cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2022-38238
2022-08-16T21:15:14.123
XPDF commit ffaf11c was discovered to contain a heap-buffer overflow via DCTStream::lookChar() at /xpdf/Stream.cc.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jhcloos/xpdf/issues/15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xpdf_project:xpdf:3.04:*:*:*:*:*:*:*", "matchCriteriaId": "CAD71528-E16D-42E8-A422-05AAD924A832", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "787" ]
787
https://github.com/jhcloos/xpdf/issues/15
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jhcloos", "xpdf" ]
Hi, in the lastest version of this code [ ps: commit id [ffaf11c](https://github.com/jhcloos/xpdf/commit/ffaf11c4f9ee0c4a124ec454f96c0f99ee699f10)] I found something unusual. ### crash sample [8id148_heap_buffer_overflow_in_lookChar.zip](https://github.com/jhcloos/xpdf/files/9278233/8id148_heap_buffer_overflow_in_l...
heap_buffer_overflow_in_lookChar
https://api.github.com/repos/jhcloos/xpdf/issues/15/comments
1
2022-08-08T02:40:13Z
2022-08-13T04:34:46Z
https://github.com/jhcloos/xpdf/issues/15
1,331,243,403
15
3,983
CVE-2022-25799
2022-08-16T22:15:08.147
An open redirect vulnerability exists in CERT/CC VINCE software prior to 1.50.0. An attacker could send a link that has a specially crafted URL and convince the user to click the link. When an authenticated user clicks the link, the authenticated user's browser could be redirected to a malicious site that is designed t...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cret@cert.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html" }, { "source": "cret@cert.org", "tags": [ "Issue Tracking", "Third Party Advisor...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cert:vince:*:*:*:*:*:*:*:*", "matchCriteriaId": "996A047E-B6BD-4CA2-AFFE-25FD35000D66", "versionEndExcluding": "1.50.0", "versionEndIncluding": null, "versionStartExcluding":...
[ "601" ]
601
https://github.com/CERTCC/VINCE/issues/45
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CERTCC", "VINCE" ]
@JLLeitschuh (with help from CodeQL) reported this open redirect, which was fixed in 1.50.0: https://www.kb.cert.org/vince/comm/login/?next=https%3A%2F%2Fexample.com https://github.com/CERTCC/VINCE/blob/b986a8637b57c5cd8b2c5722f29f9893aef3f04c/cogauth/views.py#L768 https://github.com/CERTCC/VINCE/commit/b986a8...
assign CVE ID for open redirect fixed in 1.50.0
https://api.github.com/repos/CERTCC/VINCE/issues/45/comments
4
2022-08-15T19:42:17Z
2022-08-17T14:42:42Z
https://github.com/CERTCC/VINCE/issues/45
1,339,408,309
45
3,984
CVE-2022-36186
2022-08-17T15:15:08.480
A Null Pointer dereference vulnerability exists in GPAC 2.1-DEV-revUNKNOWN-master via the function gf_filter_pid_set_property_full () at filter_core/filter_pid.c:5250,which causes a Denial of Service (DoS). This vulnerability was fixed in commit b43f9d1.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2223" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.1:dev:*:*:*:*:*:*", "matchCriteriaId": "2963671B-FA29-45DB-80B0-92F9E55F5159", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/2223
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [ ] I looked for a similar issue and couldn't find any. - [ ] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ ] I give enough info...
A NULL pointer dereference in gf_filter_pid_set_property_full
https://api.github.com/repos/gpac/gpac/issues/2223/comments
0
2022-07-07T10:26:55Z
2022-07-12T17:13:11Z
https://github.com/gpac/gpac/issues/2223
1,297,164,642
2,223
3,985
CVE-2022-36190
2022-08-17T15:15:08.543
GPAC mp4box 2.1-DEV-revUNKNOWN-master has a use-after-free vulnerability in function gf_isom_dovi_config_get. This vulnerability was fixed in commit fef6242.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2220" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
[ "416" ]
416
https://github.com/gpac/gpac/issues/2220
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [ ] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
Heap Use After Free in function gf_isom_dovi_config_get
https://api.github.com/repos/gpac/gpac/issues/2220/comments
1
2022-07-06T03:36:02Z
2022-07-12T17:13:50Z
https://github.com/gpac/gpac/issues/2220
1,295,074,577
2,220
3,986
CVE-2022-36191
2022-08-17T16:15:07.920
A heap-buffer-overflow had occurred in function gf_isom_dovi_config_get of isomedia/avc_ext.c:2490, as demonstrated by MP4Box. This vulnerability was fixed in commit fef6242.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2218" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
[ "787" ]
787
https://github.com/gpac/gpac/issues/2218
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [ ] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
heap-buffer-overflow in function gf_isom_dovi_config_get
https://api.github.com/repos/gpac/gpac/issues/2218/comments
0
2022-07-04T10:10:00Z
2022-07-12T17:13:10Z
https://github.com/gpac/gpac/issues/2218
1,292,941,893
2,218
3,987
CVE-2022-2870
2022-08-17T19:15:07.497
A vulnerability was found in laravel 5.1 and classified as problematic. This issue affects some unknown processing. The manipulation leads to deserialization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-206501 was assigned to this vulnerability.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/beicheng-maker/vulns/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.206501...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:laravel:laravel:*:*:*:*:*:*:*:*", "matchCriteriaId": "3794CF34-E1D7-4E1A-808E-D5AA4C2154E0", "versionEndExcluding": null, "versionEndIncluding": "5.1.46", "versionStartExclud...
[ "502" ]
502
https://github.com/beicheng-maker/vulns/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "beicheng-maker", "vulns" ]
# Laravel 5.1 POP Chain `composer create-project --prefer-dist laravel/laravel laravel5.1 "5.1.*"` `app/Http/Controllers/UsersController.php adding a controller UsersController` ```php <?php namespace App\Http\Controllers; use Illuminate\Http\Request; class UsersController extends Controller { /** ...
Laravel5.1 Unserialize RCE
https://api.github.com/repos/beicheng-maker/vulns/issues/2/comments
4
2022-08-17T03:15:09Z
2022-08-26T04:08:54Z
https://github.com/beicheng-maker/vulns/issues/2
1,341,109,531
2
3,988
CVE-2022-35147
2022-08-17T21:15:09.520
DoraCMS v2.18 and earlier allows attackers to bypass login authentication via a crafted HTTP request.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/doramart/DoraCMS/issues/256" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:html-js:doracms:*:*:*:*:*:*:*:*", "matchCriteriaId": "B936DD6A-24A5-44AB-965B-5F9D26E1714A", "versionEndExcluding": null, "versionEndIncluding": "2.1.8", "versionStartExcludi...
[ "200" ]
200
https://github.com/doramart/DoraCMS/issues/256
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "doramart", "DoraCMS" ]
There is login bypass in doracms2.18 and earlier versions. When logging in, you can bypass the login user authentication by replacing the return package with the return package after a system successfully logs in. [Vulnerability proof] Step 1:Log in to the system through the default account doracms and record the ret...
There is login bypass in doracms
https://api.github.com/repos/doramart/DoraCMS/issues/256/comments
1
2022-07-01T05:50:13Z
2022-08-23T08:23:40Z
https://github.com/doramart/DoraCMS/issues/256
1,290,941,924
256
3,989
CVE-2022-35148
2022-08-17T21:15:09.563
maccms10 v2021.1000.1081 to v2022.1000.3031 was discovered to contain a SQL injection vulnerability via the table parameter at database/columns.html.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/magicblack/maccms10/issues/931" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Trackin...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2021.1000.1081:*:*:*:*:*:*", "matchCriteriaId": "A7049FDA-9118-418C-9816-E2627C341D8F", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "89" ]
89
https://github.com/magicblack/maccms10/issues/931
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "magicblack", "maccms10" ]
Vulnerability name:SQL injection Vulnerability level:Medium risk Affected version:v2021.1000.1081<=v2022.1000.3031 Vulnerability location: Log in to the background and click the database function module to select the data batch replacement function ![Image](https://user-images.githubusercontent.com/28795365/176849...
SQL injection vulnerability in maccms10 background
https://api.github.com/repos/magicblack/maccms10/issues/931/comments
1
2022-07-01T07:48:29Z
2022-07-14T08:58:38Z
https://github.com/magicblack/maccms10/issues/931
1,291,044,406
931
3,990
CVE-2022-35151
2022-08-17T22:15:08.873
kkFileView v4.1.0 was discovered to contain multiple cross-site scripting (XSS) vulnerabilities via the urls and currentUrl parameters at /controller/OnlinePreviewController.java.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/kekingcn/kkFileView/issues/366" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Trackin...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:keking:kkfileview:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "3CF7B3A0-ACE8-4EF5-AF51-760E7B2650BF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "79" ]
79
https://github.com/kekingcn/kkFileView/issues/366
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "kekingcn", "kkFileView" ]
问题描述Description kkFileview v4.1.0存在XSS漏洞,可能导致网站cookies泄露。 kkFileview v4.1.0 has an XSS vulnerability, which may lead to the leakage of website cookies. 漏洞位置vulerable code location kkFileView/server/src/main/java/cn/keking/web/controller/OnlinePreviewController.java文件71行、86行,"urls"、"currentUrl"参数用户可控,且没有过滤特殊...
kkFileView XSS Vulnerability
https://api.github.com/repos/kekingcn/kkFileView/issues/366/comments
2
2022-07-01T09:12:24Z
2022-07-29T08:34:36Z
https://github.com/kekingcn/kkFileView/issues/366
1,291,138,782
366
3,991
CVE-2022-35598
2022-08-18T02:15:08.633
A SQL injection vulnerability in ConnectionFactoryDAO.java in sazanrjb InventoryManagementSystem 1.0 allows attackers to execute arbitrary SQL commands via parameter username.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/sazanrjb/InventoryManagementSystem" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sazanrjb/InventoryMan...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:inventorymanagementsystem_project:inventorymanagementsystem:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "85B0AF3A-0FEC-4DE4-A207-67A3BA34AE18", "versionEndExcluding": null, "versionEndIncludi...
[ "89" ]
89
https://github.com/sazanrjb/InventoryManagementSystem/issues/14
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sazanrjb", "InventoryManagementSystem" ]
Hey, I find few parameters are vulnerable to SQL injection vulnerability. A list of affected files: UserDAO.java Stocks.java SupplierDAO.java ProductDAO.java CustomerDAO.java ConnectionFactory.java
Sql Injection Security Issues
https://api.github.com/repos/sajxraj/InventoryManagementSystem/issues/14/comments
2
2022-07-09T02:23:14Z
2022-07-14T17:14:05Z
https://github.com/sajxraj/InventoryManagementSystem/issues/14
1,299,549,051
14
3,992
CVE-2022-35164
2022-08-18T05:15:07.603
LibreDWG v0.12.4.4608 & commit f2dea29 was discovered to contain a heap use-after-free via bit_copy_chain.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/497" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A8152A2-6867-4B31-8F47-A1A655A49EFF", "versionEndExcluding": "0.12.4.4608", "versionEndIncluding": null, "versionStartExcl...
[ "416" ]
416
https://github.com/LibreDWG/libredwg/issues/497
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
# Vulnerability description version: [0.12.4.4608](https://github.com/LibreDWG/libredwg/releases/tag/0.12.4.4608) & latest commit [f2dea29](https://github.com/LibreDWG/libredwg/commit/f2dea296a0a3bb16afdae8d2ca16749a617a4383) poc: [poc](https://github.com/0xdd96/PoC/raw/main/libredwg/UAF-bit_copy_chain) command: ./...
Heap use-after-free still exists in the bit_copy_chain
https://api.github.com/repos/LibreDWG/libredwg/issues/497/comments
2
2022-06-17T12:04:26Z
2023-06-27T10:19:27Z
https://github.com/LibreDWG/libredwg/issues/497
1,274,949,181
497
3,993
CVE-2022-35165
2022-08-18T05:15:07.657
An issue in AP4_SgpdAtom::AP4_SgpdAtom() of Bento4-1.6.0-639 allows attackers to cause a Denial of Service (DoS) via a crafted mp4 input.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/712" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "835" ]
835
https://github.com/axiomatic-systems/Bento4/issues/712
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# Vulnerability description **version:** Bento4-1.6.0-639 **command:** ./mp42aac $POC /dev/null **Download:** [poc](https://github.com/0xdd96/PoC/raw/main/Bento4/AP4_SgpdAtom::AP4_SgpdAtom-out-of-memory) Here is the trace reported by ASAN: ``` $ mp42aac poc /dev/null AddressSanitizer: Out of memory. The proc...
Possible memory exhuastion in AP4_SgpdAtom::AP4_SgpdAtom(). The process has exhausted 65536MB memory.
https://api.github.com/repos/axiomatic-systems/Bento4/issues/712/comments
0
2022-05-31T14:44:43Z
2022-06-04T17:16:23Z
https://github.com/axiomatic-systems/Bento4/issues/712
1,253,977,287
712
3,994
CVE-2022-35166
2022-08-18T05:15:07.700
libjpeg commit 842c7ba was discovered to contain an infinite loop via the component JPEG::ReadInternal.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/issues/76" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpeg:libjpeg:2022-06-15:*:*:*:*:*:*:*", "matchCriteriaId": "CDECFA58-57FC-4227-A771-A74B47C7C502", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "835" ]
835
https://github.com/thorfdbg/libjpeg/issues/76
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "thorfdbg", "libjpeg" ]
**version:** latest commit https://github.com/thorfdbg/libjpeg/commit/842c7baef7808f12cad19b49b2efcfa9575dbc78 **poc:** [poc](https://github.com/0xdd96/PoC/raw/main/libjpeg/infinite-loop-ReadInternal) **command:** ./jpeg poc /dev/null Here is the backtrace in GDB: ``` pwndbg> backtrace #0 0x000055555558fa8a in...
Infinite loop in JPEG::ReadInternal
https://api.github.com/repos/thorfdbg/libjpeg/issues/76/comments
1
2022-06-26T04:17:35Z
2022-06-27T18:59:25Z
https://github.com/thorfdbg/libjpeg/issues/76
1,284,796,852
76
3,995
CVE-2022-35173
2022-08-18T06:15:07.280
An issue was discovered in Nginx NJS v0.7.5. The JUMP offset for a break instruction was not set to a correct offset during code generation, leading to a segmentation violation.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://hg.nginx.org/njs/rev/b7c4e0f714a9" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/commit/40455389679...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nginx:njs:0.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "AFF53793-2148-4A4F-AA75-6D9B959E9B7A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "754" ]
754
https://github.com/nginx/njs/issues/553
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
Hi, the following PoC triggers a crash (related to string fmt?) in the latest commit. ```js (function() { while ([]) try { break try { return } catch (a) {} } catch (b) {} }()) ``` Environment: ``` Commit: e008f7ae22834ff1173b7a0067b14c821102018d System: Ubuntu 18.04.6 LTS `...
SEGV in njs_sprintf.c:424:19
https://api.github.com/repos/nginx/njs/issues/553/comments
0
2022-06-20T21:18:10Z
2024-07-20T00:35:11Z
https://github.com/nginx/njs/issues/553
1,277,395,914
553
3,996
CVE-2022-2876
2022-08-18T08:15:07.563
A vulnerability, which was classified as critical, was found in SourceCodester Student Management System. Affected is an unknown function of the file index.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may ...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integr...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/beicheng-maker/vulns/issues/4" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.206634...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:student_management_system_project:student_management_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A7EC412-2363-438C-8AE6-6483F8FF7D15", "versionEndExcluding": null, "versionEndIncluding...
[ "89" ]
89
https://github.com/beicheng-maker/vulns/issues/4
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "beicheng-maker", "vulns" ]
Sql injection vulnerability exists in the page ID code parameter of Student Management System, which can be exploited by attackers to obtain sensitive information and cause data leakage. ![image](https://user-images.githubusercontent.com/63102521/185157456-6aed3831-ef36-446a-b1f1-01a0de0330d4.png) Sqlmap attack ![im...
Sql injection exists for Student Management System page ID
https://api.github.com/repos/beicheng-maker/vulns/issues/4/comments
0
2022-08-17T14:18:09Z
2022-08-17T14:18:09Z
https://github.com/beicheng-maker/vulns/issues/4
1,341,838,521
4
3,997
CVE-2020-27787
2022-08-18T19:15:14.210
A Segmentaation fault was found in UPX in invert_pt_dynamic() function in p_lx_elf.cpp. An attacker with a crafted input file allows invalid memory address access that could lead to a denial of service.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/upx/upx/commit/e2f60adc95334f47e286838dac33160819c5d74d" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A4A2432-18AE-4B27-A527-030DD9D34F93", "versionEndExcluding": "3.96", "versionEndIncluding": null, "versionStartExcludin...
[ "119" ]
119
https://github.com/upx/upx/issues/333
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
## Environment A crafted input will lead to crash in p_lx_elf.cpp at UPX 3.96(latest version,git clone from branch devel) upx 3.96-git-1bb93d4fce9f+ UCL data compression library 1.03 zlib data compression library 1.2.8 LZMA SDK version 4.43 Copyright (C) 1996-2020 Markus Franz Xaver Johannes Oberhumer Copyrigh...
Segmentation fault in PackLinuxElf64::invert_pt_dynamic at p_lx_elf.cpp:5173
https://api.github.com/repos/upx/upx/issues/333/comments
4
2020-01-14T07:02:22Z
2022-08-18T21:41:23Z
https://github.com/upx/upx/issues/333
549,373,236
333
3,998
CVE-2020-27790
2022-08-18T19:15:14.270
A floating point exception issue was discovered in UPX in PackLinuxElf64::invert_pt_dynamic() function of p_lx_elf.cpp file. An attacker with a crafted input file could trigger this issue that could cause a crash leading to a denial of service. The highest impact is to Availability.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/upx/upx/commit/eb90eab6325d009004ffb155e3e33f22d4d3ca26" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A4A2432-18AE-4B27-A527-030DD9D34F93", "versionEndExcluding": "3.96", "versionEndIncluding": null, "versionStartExcludin...
[ "369" ]
369
https://github.com/upx/upx/issues/331
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
## The environment A crafted input will lead to crash in p_lx_elf.cpp at UPX 3.96(latest version,git clone from branch devel) root@ubuntu:/home/upx_cp_2/src# ./upx.out --version upx 3.96-git-0f4975fd7ffb+ UCL data compression library 1.03 zlib data compression library 1.2.8 LZMA SDK version 4.43 Copyright (C) ...
SIGFPE divide by zero in PackLinuxElf64::invert_pt_dynamic at p_lx_elf.cpp:5108
https://api.github.com/repos/upx/upx/issues/331/comments
2
2020-01-13T07:11:42Z
2022-08-18T21:42:09Z
https://github.com/upx/upx/issues/331
548,744,640
331
3,999
CVE-2022-35204
2022-08-18T19:15:14.550
Vitejs Vite before v2.9.13 was discovered to allow attackers to perform a directory traversal via a crafted URL to the victim's service.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/vitejs/vite/issues/8498" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "BA74D018-9C42-4064-99A8-59E31BAB5856", "versionEndExcluding": "2.9.13", "versionEndIncluding": null, "versionStartExcl...
[ "22" ]
22
https://github.com/vitejs/vite/issues/8498
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "vitejs", "vite" ]
### Describe the bug The vulnerability found at https://github.com/vitejs/vite/issues/2820 was found to be not fixed properly, which leads to the unrestricted directory traversal. Currently the `@fs` directory does check for the allowed path, but it does not check for encoded paths. For example, assuming that ...
Unrestricted directory traversal with `@fs` (Bypass)
https://api.github.com/repos/vitejs/vite/issues/8498/comments
4
2022-06-08T04:16:20Z
2022-07-23T00:24:39Z
https://github.com/vitejs/vite/issues/8498
1,264,168,583
8,498
4,000
CVE-2020-27788
2022-08-18T20:15:08.947
An out-of-bounds read access vulnerability was discovered in UPX in PackLinuxElf64::canPack() function of p_lx_elf.cpp file. An attacker with a crafted input file could trigger this issue that could cause a crash leading to a denial of service.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/upx/upx/commit/1bb93d4fce9f1d764ba57bf5ac154af515b3fc83" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A4A2432-18AE-4B27-A527-030DD9D34F93", "versionEndExcluding": "3.96", "versionEndIncluding": null, "versionStartExcludin...
[ "125" ]
125
https://github.com/upx/upx/issues/332
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
## Environment A crafted input will lead to crash in p_lx_elf.cpp at UPX 3.96(latest version,git clone from branch devel) root@ubuntu:/home/upx_cp_2/src# ./upx.out --version upx 3.96-git-0f4975fd7ffb+ UCL data compression library 1.03 zlib data compression library 1.2.8 LZMA SDK version 4.43 Copyright (C) 1996...
heap-buffer-overflow in PackLinuxElf64::canPack() at p_lx_elf.cpp:2385
https://api.github.com/repos/upx/upx/issues/332/comments
2
2020-01-13T08:10:55Z
2022-08-18T22:37:18Z
https://github.com/upx/upx/issues/332
548,768,610
332
4,001
CVE-2022-35213
2022-08-18T20:15:11.573
Ecommerce-CodeIgniter-Bootstrap before commit 56465f was discovered to contain a cross-site scripting (XSS) vulnerability via the function base_url() at /blog/blogpublish.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/commit/56465fb6a83aaa934a76615a8579100938b790a1" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking",...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ecommerce-codeigniter-bootstrap_project:ecommerce-codeigniter-bootstrap:*:*:*:*:*:*:*:*", "matchCriteriaId": "A2060B33-D99A-4D99-8D54-6AB28E1EE59A", "versionEndExcluding": "2021-08-21", ...
[ "79" ]
79
https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/issues/219
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "kirilkirkov", "Ecommerce-CodeIgniter-Bootstrap" ]
We found multiple XSS vulnerabilities in the latest version of Ecommerce-CodeIgniter-Bootstrap. Technique details: The vulnerabilities occur at base_url() function. We notice the user inputs (e.g., $_POST) are used as the parameter of base_url() function in many places (e.g., the 45th line in /application/modules/...
XSS vulnerabilities
https://api.github.com/repos/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/issues/219/comments
0
2021-08-22T11:13:03Z
2021-08-23T18:27:29Z
https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/issues/219
976,349,920
219
4,002
CVE-2022-37047
2022-08-18T20:15:11.837
The component tcprewrite in Tcpreplay v4.4.1 was discovered to contain a heap-based buffer overflow in get_ipv6_next at common/get.c:713. NOTE: this is different from CVE-2022-27940.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/appneta/tcpreplay/issues/734" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announc...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "820B7B7A-25F9-42C6-B0B0-0A2A34648477", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "787" ]
787
https://github.com/appneta/tcpreplay/issues/734
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "appneta", "tcpreplay" ]
You are opening a _bug report_ against the Tcpreplay project: we use GitHub Issues for tracking bug reports and feature requests. If you have a question about how to use Tcpreplay, you are at the wrong site. You can ask a question on the [tcpreplay-users mailing list](https://sourceforge.net/p/tcpreplay/mailman/tc...
[Bug] heap-overflow in get.c:713
https://api.github.com/repos/appneta/tcpreplay/issues/734/comments
1
2022-07-24T02:43:39Z
2022-08-07T02:02:04Z
https://github.com/appneta/tcpreplay/issues/734
1,315,792,459
734
4,003
CVE-2022-37048
2022-08-18T20:15:11.880
The component tcprewrite in Tcpreplay v4.4.1 was discovered to contain a heap-based buffer overflow in get_l2len_protocol at common/get.c:344. NOTE: this is different from CVE-2022-27941.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/appneta/tcpreplay/issues/735" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announc...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "820B7B7A-25F9-42C6-B0B0-0A2A34648477", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "787" ]
787
https://github.com/appneta/tcpreplay/issues/735
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "appneta", "tcpreplay" ]
You are opening a _bug report_ against the Tcpreplay project: we use GitHub Issues for tracking bug reports and feature requests. If you have a question about how to use Tcpreplay, you are at the wrong site. You can ask a question on the [tcpreplay-users mailing list](https://sourceforge.net/p/tcpreplay/mailman/tc...
[Bug] heap-overflow in get.c:344
https://api.github.com/repos/appneta/tcpreplay/issues/735/comments
1
2022-07-24T07:35:35Z
2022-08-07T02:55:11Z
https://github.com/appneta/tcpreplay/issues/735
1,315,833,757
735
4,004
CVE-2022-37049
2022-08-18T20:15:11.927
The component tcpprep in Tcpreplay v4.4.1 was discovered to contain a heap-based buffer overflow in parse_mpls at common/get.c:150. NOTE: this is different from CVE-2022-27942.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/appneta/tcpreplay/issues/736" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announc...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "820B7B7A-25F9-42C6-B0B0-0A2A34648477", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "787" ]
787
https://github.com/appneta/tcpreplay/issues/736
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "appneta", "tcpreplay" ]
You are opening a _bug report_ against the Tcpreplay project: we use GitHub Issues for tracking bug reports and feature requests. If you have a question about how to use Tcpreplay, you are at the wrong site. You can ask a question on the [tcpreplay-users mailing list](https://sourceforge.net/p/tcpreplay/mailman/tc...
[Bug] heap-overflow in get.c:150
https://api.github.com/repos/appneta/tcpreplay/issues/736/comments
1
2022-07-24T14:40:26Z
2022-08-07T03:03:15Z
https://github.com/appneta/tcpreplay/issues/736
1,315,924,974
736
4,005
CVE-2022-37768
2022-08-18T20:15:11.970
libjpeg commit 281daa9 was discovered to contain an infinite loop via the component Frame::ParseTrailer.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/issues/77" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpeg:libjpeg:-:*:*:*:*:*:*:*", "matchCriteriaId": "43E4B6B8-F045-4BF3-AC73-8F5596EA703C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": n...
[ "835" ]
835
https://github.com/thorfdbg/libjpeg/issues/77
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "thorfdbg", "libjpeg" ]
version: latest commit 14bf94c poc: [poc.zip](https://github.com/thorfdbg/libjpeg/files/9191143/poc.zip) command: ./jpeg poc /dev/null The backtrace in gdb: ``` (gdb) bt #0 ByteStream::Get (this=0x790ae0) at bytestream.cpp:223 #1 0x000000000042331e in IOStream::PeekWord (this=0x790ae0) at iostream.cpp:...
Infinite loop in Frame::ParseTrailer
https://api.github.com/repos/thorfdbg/libjpeg/issues/77/comments
1
2022-07-26T15:59:16Z
2022-08-03T12:22:36Z
https://github.com/thorfdbg/libjpeg/issues/77
1,318,449,876
77
4,006
CVE-2022-37769
2022-08-18T20:15:12.013
libjpeg commit 281daa9 was discovered to contain a segmentation fault via HuffmanDecoder::Get at huffmandecoder.hpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/issues/78" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpeg:libjpeg:-:*:*:*:*:*:*:*", "matchCriteriaId": "43E4B6B8-F045-4BF3-AC73-8F5596EA703C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": n...
[ "119" ]
119
https://github.com/thorfdbg/libjpeg/issues/78
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "thorfdbg", "libjpeg" ]
Hi, there. There is a segmentation fault in the newest master branch. Here is the reproducing command: `jpeg poc /dev/null` ``` Program received signal SIGSEGV, Segmentation fault. HuffmanDecoder::Get (this=0x0, io=0x7933c8) at /home/users/chluo/libjpeg/codestream/../coding/huffmandecoder.hpp:112 warn...
Segmentation fault in HuffmanDecoder::Get
https://api.github.com/repos/thorfdbg/libjpeg/issues/78/comments
1
2022-07-27T04:04:02Z
2022-08-03T12:23:15Z
https://github.com/thorfdbg/libjpeg/issues/78
1,318,990,797
78
4,007
CVE-2022-37770
2022-08-18T20:15:12.060
libjpeg commit 281daa9 was discovered to contain a segmentation fault via LineMerger::GetNextLowpassLine at linemerger.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/issues/79" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpeg:libjpeg:-:*:*:*:*:*:*:*", "matchCriteriaId": "43E4B6B8-F045-4BF3-AC73-8F5596EA703C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": n...
[ "119" ]
119
https://github.com/thorfdbg/libjpeg/issues/79
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "thorfdbg", "libjpeg" ]
Hi, there. There is a segmentation fault in the newest master branch. Here is the reproducing command: `jpeg poc /dev/null` ``` (gdb) bt #0 0x00007ffff7f31270 in ?? () from /lib/x86_64-linux-gnu/libc.so.6 #1 0x0000000000711b6f in LineMerger::GetNextLowpassLine (this=0x85ed20, comp=2 '\002') at linem...
Segmentation fault in LineMerger::GetNextLowpassLine
https://api.github.com/repos/thorfdbg/libjpeg/issues/79/comments
3
2022-07-28T04:17:56Z
2022-08-03T12:22:57Z
https://github.com/thorfdbg/libjpeg/issues/79
1,320,369,822
79
4,008
CVE-2022-35540
2022-08-18T23:15:08.293
Hardcoded JWT Secret in AgileConfig <1.6.8 Server allows remote attackers to use the generated JWT token to gain administrator access.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dotnetcore/AgileConfig/issues/91" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "ur...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dotnetcore:agileconfig:*:*:*:*:*:*:*:*", "matchCriteriaId": "839201E6-FD66-4BD5-954D-0A92390A5B8C", "versionEndExcluding": "1.6.8", "versionEndIncluding": null, "versionStart...
[ "798" ]
798
https://github.com/dotnetcore/AgileConfig/issues/91
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "dotnetcore", "AgileConfig" ]
The hard-coded JWT Secret in the source code allows remote attackers to gain administrator access in AgileConfig Server. Details and POC have been emailed. 源代码中存在JWT key 硬编码,导致原有的登录限制可能被绕过,直接以管理员权限访问系统 详细信息和POC已发送至邮箱
security vulnerability (存在安全漏洞)
https://api.github.com/repos/dotnetcore/AgileConfig/issues/91/comments
4
2022-07-06T16:15:01Z
2022-09-01T05:41:10Z
https://github.com/dotnetcore/AgileConfig/issues/91
1,296,073,627
91
4,009
CVE-2022-2886
2022-08-19T12:15:08.140
A vulnerability, which was classified as critical, was found in Laravel 5.1. Affected is an unknown function. The manipulation leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-206688.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integri...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/beicheng-maker/vulns/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.206688...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:laravel:laravel:*:*:*:*:*:*:*:*", "matchCriteriaId": "3794CF34-E1D7-4E1A-808E-D5AA4C2154E0", "versionEndExcluding": null, "versionEndIncluding": "5.1.46", "versionStartExclud...
[ "502" ]
502
https://github.com/beicheng-maker/vulns/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "beicheng-maker", "vulns" ]
# Laravel5.1 POP4 RCE `composer create-project --prefer-dist laravel/laravel laravel5.1 "5.1.*"` `app/Http/Controllers/UsersController.php adding a controller UsersController` ```php <?php namespace App\Http\Controllers; use Illuminate\Http\Request; class UsersController extends Controller { /** ...
Laravel5.1 POP4 RCE
https://api.github.com/repos/beicheng-maker/vulns/issues/3/comments
0
2022-08-17T05:08:35Z
2022-08-17T05:08:35Z
https://github.com/beicheng-maker/vulns/issues/3
1,341,174,463
3
4,010
CVE-2022-36605
2022-08-19T15:15:08.507
Yimioa v6.1 was discovered to contain a SQL injection vulnerability via the orderbyGET parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cloudwebsoft/ywoa/issues/24" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yimihome:ywoa:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "EB7ABBCC-CAE9-442D-8084-176F08DBBAC0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "89" ]
89
https://github.com/cloudwebsoft/ywoa/issues/24
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cloudwebsoft", "ywoa" ]
# ywoaSQL-Inject-Bypass # Environment build ## Windows build Recommended to use Windows build, because idea build is very troublesome, and report a lot of errors, Windows is a one-click deployment http://partner.yimihome.com/static/index.html#/index/sys_env ## 1, personnel - personnel information - orderbyG...
ywoa SQL inject Bypass and Analysis of the article
https://api.github.com/repos/cloudwebsoft/ywoa/issues/24/comments
0
2022-07-21T02:54:36Z
2023-09-07T13:28:46Z
https://github.com/cloudwebsoft/ywoa/issues/24
1,312,410,083
24
4,011
CVE-2022-36606
2022-08-19T15:15:08.550
Ywoa before v6.1 was discovered to contain a SQL injection vulnerability via /oa/setup/checkPool?database.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cloudwebsoft/ywoa/issues/25" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yimihome:ywoa:*:*:*:*:*:*:*:*", "matchCriteriaId": "70ADA123-C9C3-426E-A8EA-94CD3E377B74", "versionEndExcluding": "6.1", "versionEndIncluding": null, "versionStartExcluding":...
[ "89" ]
89
https://github.com/cloudwebsoft/ywoa/issues/25
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cloudwebsoft", "ywoa" ]
# Environment construction http://partner.yimihome.com/static/index.html#/index/sys_env ![image-20220722103741100](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220722103741.png) Direct one-click installation can be started, and then login on the account admin password 1111111...
yimiYWOA<6.1 version foreground unauthorized SQL injection
https://api.github.com/repos/cloudwebsoft/ywoa/issues/25/comments
0
2022-07-22T02:52:22Z
2023-09-07T13:28:46Z
https://github.com/cloudwebsoft/ywoa/issues/25
1,314,075,554
25
4,012
CVE-2022-36224
2022-08-19T17:15:07.817
XunRuiCMS V4.5.6 is vulnerable to Cross Site Request Forgery (CSRF).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/dayrui/xunruicms/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xunruicms:xunruicms:4.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "4E022B5A-17F8-4F5A-9154-747F0EDD4B6D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "352" ]
352
https://github.com/dayrui/xunruicms/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "dayrui", "xunruicms" ]
本地搭建4.5.6版本 在后台,内容->文章管理->删除功能存在csrf ![image](https://user-images.githubusercontent.com/60609675/178884354-ff6acc56-38cf-43d8-9094-9fc715cef3ab.png) 选择一个内容进行删除操作,弹出框点击确认并抓包 ![image](https://user-images.githubusercontent.com/60609675/178884591-d6615fdb-6ba3-4cae-a998-45436c930f9e.png) 发送到csrf poc,并扔掉此包 ![image](ht...
XunRuiCMS-V4.5.6后台内容管理删除功能存在csrf
https://api.github.com/repos/dayrui/xunruicms/issues/1/comments
0
2022-07-14T02:29:11Z
2022-07-14T02:29:11Z
https://github.com/dayrui/xunruicms/issues/1
1,304,169,809
1
4,013
CVE-2022-36225
2022-08-19T17:15:07.897
EyouCMS V1.5.8-UTF8-SP1 is vulnerable to Cross Site Request Forgery (CSRF) via the background, column management function and add.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/26" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "82E421EB-ECC8-42A4-8384-4187474D1AC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "352" ]
352
https://github.com/weng-xianhu/eyoucms/issues/26
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
version:V1.5.8-UTF8-SP1 ![image](https://user-images.githubusercontent.com/60609675/179399541-843e2a44-61d4-47b1-a174-97e975e03452.png) In the background, column management function and add. ![image](https://user-images.githubusercontent.com/60609675/179399615-1abe143b-0165-43f6-8738-7d16c06c1637.png) Add test data...
EyouCMS v1.5.8 has a vulnerability, Cross-site request forgery(CSRF)
https://api.github.com/repos/weng-xianhu/eyoucms/issues/26/comments
2
2022-07-17T13:08:03Z
2023-02-28T08:54:23Z
https://github.com/weng-xianhu/eyoucms/issues/26
1,307,093,003
26
4,014
CVE-2022-36577
2022-08-19T17:15:08.010
An issue was discovered in jizhicms v2.3.1. There is a CSRF vulnerability that can add a admin.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Cherry-toto/jizhicms/issues/77" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thir...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jizhicms:jizhicms:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "F7444555-03D3-42CC-88CA-4BDE28C9CFC8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "352" ]
352
https://github.com/Cherry-toto/jizhicms/issues/77
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Cherry-toto", "jizhicms" ]
version:v2.3.1 ![image](https://user-images.githubusercontent.com/60609675/179764274-4b95effb-b33e-4508-ae85-77d1107f0f56.png) The issue in the background - > User Management - > administrator list ![image](https://user-images.githubusercontent.com/60609675/179764533-82a16b97-28a7-4689-9cab-fda210224a48.png) add a ...
jizhicms v2.3.1 has a vulnerability, Cross-site request forgery(CSRF)
https://api.github.com/repos/Cherry-toto/jizhicms/issues/77/comments
1
2022-07-19T13:44:25Z
2022-07-19T14:43:30Z
https://github.com/Cherry-toto/jizhicms/issues/77
1,309,547,815
77
4,015
CVE-2022-36578
2022-08-19T17:15:08.050
jizhicms v2.3.1 has SQL injection in the background.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Cherry-toto/jizhicms/issues/78" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://git...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jizhicms:jizhicms:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "F7444555-03D3-42CC-88CA-4BDE28C9CFC8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "89" ]
89
https://github.com/Cherry-toto/jizhicms/issues/78
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Cherry-toto", "jizhicms" ]
version: v2.3.1 Problematic packets: ``` POST /index.php/admins/Fields/get_fields.html HTTP/1.1 Host: 192.168.10.130 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:54.0) Gecko/20100101 Firefox/54.0 Accept: */* Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate Content...
jizhicms v2.3.1 has a vulnerability, SQL injection
https://api.github.com/repos/Cherry-toto/jizhicms/issues/78/comments
1
2022-07-19T14:21:25Z
2022-07-19T15:06:41Z
https://github.com/Cherry-toto/jizhicms/issues/78
1,309,598,383
78
4,016
CVE-2022-36579
2022-08-19T17:15:08.090
Wellcms 2.2.0 is vulnerable to Cross Site Request Forgery (CSRF).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/wellcms/wellcms/issues/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Par...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wellcms:wellcms:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D30FB54-27CB-4ADF-80A1-372F7BA7C082", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "352" ]
352
https://github.com/wellcms/wellcms/issues/11
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "wellcms", "wellcms" ]
version:2.2.0 position:Background - > manage users - > create users ![image](https://user-images.githubusercontent.com/60609675/180605647-be7b3ed5-4c69-4afb-813f-ef3c9f3925ad.png) ![image](https://user-images.githubusercontent.com/60609675/180605734-37112265-2247-448b-bacc-62a7f3579a10.png) add a new users, and gra...
wellcms v2.2.0 has a vulnerability, Cross-site request forgery(CSRF)
https://api.github.com/repos/wellcms/wellcms/issues/11/comments
1
2022-07-23T12:56:19Z
2022-07-23T14:50:06Z
https://github.com/wellcms/wellcms/issues/11
1,315,652,867
11
4,017
CVE-2022-37254
2022-08-19T17:15:08.133
DolphinPHP 1.5.1 is vulnerable to Cross Site Scripting (XSS) via Background - > System - > system function - > configuration management.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/caiweiming/DolphinPHP/issues/42" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dolphinphp_project:dolphinphp:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "6CF0D652-3247-4BBA-8070-026C39EBAEE1", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "79" ]
79
https://github.com/caiweiming/DolphinPHP/issues/42
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "caiweiming", "DolphinPHP" ]
version:1.5.1 Vulnerability location:Background - > System - > system function - > configuration management. ![image](https://user-images.githubusercontent.com/60609675/181787442-07219a03-0684-4a85-bf70-12b2adc1a203.png) ![image](https://user-images.githubusercontent.com/60609675/181788265-dd1faafa-a77d-4861-8ae3-8b...
DolphinPHP v1.5.1 has a vulnerability, Stored Cross Site Scripting(XSS)
https://api.github.com/repos/caiweiming/DolphinPHP/issues/42/comments
1
2022-07-29T15:08:41Z
2024-07-10T09:50:07Z
https://github.com/caiweiming/DolphinPHP/issues/42
1,322,367,864
42
4,018
CVE-2022-36157
2022-08-19T22:15:09.017
XXL-JOB all versions as of 11 July 2022 are vulnerable to Insecure Permissions resulting in the ability to execute admin function with low Privilege account.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Richard-Muzi/vulnerability/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xuxueli:xxl-job:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9117C48-ADBB-4018-8476-F291CA8A2BF4", "versionEndExcluding": null, "versionEndIncluding": "2.3.1", "versionStartExcludi...
[ "269" ]
269
https://github.com/Richard-Muzi/vulnerability/issues/1
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Richard-Muzi", "vulnerability" ]
XXL-JOB is a distributed task scheduling framework, the core design goal is to develop quickly, learning simple, lightweight, easy to expand. Is now open source and access to a number of companies online product line. https://www.xuxueli.com/xxl-job/en/ https://github.com/xuxueli/xxl-job/ A Escalation of Privilege...
XXL-JOB Escalation of Privileges vulnerability
https://api.github.com/repos/Richard-Muzi/vulnerability/issues/1/comments
0
2022-07-11T06:39:47Z
2022-07-11T07:59:53Z
https://github.com/Richard-Muzi/vulnerability/issues/1
1,300,276,528
1
4,019
CVE-2020-27793
2022-08-19T23:15:08.367
An off-by-one overflow flaw was found in radare2 due to mismatched array length in core_java.c. This could allow an attacker to cause a crash, and perform a denail of service attack.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/commit/ced0223c7a1b3b5344af315715cd28fe7c0d9ebc" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEE8DA49-FB7A-4416-8942-56DD67E62CD9", "versionEndExcluding": "4.4.0", "versionEndIncluding": null, "versionStartExcludin...
[ "193" ]
193
https://github.com/radareorg/radare2/issues/16304
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "radareorg", "radare2" ]
### Work environment | Questions | Answers |------------------------------------------------------|-------------------- | OS/arch/bits (mandatory) | Ubuntu x86 64 | File format of the file you reverse (mandatory) | ELF | Architecture/bit...
unmatched array length in core_java.c
https://api.github.com/repos/radareorg/radare2/issues/16304/comments
1
2020-03-25T04:35:41Z
2020-03-26T11:02:44Z
https://github.com/radareorg/radare2/issues/16304
587,435,992
16,304
4,020
CVE-2020-27794
2022-08-19T23:15:08.427
A double free issue was discovered in radare2 in cmd_info.c:cmd_info(). Successful exploitation could lead to modification of unexpected memory locations and potentially causing a crash.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "in...
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/commit/cb8b683758edddae2d2f62e8e63a738c39f92683" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEE8DA49-FB7A-4416-8942-56DD67E62CD9", "versionEndExcluding": "4.4.0", "versionEndIncluding": null, "versionStartExcludin...
[ "415" ]
415
https://github.com/radareorg/radare2/issues/16303
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "radareorg", "radare2" ]
### Work environment | Questions | Answers |------------------------------------------------------|-------------------- | OS/arch/bits (mandatory) | Ubuntu x86 64 | File format of the file you reverse (mandatory) | ELF | Architecture/bit...
invalid free in cmd_info.c:cmd_info()
https://api.github.com/repos/radareorg/radare2/issues/16303/comments
1
2020-03-25T04:31:50Z
2020-03-26T11:28:51Z
https://github.com/radareorg/radare2/issues/16303
587,434,855
16,303
4,021
CVE-2020-27795
2022-08-19T23:15:08.487
A segmentation fault was discovered in radare2 with adf command. In libr/core/cmd_anal.c, when command "adf" has no or wrong argument, anal_fcn_data (core, input + 1) --> RAnalFunction *fcn = r_anal_get_fcn_in (core->anal, core->offset, -1); returns null pointer for fcn causing segmentation fault later in ensure_fcn_ra...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/commit/4d3811681a80f92a53e795f6a64c4b0fc2c8dd22" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEE8DA49-FB7A-4416-8942-56DD67E62CD9", "versionEndExcluding": "4.4.0", "versionEndIncluding": null, "versionStartExcludin...
[ "908" ]
908
https://github.com/radareorg/radare2/issues/16215
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "radareorg", "radare2" ]
### Work environment | Questions | Answers |------------------------------------------------------|-------------------- | OS/arch/bits (mandatory) | Ubuntu x86 64 | File format of the file you reverse (mandatory) | ELF | Architecture/bit...
command "adf" Segmentation fault
https://api.github.com/repos/radareorg/radare2/issues/16215/comments
1
2020-03-14T07:54:59Z
2020-03-16T16:03:23Z
https://github.com/radareorg/radare2/issues/16215
581,094,359
16,215
4,022
CVE-2022-24298
2022-08-23T05:15:07.760
All versions of package freeopcua/freeopcua are vulnerable to Denial of Service (DoS) when bypassing the limitations for excessive memory consumption by sending multiple CloseSession requests with the deleteSubscription parameter equal to False.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "report@snyk.io", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FreeOpcUa/freeopcua/issues/391" }, { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-UNMANAG...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:freeopcua_project:freeopcua:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F2A8BC2-6B2D-47B0-8268-77AA65032C5B", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "770" ]
770
https://github.com/FreeOpcUa/freeopcua/issues/391
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FreeOpcUa", "freeopcua" ]
We would like to responsibly report on a vulnerability we found in freeopcua (cpp). Where should we send our detailed report? Additionally I would like to suggest adding a security policy to the repository to help other security researchers reach out to you properly. Thanks! Team82 Claroty Research https://clar...
How to report a security issue?
https://api.github.com/repos/FreeOpcUa/freeopcua/issues/391/comments
0
2022-05-23T13:01:50Z
2022-05-23T13:01:50Z
https://github.com/FreeOpcUa/freeopcua/issues/391
1,245,134,139
391
4,023
CVE-2022-25304
2022-08-23T05:15:07.987
All versions of package opcua; all versions of package asyncua are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e....
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "report@snyk.io", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FreeOpcUa/python-opcua/issues/1466" }, { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-PYT...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:asyncua_project:asyncua:*:*:*:*:*:python:*:*", "matchCriteriaId": "515536F5-025D-4947-A517-339AE3019B7C", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "770" ]
770
https://github.com/FreeOpcUa/python-opcua/issues/1466
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FreeOpcUa", "python-opcua" ]
We would like to responsibly report on a vulnerability we found in python opcua. Where should we send our detailed report? Additionally I would like to suggest adding a security policy to the repository to help other security researchers reach out to you properly. Thanks! Team82 Claroty Research https://claroty...
How to report a security issue?
https://api.github.com/repos/FreeOpcUa/python-opcua/issues/1466/comments
6
2022-05-23T12:59:14Z
2022-05-26T11:34:46Z
https://github.com/FreeOpcUa/python-opcua/issues/1466
1,245,130,623
1,466
4,024
CVE-2022-37199
2022-08-23T13:15:08.520
JFinal CMS 5.1.0 is vulnerable to SQL Injection via /jfinal_cms/system/user/list.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/48" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "89" ]
89
https://github.com/jflyfox/jfinal_cms/issues/48
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jflyfox", "jfinal_cms" ]
the route is /jfinal_cms/system/user/list ![c1c9859cc9ea5015f05f68e55fb3695](https://user-images.githubusercontent.com/56295743/181653646-721d4a24-6e65-4ccc-ac85-6bdf49eb4068.jpg) ![f6d64fe8a0e68451dd7a70a0e7d98fb](https://user-images.githubusercontent.com/56295743/181653653-437648a8-c76d-495d-b1ae-2cdf5ca970fb...
There is a SQL injection vulnerability exists in JFinal CMS 5.1.0
https://api.github.com/repos/jflyfox/jfinal_cms/issues/48/comments
0
2022-07-28T23:30:08Z
2022-07-28T23:30:08Z
https://github.com/jflyfox/jfinal_cms/issues/48
1,321,592,019
48
4,025
CVE-2022-37223
2022-08-23T14:15:08.633
JFinal CMS 5.1.0 is vulnerable to SQL Injection via /jfinal_cms/system/role/list.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/49" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "89" ]
89
https://github.com/jflyfox/jfinal_cms/issues/49
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jflyfox", "jfinal_cms" ]
you can use the route /jfinal_cms/system/role/list then use sqlmap attack the interface like this : ![f097bb66a1e76ef93f3834b319a6b30](https://user-images.githubusercontent.com/56295743/181655295-926a52dc-37c0-4f99-81df-64acd5806af2.jpg)
There is a SQL injection vulnerability exists in JFinal CMS 5.1.0 again
https://api.github.com/repos/jflyfox/jfinal_cms/issues/49/comments
0
2022-07-28T23:48:08Z
2022-07-28T23:48:08Z
https://github.com/jflyfox/jfinal_cms/issues/49
1,321,600,614
49
4,026
CVE-2021-23177
2022-08-23T16:15:09.280
An improper link resolution flaw while extracting an archive can lead to changing the access control list (ACL) of the target of the link. An attacker may provide a malicious archive to a victim user, who would trigger this flaw when trying to extract the archive. A local attacker may use this flaw to change the ACL of...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2021-23177" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:*:*:*", "matchCriteriaId": "A55FBDE8-F405-4C72-BCDC-756873D578C9", "versionEndExcluding": "3.5.2", "versionEndIncluding": null, "versionStartE...
[ "59" ]
59
https://github.com/libarchive/libarchive/issues/1565
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "libarchive", "libarchive" ]
When an archive entry contains a symbolic link that has defined ACLs on Linux, on extraction the ACLs of the link target are modified. This is because the function acl_set_file() is used without a prior check if the file is not a symbolic link. FreeBSD and MacOS use acl_set_link_np() that does not follow symbolic li...
[SECURITY] Linux: extracting a symlink with ACLs modifies ACLs of target
https://api.github.com/repos/libarchive/libarchive/issues/1565/comments
3
2021-08-21T17:41:51Z
2021-12-17T07:33:13Z
https://github.com/libarchive/libarchive/issues/1565
976,185,621
1,565
4,027
CVE-2021-31566
2022-08-23T16:15:09.337
An improper link resolution flaw can occur while extracting an archive leading to changing modes, times, access control lists, and flags of a file outside of the archive. An attacker may provide a malicious archive to a victim user, who would trigger this flaw when trying to extract the archive. A local attacker may us...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2021-31566" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:*:*:*", "matchCriteriaId": "A55FBDE8-F405-4C72-BCDC-756873D578C9", "versionEndExcluding": "3.5.2", "versionEndIncluding": null, "versionStartE...
[ "59" ]
59
https://github.com/libarchive/libarchive/issues/1566
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "libarchive", "libarchive" ]
Some modes, times, ACLs and file flags especially on directories are set on archive_write_close() time. An archive can contain multiple entries with the same path. If a directory entry is marked for post-processing and a symlink entry with the same path "replaces" the directory with the symlink, the "fixup" postprocess...
[SECURITY] Processing fixup entries may follow symbolic links
https://api.github.com/repos/libarchive/libarchive/issues/1566/comments
4
2021-08-22T04:09:32Z
2021-12-17T07:37:45Z
https://github.com/libarchive/libarchive/issues/1566
976,279,379
1,566
4,028
CVE-2021-3701
2022-08-23T16:15:09.500
A flaw was found in ansible-runner where the default temporary files configuration in ansible-2.0.0 are written to world R/W locations. This flaw allows an attacker to pre-create the directory, resulting in reading private information or forcing ansible-runner to write files as the legitimate user in a place they did n...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integr...
[ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2021-3701" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://bugzilla.redhat....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:ansible_runner:2.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "1470BAF6-3B08-42DB-AD44-B5887D24D787", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "276" ]
276
https://github.com/ansible/ansible-runner/issues/738
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ansible", "ansible-runner" ]
related to: https://github.com/ansible/ansible-runner/pull/722
ansible-runner writes artifacts to world rw location by default
https://api.github.com/repos/ansible/ansible-runner/issues/738/comments
2
2021-06-24T20:55:44Z
2021-06-29T13:01:34Z
https://github.com/ansible/ansible-runner/issues/738
929,605,116
738
4,029
CVE-2021-3905
2022-08-23T16:15:10.177
A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2021-3905" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzil...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:*", "matchCriteriaId": "59369EE4-B970-4222-AA4E-276928B1016B", "versionEndExcluding": "2.17.0", "versionEndIncluding": null, "versionSta...
[ "401" ]
401
https://github.com/openvswitch/ovs-issues/issues/226
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "openvswitch", "ovs-issues" ]
Hi, This commit introduce a mempool memleak. [640d4db788eda96bb904abcfc7de2327107bafe1](https://github.com/openvswitch/ovs/commit/640d4db788eda96bb904abcfc7de2327107bafe1) If I keep sending first fragment as an attack, the mempool would be exhausted. I think revert it and respect the dnsteal flag as @ Wang L...
ipf memleak
https://api.github.com/repos/openvswitch/ovs-issues/issues/226/comments
10
2021-09-29T09:58:10Z
2021-10-12T05:47:39Z
https://github.com/openvswitch/ovs-issues/issues/226
1,010,749,369
226
4,030
CVE-2022-37111
2022-08-23T16:15:11.677
BlueCMS 1.6 has SQL injection in line 132 of admin/article.php
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/seizer-zyx/Vulnerability/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bluecms_project:bluecms:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "6A26806A-9CB5-4262-BAD1-049659C2CE2C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "89" ]
89
https://github.com/seizer-zyx/Vulnerability/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "seizer-zyx", "Vulnerability" ]
# Bluecms_v1.6 ## Download http://lp.downcode.com/j_14/j_14745_bluecms.rar ## vulnerability code: in admin/article.php line132: ![image](https://user-images.githubusercontent.com/73650154/180907799-b1e21d1e-1547-437e-b432-c78657ead087.png) There is numeric injection for $_GET['id'] Because there is no echo, you ...
Bluecms V1.6 has SQL injection in line 132 of admin/article.php
https://api.github.com/repos/seizer-zyx/Vulnerability/issues/1/comments
0
2022-07-26T02:16:33Z
2022-07-26T06:37:09Z
https://github.com/seizer-zyx/Vulnerability/issues/1
1,317,605,361
1
4,031
CVE-2022-37112
2022-08-23T16:15:11.717
BlueCMS 1.6 has SQL injection in line 55 of admin/model.php
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/seizer-zyx/Vulnerability/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bluecms_project:bluecms:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "6A26806A-9CB5-4262-BAD1-049659C2CE2C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "89" ]
89
https://github.com/seizer-zyx/Vulnerability/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "seizer-zyx", "Vulnerability" ]
## Download http://lp.downcode.com/j_14/j_14745_bluecms.rar ## vulnerability code: in admin/model.php line 55: ![image](https://user-images.githubusercontent.com/73650154/180944559-a8f7f4fc-3354-44f7-87af-ae5c41445ad0.png) There is numeric injection for $_GET['model_id'] Because there is no echo, you can blind SQ...
Bluecms V1.6 has SQL injection in line 55 of admin/model.php
https://api.github.com/repos/seizer-zyx/Vulnerability/issues/2/comments
0
2022-07-26T07:07:06Z
2022-07-26T07:07:06Z
https://github.com/seizer-zyx/Vulnerability/issues/2
1,317,796,057
2
4,032
CVE-2022-37113
2022-08-23T16:15:11.757
Bluecms 1.6 has SQL injection in line 132 of admin/area.php
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/seizer-zyx/Vulnerability/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bluecms_project:bluecms:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "6A26806A-9CB5-4262-BAD1-049659C2CE2C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "89" ]
89
https://github.com/seizer-zyx/Vulnerability/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "seizer-zyx", "Vulnerability" ]
# Bluecms_v1.6 ## Download http://lp.downcode.com/j_14/j_14745_bluecms.rar ## vulnerability code: in admin/area.php line 36: ![2022-07-26-16-58-55-image](https://user-images.githubusercontent.com/73650154/180971155-874a2cd3-0ddf-4326-988f-6444605aa3a0.png) Line 36 of admin/area.php is not heavily filtered, and in...
Bluecms V1.6 has SQL injection in line 132 of admin/area.php
https://api.github.com/repos/seizer-zyx/Vulnerability/issues/3/comments
0
2022-07-26T09:22:51Z
2022-07-26T09:22:51Z
https://github.com/seizer-zyx/Vulnerability/issues/3
1,317,952,065
3
4,033
CVE-2021-3917
2022-08-23T20:15:08.360
A flaw was found in the coreos-installer, where it writes the Ignition config to the target system with world-readable access permissions. This flaw allows a local attacker to have read access to potentially sensitive data. The highest threat from this vulnerability is to confidentiality.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integr...
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2021-3917" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:coreos-installer:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5FB7948-D4C7-4806-A707-B1F4FC340F97", "versionEndExcluding": "0.10.0", "versionEndIncluding": null, "versionSta...
[ "276" ]
276
https://github.com/coreos/fedora-coreos-tracker/issues/889
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "coreos", "fedora-coreos-tracker" ]
In the ignition file sometimes contains secrets and the best option maybe for this is denied access to unauthorized users. The only way to access has to be through `sudo` or with the root account.
Change `/boot/ignition/config.ign` permissions to 0600 and delete it after provisioning
https://api.github.com/repos/coreos/fedora-coreos-tracker/issues/889/comments
19
2021-07-06T13:02:39Z
2021-11-23T05:22:02Z
https://github.com/coreos/fedora-coreos-tracker/issues/889
937,874,394
889
4,034
CVE-2021-4178
2022-08-24T16:15:09.770
A arbitrary code execution flaw was found in the Fabric 8 Kubernetes client affecting versions 5.0.0-beta-1 and above. Due to an improperly configured YAML parsing, this will allow a local and privileged attacker to supply malicious YAML.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integr...
[ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2021-4178" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cg...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:fabric8-kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C5E8807-F660-4409-A21C-754651357607", "versionEndExcluding": "5.0.3", "versionEndIncluding": null, "versionSt...
[ "502" ]
502
https://github.com/fabric8io/kubernetes-client/issues/3653
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "fabric8io", "kubernetes-client" ]
### Describe the bug Hi team, I think I found a security issue in the kubernetes-client library which can cause code execution depending on where the input is coming from. If a malicious config string or Kubernetes resource string is passed to a specific function in the library, this will execute arbitrary Java cod...
Security issue in kubernetes-client
https://api.github.com/repos/fabric8io/kubernetes-client/issues/3653/comments
5
2021-12-16T15:03:31Z
2022-03-03T09:28:59Z
https://github.com/fabric8io/kubernetes-client/issues/3653
1,082,300,494
3,653
4,035
CVE-2021-4214
2022-08-24T16:15:10.037
A heap overflow flaw was found in libpngs' pngimage.c program. This flaw allows an attacker with local network access to pass a specially crafted PNG file to the pngimage utility, causing an application to crash, leading to a denial of service.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2021-4214" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://bugz...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libpng:libpng:1.6.0:-:*:*:*:*:*:*", "matchCriteriaId": "42882881-6827-4123-B217-FC9B4C36702A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "120" ]
120
https://github.com/glennrp/libpng/issues/302
[ "Exploit", "Third Party Advisory" ]
github.com
[ "glennrp", "libpng" ]
Hi, I find a potential heap overflow issue in contrib/libtests/pngimage.c, function compare_read. The code version is commit https://github.com/glennrp/libpng/commit/301f7a14295a3bdfaf406dbb5004d0784dc137ea The compile command is `CFLAGS="-O0 -g -fsanitize=address,leak,undefined" ./configure --disable-shared` ...
A potential heap overflow issue
https://api.github.com/repos/pnggroup/libpng/issues/302/comments
3
2019-06-25T14:50:55Z
2022-01-26T06:39:19Z
https://github.com/pnggroup/libpng/issues/302
460,472,662
302
4,036
CVE-2022-37178
2022-08-24T17:15:08.290
An issue was discovered in 72crm 9.0. There is a SQL Injection vulnerability in View the task calendar.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/72wukong/72crm-9.0-PHP/issues/34" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Th...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:72crm:wukong_crm:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "7FD0E887-2558-4A21-B67E-D5E2B722ABEE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "89" ]
89
https://github.com/72wukong/72crm-9.0-PHP/issues/34
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "72wukong", "72crm-9.0-PHP" ]
## **Brief of this vulnerability** 72crm v9 has sql injection vulnerability in View the task calendar ## **Test Environment** - Windows10 - PHP 5.6.9+Apache/2.4.39 ## **Affect version** 72crm v9 ## **Vulnerable Code** application\work\controller\Task.php line 506 The $param parameter is passed ...
72crm v9 has sql injection vulnerability
https://api.github.com/repos/WuKongOpenSource/WukongCRM-9.0-PHP/issues/34/comments
0
2022-07-28T04:35:24Z
2022-07-28T04:35:24Z
https://github.com/WuKongOpenSource/WukongCRM-9.0-PHP/issues/34
1,320,380,250
34
4,037
CVE-2022-37181
2022-08-24T17:15:08.343
72crm 9.0 has an Arbitrary file upload vulnerability.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/72wukong/72crm-9.0-PHP/issues/35" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Th...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:72crm:wukong_crm:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "7FD0E887-2558-4A21-B67E-D5E2B722ABEE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "434" ]
434
https://github.com/72wukong/72crm-9.0-PHP/issues/35
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "72wukong", "72crm-9.0-PHP" ]
## **Brief of this vulnerability** 72crm v9 has Arbitrary file upload vulnerability Where to upload the logo ## **Test Environment** - Windows10 - PHP 5.6.9+Apache/2.4.39 ## **Affect version** 72crm v9 ## **Vulnerable Code** application\admin\controller\System.php line 51 ![image](https://user-imag...
72crm v9 has Arbitrary file upload vulnerability
https://api.github.com/repos/WuKongOpenSource/WukongCRM-9.0-PHP/issues/35/comments
0
2022-07-30T06:18:30Z
2022-07-30T06:18:30Z
https://github.com/WuKongOpenSource/WukongCRM-9.0-PHP/issues/35
1,322,913,749
35
4,038
CVE-2022-37158
2022-08-25T17:15:08.150
RuoYi v3.8.3 has a Weak password vulnerability in the management system.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/YunaiV/ruoyi-vue-pro/issues/170" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:iocoder:ruoyi-vue-pro:3.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "5A0B2F76-205F-4F61-A7E9-9FB7177F40C5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "521" ]
521
https://github.com/YunaiV/ruoyi-vue-pro/issues/170
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "YunaiV", "ruoyi-vue-pro" ]
碰到问题,请在 <https://github.com/YunaiV/ruoyi-vue-pro/issues> 搜索是否存在相似的 issue。 不按照模板提交的 issue,会被系统自动删除。 ### 基本信息 - ruoyi-vue-pro 版本:RuoYi v3.8.3 - 操作系统:windows - 数据库:mysql5.6 ### 你猜测可能的原因 (必填)我花费了 2-4 小时自查,发现可能的原因是:Weak password vulnerability in the management system ### 复现步骤 ![image](https://user-ima...
Weak password vulnerability in the management system
https://api.github.com/repos/YunaiV/ruoyi-vue-pro/issues/170/comments
1
2022-07-29T11:06:37Z
2022-08-19T16:56:07Z
https://github.com/YunaiV/ruoyi-vue-pro/issues/170
1,322,110,038
170
4,039
CVE-2021-42523
2022-08-25T18:15:09.260
There are two Information Disclosure vulnerabilities in colord, and they lie in colord/src/cd-device-db.c and colord/src/cd-profile-db.c separately. They exist because the 'err_msg' of 'sqlite3_exec' is not releasing after use, while libxml2 emphasizes that the caller needs to release it.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/hughsie/colord/issues/110" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tra...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:colord_project:colord:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E226351-6F3B-47C1-9E4A-72398A194CA5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "401" ]
401
https://github.com/hughsie/colord/issues/110
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "hughsie", "colord" ]
According to libsqlite3 API document, "To avoid memory leaks, the application should invoke sqlite3_free() on error message strings returned through the 5th parameter of sqlite3_exec() after the error message string is no longer needed." https://github.com/hughsie/colord/blob/1572d92bb69de7632841bf17f3cb81534881c3c6...
potential memory leak: forgetting to free error message of libsqlite3 API 'sqlite3_exec' -1
https://api.github.com/repos/hughsie/colord/issues/110/comments
5
2020-03-21T15:10:44Z
2022-08-26T07:40:04Z
https://github.com/hughsie/colord/issues/110
585,517,804
110
4,040
CVE-2021-43766
2022-08-25T18:15:09.317
Odyssey passes to server unencrypted bytes from man-in-the-middle When Odyssey is configured to use certificate Common Name for client authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of SSL certificate verification and encryption. Thi...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integ...
[ { "source": "patrick@puiterwijk.org", "tags": null, "url": "https://github.com/yandex/odyssey/issues/376%2C" }, { "source": "patrick@puiterwijk.org", "tags": [ "Not Applicable" ], "url": "https://www.postgresql.org/support/security/CVE-2021-23214/" }, { "source": "af854...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odyssey_project:odyssey:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "34DBBE36-E704-416B-B8C1-CCF6D8F2B865", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "295" ]
295
https://github.com/yandex/odyssey/issues/376%2C
null
github.com
[ "yandex", "odyssey" ]
When Odyssey is configured to use certificate Common Name for client authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of SSL certificate verification and encryption. This is similar to CVE-2021-23214 for PostgreSQL. This issue was f...
CVE-2021-43766: Odyssey passes to server unencrypted bytes from man-in-the-middle
https://api.github.com/repos/yandex/odyssey/issues/376/comments
0
2021-12-06T06:42:53Z
2021-12-06T06:42:56Z
https://github.com/yandex/odyssey/issues/376
1,071,787,095
376
4,041
CVE-2021-43767
2022-08-25T18:15:09.377
Odyssey passes to client unencrypted bytes from man-in-the-middle When Odyssey storage is configured to use the PostgreSQL server using 'trust' authentication with a 'clientcert' requirement or to use 'cert' authentication, a man-in-the-middle attacker can inject false responses to the client's first few queries. Despi...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "int...
[ { "source": "patrick@puiterwijk.org", "tags": null, "url": "https://github.com/yandex/odyssey/issues/377%2C" }, { "source": "patrick@puiterwijk.org", "tags": [ "Not Applicable", "Vendor Advisory" ], "url": "https://www.postgresql.org/support/security/CVE-2021-23222/" },...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E950ED8-CA9E-4C53-BD86-7E1BEF561E9A", "versionEndExcluding": "9.6.24", "versionEndIncluding": null, "versionStart...
[ "295" ]
295
https://github.com/yandex/odyssey/issues/377%2C
null
github.com
[ "yandex", "odyssey" ]
When Odyssey storage is configured to use the PostgreSQL server using `trust` authentication with a `clientcert` requirement or to use `cert` authentication, a man-in-the-middle attacker can inject false responses to the client's first few queries. Despite the use of SSL certificate verification and encryption, Odyssey...
CVE-2021-43767: Odyssey passes to client unencrypted bytes from man-in-the-middle
https://api.github.com/repos/yandex/odyssey/issues/377/comments
0
2021-12-06T06:43:37Z
2021-12-06T06:43:40Z
https://github.com/yandex/odyssey/issues/377
1,071,787,462
377
4,042
CVE-2021-4022
2022-08-25T18:15:09.443
A vulnerability was found in rizin. The bug involves an ELF64 binary for the HPPA architecture. When a specially crafted binarygets analysed by rizin, it causes rizin to crash by freeing an uninitialized (and potentially user controlled, depending on the build) memory address.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/issues/2015" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rizin:rizin:*:*:*:*:*:*:*:*", "matchCriteriaId": "DDF54820-3CA2-49DC-9B65-DF480E8AF596", "versionEndExcluding": null, "versionEndIncluding": "0.3.1", "versionStartExcluding":...
[ "416" ]
416
https://github.com/rizinorg/rizin/issues/2015
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rizinorg", "rizin" ]
### Work environment With @ogianatiempo we discovered a bug which makes rizin crash when analyzing certain kind of binaries. | Questions | Answers |------------------------------------------------------|-------------------- | OS/arch/bits (mandatory) ...
CVE-2021-4022: Segfault when analyzing an ELF64 for HPPA architecture
https://api.github.com/repos/rizinorg/rizin/issues/2015/comments
9
2021-11-23T15:46:59Z
2021-11-29T12:15:17Z
https://github.com/rizinorg/rizin/issues/2015
1,061,438,966
2,015
4,043
CVE-2022-36527
2022-08-25T19:15:08.483
Jfinal CMS v5.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the post title text field under the publish blog module.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/45" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "79" ]
79
https://github.com/jflyfox/jfinal_cms/issues/45
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jflyfox", "jfinal_cms" ]
There is a stored XSS vulnerability in JFinal_cms 's publish blog module. An attacker could insert malicious XSS code into the post title. When users and administrators view the blog post, the malicious XSS code is triggered successfully. First register a user to test it, then go to the submit blog post page and ins...
XSS vulnerability1 in jfinal_cms 5.1.0
https://api.github.com/repos/jflyfox/jfinal_cms/issues/45/comments
0
2022-07-18T04:43:11Z
2022-07-18T04:43:11Z
https://github.com/jflyfox/jfinal_cms/issues/45
1,307,399,442
45
4,044
CVE-2020-27796
2022-08-25T20:15:08.487
A heap-based buffer over-read was discovered in the invert_pt_dynamic function in p_lx_elf.cpp in UPX 4.0.0 via a crafted Mach-O file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/392" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3527302-7874-4400-B123-99C1CA6FE8EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "125" ]
125
https://github.com/upx/upx/issues/392
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
Author: giantbranch of NSFOCUS Security Team ## What's the problem (or question)? A heap buffer overflow in the latest commit of the devel branch ASAN reports: ``` ==21202==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62f00000c530 at pc 0x00000058b076 bp 0x7ffdc9ecf670 sp 0x7ffdc9ecf668 READ of...
Heap buffer overflow in PackLinuxElf32::invert_pt_dynamic
https://api.github.com/repos/upx/upx/issues/392/comments
1
2020-07-23T08:29:53Z
2020-08-06T06:29:46Z
https://github.com/upx/upx/issues/392
664,292,638
392
4,045
CVE-2020-27797
2022-08-25T20:15:08.537
An invalid memory address reference was discovered in the elf_lookup function in p_lx_elf.cpp in UPX 4.0.0 via a crafted Mach-O file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/390" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3527302-7874-4400-B123-99C1CA6FE8EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "763" ]
763
https://github.com/upx/upx/issues/390
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
Author: giantbranch of NSFOCUS Security Team ## What's the problem (or question)? Segmentation fault in PackLinuxElf32::elf_lookup(char const*) of /src/p_lx_elf.cpp in the latest commit of the devel branch code link : [p_lx_elf.cpp#L5486](https://github.com/upx/upx/blob/87b73e5cfdc12da94c251b2cd83bb01c7d9f616...
Segmentation fault in PackLinuxElf32::elf_lookup(char const*) of /src/p_lx_elf.cpp
https://api.github.com/repos/upx/upx/issues/390/comments
2
2020-07-23T08:06:10Z
2020-08-06T06:28:39Z
https://github.com/upx/upx/issues/390
664,279,490
390
4,046
CVE-2020-27798
2022-08-25T20:15:08.583
An invalid memory address reference was discovered in the adjABS function in p_lx_elf.cpp in UPX 4.0.0 via a crafted Mach-O file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/396" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3527302-7874-4400-B123-99C1CA6FE8EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "763" ]
763
https://github.com/upx/upx/issues/396
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
Author: giantbranch of NSFOCUS Security Team ## What's the problem (or question)? Segmentation fault in PackLinuxElf64::adjABS of p_lx_elf.cpp in the latest commit of the devel branch code: ``` ────────────────────────────────────────────────────────────────────────────────[ REGISTERS ]──────────────────────...
Segmentation fault in PackLinuxElf64::adjABS of p_lx_elf.cpp
https://api.github.com/repos/upx/upx/issues/396/comments
1
2020-07-24T09:28:47Z
2020-08-06T06:30:09Z
https://github.com/upx/upx/issues/396
665,044,143
396
4,047
CVE-2020-27799
2022-08-25T20:15:08.630
A heap-based buffer over-read was discovered in the acc_ua_get_be32 function in miniacc.h in UPX 4.0.0 via a crafted Mach-O file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/391" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3527302-7874-4400-B123-99C1CA6FE8EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "125" ]
125
https://github.com/upx/upx/issues/391
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
Author: giantbranch of NSFOCUS Security Team ## What's the problem (or question)? A heap buffer overflow read in the latest commit of the devel branch ASAN reports: ``` ==21053==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6160000014bb at pc 0x000000755961 bp 0x7ffe38d0c080 sp 0x7ffe38d0c078 ...
Heap buffer overflow in acc_ua_get_be32()
https://api.github.com/repos/upx/upx/issues/391/comments
1
2020-07-23T08:13:04Z
2020-08-06T06:29:39Z
https://github.com/upx/upx/issues/391
664,283,181
391
4,048
CVE-2020-27800
2022-08-25T20:15:08.677
A heap-based buffer over-read was discovered in the get_le32 function in bele.h in UPX 4.0.0 via a crafted Mach-O file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/395" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3527302-7874-4400-B123-99C1CA6FE8EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "125" ]
125
https://github.com/upx/upx/issues/395
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
Author: giantbranch of NSFOCUS Security Team ## What's the problem (or question)? A heap buffer overflow read in the latest commit of the devel branch ASAN reports: ``` ==5614==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x624000007da0 at pc 0x000000757233 bp 0x7ffe125eb8e0 sp 0x7ffe125eb8d8 REA...
Another heap buffer overflow in get_le32()
https://api.github.com/repos/upx/upx/issues/395/comments
1
2020-07-24T08:10:02Z
2020-08-06T06:30:04Z
https://github.com/upx/upx/issues/395
664,994,296
395
4,049
CVE-2020-27801
2022-08-25T20:15:08.727
A heap-based buffer over-read was discovered in the get_le64 function in bele.h in UPX 4.0.0 via a crafted Mach-O file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/394" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.co...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3527302-7874-4400-B123-99C1CA6FE8EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "125" ]
125
https://github.com/upx/upx/issues/394
[ "Exploit", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
Author: giantbranch of NSFOCUS Security Team ## What's the problem (or question)? A heap buffer overflow read in the latest commit of the devel branch ASAN reports: ``` ==4525==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7fab6ae5cdd8 at pc 0x000000757297 bp 0x7fff2d255a60 sp 0x7fff2d255a58 REA...
Heap buffer overflow in get_le64()
https://api.github.com/repos/upx/upx/issues/394/comments
1
2020-07-24T06:42:22Z
2020-08-06T06:29:58Z
https://github.com/upx/upx/issues/394
664,953,164
394
4,050
CVE-2020-27802
2022-08-25T20:15:08.777
An floating point exception was discovered in the elf_lookup function in p_lx_elf.cpp in UPX 4.0.0 via a crafted Mach-O file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/393" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3527302-7874-4400-B123-99C1CA6FE8EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "369" ]
369
https://github.com/upx/upx/issues/393
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
Author: giantbranch of NSFOCUS Security Team ## What's the problem (or question)? Floating point exception was found in PackLinuxElf32::elf_lookup of p_lx_elf.cpp (the latest commit of the devel branch) through debugging,because of div 0 ``` ────────────────────────────────────────────────────────────[ DISA...
Floating point exception in PackLinuxElf32::elf_lookup
https://api.github.com/repos/upx/upx/issues/393/comments
1
2020-07-23T09:02:02Z
2020-08-06T06:29:52Z
https://github.com/upx/upx/issues/393
664,311,420
393
4,051
CVE-2022-36168
2022-08-26T00:15:09.237
A directory traversal vulnerability was discovered in Wuzhicms 4.1.0. via /coreframe/app/attachment/admin/index.php:
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Cigar-Fasion/CVE/issues/1" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wuzhicms:wuzhicms:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2B76E69A-B2F3-4359-A7C0-046CEE2FAEEB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "22" ]
22
https://github.com/Cigar-Fasion/CVE/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Cigar-Fasion", "CVE" ]
A directory traversal vulnerability was discovered in WUZHI CMS 4.1.0. Directory traversal allows authenticated remote attackers to list files in any directory. Vulnerability in /coreframe/app/attachment/admin/index.php: ``` public function dir() { $dir = isset($GLOBALS['dir']) && trim($GLOBALS['d...
Wuzhicms v4.1.0 /coreframe/app/attachment/admin/index.php hava a directory traversal Vulnerability
https://api.github.com/repos/f4s1on/CVE/issues/1/comments
0
2022-07-12T03:17:32Z
2022-07-12T03:17:32Z
https://github.com/f4s1on/CVE/issues/1
1,301,479,795
1
4,052
CVE-2022-36168
2022-08-26T00:15:09.237
A directory traversal vulnerability was discovered in Wuzhicms 4.1.0. via /coreframe/app/attachment/admin/index.php:
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Cigar-Fasion/CVE/issues/1" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wuzhicms:wuzhicms:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2B76E69A-B2F3-4359-A7C0-046CEE2FAEEB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "22" ]
22
https://github.com/wuzhicms/wuzhicms/issues/202
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "wuzhicms", "wuzhicms" ]
A directory traversal vulnerability was discovered in WUZHI CMS 4.1.0. Directory traversal allows authenticated remote attackers to list files in any directory. Vulnerability in /coreframe/app/attachment/admin/index.php: ``` public function dir() { $dir = isset($GLOBALS['dir']) && trim($GLOBALS['d...
Wuzhicms v4.1.0 /coreframe/app/attachment/admin/index.php hava a directory traversal Vulnerability
https://api.github.com/repos/wuzhicms/wuzhicms/issues/202/comments
1
2022-07-12T03:28:46Z
2023-01-08T02:20:43Z
https://github.com/wuzhicms/wuzhicms/issues/202
1,301,485,949
202
4,053
CVE-2021-39393
2022-08-26T13:15:08.300
mm-wiki v0.2.1 was discovered to contain a cross-site scripting (XSS) vulnerability via the markdown editor.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/phachon/mm-wiki/issues/315" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mm-wiki_project:mm-wiki:0.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "B14C3277-7618-436B-B961-C0A2673B87CC", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "79" ]
79
https://github.com/phachon/mm-wiki/issues/315
[ "Exploit", "Third Party Advisory" ]
github.com
[ "phachon", "mm-wiki" ]
xxxxxHere is the problem descriptionxxxx 1. The version number in use vx0.2.1 2. Whether the version has been upgraded to the new version yes 3. Current problems encountered: The markdown editor exist a XSS 4. Error logs or screenshots Insert the XSS-payload into it ![图片](https://user-images.githubuser...
The markdown editor exist a XSS
https://api.github.com/repos/phachon/mm-wiki/issues/315/comments
0
2021-08-17T01:39:32Z
2021-08-17T01:39:32Z
https://github.com/phachon/mm-wiki/issues/315
972,222,792
315
4,054
CVE-2021-39394
2022-08-26T13:15:08.357
mm-wiki v0.2.1 was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily add user accounts and modify user information.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/phachon/mm-wiki/issues/316" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mm-wiki_project:mm-wiki:0.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "B14C3277-7618-436B-B961-C0A2673B87CC", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "352" ]
352
https://github.com/phachon/mm-wiki/issues/316
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "phachon", "mm-wiki" ]
xxxxxHere is the problem descriptionxxxx The version number in use vx0.2.1 Whether the version has been upgraded to the new version yes Current problems encountered: CSRF vulnerabilities Error logs or screenshots 1. Click to modify personal information and capture it ![图片](h...
CSRF vulnerabilities
https://api.github.com/repos/phachon/mm-wiki/issues/316/comments
0
2021-08-18T03:22:30Z
2021-08-18T03:54:22Z
https://github.com/phachon/mm-wiki/issues/316
973,236,101
316
4,055
CVE-2021-40285
2022-08-26T13:15:08.397
htmly v2.8.1 was discovered to contain an arbitrary file deletion vulnerability via the component \views\backup.html.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/danpros/htmly/issues/462" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmly:htmly:2.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "3943A5AA-F6A1-40B4-AFD3-7D1189668464", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "22" ]
22
https://github.com/danpros/htmly/issues/462
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "danpros", "htmly" ]
Hi there, I found an arbitrary file deletion vulnerability in Htmly. **Proof of Concept:** tested on Windows7 and Htmly version 2.8.1 and 2.8.0 1. Log in to the dashboard,click **Tools** -->**Backup**-->**create backup** to create backup. 2. Arbitrary file deletion: click **Delete** and modify t...
Security Issue: arbitrary file deletion vulnerability in “\system\admin\views\backup.html.php”
https://api.github.com/repos/danpros/htmly/issues/462/comments
4
2021-05-12T08:45:43Z
2022-09-30T01:18:21Z
https://github.com/danpros/htmly/issues/462
889,834,459
462
4,056
CVE-2022-36521
2022-08-26T14:15:08.353
Insecure permissions in cskefu v7.0.1 allows unauthenticated attackers to arbitrarily add administrator accounts.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chatopera/cskefu/issues/724" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cskefu:cskefu:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "6801701E-47D9-4EE6-913D-6FE780D5C3FF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "306" ]
306
https://github.com/chatopera/cskefu/issues/724
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chatopera", "cskefu" ]
<!-- 致工单作者: 以这样的设想:读完您的工单,是一个心情愉悦的状态。 为此,您的工单应该是一个故事,徐徐展开:开头有悬念,能读到结尾;有时间、地点、人物、问题;有可能的解决方案。 您的描述越具体,越有人愿意帮助。因为您的一个不起眼的线索,可能就让读者快速的分析和解决问题。 如果工单的内容,没有具体、没有背景、没有截图、没有日志的话,也就没有人愿意解决。 每个工单,应花至少半个小时进行撰写。就算是对春松客服熟悉,对业务熟悉,写作技能上乘,也是这样。 写出一个好的工单,可能会花一天的时间,还可能更长。 就一项别人可以参与进来合作的事情而言,对方可能要花的时间可能是几周,几个月。 --> ## ...
【安全漏洞】前台未授权增加管理员账号
https://api.github.com/repos/cskefu/cskefu/issues/724/comments
1
2022-07-18T03:21:46Z
2022-10-30T10:24:15Z
https://github.com/cskefu/cskefu/issues/724
1,307,348,918
724
4,057
CVE-2021-3574
2022-08-26T16:15:08.943
A vulnerability was found in ImageMagick-7.0.11-5, where executing a crafted file with the convert command, ASAN detects memory leaks.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityI...
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/c6ad94fbb7b280f39c2fbbdc1c140e51b1b466e9" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.11-5:*:*:*:*:*:*:*", "matchCriteriaId": "3769F997-3EBC-4222-B3D4-8709A7AA49FE", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "401" ]
401
https://github.com/ImageMagick/ImageMagick/issues/3540
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites I have written a descriptive issue title I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported I have verified that I am using the latest ...
AddressSanitizer report LeakSanitizer: detected memory leaks when executing convert command
https://api.github.com/repos/ImageMagick/ImageMagick/issues/3540/comments
11
2021-04-13T14:50:19Z
2022-11-30T17:19:10Z
https://github.com/ImageMagick/ImageMagick/issues/3540
857,040,605
3,540
4,058
CVE-2022-38794
2022-08-27T21:15:08.890
Zaver through 2020-12-15 allows directory traversal via the GET /.. substring.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zyearn/zaver/issues/22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zaver_project:zaver:*:*:*:*:*:*:*:*", "matchCriteriaId": "33AAE9C2-8D4D-4DCB-A971-79C8C4B29291", "versionEndExcluding": null, "versionEndIncluding": "2020-12-15", "versionSta...
[ "22" ]
22
https://github.com/zyearn/zaver/issues/22
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "zyearn", "zaver" ]
Directory traversal. Hackers can gain access to a wealth of sensitive information including configuration files. ![image](https://user-images.githubusercontent.com/86256628/186872271-12b858e0-835b-4119-93d8-d21e32b7cad7.png) For example, here I can read my `.bashrc` and `zaver.conf` ![image](https://user-im...
Serious vulnerability exists
https://api.github.com/repos/zyearn/zaver/issues/22/comments
0
2022-08-26T09:23:12Z
2023-03-09T02:07:29Z
https://github.com/zyearn/zaver/issues/22
1,352,001,188
22
4,059
CVE-2022-36573
2022-08-29T00:15:08.570
A cross-site scripting (XSS) vulnerability in Pagekit CMS v1.0.18 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Markdown text box under /blog/post/edit.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pagekit/pagekit/issues/968" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pagekit:pagekit:1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "A1E39691-604C-42A3-BA30-80433E0E09EA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "79" ]
79
https://github.com/pagekit/pagekit/issues/968
[ "Exploit", "Third Party Advisory" ]
github.com
[ "pagekit", "pagekit" ]
## Problem An attacker can insert a constructed statement into the article. When a user visits this page, it will trigger (XSS) cross site scripting attack ![xss](https://user-images.githubusercontent.com/73064965/180004839-d1384f13-4d83-4fdc-a6c2-5cac268579cd.gif) ## EXP <svg/onrandom=random onload=confirm...
There is an XSS vulnerability in the place where the article is edited
https://api.github.com/repos/pagekit/pagekit/issues/968/comments
1
2022-07-20T14:19:05Z
2022-07-20T14:19:55Z
https://github.com/pagekit/pagekit/issues/968
1,311,207,979
968
4,060
CVE-2022-0284
2022-08-29T15:15:09.183
A heap-based-buffer-over-read flaw was found in ImageMagick's GetPixelAlpha() function of 'pixel-accessor.h'. This vulnerability is triggered when an attacker passes a specially crafted Tagged Image File Format (TIFF) image to convert it into a PICON file format. This issue can potentially lead to a denial of service a...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2022-0284" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "90A073A6-900F-44EE-B29F-05CB65058078", "versionEndExcluding": "7.1.0-20", "versionEndIncluding": null, "versionS...
[ "125" ]
125
https://github.com/ImageMagick/ImageMagick/issues/4729
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### ImageMagick version 7.1.0-20 ### Operating system Linux ### Operating system, version and so on Linux ubuntu 5.4.0-73-generic #82~18.04.1-Ubuntu SMP Fri Apr 16 15:10:02 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux ### Description Hi, ImageMagick security team This is ZhangJiaxing (@r0fm1a) from Codesafe Team of ...
Heap Buffer Overflow
https://api.github.com/repos/ImageMagick/ImageMagick/issues/4729/comments
4
2022-01-19T07:07:49Z
2022-02-19T13:35:53Z
https://github.com/ImageMagick/ImageMagick/issues/4729
1,107,736,894
4,729
4,061
CVE-2022-0367
2022-08-29T15:15:09.370
A heap-based buffer overflow flaw was found in libmodbus in function modbus_reply() in src/modbus.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045571" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libmodbus:libmodbus:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4A63A4C-595F-494C-9F53-ED458E91FFE0", "versionEndExcluding": "3.1.7", "versionEndIncluding": null, "versionStartExc...
[ "787" ]
787
https://github.com/stephane/libmodbus/issues/614
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "stephane", "libmodbus" ]
## libmodbus version ebc4f4788678eda8d99e23be87c61a662a9d26b7 ## OS and/or distribution Ubuntu 20.04 focal ## Environment ,AMD EPYC 7742 64-Core @ 16x 2.25GHz ## Description Heap-based Buffer Overflow in _modbus_receive_msg ## Expected behaviour no crash. ## Actual behaviour double free...
Heap-based Buffer Overflow in modbus_reply
https://api.github.com/repos/stephane/libmodbus/issues/614/comments
14
2021-12-22T10:46:59Z
2023-02-11T02:24:21Z
https://github.com/stephane/libmodbus/issues/614
1,086,695,047
614
4,062
CVE-2022-0480
2022-08-29T15:15:09.477
A flaw was found in the filelock_init in fs/locks.c function in the Linux kernel. This issue can lead to host memory exhaustion due to memcg not limiting the number of Portable Operating System Interface (POSIX) file locks.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2022-0480" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/s...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "037A6DFB-B41D-4CC7-86C1-A201809B79C4", "versionEndExcluding": "5.15", "versionEndIncluding": null, "versionStartExclu...
[ "770" ]
770
https://github.com/kata-containers/kata-containers/issues/3373
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kata-containers", "kata-containers" ]
This is Yutian Yang from Zhejiang University. Our team have discovered a new attack from inside Kata containers, leading to host memory exhaustion. The root cause lies in the Linux kernel, even in the latest version. Briefly speaking, the kernel memcg does not charge posix locks allocated by user processes. The...
Host Memory Exhaustion Attack from Inside Kata Containers
https://api.github.com/repos/kata-containers/kata-containers/issues/3373/comments
16
2022-01-03T12:33:47Z
2022-02-03T11:09:36Z
https://github.com/kata-containers/kata-containers/issues/3373
1,092,474,299
3,373
4,063
CVE-2022-0496
2022-08-29T15:15:09.597
A vulnerbiility was found in Openscad, where a DXF-format drawing with particular (not necessarily malformed!) properties may cause an out-of-bounds memory access when imported using import().
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integr...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050695" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openscad:openscad:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1CAB560-2A16-496D-8216-1EC6B102BB0A", "versionEndExcluding": "2022-02-04", "versionEndIncluding": null, "versionStart...
[ "125" ]
125
https://github.com/openscad/openscad/issues/4037
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "openscad", "openscad" ]
### Summary A DXF-format drawing with particular (not necessarily malformed!) properties may cause an out-of-bounds memory access when imported using `import()`. ### Vulnerable versions * OpenSCAD Linux (commit eedf37059ca9ce81c09b9270c99257c3d7f74c43) * OpenSCAD Windows x64 (2021.01) ### Steps to reproduce ...
Out-of-bounds memory access in DXF loader (path identification)
https://api.github.com/repos/openscad/openscad/issues/4037/comments
9
2022-01-05T19:57:35Z
2022-02-05T01:53:54Z
https://github.com/openscad/openscad/issues/4037
1,094,696,669
4,037
4,064
CVE-2022-0497
2022-08-29T15:15:09.650
A vulnerbiility was found in Openscad, where a .scad file with no trailing newline could cause an out-of-bounds read during parsing of annotations.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050699" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Adv...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openscad:openscad:*:*:*:*:*:*:*:*", "matchCriteriaId": "715D4AF8-E090-42D2-BE4E-125F287BD9FF", "versionEndExcluding": "2022-01-09", "versionEndIncluding": null, "versionStart...
[ "125" ]
125
https://github.com/openscad/openscad/issues/4043
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "openscad", "openscad" ]
### Summary A .scad file with no trailing newline may cause an out-of-bounds read during parsing of annotations. ### Vulnerable versions * OpenSCAD (commit 374fa5853faeadf48afb55a0e4482f7b14b4f280) ### Steps to reproduce 1. Unzip the [provided proof-of-concept file](https://github.com/openscad/openscad/fil...
Out-of-bounds memory access in comment parser (file without trailing newline)
https://api.github.com/repos/openscad/openscad/issues/4043/comments
2
2022-01-09T17:08:37Z
2022-02-04T13:50:30Z
https://github.com/openscad/openscad/issues/4043
1,097,250,051
4,043
4,065
CVE-2022-1115
2022-08-29T15:15:10.297
A heap-buffer-overflow flaw was found in ImageMagick’s PushShortPixel() function of quantum-private.h file. This vulnerability is triggered when an attacker passes a specially crafted TIFF image file to ImageMagick for conversion, potentially leading to a denial of service.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2022-1115" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "62ED872E-70D8-4736-9876-F307A77839D4", "versionEndExcluding": "6.9.12-44", "versionEndIncluding": null, "version...
[ "787" ]
787
https://github.com/ImageMagick/ImageMagick/issues/4974
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### ImageMagick version 7.1.0-28 ### Operating system Linux ### Operating system, version and so on OS: Ubuntu 20.04.3 LTS Version: ImageMagick 7.1.0-28 Q16-HDRI x86_64 2022-03-04 https://imagemagick.org Copyright: (C) 1999 ImageMagick Studio LLC License: https://imagemagick.org/script/license.php ...
heap-buffer-overflow in magick at quantum-private.h PushShortPixel
https://api.github.com/repos/ImageMagick/ImageMagick/issues/4974/comments
1
2022-03-22T02:10:38Z
2022-03-24T01:28:05Z
https://github.com/ImageMagick/ImageMagick/issues/4974
1,176,173,021
4,974
4,066
CVE-2022-25646
2022-08-30T05:15:07.607
All versions of package x-data-spreadsheet are vulnerable to Cross-site Scripting (XSS) due to missing sanitization of values inserted into the cells.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/myliang/x-spreadsheet/issues/580" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:x-data-spreadsheet_project:x-data-spreadsheet:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "EAB5CA5D-367A-4344-8151-1C2C41E9CD2D", "versionEndExcluding": null, "versionEndIncluding": null,...
[ "79" ]
79
https://github.com/myliang/x-spreadsheet/issues/580
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "myliang", "x-spreadsheet" ]
xss found PoC: https://ibb.co/XbdMNVV Payload: `"><img src=1 onerror=alert(document.domain)>`
xss bug found
https://api.github.com/repos/myliang/x-spreadsheet/issues/580/comments
1
2022-03-18T06:45:03Z
2022-07-16T01:50:21Z
https://github.com/myliang/x-spreadsheet/issues/580
1,173,239,466
580
4,067
CVE-2022-36747
2022-08-30T22:15:09.537
Razor v0.8.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the function uploadchannel().
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/enferas/b00038c9add210ab639c13e0729425c9" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "ur...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cobub:razor:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "685B8616-266E-4588-BB94-748233156F4B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "79" ]
79
https://github.com/cobub/razor/issues/176
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cobub", "razor" ]
Hello, I would like to report for XSS vulnerability. In file https://github.com/cobub/razor/blob/2c991aff4a9c83f99e77a03e26056715706f15c0/web/application/controllers/manage/product.php ```php //line 98 function uploadchannel() { $platform = $_POST['platform']; $channel = $this->channel...
XSS vulnerability
https://api.github.com/repos/cobub/razor/issues/176/comments
1
2022-07-18T16:02:27Z
2022-09-13T17:53:35Z
https://github.com/cobub/razor/issues/176
1,308,172,462
176
4,068
CVE-2022-36748
2022-08-30T22:15:09.583
PicUploader v2.6.3 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /master/index.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xiebruce/PicUploader/issues/80" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thir...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:picuploader_project:picuploader:2.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "9FBB4CBD-45D3-4117-8510-4048A5E321B7", "versionEndExcluding": null, "versionEndIncluding": null, "ve...
[ "79" ]
79
https://github.com/xiebruce/PicUploader/issues/80
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "xiebruce", "PicUploader" ]
Hello, I would like to report for possible XSS vulnerability. In file https://github.com/xiebruce/PicUploader/blob/master/index.php ```php $data = [ 'code' => 'success', 'data' => [ 'filename' => $_FILES['file']['name'], 'url' => $isWeb ? $link['formatLink'] : $link, //专用于web上传,其它客户端上...
XX vulnerability in index.php
https://api.github.com/repos/xiebruce/PicUploader/issues/80/comments
9
2022-07-22T20:45:18Z
2023-06-25T13:45:44Z
https://github.com/xiebruce/PicUploader/issues/80
1,315,403,588
80
4,069
CVE-2022-36749
2022-08-30T22:15:09.630
RPi-Jukebox-RFID v2.3.0 was discovered to contain a command injection vulnerability via the component /htdocs/utils/Files.php. This vulnerability is exploited via a crafted payload injected into the file name of an uploaded file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/1859" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Adv...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sourcefabric:rpi-jukebox-rfid:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D564CC8A-AFE5-48C3-910C-08BDEF93FBEA", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "78" ]
78
https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/1859
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "MiczFlor", "RPi-Jukebox-RFID" ]
Hello, I would like to report for possible vulnerability. In file https://github.com/MiczFlor/RPi-Jukebox-RFID/blob/develop/htdocs/trackEdit.php ```php //line 136 if(isset($_GET['folder']) && $_GET['folder'] != "") { $post['folder'] = $_GET['folder']; } else { if(isset($_POST['folder']) && $_POST...
🐛 | Command Injection and XSS vulnerabilities reports
https://api.github.com/repos/MiczFlor/RPi-Jukebox-RFID/issues/1859/comments
4
2022-07-18T14:10:45Z
2024-09-15T09:50:33Z
https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/1859
1,308,022,012
1,859
4,070
CVE-2020-35538
2022-08-31T16:15:09.040
A crafted input file could cause a null pointer dereference in jcopy_sample_rows() when processed by libjpeg-turbo.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libjpeg-turbo/libjpeg-turbo/commit/9120a247436e84c0b4eea828cb11e8f665fcde30" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libjpeg-turbo:libjpeg-turbo:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "5130BD31-63BD-48B0-9B1C-E01B3484FD05", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ "476" ]
476
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/441
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libjpeg-turbo", "libjpeg-turbo" ]
**Have you searched the existing issues (both open and closed) in the libjpeg-turbo issue tracker to ensure that this bug report is not a duplicate?** Yes **Does this bug report describe one of the [two known and unsolvable issues with the JPEG format](https://libjpeg-turbo.org/pmwiki/uploads/About/TwoIssueswiththe...
jcopy_sample_rows() causes SIGSEGV
https://api.github.com/repos/libjpeg-turbo/libjpeg-turbo/issues/441/comments
4
2020-07-06T07:45:09Z
2021-12-23T16:23:45Z
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/441
651,322,599
441
4,071
CVE-2022-1325
2022-08-31T16:15:09.467
A flaw was found in Clmg, where with the help of a maliciously crafted pandore or bmp file with modified dx and dy header field values it is possible to trick the application into allocating huge buffer sizes like 64 Gigabyte upon reading the file from disk or from a virtual buffer.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "https://access.redhat.com/security/cve/CVE-2022-1325" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cimg:cimg:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BC6B9AC-0442-4A13-BE55-DC1B28A0700B", "versionEndExcluding": "3.1.0", "versionEndIncluding": null, "versionStartExcluding": n...
[ "770" ]
770
https://github.com/GreycLab/CImg/issues/343
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "GreycLab", "CImg" ]
# Description Via a maliciously crafted pandore or bmp file with modified dx and dy header field values it is possible to trick the application into allocating huge buffer sizes like 64 Gigabyte upon reading the file from disk or from a virtual buffer. # Version This does affect the newest Version of Cimg which i...
Denial of service via RAM exhaustion in _load_bmp
https://api.github.com/repos/GreycLab/CImg/issues/343/comments
18
2022-04-02T13:56:36Z
2022-09-27T09:01:50Z
https://github.com/GreycLab/CImg/issues/343
1,190,640,729
343
4,072
CVE-2022-2466
2022-08-31T16:15:10.943
It was found that Quarkus 2.10.x does not terminate HTTP requests header context which may lead to unpredictable behavior.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/quarkusio/quarkus/issues/26748" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*", "matchCriteriaId": "10673B6C-4242-4C0A-9CC2-888ACF185D66", "versionEndExcluding": "2.10.4", "versionEndIncluding": null, "versionStartExclud...
[ "444" ]
444
https://github.com/quarkusio/quarkus/issues/26748
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "quarkusio", "quarkus" ]
### Describe the bug ~~Upgrading from Quarkus 2.9.x to 2.10.x whenever i try to access `RoutingContext` request from a bean i get always the headers of the first request that have been made to the app.~~ ~~This happens on both @GraphQLApi endpoints and event in any CDI bean that consumes `RoutingContext` or `Ht...
CVE-2022-2466 - Request Context not terminated with GraphQL
https://api.github.com/repos/quarkusio/quarkus/issues/26748/comments
28
2022-07-15T07:32:30Z
2022-07-26T14:51:35Z
https://github.com/quarkusio/quarkus/issues/26748
1,305,687,135
26,748
4,073
CVE-2022-36566
2022-08-31T18:15:08.607
Rengine v1.3.0 was discovered to contain a command injection vulnerability via the scan engine function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zongdeiqianxing/rengine/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Th...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yogeshojha:rengine:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7EC7544-DE01-459C-AAEE-BA6815D98AFB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "78" ]
78
https://github.com/zongdeiqianxing/rengine/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "zongdeiqianxing", "rengine" ]
https://github.com/yogeshojha/rengine The rce vulnerability is caused by the code reading the value from the yaml file and splicing it directly into the os.system statement. [ github permark](https://github.com/yogeshojha/rengine/blob/67ca0a4350c4fb4b3d9a25c01db7024e170ff12a/web/reNgine/tasks.py#L1692-L1708) !...
There is an OS Command Injection vulnerability in the scan engine function configuration of rengine 1.3.0
https://api.github.com/repos/zongdeiqianxing/rengine/issues/2/comments
0
2022-07-19T03:10:43Z
2022-07-19T03:22:33Z
https://github.com/zongdeiqianxing/rengine/issues/2
1,308,916,097
2
4,074
CVE-2020-35530
2022-09-01T18:15:08.770
In LibRaw, there is an out-of-bounds write vulnerability within the "new_node()" function (libraw\src\x3f\x3f_utils_patched.cpp) that can be triggered via a crafted X3F file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/commit/11c4db253ef2c9bb44247b578f5caa57c66a1eeb" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libraw:libraw:0.20.0:-:*:*:*:*:*:*", "matchCriteriaId": "E00F0C8F-11AC-42B2-8D85-27028B41EBF3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "787" ]
787
https://github.com/LibRaw/LibRaw/issues/272
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibRaw", "LibRaw" ]
**Description** There is an out-of-bounds write vulnerability within the "new_node()" function (libraw\src\x3f\x3f_utils_patched.cpp). **Steps to Reproduce** poc (password: 0xfoxone): https://drive.google.com/open?id=1SGItp-hBZXEgrPErI6URiRkqUOT5J9In cmd: magick.exe convert poc.X3F new.png Upon running...
Libraw "new_node()" Out-of-bounds Write Vulnerability
https://api.github.com/repos/LibRaw/LibRaw/issues/272/comments
1
2020-04-03T17:35:32Z
2020-06-15T14:40:35Z
https://github.com/LibRaw/LibRaw/issues/272
593,536,465
272
4,075
CVE-2020-35531
2022-09-01T18:15:08.820
In LibRaw, an out-of-bounds read vulnerability exists within the get_huffman_diff() function (libraw\src\x3f\x3f_utils_patched.cpp) when reading data from an image file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/commit/d75af00681a74dcc8b929207eb895611a6eceb68" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libraw:libraw:0.20.0:-:*:*:*:*:*:*", "matchCriteriaId": "E00F0C8F-11AC-42B2-8D85-27028B41EBF3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "125" ]
125
https://github.com/LibRaw/LibRaw/issues/270
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibRaw", "LibRaw" ]
**Description** An out-of-bounds read vulnerability exists within the "get_huffman_diff()" function (libraw\src\x3f\x3f_utils_patched.cpp) when parsing a crafted X3F file. **Steps to Reproduce** (poc archive password= girlelecta): https://drive.google.com/file/d/1Yhqo6idPqWMisvPKrlzjsUKRApHmz2M_/view cmd: ...
LibRaw "get_huffman_diff()" Out-of-bounds read vulnerability
https://api.github.com/repos/LibRaw/LibRaw/issues/270/comments
4
2020-04-02T12:03:57Z
2020-06-17T13:12:10Z
https://github.com/LibRaw/LibRaw/issues/270
592,578,946
270
4,076
CVE-2020-35532
2022-09-01T18:15:08.870
In LibRaw, an out-of-bounds read vulnerability exists within the "simple_decode_row()" function (libraw\src\x3f\x3f_utils_patched.cpp) which can be triggered via an image with a large row_stride field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/commit/5ab45b085898e379fedc6b113e2e82a890602b1e" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libraw:libraw:0.20.0:-:*:*:*:*:*:*", "matchCriteriaId": "E00F0C8F-11AC-42B2-8D85-27028B41EBF3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "125" ]
125
https://github.com/LibRaw/LibRaw/issues/271
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibRaw", "LibRaw" ]
**Description** An out-of-bounds read vulnerability exists within the "simple_decode_row()" function (libraw\src\x3f\x3f_utils_patched.cpp) which can be triggered via an image with a large "row_stride" field. **Steps to Reproduce** (poc archive password= girlelecta): https://drive.google.com/file/d/12pjib7aED...
LibRaw "simple_decode_row()" Out-of-bounds read vulnerability
https://api.github.com/repos/LibRaw/LibRaw/issues/271/comments
3
2020-04-02T12:14:58Z
2020-06-17T12:49:47Z
https://github.com/LibRaw/LibRaw/issues/271
592,585,243
271
4,077
CVE-2020-35533
2022-09-01T18:15:08.920
In LibRaw, an out-of-bounds read vulnerability exists within the "LibRaw::adobe_copy_pixel()" function (libraw\src\decoders\dng.cpp) when reading data from the image file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/commit/a6937d4046a7c4742b683a04c8564605fd9be4fb" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libraw:libraw:0.20.0:-:*:*:*:*:*:*", "matchCriteriaId": "E00F0C8F-11AC-42B2-8D85-27028B41EBF3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "125" ]
125
https://github.com/LibRaw/LibRaw/issues/273
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibRaw", "LibRaw" ]
**Description** An out-of-bounds read vulnerability exists within the "LibRaw::adobe_copy_pixel()" function (libraw\src\decoders\dng.cpp) when parsing a crafted DNG file. **Steps to Reproduce** (poc archive password= girlelecta): https://drive.google.com/file/d/1kDMhDwfxoZBa31_vrsA2TfQI45FG8NRW/view cmd: ...
"LibRaw::adobe_copy_pixel()" Out-of-bounds read vulnerability
https://api.github.com/repos/LibRaw/LibRaw/issues/273/comments
2
2020-04-08T15:45:46Z
2020-06-15T15:00:04Z
https://github.com/LibRaw/LibRaw/issues/273
596,678,080
273
4,078
CVE-2020-35534
2022-09-01T18:15:08.970
In LibRaw, there is a memory corruption vulnerability within the "crxFreeSubbandData()" function (libraw\src\decoders\crx.cpp) when processing cr3 files.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/commit/e41f331e90b383e3208cefb74e006df44bf3a4b8" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libraw:libraw:0.20.0:-:*:*:*:*:*:*", "matchCriteriaId": "E00F0C8F-11AC-42B2-8D85-27028B41EBF3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "770" ]
770
https://github.com/LibRaw/LibRaw/issues/279
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibRaw", "LibRaw" ]
**Description:** There is a memory corruption vulnerability within the "crxFreeSubbandData()" function (libraw\src\decoders\crx.cpp) when processing cr3 files. **Steps to Reproduce:** poc (password: 0xfoxone): https://drive.google.com/open?id=10pjqVx6mItzmvovgqF-8IHi3jnnKQ6fD cmd: magick.exe convert poc.c...
Libraw "crxFreeSubbandData()" Memory Corruption Vulnerability
https://api.github.com/repos/LibRaw/LibRaw/issues/279/comments
1
2020-04-26T13:13:45Z
2020-04-26T15:50:32Z
https://github.com/LibRaw/LibRaw/issues/279
607,009,739
279
4,079
CVE-2020-35535
2022-09-01T18:15:09.027
In LibRaw, there is an out-of-bounds read vulnerability within the "LibRaw::parseSonySRF()" function (libraw\src\metadata\sony.cpp) when processing srf files.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/commit/c243f4539233053466c1309bde606815351bee81" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libraw:libraw:0.20.0:-:*:*:*:*:*:*", "matchCriteriaId": "E00F0C8F-11AC-42B2-8D85-27028B41EBF3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "125" ]
125
https://github.com/LibRaw/LibRaw/issues/283
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibRaw", "LibRaw" ]
**Description:** There is an out-of-bounds read vulnerability within the "LibRaw::parseSonySRF()" function (libraw\src\metadata\sony.cpp) when processing srf files. **Steps to Reproduce:** poc (password: 0xfoxone): https://drive.google.com/open?id=1r0wig5pSGUFhP3mDycIUcKMvnHamYaGJ cmd: magick.exe convert ...
Libraw "LibRaw::parseSonySRF()" Out-of-bounds Read Vulnerability
https://api.github.com/repos/LibRaw/LibRaw/issues/283/comments
1
2020-05-10T17:30:28Z
2020-05-10T18:24:18Z
https://github.com/LibRaw/LibRaw/issues/283
615,438,367
283
4,080
CVE-2022-39170
2022-09-02T03:15:07.527
libdwarf 0.4.1 has a double free in _dwarf_exec_frame_instr in dwarf_frame.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/davea42/libdwarf-code/commit/60303eb80ecc7747bf29776d545e2a5c5a76f6f8" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libdwarf_project:libdwarf:0.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "DE7E818D-510D-47B1-8DB9-299F4344D6D8", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "415" ]
415
https://github.com/davea42/libdwarf-code/issues/132
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "davea42", "libdwarf-code" ]
Hello, I was testing my fuzzer and found a double free in dwarfdump, _dwarf_exec_frame_instr bug. A double free will be triggered when parsing a crafted file, when running ./dwarfdump -vv -a $POC, as shown in the attachment ## Environment Ubuntu 22.04 gcc 11.2.0 libdwarf latest commit 271cc04a1bdd1f47d641ab9219fb...
[BUG] double free in _dwarf_exec_frame_instr
https://api.github.com/repos/davea42/libdwarf-code/issues/132/comments
1
2022-08-27T08:23:55Z
2022-08-29T22:20:39Z
https://github.com/davea42/libdwarf-code/issues/132
1,352,982,801
132
4,081
CVE-2022-36593
2022-09-02T04:15:11.267
kkFileView v4.0.0 was discovered to contain an arbitrary file deletion vulnerability via the fileName parameter at /controller/FileController.java.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kekingcn/kkFileView/issues/370" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thir...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:keking:kkfileview:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "14029A50-34F9-451F-800A-5A21EE2822A0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "22" ]
22
https://github.com/kekingcn/kkFileView/issues/370
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kekingcn", "kkFileView" ]
问题描述Description kkFileview v4.0.0存在任意文件删除漏洞,可能导致系统任意文件被删除。 kkFileview v4.0.0 has an arbitrary file deletion vulnerability, which may lead to arbitrary file being deleted. 漏洞位置vulerable code location src/main/java/cn/keking/web/controller/FileController.java文件78行,fileName参数用户可控,由于只截取"/"后面的内容作为文件名,导致可以利用“..\"...
kkFileView arbitrary file deletion vulnerability
https://api.github.com/repos/kekingcn/kkFileView/issues/370/comments
2
2022-07-20T05:59:04Z
2022-07-25T10:33:59Z
https://github.com/kekingcn/kkFileView/issues/370
1,310,483,184
370
4,082