 bit # Testcase ```c #include <stdio.h> #include <stdlib.h> #include "ok_png.c" #include "ok_png.h" int main(int _argc, char **_argv) { FILE *file = f...
heap-buffer-overflow in function ok_png_transform_scanline() at ok_png.c:712:13
https://api.github.com/repos/brackeen/ok-file-formats/issues/15/comments
1
2021-06-07T04:58:26Z
2022-05-09T10:32:12Z
https://github.com/brackeen/ok-file-formats/issues/15
913,089,593
15
3,247
CVE-2021-44331
2022-02-28T17:15:09.923
ARM astcenc 3.2.0 is vulnerable to Buffer Overflow in function encode_ise().
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ARM-software/astc-encoder/issues/294" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:arm:adaptive_scalable_texture_compression_encoder:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC0AA123-0F53-4A6E-980E-4539FBAB8242", "versionEndExcluding": null, "versionEndIncluding": nul...
[ "787" ]
787
https://github.com/ARM-software/astc-encoder/issues/294
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ARM-software", "astc-encoder" ]
# Version ``` astcenc v3.2.0, 64-bit sse2 ``` # Environment Ubuntu 18.04,64 bit # Command **Compile test program:** ```c++ $ mkdir build $ cd build $ cmake -G "Unix Makefiles" -DCMAKE_BUILD_TYPE=Release .. $ make -j8 ``` **Compile test program with address sanitizer:** - Update Makefile: ...
stack-buffer-overflow in function encode_ise()
https://api.github.com/repos/ARM-software/astc-encoder/issues/294/comments
5
2021-10-22T05:11:46Z
2021-10-27T12:31:03Z
https://github.com/ARM-software/astc-encoder/issues/294
1,033,185,978
294
3,248
CVE-2021-44342
2022-02-28T17:15:09.970
David Brackeen ok-file-formats 203defd is vulnerable to Buffer Overflow via function ok_png_transform_scanline() in "/ok_png.c:494".
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/brackeen/ok-file-formats/issues/19" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ok-file-formats_project:ok-file-formats:2021-06-05:*:*:*:*:*:*:*", "matchCriteriaId": "FEF1A3E0-1854-4086-844E-05721E915556", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "787" ]
787
https://github.com/brackeen/ok-file-formats/issues/19
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "brackeen", "ok-file-formats" ]
# Version [203defd](https://github.com/brackeen/ok-file-formats/commit/203defdfb2c8b1207a392493a09145c1b54bb070) # Environment Ubuntu 18.04,64 bit # Testcase ```c #include <stdio.h> #include <stdlib.h> #include "ok_png.c" #include "ok_png.h" int main(int _argc, char **_argv) { FILE *file = f...
heap-buffer-overflow in function ok_png_transform_scanline() at ok_png.c:494:20
https://api.github.com/repos/brackeen/ok-file-formats/issues/19/comments
1
2021-06-07T05:05:25Z
2022-05-09T10:33:54Z
https://github.com/brackeen/ok-file-formats/issues/19
913,093,988
19
3,249
CVE-2022-25013
2022-02-28T19:15:12.433
Ice Hrm 30.0.0.OS was discovered to contain multiple reflected cross-site scripting (XSS) vulnerabilities via the "key" and "fm" parameters in the component login.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gamonoid/icehrm/issues/284" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icehrm:icehrm:30.0.0.os:*:*:*:*:*:*:*", "matchCriteriaId": "5CC48B8B-4DDC-44AC-A809-2F88B317605E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "79" ]
79
https://github.com/gamonoid/icehrm/issues/284
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gamonoid", "icehrm" ]
# Important note : This vulnerability was reported to the maintainers on **Nov 23rd, 2021**, and there has been no response yet. So, I infer it makes sense to publish it publicly here for the good sake of everyone who is using this software actively. # Description DOM XSS in login.php GET parameter `key`. The in...
Reflected XSS vulnerabilities in login.php -- can be used to leak passwords
https://api.github.com/repos/gamonoid/icehrm/issues/284/comments
1
2021-12-23T08:13:20Z
2022-01-14T20:12:38Z
https://github.com/gamonoid/icehrm/issues/284
1,087,479,274
284
3,250
CVE-2022-25014
2022-02-28T19:15:12.480
Ice Hrm 30.0.0.OS was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the "m" parameter in the Dashboard of the current user. This vulnerability allows attackers to compromise session credentials via user interaction with a crafted link.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gamonoid/icehrm/issues/283" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icehrm:icehrm:30.0.0.os:*:*:*:*:*:*:*", "matchCriteriaId": "5CC48B8B-4DDC-44AC-A809-2F88B317605E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "79" ]
79
https://github.com/gamonoid/icehrm/issues/283
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gamonoid", "icehrm" ]
# Important note : This vulnerability was reported to the maintainers on **Nov 23rd, 2021**, and there has been no response yet. So, I infer it makes sense to publish it publicly here for the good sake of everyone who is using this software actively. # Description The input sent to GET parameter `m` gets reflecte...
Reflected XSS vulnerability in the Dashboard page of logged-in user
https://api.github.com/repos/gamonoid/icehrm/issues/283/comments
1
2021-12-23T08:09:18Z
2022-02-08T10:13:15Z
https://github.com/gamonoid/icehrm/issues/283
1,087,476,492
283
3,251
CVE-2022-25015
2022-02-28T19:15:12.527
A stored cross-site scripting (XSS) vulnerability in Ice Hrm 30.0.0.OS allows attackers to steal cookies via a crafted payload inserted into the First Name field.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gamonoid/icehrm/issues/285" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icehrm:icehrm:30.0.0.os:*:*:*:*:*:*:*", "matchCriteriaId": "5CC48B8B-4DDC-44AC-A809-2F88B317605E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "79" ]
79
https://github.com/gamonoid/icehrm/issues/285
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gamonoid", "icehrm" ]
# Important note : This vulnerability was reported to the maintainers on **Nov 23rd, 2021**, and there has been no response yet. So, I infer it makes sense to publish it publicly here for the good sake of everyone who is using this software actively. # Description An Authenticated user can set thier 'first name' ...
Stored XSS vulnerability in dashboard of any logged-in user
https://api.github.com/repos/gamonoid/icehrm/issues/285/comments
1
2021-12-23T08:15:18Z
2022-03-01T04:15:01Z
https://github.com/gamonoid/icehrm/issues/285
1,087,480,595
285
3,252
CVE-2022-25023
2022-02-28T19:15:12.573
Audio File commit 004065d was discovered to contain a heap-buffer overflow in the function fouBytesToInt():AudioFile.h.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/adamstark/AudioFile/issues/58" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:audio_file_project:audio_file:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "C2FF1257-FC62-4620-A576-3D6A9D05D91C", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "787" ]
787
https://github.com/adamstark/AudioFile/issues/58
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "adamstark", "AudioFile" ]
### Description A heap-buffer-overflow was discovered in function fouBytesToInt():AudioFile.h:1196 The issue is being triggered in function getIndexOfChunk() ### Version Version [004065d](https://github.com/adamstark/AudioFile/commit/004065d01e9b7338580390d4fdbfbaa46adede4e) (Lastest commit) ### Environment U...
[Bug]heap-buffer-overflow in function fouBytesToInt():AudioFile.h:1196
https://api.github.com/repos/adamstark/AudioFile/issues/58/comments
2
2022-02-08T12:21:52Z
2022-08-01T20:41:30Z
https://github.com/adamstark/AudioFile/issues/58
1,127,185,345
58
3,253
CVE-2022-26181
2022-02-28T19:15:12.673
Dropbox Lepton v1.2.1-185-g2a08b77 was discovered to contain a heap-buffer-overflow in the function aligned_dealloc():src/lepton/bitops.cc:108.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://drive.google.com/file/d/1bJlHozO37c5NZ1wI0NBWh0yHHyTcfaQL/view?usp=sharing" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/dropbox/lept...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dropbox:lepton:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "6DCDBF54-A4B3-4D67-A014-6ECC38D58621", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "787" ]
787
https://github.com/dropbox/lepton/issues/154
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "dropbox", "lepton" ]
### Description A heap-buffer-overflow was discovered in function aligned_dealloc():src/lepton/bitops.cc:108 The issue is being triggered in function reset_buffers() src/lepton/jpgcoder.cc:4373 ### Version lepton v1.0-1.2.1-185-g2a08b77 (Lastest Commit) url: https://github.com/dropbox/lepton ### Reproduce ``` ...
[Bug]A heap-buffer-overflow was discovered in function aligned_dealloc():src/lepton/bitops.cc:108
https://api.github.com/repos/dropbox/lepton/issues/154/comments
0
2022-02-21T11:00:57Z
2022-04-13T07:01:04Z
https://github.com/dropbox/lepton/issues/154
1,145,642,507
154
3,254
CVE-2022-26315
2022-02-28T19:15:12.717
qrcp through 0.8.4, in receive mode, allows ../ Directory Traversal via the file name specified by the uploader.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/claudiodangelis/qrcp/issues/223" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qrcp_project:qrcp:*:*:*:*:*:*:*:*", "matchCriteriaId": "9127C471-EEAF-479B-9506-95C640914824", "versionEndExcluding": null, "versionEndIncluding": "0.8.4", "versionStartExclu...
[ "22" ]
22
https://github.com/claudiodangelis/qrcp/issues/223
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "claudiodangelis", "qrcp" ]
While qrcp works on receive mode, uploader can edit the file name in HTTP request and add "../". Meanwhile, qrcp doesn't check legality of file name which lead to directory traversal. Env: qrcp-0.8.4, Windows 10 x86_64, Ubuntu 20.04 x86_64 Poc: <img width="952" alt="image" src="https://user-images.githubusercontent....
Directory Traversal Vulnerability
https://api.github.com/repos/claudiodangelis/qrcp/issues/223/comments
2
2022-02-28T14:59:45Z
2022-03-05T03:57:24Z
https://github.com/claudiodangelis/qrcp/issues/223
1,154,193,943
223
3,255
CVE-2022-25407
2022-02-28T23:15:12.647
Hospital Management System v1.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Doctor parameter at /admin-panel1.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kishan0725/Hospital-Management-System/issues/21" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Track...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hospital_management_system_project:hospital_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "36653204-5E38-44E3-B8FD-580F2D27E958", "versionEndExcluding": null, "versionEndInclu...
[ "79" ]
79
https://github.com/kishan0725/Hospital-Management-System/issues/21
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kishan0725", "Hospital-Management-System" ]
Add Doctor info payload to Doctor Name of Add Doctor page to target /admin-panel1.php ,then use burpsuite get requests datas,change the 'doctor' parameter to xss payload: `<sCrIpT>alert(1234)</ScRiPt>` Add Doctor info payload to Doctor Name of Add Doctor page to target /admin-panel1.php ,then use burpsuite get r...
Persistent cross-site scripting (XSS) in targeted towards web admin through /admin-panel1.php at via the parameter doctor.
https://api.github.com/repos/kishan0725/Hospital-Management-System/issues/21/comments
0
2022-02-13T15:55:55Z
2022-02-13T15:55:55Z
https://github.com/kishan0725/Hospital-Management-System/issues/21
1,136,052,127
21
3,256
CVE-2022-25408
2022-02-28T23:15:12.687
Hospital Management System v1.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the dpassword parameter at /admin-panel1.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kishan0725/Hospital-Management-System/issues/22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Track...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hospital_management_system_project:hospital_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "36653204-5E38-44E3-B8FD-580F2D27E958", "versionEndExcluding": null, "versionEndInclu...
[ "79" ]
79
https://github.com/kishan0725/Hospital-Management-System/issues/22
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kishan0725", "Hospital-Management-System" ]
Add Doctor info payload to Doctor Name of Add Doctor page to target /admin-panel1.php ,then use burpsuite get requests datas,change the 'dpassword' parameter to xss payload: `<sCrIpT>alert(7777)</ScRiPt>` Steps to exploit: 1) Navigate to http://hospital.com/admin-panel1.php 2) click 'Add Doctors ', use burpsui...
Persistent cross-site scripting (XSS) in targeted towards web admin through /admin-panel1.php at via the parameter dpassword.
https://api.github.com/repos/kishan0725/Hospital-Management-System/issues/22/comments
0
2022-02-13T15:57:12Z
2022-02-13T15:58:44Z
https://github.com/kishan0725/Hospital-Management-System/issues/22
1,136,053,859
22
3,257
CVE-2022-25409
2022-02-28T23:15:12.727
Hospital Management System v1.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the demail parameter at /admin-panel1.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kishan0725/Hospital-Management-System/issues/20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Track...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hospital_management_system_project:hospital_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "36653204-5E38-44E3-B8FD-580F2D27E958", "versionEndExcluding": null, "versionEndInclu...
[ "79" ]
79
https://github.com/kishan0725/Hospital-Management-System/issues/20
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kishan0725", "Hospital-Management-System" ]
Persistent cross-site scripting (XSS) in Hospital Management System v4.0 targeted towards web admin through /admin-panel1.php at via the parameter demail. Add Doctor info payload to Doctor Name of Add Doctor page to target /admin-panel1.php ,then use burpsuite get requests datas,change the 'demail' parameter to...
Persistent cross-site scripting (XSS) targeted towards web admin through /admin-panel1.php at via the parameter demail.
https://api.github.com/repos/kishan0725/Hospital-Management-System/issues/20/comments
0
2022-02-13T15:53:58Z
2022-02-13T15:53:58Z
https://github.com/kishan0725/Hospital-Management-System/issues/20
1,136,049,571
20
3,258
CVE-2022-25410
2022-02-28T23:15:12.767
Maxsite CMS v180 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the parameter f_file_description at /admin/files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/maxsite/cms/issues/485" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:max-3000:maxsite_cms:108:*:*:*:*:*:*:*", "matchCriteriaId": "EC356198-5D41-4152-90E2-AED880BAB522", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "79" ]
79
https://github.com/maxsite/cms/issues/485
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "maxsite", "cms" ]
### Stored-Cross-Site-Scripting (XSS) -2 a stored cross-site scripting (XSS) in maxsite cms targeted towards web admin through ~/admin/files at via the parameter f_file_description . 1. Navigate to admin page, go to http://localhost/admin/files,then update a xss.gif file ![image](https://user-images.githubuserc...
Stored-Cross-Site-Scripting (XSS)(authenticated) --2
https://api.github.com/repos/maxsite/cms/issues/485/comments
1
2022-02-17T16:01:55Z
2022-02-17T16:20:15Z
https://github.com/maxsite/cms/issues/485
1,141,533,236
485
3,259
CVE-2022-25411
2022-02-28T23:15:12.810
A Remote Code Execution (RCE) vulnerability at /admin/options in Maxsite CMS v180 allows attackers to execute arbitrary code via a crafted PHP file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/maxsite/cms/issues/487" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:max-3000:maxsite_cms:108:*:*:*:*:*:*:*", "matchCriteriaId": "EC356198-5D41-4152-90E2-AED880BAB522", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "434" ]
434
https://github.com/maxsite/cms/issues/487
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "maxsite", "cms" ]
### Description of Vulnerability The arbitrary file deletion vulnerability https://github.com/maxsite/cms/issues/486),we can delete ~/cms-108/uploads/.htaccess, and then in /admin/options add the types of files allowed to be uploaded, it will allows hacker to bypass the protection system protection upload malicio...
Remote Code Execution Vulnerability In MaxSite CMS v180
https://api.github.com/repos/maxsite/cms/issues/487/comments
1
2022-02-17T17:15:18Z
2022-02-17T19:03:19Z
https://github.com/maxsite/cms/issues/487
1,141,623,090
487
3,260
CVE-2022-25412
2022-02-28T23:15:12.850
Maxsite CMS v180 was discovered to contain multiple arbitrary file deletion vulnerabilities in /admin_page/all-files-update-ajax.php via the dir and deletefile parameters.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE"...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/maxsite/cms/issues/486" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:max-3000:maxsite_cms:108:*:*:*:*:*:*:*", "matchCriteriaId": "EC356198-5D41-4152-90E2-AED880BAB522", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "22" ]
22
https://github.com/maxsite/cms/issues/486
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "maxsite", "cms" ]
#### Description of Vulnerability Multiple Arbitrary File Deletion vulnerabilities in maxsite cms v 180 targeted towards web admin through admin/plugins/admin_page/all-files-update-ajax.php at the parameter dir and deletefile #### affected source code: at 15~34 in admin/plugins/admin_page/all-files-update-aja...
Multiple Arbitrary File Deletion vulnerabilities
https://api.github.com/repos/maxsite/cms/issues/486/comments
1
2022-02-17T16:55:54Z
2022-02-17T19:01:48Z
https://github.com/maxsite/cms/issues/486
1,141,600,693
486
3,261
CVE-2022-25413
2022-02-28T23:15:12.890
Maxsite CMS v108 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the parameter f_tags at /admin/page_edit/3.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/maxsite/cms/issues/484" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:max-3000:maxsite_cms:108:*:*:*:*:*:*:*", "matchCriteriaId": "EC356198-5D41-4152-90E2-AED880BAB522", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "79" ]
79
https://github.com/maxsite/cms/issues/484
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "maxsite", "cms" ]
### Stored-Cross-Site-Scripting (XSS)(authenticated) a stored cross-site scripting (XSS) in maxsite cms version 108 targeted towards web admin through ~/admin/page_edit/3 at via the parameter f_tags. 1. Navigate to admin page, ~/admin/page_edit/ and make a new page 2. click in "Рубрики и метки">"Метки (через з...
Stored-Cross-Site-Scripting (XSS)-vulnerabilities(authenticated)--1
https://api.github.com/repos/maxsite/cms/issues/484/comments
1
2022-02-17T15:24:21Z
2022-02-17T15:57:02Z
https://github.com/maxsite/cms/issues/484
1,141,483,156
484
3,262
CVE-2022-23380
2022-03-01T14:15:07.820
There is a SQL injection vulnerability in the background of taocms 3.0.2 in parameter id:action=admin&id=2&ctrl=edit.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "89" ]
89
https://github.com/taogogo/taocms/issues/16
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "taogogo", "taocms" ]
![20220116015744](https://user-images.githubusercontent.com/46486374/149633033-32c2dfd1-bc79-46a1-96c8-a05e1873985c.jpg) ![20220116015609](https://user-images.githubusercontent.com/46486374/149633040-9d78fd1a-3df2-4c0b-bc2b-71ea3aa5727e.jpg) ``` GET /admin/admin.php?action=admin&id=2+and(sleep(5))--+&ctrl=edit...
There is SQL blind injection at "Admin Edit"
https://api.github.com/repos/taogogo/taocms/issues/16/comments
0
2022-01-15T18:16:58Z
2022-01-16T03:13:12Z
https://github.com/taogogo/taocms/issues/16
1,104,805,848
16
3,263
CVE-2022-23387
2022-03-01T17:15:08.120
An issue was discovered in taocms 3.0.2. This is a SQL blind injection that can obtain database data through the Comment Update field.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:taocms:taocms:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "98036B99-8DC6-4F7F-9450-763A199E6148", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "89" ]
89
https://github.com/taogogo/taocms/issues/23
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "taogogo", "taocms" ]
``` POST /admin/admin.php HTTP/1.1 Host: taocms.test Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8...
There is SQL blind injection at "Comment Update"
https://api.github.com/repos/taogogo/taocms/issues/23/comments
0
2022-01-17T02:51:41Z
2022-01-17T02:51:41Z
https://github.com/taogogo/taocms/issues/23
1,105,307,017
23
3,264
CVE-2021-41652
2022-03-01T23:15:08.397
Insecure permissions in the file database.sdb of BatFlat CMS v1.3.6 allows attackers to dump the entire database.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://deathflash1411.github.io/blog/dumping-batflat-cms-database" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sruupl/batflat/is...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:batflat:batflat:1.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "CCD502D1-2B27-4BC5-9DF2-C71F42212D85", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "276" ]
276
https://github.com/sruupl/batflat/issues/113
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sruupl", "batflat" ]
Improper access control leads to accessing the database file (database.sdb) - https://leobreaker1411.github.io/blog/cve-2021-41652
Improper access control
https://api.github.com/repos/sruupl/batflat/issues/113/comments
1
2021-09-20T16:54:46Z
2022-04-07T13:53:26Z
https://github.com/sruupl/batflat/issues/113
1,001,188,810
113
3,265
CVE-2021-45860
2022-03-02T00:15:08.030
An integer overflow in DTSStreamReader::findFrame() of tsMuxer git-2678966 allows attackers to cause a Denial of Service (DoS) via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/issues/510" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tsmuxer_project:tsmuxer:*:*:*:*:*:*:*:*", "matchCriteriaId": "2022C236-72EE-451A-AA9D-5F3E2DA838E3", "versionEndExcluding": "2021-12-21", "versionEndIncluding": null, "versio...
[ "190" ]
190
https://github.com/justdan96/tsMuxer/issues/510
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "justdan96", "tsMuxer" ]
Hi, I found a integer overflow in DTSStreamReader::findFrame() https://github.com/justdan96/tsMuxer/blob/380cca33a2fc68b1f9e7a7c79302b13274ededcd/tsMuxer/dtsStreamReader.cpp#L204-L212 **POC** [poc.zip](https://github.com/justdan96/tsMuxer/files/7750896/poc.zip) With this poc, the buffer is too small but the...
An Integer Overflow in DTSStreamReader::findFrame()
https://api.github.com/repos/justdan96/tsMuxer/issues/510/comments
0
2021-12-21T08:53:16Z
2022-06-23T07:12:55Z
https://github.com/justdan96/tsMuxer/issues/510
1,085,586,537
510
3,266
CVE-2021-45861
2022-03-02T00:15:08.080
There is an Assertion `num <= INT_BIT' failed at BitStreamReader::skipBits in /bitStream.h:132 of tsMuxer git-c6a0277.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/issues/478" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tsmuxer_project:tsmuxer:*:*:*:*:*:*:*:*", "matchCriteriaId": "05AA1A0C-51F5-46F3-A82E-5E73923E2877", "versionEndExcluding": "2021-10-19", "versionEndIncluding": null, "versio...
[ "617" ]
617
https://github.com/justdan96/tsMuxer/issues/478
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "justdan96", "tsMuxer" ]
Hi, I Found an Assertion Failed error. **Some info:** ``` Ubuntu 20.04.3 LTS tsMuxeR version git-c6a0277 ``` **To reproduce** 1. Compile tsMuxer 2. Run tsmuxer ``` tsmuxer ./poc tsMuxeR version git-c6a0277. github.com/justdan96/tsMuxer tsmuxer: tsMuxer/tsMuxer/bitStream.h:132: void BitStreamReader::skipBi...
Assertion Failed in bitStream.h:132 BitStreamReader::skipBits
https://api.github.com/repos/justdan96/tsMuxer/issues/478/comments
1
2021-10-18T14:29:17Z
2022-06-22T21:45:09Z
https://github.com/justdan96/tsMuxer/issues/478
1,029,196,897
478
3,267
CVE-2021-45863
2022-03-02T00:15:08.127
tsMuxer git-2678966 was discovered to contain a heap-based buffer overflow via the function HevcUnit::updateBits in hevc.cpp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/issues/509" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tsmuxer_project:tsmuxer:*:*:*:*:*:*:*:*", "matchCriteriaId": "2022C236-72EE-451A-AA9D-5F3E2DA838E3", "versionEndExcluding": "2021-12-21", "versionEndIncluding": null, "versio...
[ "787" ]
787
https://github.com/justdan96/tsMuxer/issues/509
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "justdan96", "tsMuxer" ]
Hi, I found a heap-buffer-overflow error. **Some Info** ``` Ubuntu 20.04.3 LTS tsMuxeR version git-2678966. ``` **To reproduce** 1. Compile tsMuxer 2. run tsmuxer ``` tsmuxer ./poc ``` **Asan output** ``` $ tsMuxer-asan ./poc tsMuxeR version git-2678966. github.com/justdan96/tsMuxer This HEV...
heap-buffer-overflow in hevc.cpp:76 HevcUnit::updateBits
https://api.github.com/repos/justdan96/tsMuxer/issues/509/comments
0
2021-12-21T08:06:40Z
2022-06-22T21:43:07Z
https://github.com/justdan96/tsMuxer/issues/509
1,085,548,429
509
3,268
CVE-2021-45864
2022-03-02T00:15:08.173
tsMuxer git-c6a0277 was discovered to contain a segmentation fault via DTSStreamReader::findFrame in dtsStreamReader.cpp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/issues/476" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tsmuxer_project:tsmuxer:*:*:*:*:*:*:*:*", "matchCriteriaId": "05AA1A0C-51F5-46F3-A82E-5E73923E2877", "versionEndExcluding": "2021-10-19", "versionEndIncluding": null, "versio...
[ "125" ]
125
https://github.com/justdan96/tsMuxer/issues/476
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "justdan96", "tsMuxer" ]
Hi, I found a segmentation fault. **Some info:** ``` Ubuntu 20.04.3 LTS tsMuxeR version git-c6a0277 ``` **To reproduce** 1. Compile tsMuxer 2. Run tsmuxer ``` tsmuxer ./poc ``` **POC** [poc.zip](https://github.com/justdan96/tsMuxer/files/7365611/poc.zip) **ASAN output:** ``` tsMuxeR version gi...
segmentation fault in dtsStreamReader.cpp:193 DTSStreamReader::findFrame
https://api.github.com/repos/justdan96/tsMuxer/issues/476/comments
1
2021-10-18T14:12:22Z
2022-06-23T07:14:29Z
https://github.com/justdan96/tsMuxer/issues/476
1,029,175,684
476
3,269
CVE-2022-25050
2022-03-02T00:15:08.250
rtl_433 21.12 was discovered to contain a stack overflow in the function somfy_iohc_decode(). This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/merbanan/rtl_433/commit/2dad7b9fc67a1d0bfbe520fbd821678b8f8cc7a8" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rtl_433_project:rlt_433:21.12:*:*:*:*:*:*:*", "matchCriteriaId": "706EE005-D69A-444F-9F6D-DFDB877D2A52", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "787" ]
787
https://github.com/merbanan/rtl_433/issues/1960
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "merbanan", "rtl_433" ]
Hey there! I belong to an open source security research community, and a member (@aug5t7) has found an issue, but doesn’t know the best way to disclose it. If not a hassle, might you kindly add a `SECURITY.md` file with an email, or another contact method? GitHub [recommends](https://docs.github.com/en/code-security/...
Responsible disclosure policy
https://api.github.com/repos/merbanan/rtl_433/issues/1960/comments
6
2022-01-24T12:23:29Z
2022-02-03T10:53:20Z
https://github.com/merbanan/rtl_433/issues/1960
1,112,577,948
1,960
3,270
CVE-2022-25045
2022-03-02T21:15:08.313
Home Owners Collection Management System v1.0 was discovered to contain hardcoded credentials which allows attackers to escalate privileges and access the admin panel.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/VivekPanday12/CVE-/issues/6" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.linkedin.com/in/vi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:home_owners_collection_management_system_project:home_owners_collection_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "FDB75A84-7EE7-4D4A-9B5F-77365D793307", "versionEndExcluding": null, ...
[ "798" ]
798
https://github.com/VivekPanday12/CVE-/issues/6
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "VivekPanday12", "CVE-" ]
CVE-2022-25045 Exploit Title: Home Owners Collection Management System — Use of Hard-coded Credentials in Source Code Leads to Admin Panel Access Exploit Author: VIVEK PANDAY Vendor Homepage: https://www.sourcecodester.com/ Software Link: https://www.sourcecodester.com/php/15162/home-owners-collection-manage...
CVE-2022-25045 Home Owners Collection Management System — Use of Hard-coded Credentials in Source Code Leads to Admin Panel Access
https://api.github.com/repos/VivekPanday12/CVE-/issues/6/comments
0
2022-02-09T09:00:10Z
2022-05-18T10:22:16Z
https://github.com/VivekPanday12/CVE-/issues/6
1,128,242,995
6
3,271
CVE-2021-23180
2022-03-02T23:15:08.283
A flaw was found in htmldoc in v1.9.12 and before. Null pointer dereference in file_extension(),in file.c may lead to execute arbitrary code and denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967041" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9DD956F-44F8-4CB5-B9FD-9269C3E931F2", "versionEndExcluding": null, "versionEndIncluding": "1.9.12", "versionSta...
[ "476" ]
476
https://github.com/michaelrsweet/htmldoc/issues/418
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
Hello, While fuzzing htmldoc , I found aSEGV in file_extension function in file.c:337:29 - test platform htmldoc Version 1.9.12 git [master 6898d0a] OS :Ubuntu 20.04.1 LTS x86_64 kernel: 5.4.0-53-generic compiler: clang version 10.0.0-4ubuntu1 reproduced: htmldoc -f demo.pdf poc8.html poc(zipped for up...
AddressSanitizer: SEGV in file_extension file.c:337:29
https://api.github.com/repos/michaelrsweet/htmldoc/issues/418/comments
2
2021-01-26T09:02:25Z
2022-03-11T05:20:30Z
https://github.com/michaelrsweet/htmldoc/issues/418
794,056,743
418
3,272
CVE-2021-23191
2022-03-02T23:15:08.347
A security issue was found in htmldoc v1.9.12 and before. A NULL pointer dereference in the function image_load_jpeg() in image.cxx may result in denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967022" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9DD956F-44F8-4CB5-B9FD-9269C3E931F2", "versionEndExcluding": null, "versionEndIncluding": "1.9.12", "versionSta...
[ "476" ]
476
https://github.com/michaelrsweet/htmldoc/issues/415
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
Hello, While fuzzing htmldoc , I found SEGV on unknown address test platform htmldoc Version 1.9.12 git [master 6898d0a] OS :Ubuntu 20.04.1 LTS x86_64 kernel: 5.4.0-53-generic compiler: clang version 10.0.0-4ubuntu1 reproduced: ``` htmldoc -f demo.pdf poc4.html ``` poc(zipped for update): [poc4.zip]...
AddressSanitizer: SEGV on unknown address 0x000000000014
https://api.github.com/repos/michaelrsweet/htmldoc/issues/415/comments
7
2021-01-26T08:50:41Z
2022-03-11T05:12:06Z
https://github.com/michaelrsweet/htmldoc/issues/415
794,049,235
415
3,273
CVE-2021-23206
2022-03-02T23:15:08.460
A flaw was found in htmldoc in v1.9.12 and prior. A stack buffer overflow in parse_table() in ps-pdf.cxx may lead to execute arbitrary code and denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967028" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9DD956F-44F8-4CB5-B9FD-9269C3E931F2", "versionEndExcluding": null, "versionEndIncluding": "1.9.12", "versionSta...
[ "787" ]
787
https://github.com/michaelrsweet/htmldoc/issues/416
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
Hello, While fuzzing htmldoc , I found a stack-buffer-overflow in parse_table() ps-pdf.cxx:6611:25 - test platform htmldoc Version 1.9.12 git [master 6898d0a] OS :Ubuntu 20.04.1 LTS x86_64 kernel: 5.4.0-53-generic compiler: clang version 10.0.0-4ubuntu1 reproduced: ``` htmldoc -f demo.pdf poc6.html ```...
AddressSanitizer: stack-buffer-overflow in parse_table ps-pdf.cxx:6611:25
https://api.github.com/repos/michaelrsweet/htmldoc/issues/416/comments
3
2021-01-26T08:54:36Z
2022-03-11T05:14:48Z
https://github.com/michaelrsweet/htmldoc/issues/416
794,051,710
416
3,274
CVE-2021-44335
2022-03-03T00:15:08.157
David Brackeen ok-file-formats 203defd is vulnerable to Buffer Overflow. When the function of the ok-file-formats project is used, a heap-buffer-overflow occurs in function ok_png_transform_scanline() in "/ok_png.c:533".
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/brackeen/ok-file-formats/issues/17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ok-file-formats_project:ok-file-formats:2021-06-05:*:*:*:*:*:*:*", "matchCriteriaId": "FEF1A3E0-1854-4086-844E-05721E915556", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "787" ]
787
https://github.com/brackeen/ok-file-formats/issues/17
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "brackeen", "ok-file-formats" ]
## Version [203defd](https://github.com/brackeen/ok-file-formats/commit/203defdfb2c8b1207a392493a09145c1b54bb070) # Environment Ubuntu 18.04,64 bit # Testcase ```c #include <stdio.h> #include <stdlib.h> #include "ok_png.c" #include "ok_png.h" int main(int _argc, char **_argv) { FILE *file = ...
heap-buffer-overflow in function ok_png_transform_scanline() at ok_png.c:533:20
https://api.github.com/repos/brackeen/ok-file-formats/issues/17/comments
1
2021-06-07T05:03:03Z
2022-05-09T10:33:04Z
https://github.com/brackeen/ok-file-formats/issues/17
913,092,383
17
3,275
CVE-2021-44343
2022-03-03T00:15:08.200
David Brackeen ok-file-formats 203defd is vulnerable to Buffer Overflow. When the function of the ok-file-formats project is used, a heap-buffer-overflow occurred in function ok_png_read_data() in "/ok_png.c".
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/brackeen/ok-file-formats/issues/18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ok-file-formats_project:ok-file-formats:2021-06-05:*:*:*:*:*:*:*", "matchCriteriaId": "FEF1A3E0-1854-4086-844E-05721E915556", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "120" ]
120
https://github.com/brackeen/ok-file-formats/issues/18
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "brackeen", "ok-file-formats" ]
# Version [203defd](https://github.com/brackeen/ok-file-formats/commit/203defdfb2c8b1207a392493a09145c1b54bb070) # Environment Ubuntu 18.04,64 bit # Testcase ```c #include <stdio.h> #include <stdlib.h> #include "ok_png.c" #include "ok_png.h" int main(int _argc, char **_argv) { FILE *file = f...
heap-buffer-overflow in ‘/usr/lib/x86_64-linux-gnu/libasan.so.3+0x47dc3’
https://api.github.com/repos/brackeen/ok-file-formats/issues/18/comments
1
2021-06-07T05:04:12Z
2022-05-09T10:33:29Z
https://github.com/brackeen/ok-file-formats/issues/18
913,093,151
18
3,276
CVE-2021-40635
2022-03-03T14:15:07.870
OS4ED openSIS 8.0 is affected by SQL injection in ChooseCpSearch.php, ChooseRequestSearch.php. An attacker can inject a SQL query to extract information from the database.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OS4ED/openSIS-Classic/issues/195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Th...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:os4ed:opensis:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "20B5286C-4CFF-4710-8D23-C76669FADFE7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "89" ]
89
https://github.com/OS4ED/openSIS-Classic/issues/195
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "OS4ED", "openSIS-Classic" ]
Due to no security mechanism was implemented in parameter `id`, attacker can inject arbitrary SQL query and extract database informations ![Screenshot from 2021-09-01 22-34-35](https://user-images.githubusercontent.com/35491855/131700825-f4e7a36a-22d2-43fb-b442-948cd4c9a4b8.png) ### Vulnerable code section **Choo...
SQL Injection in id Parameter
https://api.github.com/repos/OS4ED/openSIS-Classic/issues/195/comments
2
2021-09-01T15:52:40Z
2021-09-09T22:20:42Z
https://github.com/OS4ED/openSIS-Classic/issues/195
985,319,720
195
3,277
CVE-2021-40636
2022-03-03T14:15:07.930
OS4ED openSIS 8.0 is affected by SQL Injection in CheckDuplicateName.php, which can extract information from the database.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OS4ED/openSIS-Classic/issues/198" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Th...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:os4ed:opensis:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "20B5286C-4CFF-4710-8D23-C76669FADFE7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "89" ]
89
https://github.com/OS4ED/openSIS-Classic/issues/198
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "OS4ED", "openSIS-Classic" ]
### Description Due to lack of protection, parameters `table_name`, `field_name`, `id`, `field_id` can be abused to injection SQL queries to extract information from databases some other SQLi tricks, parameter `msg` can be used to inject XSS payload and steal user's cookie (and even takeover user's account) ![Scre...
XSS and Error based SQL injection in CheckDuplicateName.php
https://api.github.com/repos/OS4ED/openSIS-Classic/issues/198/comments
4
2021-09-05T08:05:52Z
2022-03-05T02:40:45Z
https://github.com/OS4ED/openSIS-Classic/issues/198
988,449,754
198
3,278
CVE-2021-40637
2022-03-03T15:15:08.427
OS4ED openSIS 8.0 is affected by cross-site scripting (XSS) in EmailCheckOthers.php. An attacker can inject JavaScript code to get the user's cookie and take over the working session of user.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OS4ED/openSIS-Classic/issues/199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Th...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:os4ed:opensis:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "20B5286C-4CFF-4710-8D23-C76669FADFE7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "79" ]
79
https://github.com/OS4ED/openSIS-Classic/issues/199
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "OS4ED", "openSIS-Classic" ]
### Description By injecting Javascript code, an attacker can steal the user's cookie and take over the user's account. This happened because of the lack of security implementation for`type` parameter. This was tested on demo website ### Exploitation ![Screenshot from 2021-09-05 14-06-22](https://user-images.g...
Reflected XSS in EmailCheckOthers.php
https://api.github.com/repos/OS4ED/openSIS-Classic/issues/199/comments
1
2021-09-05T10:01:03Z
2021-09-06T18:56:07Z
https://github.com/OS4ED/openSIS-Classic/issues/199
988,469,984
199
3,279