cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2022-40885
2022-10-19T18:15:13.287
Bento4 v1.6.0-639 has a memory allocation issue that can cause denial of service.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/761" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/yangfar/CVE/blob/main/CVE-2022-40885.md" }...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "770" ]
770
https://github.com/axiomatic-systems/Bento4/issues/761
[ "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hello,I use the fuzzer(AFL) to fuzz binary mp42avc and got some crashes which show that allocator is out of memory trying to allocate 0xXXXXXXXX bytes when method new is called. The following is the details. ### Bug1 #### ./mp42avc ~/out/crashes/id\:000017\,sig\:06\,src\:000925+000617\,op\:splice\,rep\:128 3.avc ==...
Out of memory in Ap4DataBuffer:new AP4_Byte[buffer_size]
https://api.github.com/repos/axiomatic-systems/Bento4/issues/761/comments
0
2022-09-19T00:56:17Z
2023-05-29T02:53:19Z
https://github.com/axiomatic-systems/Bento4/issues/761
1,377,242,122
761
4,287
CVE-2022-42227
2022-10-19T18:15:13.350
jsonlint 1.0 is vulnerable to heap-buffer-overflow via /home/hjsz/jsonlint/src/lexer.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/p-ranav/jsonlint/issues/2" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yangfar/CVE/blob/mai...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsonlint_project:jsonlint_c\\+\\+:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "91B189D2-E9BB-40B7-907A-D48BF6EBFE3C", "versionEndExcluding": null, "versionEndIncluding": null, "ve...
[ "787" ]
787
https://github.com/p-ranav/jsonlint/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "p-ranav", "jsonlint" ]
Hi, developers of jsonlint. I fuzz the jsonlint with AFL,and some crashes incurred—heap-buffer-overflow.The following is the details. **Commond: ./jsonlint input** ### Bug =1492403==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60e0000000df at pc 0x000000508ea7 bp 0x7ffc32b00ef0 sp 0x7ffc32b00ee8 READ...
Heap-buffer-overflow in jsonlint/src/lexer.cpp:18:15
https://api.github.com/repos/p-ranav/jsonlint/issues/2/comments
0
2022-10-01T04:51:04Z
2022-10-01T04:51:04Z
https://github.com/p-ranav/jsonlint/issues/2
1,393,237,409
2
4,288
CVE-2022-37598
2022-10-20T11:15:10.437
Prototype pollution vulnerability in function DEFNODE in ast.js in mishoo UglifyJS 3.13.2 via the name variable in ast.js. NOTE: the vendor considers this an invalid report.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mishoo/UglifyJS/blob/352a944868b09c9ce3121a49d4a0bf0afe370a35/lib/ast.js#L46" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:uglifyjs_project:uglifyjs:3.13.2:*:*:*:*:node.js:*:*", "matchCriteriaId": "4B85A70A-2451-4F40-8B75-EA25C7C21B6D", "versionEndExcluding": null, "versionEndIncluding": null, "v...
[ "1321" ]
1321
https://github.com/mishoo/UglifyJS/issues/5699
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "mishoo", "UglifyJS" ]
Prototype pollution vulnerability in function DEFNODE in ast.js in mishoo UglifyJS 3.13.2 via the name variable in ast.js. The prototype pollution vulnerability can be mitigated with several best practices described here: https://learn.snyk.io/lessons/prototype-pollution/javascript/
[CVE-2022-37598]/ Prototype pollution found in ast.js
https://api.github.com/repos/mishoo/UglifyJS/issues/5699/comments
10
2022-10-05T05:10:21Z
2024-11-03T16:33:32Z
https://github.com/mishoo/UglifyJS/issues/5699
1,397,239,832
5,699
4,289
CVE-2022-37598
2022-10-20T11:15:10.437
Prototype pollution vulnerability in function DEFNODE in ast.js in mishoo UglifyJS 3.13.2 via the name variable in ast.js. NOTE: the vendor considers this an invalid report.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mishoo/UglifyJS/blob/352a944868b09c9ce3121a49d4a0bf0afe370a35/lib/ast.js#L46" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:uglifyjs_project:uglifyjs:3.13.2:*:*:*:*:node.js:*:*", "matchCriteriaId": "4B85A70A-2451-4F40-8B75-EA25C7C21B6D", "versionEndExcluding": null, "versionEndIncluding": null, "v...
[ "1321" ]
1321
https://github.com/mishoo/UglifyJS/issues/5721#issuecomment-1292849604
[ "Third Party Advisory" ]
github.com
[ "mishoo", "UglifyJS" ]
**Uglify version ** At least all versions from our current (3.13.2) to latest **Issue ** As of 25/10/22, running an `auditjs ossi` scan on our codebase throws this issue as a critical error: `Vulnerability Title: [CVE-2022-37598] Prototype pollution vulnerability in function DEFNODE in ast.js in mishoo UglifyJ...
Sonatype scan raises critical vulnerability: [CVE-2022-37598] Prototype pollution vulnerability in function DEFNODE in ast.js in mishoo UglifyJS 3.X.X via the name variable in ast.js.
https://api.github.com/repos/mishoo/UglifyJS/issues/5721/comments
7
2022-10-26T12:52:37Z
2022-11-16T15:11:30Z
https://github.com/mishoo/UglifyJS/issues/5721
1,423,971,344
5,721
4,290
CVE-2022-39272
2022-10-22T00:15:09.310
Flux is an open and extensible continuous delivery solution for Kubernetes. Versions prior to 0.35.0 are subject to a Denial of Service. Users that have permissions to change Flux’s objects, either through a Flux source or directly within a cluster, can provide invalid data to fields `.spec.interval` or `.spec.timeout`...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integri...
[ { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/fluxcd/flux2/security/advisories/GHSA-f4p5-x4vc-mh4v" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch", "Third Party Ad...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fluxcd:flux2:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AA15FCA-BF23-4A33-B5A9-CF1505C01DE0", "versionEndExcluding": "0.35.0", "versionEndIncluding": null, "versionStartExcluding...
[ "1284" ]
1284
https://github.com/kubernetes/apimachinery/issues/131
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "kubernetes", "apimachinery" ]
Despite validation of type=duration being [documented](https://github.com/kubernetes/apiextensions-apiserver/blob/29400d7010f44f7d6ad2c6762604185143382598/pkg/apis/apiextensions/v1/types_jsonschema.go#L51) as parsed by time.ParseDuration, which is [what the unmarshaller does](https://github.com/kubernetes/apimachinery/...
metav1.Duration doesn't parse `d`, `w`; conflicts with kubebuilder `format=duration` validation
https://api.github.com/repos/kubernetes/apimachinery/issues/131/comments
11
2022-02-10T15:14:13Z
2023-03-15T14:33:52Z
https://github.com/kubernetes/apimachinery/issues/131
1,130,271,415
131
4,291
CVE-2022-43680
2022-10-24T14:15:53.323
In libexpat through 2.4.9, there is a use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate in out-of-memory situations.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/12/28/5" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwal...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*", "matchCriteriaId": "262BCBEE-82AD-4ED4-A93E-9AE282BBE16C", "versionEndExcluding": null, "versionEndIncluding": "2.4.9", "versionSt...
[ "416" ]
416
https://github.com/libexpat/libexpat/issues/649
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "libexpat", "libexpat" ]
Pull request #616 titles "Bugfixes" contains two bug reports. This new ticket is about the "UAF due to DTD destruction" half of it, with the intention of making the issue more easily accessible. If I squash together the two related commits… - [Fix UAF due to DTD destruction. ](https://github.com/libexpat/libexpa...
[CVE-2022-43680] XML_ParserFree may free parser->m_dtd memory in out-of-memory situations when it should not
https://api.github.com/repos/libexpat/libexpat/issues/649/comments
0
2022-09-21T01:24:41Z
2022-10-24T14:34:21Z
https://github.com/libexpat/libexpat/issues/649
1,380,181,973
649
4,292
CVE-2022-38870
2022-10-25T17:15:55.773
Free5gc v3.2.1 is vulnerable to Information disclosure.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/free5gc/free5gc/issues/387" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:free5gc:free5gc:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "7EE8C66F-32FE-45C1-BC90-298A6B1469C7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "306" ]
306
https://github.com/free5gc/free5gc/issues/387
[ "Exploit", "Third Party Advisory" ]
github.com
[ "free5gc", "free5gc" ]
## Bug Description Free5gc webconsole come with a default username Admin and by using this username as a token header and without any password or authentication ,it's possible to leak all the information below : - Registered UEs (plmnID,ueId) - Subscriber information (AccessType,CmState,Guti,Mcc,Mnc,Dnn,PduSessi...
[Bugs] Leaking Registered UEs,Subscriber information,Tenants and User via the Free5gc webconsole without authentication
https://api.github.com/repos/free5gc/free5gc/issues/387/comments
4
2022-08-24T10:47:13Z
2023-07-20T02:13:31Z
https://github.com/free5gc/free5gc/issues/387
1,349,239,716
387
4,293
CVE-2022-39345
2022-10-25T17:15:56.407
Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. Gin-vue-admin prior to 2.5.4 is vulnerable to path traversal, which leads to file upload vulnerabilities. Version 2.5.4 contains a patch for this issue. There are no workarounds aside from upgradin...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/flipped-aurora/gin-vue-admin/blob/main/server/service/system/sys_auto_code.go" }, { "source": "security-advisories@github.com", "tags": [ "Issue Track...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gin-vue-admin_project:gin-vue-admin:*:*:*:*:*:*:*:*", "matchCriteriaId": "86B452EF-D11A-48EC-9D1F-29C445C6B3B6", "versionEndExcluding": "2.5.4", "versionEndIncluding": null, ...
[ "22" ]
22
https://github.com/flipped-aurora/gin-vue-admin/issues/1263
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "flipped-aurora", "gin-vue-admin" ]
### gin-vue-admin 版本 v2.5.4 ### Node 版本 16 ### Golang 版本 go1.19.1 ### 是否依旧存在 可以 ### bug描述 已发邮件 ### 修改建议 _No response_
[Bug]: gin-vue-admin存在安全漏洞
https://api.github.com/repos/flipped-aurora/gin-vue-admin/issues/1263/comments
2
2022-10-23T03:05:40Z
2022-10-25T08:11:01Z
https://github.com/flipped-aurora/gin-vue-admin/issues/1263
1,419,613,190
1,263
4,294
CVE-2022-41711
2022-10-25T21:15:49.150
Badaso version 2.6.0 allows an unauthenticated remote attacker to execute arbitrary code remotely on the server. This is possible because the application does not properly validate the data uploaded by users.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "help@fluidattacks.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://fluidattacks.com/advisories/harlow/" }, { "source": "help@fluidattacks.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:uatech:badaso:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F747296-3BE2-4660-95EB-C68E72A79EAF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "434" ]
434
https://github.com/uasoft-indonesia/badaso/issues/802
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "uasoft-indonesia", "badaso" ]
Any secure email contact to report a critical vulnerability in your application?
Critical Vulnerability
https://api.github.com/repos/uasoft-indonesia/badaso/issues/802/comments
4
2022-09-30T21:22:38Z
2022-10-11T10:04:47Z
https://github.com/uasoft-indonesia/badaso/issues/802
1,393,036,633
802
4,295
CVE-2022-3662
2022-10-26T19:15:17.857
A vulnerability was found in Axiomatic Bento4. It has been declared as critical. This vulnerability affects the function GetOffset of the file Ap4Sample.h of the component mp42hls. The manipulation leads to use after free. The attack can be initiated remotely. The exploit has been disclosed to the public and may be use...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrit...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/files/9817606/mp42hls_cuaf_Ap4Sample99.zip" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "416" ]
416
https://github.com/axiomatic-systems/Bento4/issues/802
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, there. There is an heap overflow in mp42hls, GetOffset, Ap4Sample.h:99, in the newest commit 5e7bb34a08272c49242196eba1cefab8af55f381. This seems to be an incomplete fix of issue #461. Here is the reproducing command: ~~~~ ./mp42hls poc ~~~~ POC: [mp42hls_cuaf_Ap4Sample99.zip](https://github.com/axi...
Concurrent heap use after free in mp42hls, GetOffset, Ap4Sample.h:99
https://api.github.com/repos/axiomatic-systems/Bento4/issues/802/comments
0
2022-10-19T06:53:27Z
2023-05-29T02:40:07Z
https://github.com/axiomatic-systems/Bento4/issues/802
1,414,407,802
802
4,296
CVE-2022-3663
2022-10-26T19:15:19.093
A vulnerability was found in Axiomatic Bento4. It has been rated as problematic. This issue affects the function AP4_StsdAtom of the file Ap4StsdAtom.cpp of the component MP4fragment. The manipulation leads to null pointer dereference. The attack may be initiated remotely. The exploit has been disclosed to the public a...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/files/9817303/mp4fragment_npd_Ap4StsdAtom.cpp75.zip" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "476" ]
476
https://github.com/axiomatic-systems/Bento4/issues/800
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, there. There is a segmentation fault caused by null pointer dereference in MP4fragment, Ap4StsdAtom.cpp:75 in the newest commit 5e7bb34a08272c49242196eba1cefab8af55f381. The reason for this issue is that the return value of the GetSampleDescription is unchecked. <img width="1055" alt="image" src="https://use...
Segmentation fault caused by null pointer dereference in MP4fragment, Ap4StsdAtom.cpp:75
https://api.github.com/repos/axiomatic-systems/Bento4/issues/800/comments
0
2022-10-19T06:06:34Z
2023-05-29T02:51:53Z
https://github.com/axiomatic-systems/Bento4/issues/800
1,414,350,784
800
4,297
CVE-2022-3664
2022-10-26T19:15:21.197
A vulnerability classified as critical has been found in Axiomatic Bento4. Affected is the function AP4_BitStream::WriteBytes of the file Ap4BitStream.cpp of the component avcinfo. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the p...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrit...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/files/9746288/avcinfo_poc1.zip" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "787" ]
787
https://github.com/axiomatic-systems/Bento4/issues/794
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hello, developers of Bento4! I also found some **heap buffer overflow** bugs in avcinfo by using our fuzzing tools with ASAN. Here is details: ## Bug1 ``` ================================================================= ==48171==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000038 at pc 0x7f...
Some heap buffer overflow bugs exist in avcinfo
https://api.github.com/repos/axiomatic-systems/Bento4/issues/794/comments
0
2022-10-10T13:34:03Z
2023-05-29T02:51:50Z
https://github.com/axiomatic-systems/Bento4/issues/794
1,403,189,077
794
4,298
CVE-2022-3666
2022-10-26T19:15:23.570
A vulnerability, which was classified as critical, has been found in Axiomatic Bento4. Affected by this issue is the function AP4_LinearReader::Advance of the file Ap4LinearReader.cpp of the component mp42ts. The manipulation leads to use after free. The attack may be launched remotely. The exploit has been disclosed t...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrit...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/files/9744391/mp42ts_poc.zip" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://git...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "416" ]
416
https://github.com/axiomatic-systems/Bento4/issues/793
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hello, developers of Bento4. I found a heap use after free bug in AP4_LinearReader::Advance(bool) with ASAN. The following is the details. ### Details ``` ================================================================= ==32056==ERROR: AddressSanitizer: heap-use-after-free on address 0x604000001f98 at pc 0x5609...
heap-use-after-free bug in mp42ts
https://api.github.com/repos/axiomatic-systems/Bento4/issues/793/comments
0
2022-10-10T08:51:58Z
2023-05-29T02:51:21Z
https://github.com/axiomatic-systems/Bento4/issues/793
1,402,818,781
793
4,299
CVE-2022-3667
2022-10-26T19:15:24.427
A vulnerability, which was classified as critical, was found in Axiomatic Bento4. This affects the function AP4_MemoryByteStream::WritePartial of the file Ap4ByteStream.cpp of the component mp42aac. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has bee...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrit...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/17ssDP/fuzzer_crashes/blob/main/Bento4/mp42aac-hbo-01" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://git...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "787" ]
787
https://github.com/axiomatic-systems/Bento4/issues/789
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, developers of Bento4: Thanks for your fix of issue #751 In the test of the binary mp42aac instrumented with ASAN. There are some inputs causing heap-buffer-overflow. Here is the ASAN mode output. This issue may be because of an incomplete fix of #751. ===========================================================...
Heap-buffer-overflow with ASAN in mp42aac
https://api.github.com/repos/axiomatic-systems/Bento4/issues/789/comments
0
2022-10-04T06:45:46Z
2023-05-29T02:51:19Z
https://github.com/axiomatic-systems/Bento4/issues/789
1,395,747,445
789
4,300
CVE-2022-3668
2022-10-26T19:15:25.300
A vulnerability has been found in Axiomatic Bento4 and classified as problematic. This vulnerability affects the function AP4_AtomFactory::CreateAtomFromStream of the component mp4edit. The manipulation leads to memory leak. The attack can be initiated remotely. The exploit has been disclosed to the public and may be u...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/files/9640968/Bug_1_POC.zip" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "401" ]
401
https://github.com/axiomatic-systems/Bento4/issues/776
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# Summary Hi, developers of Bento4: I tested the binary mp4edit and mp42hevc with my fuzzer, and three crashes incurred, including two memory-leaks from mp4edit and a heap-overflow from mp42hevc. And I think Bug1 and Bug2 are different. The following is the details. # Bug1 Detected memory leaks in mp4edit. ```...
Memory-leak and heap-overflow bugs in Bento4
https://api.github.com/repos/axiomatic-systems/Bento4/issues/776/comments
0
2022-09-25T14:31:41Z
2023-05-29T02:51:14Z
https://github.com/axiomatic-systems/Bento4/issues/776
1,385,048,849
776
4,301
CVE-2022-3704
2022-10-26T20:15:10.730
A vulnerability classified as problematic has been found in Ruby on Rails. This affects an unknown part of the file actionpack/lib/action_dispatch/middleware/templates/routes/_table.html.erb. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The real existence of this vulne...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integri...
[ { "source": "cna@vuldb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rails/rails/commit/be177e4566747b73ff63fd5f529fab564e475ed4" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Par...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rubyonrails:rails:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DE62461-5072-4B51-9043-C6AA48A95069", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "707" ]
707
https://github.com/rails/rails/issues/46244
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "rails", "rails" ]
After highlighting this issue to the Rails team via Hacker1, I was informed that this bug should be highlighted here upstream. Whilst the issue is nothing critical, it is after all more of a self XSS, the ability to inject XSS attacks within the Rails framework is concerning. At a later date a vulnerability may be dis...
¬ XSS within Route Error Page
https://api.github.com/repos/rails/rails/issues/46244/comments
5
2022-10-14T09:35:08Z
2023-01-12T19:03:07Z
https://github.com/rails/rails/issues/46244
1,409,061,823
46,244
4,302
CVE-2022-39364
2022-10-27T15:15:09.463
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. In Nextcloud Server prior to versions 23.0.9 and 24.0.5 and Nextcloud Enterprise Server prior to versions 22.2.10.5, 23.0.9, and 24.0.5 an attacker reading `nextcloud.log` may gain knowledge of credentials to connect to a S...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integri...
[ { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qpf5-jj85-36h5" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nextcloud:nextcloud_enterprise_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "45FEB84E-FFA7-4C0E-A6A9-6CEB64E1F315", "versionEndExcluding": "22.2.10.5", "versionEndIncluding": null, ...
[ "312" ]
312
https://github.com/nextcloud/sharepoint/issues/141
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nextcloud", "sharepoint" ]
### Steps to reproduce 1. install nextcloud/sharepoint app 2. create O365 OneDrive external storage, according to provided documentation at https://github.com/nextcloud/sharepoint#how-to-add-office-365-onedrive ### Expected behaviour connectivity to the (Sharepoint-based) O365 OneDrive share ### Actual behavio...
Unable to connect to 2FA-enabled O365 OneDrive
https://api.github.com/repos/nextcloud/sharepoint/issues/141/comments
2
2022-07-26T12:26:09Z
2022-07-26T17:37:05Z
https://github.com/nextcloud/sharepoint/issues/141
1,318,167,987
141
4,303
CVE-2022-43340
2022-10-27T20:15:34.503
A Cross-Site Request Forgery (CSRF) in dzzoffice 2.02.1_SC_UTF8 allows attackers to arbitrarily create user accounts and grant Administrator rights to regular users.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://dzzoffice.com" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/zyx0814/dzzoffice" }, { "source": "cve@mitre.org", "tags": [ "Exploit", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dzzoffice:dzzoffice:2.02.1:*:*:*:*:*:*:*", "matchCriteriaId": "0ECA901D-850D-468C-B516-01F29417313D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ "352" ]
352
https://github.com/zyx0814/dzzoffice/issues/223
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "zyx0814", "dzzoffice" ]
After log-in as an administrator,poc below opened in a new html will create a new user account: ``` <html> <body> <script>history.pushState('', '', '/')</script> <form action="http://127.0.0.1/admin.php?mod=orguser&op=edituser&inajax=1" method="POST"> <input type="hidden" name="accountadd" value="tr...
Multiple CSRF vulnerabilities occurred in dzzoffice2.02.1_SC_UTF8
https://api.github.com/repos/zyx0814/dzzoffice/issues/223/comments
0
2022-10-16T05:56:19Z
2022-10-16T05:56:19Z
https://github.com/zyx0814/dzzoffice/issues/223
1,410,383,860
223
4,304
CVE-2022-43164
2022-10-28T17:15:26.973
A stored cross-site scripting (XSS) vulnerability in the Global Lists feature (/index.php?module=global_lists/lists) of Rukovoditel v3.2.1 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter after clicking "Add".
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/rukovoditel/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF93014A-D2CB-48B2-AB57-692E95E5702D", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "79" ]
79
https://github.com/anhdq201/rukovoditel/issues/4
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "anhdq201", "rukovoditel" ]
# Version: 3.2.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Global Lists" feature. # Proof of Concept **Step 1:** Go to "/index.php?module=global_lists/lists", click "Add" and insert payload "`<img src=1 onerror='alert(document.coookie)'/>`" in Name fi...
Stored Cross Site Scripting Vulnerability on "Global Lists" in rukovoditel 3.2.1
https://api.github.com/repos/anhdq201/rukovoditel/issues/4/comments
1
2022-10-09T08:28:39Z
2022-11-01T16:40:12Z
https://github.com/anhdq201/rukovoditel/issues/4
1,402,198,049
4
4,305
CVE-2022-43165
2022-10-28T17:15:27.047
A stored cross-site scripting (XSS) vulnerability in the Global Variables feature (/index.php?module=global_vars/vars) of Rukovoditel v3.2.1 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Value parameter after clicking "Create".
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/rukovoditel/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF93014A-D2CB-48B2-AB57-692E95E5702D", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "79" ]
79
https://github.com/anhdq201/rukovoditel/issues/5
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "anhdq201", "rukovoditel" ]
# Version: 3.2.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Global Variables" feature. # Proof of Concept **Step 1:** Go to "/index.php?module=global_vars/vars", click "Create" and insert payload "`<img src=1 onerror='alert(document.coookie)'/>`" in Va...
Stored Cross Site Scripting Vulnerability on "Global Variables" in rukovoditel 3.2.1
https://api.github.com/repos/anhdq201/rukovoditel/issues/5/comments
1
2022-10-09T08:32:18Z
2022-11-01T16:41:04Z
https://github.com/anhdq201/rukovoditel/issues/5
1,402,198,998
5
4,306
CVE-2022-43166
2022-10-28T17:15:27.130
A stored cross-site scripting (XSS) vulnerability in the Global Entities feature (/index.php?module=entities/entities) of Rukovoditel v3.2.1 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter after clicking "Add New Entity".
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/rukovoditel/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF93014A-D2CB-48B2-AB57-692E95E5702D", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "79" ]
79
https://github.com/anhdq201/rukovoditel/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "anhdq201", "rukovoditel" ]
# Version: 3.2.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Entities List" feature. # Proof of Concept **Step 1:** Go to "/index.php?module=entities/entities", click "Add New Entity" and insert payload "`<img src=1 onerror='alert(document.coookie)'/>`"...
Stored Cross Site Scripting Vulnerability on "Entities List" in rukovoditel 3.2.1
https://api.github.com/repos/anhdq201/rukovoditel/issues/2/comments
1
2022-10-09T08:14:31Z
2022-11-01T16:42:21Z
https://github.com/anhdq201/rukovoditel/issues/2
1,402,194,331
2
4,307
CVE-2022-43167
2022-10-28T17:15:27.213
A stored cross-site scripting (XSS) vulnerability in the Users Alerts feature (/index.php?module=users_alerts/users_alerts) of Rukovoditel v3.2.1 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title parameter after clicking "Add".
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/rukovoditel/issues/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF93014A-D2CB-48B2-AB57-692E95E5702D", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "79" ]
79
https://github.com/anhdq201/rukovoditel/issues/7
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "anhdq201", "rukovoditel" ]
# Version: 3.2.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Users Alerts" feature. # Proof of Concept **Step 1:** Go to "/index.php?module=users_alerts/users_alerts", click "Add" and insert payload "`<img src=1 onerror='alert(document.coookie)'/>`" in ...
Stored Cross Site Scripting Vulnerability on "Users Alerts" in rukovoditel 3.2.1
https://api.github.com/repos/anhdq201/rukovoditel/issues/7/comments
1
2022-10-09T08:48:22Z
2022-11-02T04:55:34Z
https://github.com/anhdq201/rukovoditel/issues/7
1,402,202,901
7
4,308
CVE-2022-43168
2022-10-28T17:15:27.287
Rukovoditel v3.2.1 was discovered to contain a SQL injection vulnerability via the reports_id parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/rukovoditel/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF93014A-D2CB-48B2-AB57-692E95E5702D", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "89" ]
89
https://github.com/anhdq201/rukovoditel/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "anhdq201", "rukovoditel" ]
# Version: 3.2.1 # Description The reports_id parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the reports_id parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. # Proof of Concept **Step 1:**...
SQL injection Vulnerability on "reports_id" in rukovoditel 3.2.1
https://api.github.com/repos/anhdq201/rukovoditel/issues/1/comments
1
2022-10-08T16:41:48Z
2022-11-02T04:56:29Z
https://github.com/anhdq201/rukovoditel/issues/1
1,401,999,002
1
4,309
CVE-2022-43169
2022-10-28T17:15:27.360
A stored cross-site scripting (XSS) vulnerability in the Users Access Groups feature (/index.php?module=users_groups/users_groups) of Rukovoditel v3.2.1 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter after clicking "Add New Group".
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/rukovoditel/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF93014A-D2CB-48B2-AB57-692E95E5702D", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "79" ]
79
https://github.com/anhdq201/rukovoditel/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "anhdq201", "rukovoditel" ]
# Version: 3.2.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Users Access Groups" feature. # Proof of Concept **Step 1:** Go to "/index.php?module=users_groups/users_groups", click "Add New Group" and insert payload "`<img src=1 onerror='alert(document....
Stored Cross Site Scripting Vulnerability on "Users Access Groups" in rukovoditel 3.2.1
https://api.github.com/repos/anhdq201/rukovoditel/issues/3/comments
1
2022-10-09T08:18:05Z
2022-11-02T04:57:12Z
https://github.com/anhdq201/rukovoditel/issues/3
1,402,195,288
3
4,310
CVE-2022-43170
2022-10-28T17:15:27.443
A stored cross-site scripting (XSS) vulnerability in the Dashboard Configuration feature (index.php?module=dashboard_configure/index) of Rukovoditel v3.2.1 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title parameter after clicking "Add info block".
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/rukovoditel/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF93014A-D2CB-48B2-AB57-692E95E5702D", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "79" ]
79
https://github.com/anhdq201/rukovoditel/issues/6
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "anhdq201", "rukovoditel" ]
# Version: 3.2.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Dashboard Configuration" feature. # Proof of Concept **Step 1:** Go to "index.php?module=dashboard_configure/index", click "Add info block" and insert payload "`<img src=1 onerror='alert(docum...
Stored Cross Site Scripting Vulnerability on "Dashboard Configuration" in rukovoditel 3.2.1
https://api.github.com/repos/anhdq201/rukovoditel/issues/6/comments
1
2022-10-09T08:42:23Z
2022-11-02T04:58:19Z
https://github.com/anhdq201/rukovoditel/issues/6
1,402,201,334
6
4,311
CVE-2022-37621
2022-10-28T20:15:10.027
Prototype pollution vulnerability in function resolveShims in resolve-shims.js in thlorenz browserify-shim 3.8.15 via the fullPath variable in resolve-shims.js.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/thlorenz/browserify-shim/blob/464b32bbe142664cd9796059798f6c738ea3de8f/lib/resolve-shims.js#L158" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "ht...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:browserify-shim_project:browserify-shim:3.8.15:*:*:*:*:node.js:*:*", "matchCriteriaId": "6152AAB8-ED1B-4363-8A3B-2F1B0FAFD339", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "1321" ]
1321
https://github.com/thlorenz/browserify-shim/issues/247
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "thlorenz", "browserify-shim" ]
Prototype pollution vulnerability in function resolveShims in resolve-shims.js in thlorenz browserify-shim 3.8.15 via the fullPath variable in resolve-shims.js. The prototype pollution vulnerability can be mitigated with several best practices described here: [https://learn.snyk.io/lessons/prototype-pollution/javasc...
CVE-2022-37621/ Prototype pollution found in resolve-shims.js
https://api.github.com/repos/thlorenz/browserify-shim/issues/247/comments
3
2022-10-27T18:22:17Z
2022-11-09T15:21:20Z
https://github.com/thlorenz/browserify-shim/issues/247
1,426,089,595
247
4,312
CVE-2022-43280
2022-10-28T21:15:09.807
wasm-interp v1.0.29 was discovered to contain an out-of-bounds read via the component OnReturnCallExpr->GetReturnCallDropKeepCount.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/wabt/issues/1982" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:wabt:1.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "C524E018-FAA2-4A8D-B861-6ACE6A675FEC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "125" ]
125
https://github.com/WebAssembly/wabt/issues/1982
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "WebAssembly", "wabt" ]
### Environment ``` OS : Linux ubuntu 5.15.0-46-generic #49~20.04.1-Ubuntu SMP Thu Aug 4 19:15:44 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : 3054d61f703d609995798f872fc86b462617c294 Version : 1.0.29 Build : make clang-debug-asan ``` ### Proof of concept poc-interp-2.wasm [poc-interp-2.wasm.zip]...
Out-of-bound read in OnReturnCallExpr->GetReturnCallDropKeepCount
https://api.github.com/repos/WebAssembly/wabt/issues/1982/comments
1
2022-09-05T12:50:49Z
2022-09-17T19:13:47Z
https://github.com/WebAssembly/wabt/issues/1982
1,361,906,900
1,982
4,313
CVE-2022-43281
2022-10-28T21:15:09.883
wasm-interp v1.0.29 was discovered to contain a heap overflow via the component std::vector<wabt::Type, std::allocator<wabt::Type>>::size() at /bits/stl_vector.h.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/wabt/issues/1981" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:wasm:1.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "FC0B0732-FA64-456C-9C9E-FC4F182BEEB1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/WebAssembly/wabt/issues/1981
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "WebAssembly", "wabt" ]
### Environment ``` OS : Linux ubuntu 5.15.0-46-generic #49~20.04.1-Ubuntu SMP Thu Aug 4 19:15:44 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : 3054d61f703d609995798f872fc86b462617c294 Version : 1.0.29 Build : make clang-debug-asan ``` ### Proof of concept poc-interp-1.wasm [poc-interp-1.wasm....
heap overflow in wasm-interp
https://api.github.com/repos/WebAssembly/wabt/issues/1981/comments
1
2022-09-05T12:50:09Z
2022-09-17T19:11:15Z
https://github.com/WebAssembly/wabt/issues/1981
1,361,905,751
1,981
4,314
CVE-2022-43282
2022-10-28T21:15:09.940
wasm-interp v1.0.29 was discovered to contain an out-of-bounds read via the component OnReturnCallIndirectExpr->GetReturnCallDropKeepCount.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/wabt/issues/1983" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:wabt:1.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "C524E018-FAA2-4A8D-B861-6ACE6A675FEC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "125" ]
125
https://github.com/WebAssembly/wabt/issues/1983
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "WebAssembly", "wabt" ]
### Environment ``` OS : Linux ubuntu 5.15.0-46-generic #49~20.04.1-Ubuntu SMP Thu Aug 4 19:15:44 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : 3054d61f703d609995798f872fc86b462617c294 Version : 1.0.29 Build : make clang-debug-asan ``` ### Proof of concept poc-interp-3.wasm [poc-interp-3.wasm.zip]...
Out-of-bound read in OnReturnCallIndirectExpr->GetReturnCallDropKeepCount
https://api.github.com/repos/WebAssembly/wabt/issues/1983/comments
1
2022-09-05T12:51:24Z
2022-09-17T19:15:54Z
https://github.com/WebAssembly/wabt/issues/1983
1,361,907,936
1,983
4,315
CVE-2022-43283
2022-10-28T21:15:10.007
wasm2c v1.0.29 was discovered to contain an abort in CWriter::Write.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/wabt/issues/1985" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:wabt:1.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "C524E018-FAA2-4A8D-B861-6ACE6A675FEC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "434" ]
434
https://github.com/WebAssembly/wabt/issues/1985
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "WebAssembly", "wabt" ]
### Environment ``` OS : Linux ubuntu 5.15.0-46-generic #49~20.04.1-Ubuntu SMP Thu Aug 4 19:15:44 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : 3054d61f703d609995798f872fc86b462617c294 Version : 1.0.29 Build : make clang-debug-asan ``` ### Proof of concept poc_wasm2c-1.wasm [poc_wasm2c-1.wasm.zip]...
Aborted in CWriter::Write at wasm2c
https://api.github.com/repos/WebAssembly/wabt/issues/1985/comments
1
2022-09-05T12:58:25Z
2022-10-03T06:27:37Z
https://github.com/WebAssembly/wabt/issues/1985
1,361,920,430
1,985
4,316
CVE-2022-43286
2022-10-28T21:15:10.213
Nginx NJS v0.7.2 was discovered to contain a heap-use-after-free bug caused by illegal memory copy in the function njs_json_parse_iterator_call at njs_json.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/commit/2ad0ea24a58d570634e09c2e58c3b314505eaa6a" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "C1858598-78C6-451F-81B4-57F6D636EBAC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nul...
[ "416" ]
416
https://github.com/nginx/njs/issues/480
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
### Environment ``` OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : f65981b0b8fcf02d69a40bc934803c25c9f607ab Version : 0.7.2 Build : NJS_CFLAGS="$NJS_CFLAGS -fsanitize=address" NJS_CFLAGS="$NJS_CFLAGS -...
illegal memory copy in njs_json_parse_iterator_call of njs_json.c:1008
https://api.github.com/repos/nginx/njs/issues/480/comments
0
2022-03-02T11:45:19Z
2022-05-04T23:59:07Z
https://github.com/nginx/njs/issues/480
1,157,082,696
480
4,317
CVE-2022-44019
2022-10-30T00:15:10.070
In Total.js 4 before 0e5ace7, /api/common/ping can achieve remote command execution via shell metacharacters in the host parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/totaljs/code/issues/12" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.edoard...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:totaljs:total.js:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "DE18E8B0-9769-47AC-ADE0-0D4B9E0C6508", "versionEndExcluding": "2022-09-26", "versionEndIncluding": null, "version...
[ "78" ]
78
https://github.com/totaljs/code/issues/12
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "totaljs", "code" ]
Using the API `/api/common/ping` it's possible to achieve remote command execution on the host machine. This leads to complete control over the machine hosting the server. To reproduce the vulnerability: - Download the repo - Execute `node index.js` - Login - Execute this request as shown below: ![Scr...
[Security] Remote command execution
https://api.github.com/repos/totaljs/code/issues/12/comments
6
2022-09-22T09:44:44Z
2025-03-12T09:27:46Z
https://github.com/totaljs/code/issues/12
1,382,153,683
12
4,318
CVE-2022-44022
2022-10-30T00:15:10.197
PwnDoc through 0.5.3 might allow remote attackers to identify valid user account names by leveraging response timings for authentication attempts.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://cve.nstsec.com/cve-2022-44022" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pwndoc/pwndoc/issues/381" }, { "source": "af...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pwndoc_project:pwndoc:*:*:*:*:*:*:*:*", "matchCriteriaId": "84379E02-9EB4-4FA1-8341-3CF6ECFC3903", "versionEndExcluding": null, "versionEndIncluding": "0.5.3", "versionStartE...
[ "307" ]
307
https://github.com/pwndoc/pwndoc/issues/381
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pwndoc", "pwndoc" ]
It is possible to enumerate users registered in PwnDoc (tested on 0.5.3 - 2022-07-19 and previous versions) observing the web server response timing. For example, let's suppose these users were registered on PwnDoc: ![Schermata del 2022-10-06 23-22-56](https://user-images.githubusercontent.com/43656486/194424548-06...
(Vulnerability) Username enumeration via response timing
https://api.github.com/repos/pwndoc/pwndoc/issues/381/comments
2
2022-10-24T16:14:00Z
2023-03-08T14:32:46Z
https://github.com/pwndoc/pwndoc/issues/381
1,421,083,032
381
4,319
CVE-2022-44023
2022-10-30T00:15:10.253
PwnDoc through 0.5.3 might allow remote attackers to identify disabled user account names by leveraging response messages for authentication attempts.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://cve.nstsec.com/cve-2022-44023" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pwndoc/pwndoc/issues/382" }, { "source": "af...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pwndoc_project:pwndoc:*:*:*:*:*:*:*:*", "matchCriteriaId": "84379E02-9EB4-4FA1-8341-3CF6ECFC3903", "versionEndExcluding": null, "versionEndIncluding": "0.5.3", "versionStartE...
[ "307" ]
307
https://github.com/pwndoc/pwndoc/issues/382
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pwndoc", "pwndoc" ]
It is possible to enumerate "disabled account" usernames in PwnDoc (tested on 0.5.3 - 2022-07-19) observing the web server responses to login requests. For example, let's suppose these users were registered on PwnDoc and then disabled: ![Schermata del 2022-10-06 23-02-22](https://user-images.githubusercontent.com/4...
(Vulnerability) Disabled user account enumeration via different responses
https://api.github.com/repos/pwndoc/pwndoc/issues/382/comments
2
2022-10-24T16:34:41Z
2023-03-08T14:33:01Z
https://github.com/pwndoc/pwndoc/issues/382
1,421,108,528
382
4,320
CVE-2022-37620
2022-10-31T12:15:10.137
A Regular Expression Denial of Service (ReDoS) flaw was found in kangax html-minifier 4.0.0 via the candidate variable in htmlminifier.js.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/kangax/html-minifier/blob/51ce10f4daedb1de483ffbcccecc41be1c873da2/src/htmlminifier.js#L1338" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/kangax/html-m...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:html-minifier_project:html-minifier:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6CB8D90A-F60B-41DC-9A35-ED4FA773C595", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "1333" ]
1333
https://github.com/kangax/html-minifier/issues/1135
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kangax", "html-minifier" ]
A Regular Expression Denial of Service (ReDoS) flaw was found in kangax html-minifier 4.0.0 via the candidate variable in htmlminifier.js. The ReDoS vulnerability can be mitigated with several best practices described here: [https://snyk.io/blog/redos-and-catastrophic-backtracking/]
CVE-2022-37620/ ReDoS found in htmlminifier.js
https://api.github.com/repos/kangax/html-minifier/issues/1135/comments
26
2022-10-27T18:19:19Z
2025-06-07T13:00:33Z
https://github.com/kangax/html-minifier/issues/1135
1,426,086,378
1,135
4,321
CVE-2022-37623
2022-10-31T12:15:10.190
Prototype pollution vulnerability in function resolveShims in resolve-shims.js in thlorenz browserify-shim 3.8.15 via the shimPath variable in resolve-shims.js.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/thlorenz/browserify-shim/blob/464b32bbe142664cd9796059798f6c738ea3de8f/lib/resolve-shims.js#L158" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Par...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:browserify-shim_project:browserify-shim:3.8.15:*:*:*:*:*:*:*", "matchCriteriaId": "DEE6BD7C-D48B-4D54-8F00-76BC34532843", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "1321" ]
1321
https://github.com/thlorenz/browserify-shim/issues/248
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "thlorenz", "browserify-shim" ]
Prototype pollution vulnerability in function resolveShims in resolve-shims.js in thlorenz browserify-shim 3.8.15 via the shimPath variable in resolve-shims.js The prototype pollution vulnerability can be mitigated with several best practices described here: [https://learn.snyk.io/lessons/prototype-pollution/javascr...
CVE-2022-37623 / Prototype pollution vulnerability found in resolve-shims.js
https://api.github.com/repos/thlorenz/browserify-shim/issues/248/comments
1
2022-10-27T18:32:14Z
2022-10-27T20:06:27Z
https://github.com/thlorenz/browserify-shim/issues/248
1,426,102,532
248
4,322
CVE-2022-43148
2022-10-31T19:15:10.713
rtf2html v0.2.0 was discovered to contain a heap overflow in the component /rtf2html/./rtf_tools.h.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/lvu/rtf2html/issues/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rtf2html_project:rtf2html:0.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "35B86EF5-B49A-4C35-9A70-7B658FF192FF", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "787" ]
787
https://github.com/lvu/rtf2html/issues/11
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "lvu", "rtf2html" ]
### Version hjsz@hjsz:~/rtf2html$ ./rtf2html -v rtf2html version 0.2.0 ### Command ./rtf2html <input file> <output file> ### Crash output #### Crash1: heap-buffer-overflow ================================================================= ==3467450==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6300...
Some crashes occur when fuzzing rtf2html.
https://api.github.com/repos/lvu/rtf2html/issues/11/comments
0
2022-10-09T07:01:53Z
2022-10-09T07:01:53Z
https://github.com/lvu/rtf2html/issues/11
1,402,176,814
11
4,323
CVE-2022-43151
2022-10-31T19:15:10.777
timg v1.4.4 was discovered to contain a memory leak via the function timg::QueryBackgroundColor() at /timg/src/term-query.cc.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/hzeller/timg/issues/92" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hzeller:timg:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "B66C5A53-41E5-4F12-BE9D-2481F74F42ED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "401" ]
401
https://github.com/hzeller/timg/issues/92
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "hzeller", "timg" ]
### Version timg v1.4.4 afl-clang afl-clang++ ### Description ================================================================= ==15159==ERROR: LeakSanitizer: detected memory leaks Direct leak of 8 byte(s) in 1 object(s) allocated from: #0 0x485b14 in strdup (/home/hjsz/fuzz_software/timg/build/src/timg+0...
Detected memory leaks 16 byte(s) leaked in 2 allocation(s)
https://api.github.com/repos/hzeller/timg/issues/92/comments
3
2022-10-14T07:44:13Z
2022-11-14T18:21:22Z
https://github.com/hzeller/timg/issues/92
1,408,920,106
92
4,324
CVE-2022-43152
2022-10-31T19:15:10.833
tsMuxer v2.6.16 was discovered to contain a heap overflow via the function BitStreamWriter::flushBits() at /tsMuxer/bitStream.h.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/issues/641" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tsmuxer_project:tsmuxer:2.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "D9880E94-9CCB-4A6A-97BA-B6DDEB30C0B9", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "787" ]
787
https://github.com/justdan96/tsMuxer/issues/641
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "justdan96", "tsMuxer" ]
### Version tsMuxeR version 2.6.16-dev. github.com/justdan96/tsMuxer [https://github.com/justdan96/tsMuxer/commit/fc36229b007d476437271e03e5297b0f04f61ed6](commit) ### Description ### Crash1 ================================================================ ==1445939==ERROR: AddressSanitizer: heap-buffer-overflow...
Heap-buffer-overflow in /fuzz_software/tsMuxer-master/tsMuxer/bitStream.h:224:37 in BitStreamWriter::flushBits() and BitStreamReader::getCurVal
https://api.github.com/repos/justdan96/tsMuxer/issues/641/comments
5
2022-10-15T06:02:28Z
2022-10-23T12:55:23Z
https://github.com/justdan96/tsMuxer/issues/641
1,410,059,927
641
4,325
CVE-2022-44079
2022-10-31T19:15:10.917
pycdc commit 44a730f3a889503014fec94ae6e62d8401cb75e5 was discovered to contain a stack overflow via the component __sanitizer::StackDepotBase<__sanitizer::StackDepotNode.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zrax/pycdc/issues/291" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pycdc_project:pycdc:2022-10-04:*:*:*:*:*:*:*", "matchCriteriaId": "F4CA3FCC-41DA-459F-99CB-29AFF37C35DE", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "787" ]
787
https://github.com/zrax/pycdc/issues/291
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "zrax", "pycdc" ]
### Version Info Pycdc latest commit [https://github.com/zrax/pycdc/commit/44a730f3a889503014fec94ae6e62d8401cb75e5](url) ### Command ./pycdas ./POC ### Crash output AddressSanitizer:DEADLYSIGNAL ================================================================= ==2840==ERROR: AddressSanitizer: stack-overflow on ...
Stack-overflow occurred in operator new(unsigned long) of pyc_object.cpp.
https://api.github.com/repos/zrax/pycdc/issues/291/comments
0
2022-10-18T01:34:18Z
2022-10-18T01:34:18Z
https://github.com/zrax/pycdc/issues/291
1,412,442,130
291
4,326
CVE-2022-44081
2022-10-31T19:15:10.973
Lodepng v20220717 was discovered to contain a segmentation fault via the function pngdetail.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/lvandeve/lodepng/issues/177" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lodev:lodepng:2022-07-17:*:*:*:*:*:*:*", "matchCriteriaId": "8DA67E84-E5E6-49C5-A66C-A12807444F49", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "125" ]
125
https://github.com/lvandeve/lodepng/issues/177
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "lvandeve", "lodepng" ]
### Version pngdetail by Lode Vandevenne version: 20220717 ### Command ./pngdetail @@ ### Crash Output ##### AddressSanitizer:DEADLYSIGNAL ================================================================= ==2262494==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000003 (pc 0x0000004f43b4 bp 0x00000000...
SEGV on unknown address in function pngdetail.
https://api.github.com/repos/lvandeve/lodepng/issues/177/comments
2
2022-10-22T01:16:12Z
2022-11-08T20:14:38Z
https://github.com/lvandeve/lodepng/issues/177
1,419,015,662
177
4,327
CVE-2022-3783
2022-10-31T21:15:12.413
A vulnerability, which was classified as problematic, has been found in node-red-dashboard. This issue affects some unknown processing of the file components/ui-component/ui-component-ctrl.js of the component ui_text Format Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. T...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integri...
[ { "source": "cna@vuldb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/node-red/node-red-dashboard/commit/9305d1a82f19b235dfad24a7d1dd4ed244db7743" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nodered:node-red-dashboard:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3BED8AC-2ECA-409C-955E-83D046AE1733", "versionEndExcluding": "3.2.0", "versionEndIncluding": null, "versionS...
[ "79" ]
79
https://github.com/node-red/node-red-dashboard/issues/772
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "node-red", "node-red-dashboard" ]
<!-- ## Before you hit that Submit button.... This issue tracker is for problems with the Node-RED-Dashboard only. If your issue is: - a general 'how-to' type question, - a feature request or suggestion for a change please use the Dashboard category in the [Node-RED Forum](https://discourse.nodered.org)...
User can inject JavaScript code into the text node which can cause security issues( Cross-Site Scripting)
https://api.github.com/repos/node-red/node-red-dashboard/issues/772/comments
0
2022-08-05T08:01:20Z
2022-09-09T09:50:30Z
https://github.com/node-red/node-red-dashboard/issues/772
1,329,592,722
772
4,328
CVE-2022-3784
2022-10-31T21:15:12.497
A vulnerability classified as critical was found in Axiomatic Bento4 5e7bb34. Affected by this vulnerability is the function AP4_Mp4AudioDsiParser::ReadBits of the file Ap4Mp4AudioInfo.cpp of the component mp4hls. The manipulation leads to heap-based buffer overflow. The attack can be launched remotely. The exploit has...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integr...
[ { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/files/9849116/mp42hls_ReadBits_Ap4Mp4AudioInfo66.zip" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "787" ]
787
https://github.com/axiomatic-systems/Bento4/issues/806
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, there. There is an heap overflow in ReadBits, Ap4Mp4AudioInfo.cpp:66, in the newest master branch 5e7bb34a08272c49242196eba1cefab8af55f381, which seems to be incomplete fix of issue #194. Here is the reproducing command: ~~~~ mp42hls poc ~~~~ POC: [mp42hls_ReadBits_Ap4Mp4AudioInfo66.zip](https://git...
Heap overflow in mp4hls, ReadBits, Ap4Mp4AudioInfo.cpp:66
https://api.github.com/repos/axiomatic-systems/Bento4/issues/806/comments
0
2022-10-24T06:03:44Z
2023-05-29T02:38:17Z
https://github.com/axiomatic-systems/Bento4/issues/806
1,420,268,717
806
4,329
CVE-2022-3785
2022-10-31T21:15:12.577
A vulnerability, which was classified as critical, has been found in Axiomatic Bento4. Affected by this issue is the function AP4_DataBuffer::SetDataSize of the component Avcinfo. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and ...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integr...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/files/9658653/POC_avcinfo_15644345.zip" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "h...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "787" ]
787
https://github.com/axiomatic-systems/Bento4/issues/780
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# Summary Hi, developers of Bento4: I tested the binary Avcinfo with my fuzzer, and a crash incurred—heap-buffer-overflow. The following is the details. I think this error is different from both #731 and #610. # Bug Detected heap-buffer-overflow in Avcinfo. ``` root@4w41awdas71:/# ./Bento4/cmakebuild/avcinfo ...
A heap-buffer-overflow in Avcinfo
https://api.github.com/repos/axiomatic-systems/Bento4/issues/780/comments
3
2022-09-27T18:09:33Z
2023-05-29T02:51:16Z
https://github.com/axiomatic-systems/Bento4/issues/780
1,388,166,902
780
4,330
CVE-2022-3798
2022-11-01T16:15:13.820
A vulnerability classified as critical has been found in IBAX go-ibax. Affected is an unknown function of the file /api/v2/open/tablesInfo. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-212634 is the identifier as...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integr...
[ { "source": "cna@vuldb.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/IBAX-io/go-ibax/issues/2060" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.212634" }, { "sou...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibax:go-ibax:-:*:*:*:*:*:*:*", "matchCriteriaId": "48416D6D-12DB-4BAB-A433-DE588E0EDEB2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": n...
[ "89" ]
89
https://github.com/IBAX-io/go-ibax/issues/2060
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "IBAX-io", "go-ibax" ]
### Describe the bug There are two SQL injection vulnerabilities ## First place file: https://github.com/IBAX-io/go-ibax/blob/6bac7462801b5e6da47f1231681bb1516a7dd4bb/packages/api/database.go#L92 ``` go query := fmt.Sprintf("SELECT tablename from pg_tables where schemaname ='public' and tablename like %s ord...
SQL Injection vulnerabilities
https://api.github.com/repos/IBAX-io/go-ibax/issues/2060/comments
1
2022-10-18T06:52:41Z
2022-12-02T08:47:05Z
https://github.com/IBAX-io/go-ibax/issues/2060
1,412,668,683
2,060
4,331
CVE-2022-3800
2022-11-01T16:15:13.977
A vulnerability, which was classified as critical, has been found in IBAX go-ibax. Affected by this issue is some unknown functionality of the file /api/v2/open/rowsInfo. The manipulation of the argument table_name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integr...
[ { "source": "cna@vuldb.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/IBAX-io/go-ibax/issues/2061" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.212636" }, { "sou...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibax:go-ibax:-:*:*:*:*:*:*:*", "matchCriteriaId": "48416D6D-12DB-4BAB-A433-DE588E0EDEB2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": n...
[ "89" ]
89
https://github.com/IBAX-io/go-ibax/issues/2061
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "IBAX-io", "go-ibax" ]
### Describe the bug SQL Injection vulnerability in /packages/api/database.go of go-ibax via table_name parameter allows attacker to spoof identity, tamper with existing data, allow the complete disclosure of all data on the system, destroy the data or make it otherwise unavailable, and become administrators of the ...
SQL injection vulnerability via table_name parameter
https://api.github.com/repos/IBAX-io/go-ibax/issues/2061/comments
0
2022-10-24T13:50:05Z
2022-10-24T14:01:16Z
https://github.com/IBAX-io/go-ibax/issues/2061
1,420,866,314
2,061
4,332
CVE-2022-3801
2022-11-01T16:15:14.057
A vulnerability, which was classified as critical, was found in IBAX go-ibax. This affects an unknown part of the file /api/v2/open/rowsInfo. The manipulation of the argument order leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The i...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integr...
[ { "source": "cna@vuldb.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/IBAX-io/go-ibax/issues/2062" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.212637" }, { "sou...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibax:go-ibax:-:*:*:*:*:*:*:*", "matchCriteriaId": "48416D6D-12DB-4BAB-A433-DE588E0EDEB2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": n...
[ "89" ]
89
https://github.com/IBAX-io/go-ibax/issues/2062
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "IBAX-io", "go-ibax" ]
### Describe the bug SQL Injection vulnerability in /packages/api/database.go of go-ibax via order parameter allows attacker to spoof identity, tamper with existing data, allow the complete disclosure of all data on the system, destroy the data or make it otherwise unavailable, and become administrators of the datab...
SQL injection vulnerability via order parameter
https://api.github.com/repos/IBAX-io/go-ibax/issues/2062/comments
0
2022-10-24T13:55:09Z
2022-10-24T14:01:06Z
https://github.com/IBAX-io/go-ibax/issues/2062
1,420,876,320
2,062
4,333
CVE-2022-3802
2022-11-01T16:15:14.137
A vulnerability has been found in IBAX go-ibax and classified as critical. This vulnerability affects unknown code of the file /api/v2/open/rowsInfo. The manipulation of the argument where leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-212...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integr...
[ { "source": "cna@vuldb.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/IBAX-io/go-ibax/issues/2063" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.212638" }, { "sou...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibax:go-ibax:-:*:*:*:*:*:*:*", "matchCriteriaId": "48416D6D-12DB-4BAB-A433-DE588E0EDEB2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": n...
[ "89" ]
89
https://github.com/IBAX-io/go-ibax/issues/2063
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "IBAX-io", "go-ibax" ]
### Describe the bug SQL Injection vulnerability in /packages/api/database.go of go-ibax via where parameter allows attacker to spoof identity, tamper with existing data, allow the complete disclosure of all data on the system, destroy the data or make it otherwise unavailable, and become administrators of the datab...
SQL injection vulnerability via where parameter
https://api.github.com/repos/IBAX-io/go-ibax/issues/2063/comments
1
2022-10-24T14:00:35Z
2022-12-02T09:43:19Z
https://github.com/IBAX-io/go-ibax/issues/2063
1,420,884,385
2,063
4,334
CVE-2022-43361
2022-11-01T19:15:11.450
Senayan Library Management System v9.4.2 was discovered to contain a cross-site scripting (XSS) vulnerability via the component pop_chart.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/slims/slims9_bulian/issues/162" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thir...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:slims:senayan_library_management_system:9.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "EDC3FA43-9AED-4115-B41B-61587D7D784F", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "79" ]
79
https://github.com/slims/slims9_bulian/issues/162
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "slims", "slims9_bulian" ]
**Describe the bug** A Cross site scripting due to unfiltered `$_GET['filter']` **To Reproduce** Steps to reproduce the behavior: 1. Log in as Admin 2. Go to http://localhost/admin/modules/reporting/pop_chart.php?filter=2022%20%27<script>alert(%270xdc9%27);</script> 3. There should be a pop that says '0xdc9...
[Security Bug] XSS in pop_chart.php
https://api.github.com/repos/slims/slims9_bulian/issues/162/comments
0
2022-10-16T08:51:31Z
2022-11-24T07:55:09Z
https://github.com/slims/slims9_bulian/issues/162
1,410,420,838
162
4,335
CVE-2022-43362
2022-11-01T19:15:11.503
Senayan Library Management System v9.4.2 was discovered to contain a SQL injection vulnerability via the collType parameter at loan_by_class.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/slims/slims9_bulian/issues/163" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thir...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:slims:senayan_library_management_system:9.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "EDC3FA43-9AED-4115-B41B-61587D7D784F", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/slims/slims9_bulian/issues/163
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "slims", "slims9_bulian" ]
**Describe the bug** An unsanitized collType parameter can be used to perform bloolean base blind SQL Injection attack **To Reproduce** 1. Log in as admin 2. go to http://localhost/admin/modules/reporting/customs/loan_by_class.php?reportView=true&year=2002&class=bbbb&membershipType=a&collType=aaaa 3. capture the...
[Security Bug] Boolean SQL Injection in loan_by_class.php
https://api.github.com/repos/slims/slims9_bulian/issues/163/comments
0
2022-10-16T14:33:45Z
2022-11-24T07:55:41Z
https://github.com/slims/slims9_bulian/issues/163
1,410,507,872
163
4,336
CVE-2022-3807
2022-11-01T20:15:22.120
A vulnerability was found in Axiomatic Bento4. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Incomplete Fix CVE-2019-13238. The manipulation leads to resource consumption. The attack may be launched remotely. The exploit has been disclosed to the public and may ...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/files/9820612/mp42aac_exhaustive_AP4_RtpAtom50.zip" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9F13899-4DE7-4BC0-8E7F-8795F58AA99F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding":...
[ "252" ]
252
https://github.com/axiomatic-systems/Bento4/issues/803
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
A memory allocation failure unhandled in Ap4RtpAtom.cpp and leads to crashes. This seems to be an incomplete fix of issue #396, CVE-2019-13238. `./mp42aac input_file /dev/null` In file Source/C++/Core/Ap4RtpAtom.cpp <img width="929" alt="image" src="https://user-images.githubusercontent.com/7632714/196694985-02c...
Incomplete fix of CVE-2019-13238, Exhaustive memory misunhandle
https://api.github.com/repos/axiomatic-systems/Bento4/issues/803/comments
0
2022-10-19T12:55:56Z
2022-10-19T12:55:56Z
https://github.com/axiomatic-systems/Bento4/issues/803
1,414,926,196
803
4,337
CVE-2022-3812
2022-11-01T22:15:12.027
A vulnerability was found in Axiomatic Bento4. It has been rated as problematic. Affected by this issue is the function AP4_ContainerAtom::AP4_ContainerAtom of the component mp4encrypt. The manipulation leads to memory leak. The attack may be launched remotely. The exploit has been disclosed to the public and may be us...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/files/9726934/POC_mp4encrypt_631000973.zip" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "401" ]
401
https://github.com/axiomatic-systems/Bento4/issues/792
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# **Summary** Hi, developers of Bento4, I tested the binary of bento4 with my fuzzer, and some memory-leak crashes incurred. Among them, Bug3-5 may be different from #771. The operation system is Ubuntu 18.04.6 LTS (docker), these crashes with the following. # **Bug1** Detected memory leaks in mp4encrypt, the bug...
Some Memory leaks exist in mp4xx
https://api.github.com/repos/axiomatic-systems/Bento4/issues/792/comments
0
2022-10-06T17:14:56Z
2023-06-26T05:55:54Z
https://github.com/axiomatic-systems/Bento4/issues/792
1,400,040,986
792
4,338
CVE-2021-37789
2022-11-02T13:15:10.037
stb_image.h 2.27 has a heap-based buffer over in stbi__jpeg_load, leading to Information Disclosure or Denial of Service.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/1178" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lis...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stb_project:stb:2.27:*:*:*:*:*:*:*", "matchCriteriaId": "4EE9CD8E-67B3-4D15-A7D3-FD54FEE21B79", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "787" ]
787
https://github.com/nothings/stb/issues/1178
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
[poc.zip](https://github.com/nothings/stb/files/6861922/poc.zip) I find heap-buffer-overflow in stbi__jpeg_load with lastest version: 2.27 `clang test.cpp -fsanitize=address -o test` ` ./test poc.jpg` ASAN log: ```================================================================= ==11092==ERROR: AddressSanitizer...
heap-buffer-overflow in stbi__jpeg_load
https://api.github.com/repos/nothings/stb/issues/1178/comments
2
2021-07-22T11:46:46Z
2023-01-22T23:03:31Z
https://github.com/nothings/stb/issues/1178
950,573,228
1,178
4,339
CVE-2022-43235
2022-11-02T14:15:12.197
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via ff_hevc_put_hevc_epel_pixels_8_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/337" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/strukturag/libde265/issues/337
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Heap-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x262cc1) in ff_hevc_put_hevc_epel_pixels_8_sse(short*, long, unsigned char const*, long, int, int, int, int, short*) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofile.bin The vi...
Heap-buffer-overflow in sse-motion.cc: ff_hevc_put_hevc_epel_pixels_8_sse
https://api.github.com/repos/strukturag/libde265/issues/337/comments
5
2022-10-10T14:26:02Z
2023-07-23T16:03:46Z
https://github.com/strukturag/libde265/issues/337
1,403,267,152
337
4,340
CVE-2022-43236
2022-11-02T14:15:12.607
Libde265 v1.0.8 was discovered to contain a stack-buffer-overflow vulnerability via put_qpel_fallback<unsigned short> in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/343" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/strukturag/libde265/issues/343
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Stack-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x14bef2) in void put_qpel_fallback<unsigned short>(short*, long, unsigned short const*, long, int, int, short*, int, int, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofile....
Stack-buffer-overflow in fallback-motion.cc: void put_qpel_fallback<unsigned short>
https://api.github.com/repos/strukturag/libde265/issues/343/comments
2
2022-10-10T15:01:43Z
2023-01-24T16:05:16Z
https://github.com/strukturag/libde265/issues/343
1,403,319,141
343
4,341
CVE-2022-43237
2022-11-02T14:15:12.827
Libde265 v1.0.8 was discovered to contain a stack-buffer-overflow vulnerability via void put_epel_hv_fallback<unsigned short> in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/344" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/strukturag/libde265/issues/344
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Stack-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x148bb1) in void put_epel_hv_fallback<unsigned short>(short*, long, unsigned short const*, long, int, int, int, int, short*, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofi...
Stack-buffer-overflow in fallback-motion.cc: void put_epel_hv_fallback<unsigned short>
https://api.github.com/repos/strukturag/libde265/issues/344/comments
2
2022-10-10T15:06:43Z
2023-01-24T16:05:06Z
https://github.com/strukturag/libde265/issues/344
1,403,327,299
344
4,342
CVE-2022-43239
2022-11-02T14:15:13.140
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via mc_chroma<unsigned short> in motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/341" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/strukturag/libde265/issues/341
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Heap-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x178e82) in void mc_chroma<unsigned short>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned short const*, int, int, int, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 ------------...
Heap-buffer-overflow in motion.cc: mc_chroma<unsigned short>
https://api.github.com/repos/strukturag/libde265/issues/341/comments
2
2022-10-10T14:44:20Z
2023-01-24T16:05:35Z
https://github.com/strukturag/libde265/issues/341
1,403,293,231
341
4,343
CVE-2022-43240
2022-11-02T14:15:13.313
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via ff_hevc_put_hevc_qpel_h_2_v_1_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/335" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/strukturag/libde265/issues/335
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Heap-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x2831a1) in ff_hevc_put_hevc_qpel_h_2_v_1_sse(short*, long, unsigned char const*, long, int, int, short*) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofile.bin The video file mu...
Heap-buffer-overflow in sse-motion.cc: ff_hevc_put_hevc_qpel_h_2_v_1_sse
https://api.github.com/repos/strukturag/libde265/issues/335/comments
2
2022-10-10T13:44:54Z
2023-01-24T16:06:27Z
https://github.com/strukturag/libde265/issues/335
1,403,205,674
335
4,344
CVE-2022-43241
2022-11-02T14:15:13.517
Libde265 v1.0.8 was discovered to contain an unknown crash via ff_hevc_put_hevc_qpel_v_3_8_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/338" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/strukturag/libde265/issues/338
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Unknown-crash (/libde265/build/libde265/liblibde265.so+0x27a238) in ff_hevc_put_hevc_qpel_v_3_8_sse(short*, long, unsigned char const*, long, int, int, short*) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofile.bin The video file must be a r...
Crash in see-motion.cc: ff_hevc_put_hevc_qpel_v_3_8_sse
https://api.github.com/repos/strukturag/libde265/issues/338/comments
2
2022-10-10T14:34:34Z
2023-01-24T16:06:05Z
https://github.com/strukturag/libde265/issues/338
1,403,279,658
338
4,345
CVE-2022-43242
2022-11-02T14:15:13.637
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via mc_luma<unsigned char> in motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/340" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/strukturag/libde265/issues/340
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Heap-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x1787af) in void mc_luma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- ...
Heap-buffer-overflow in motion.cc: mc_luma<unsigned char>
https://api.github.com/repos/strukturag/libde265/issues/340/comments
2
2022-10-10T14:40:58Z
2023-01-24T16:05:44Z
https://github.com/strukturag/libde265/issues/340
1,403,288,592
340
4,346
CVE-2022-43243
2022-11-02T14:15:13.797
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via ff_hevc_put_weighted_pred_avg_8_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/339" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/strukturag/libde265/issues/339
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Heap-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x25f5ed) in ff_hevc_put_weighted_pred_avg_8_sse(unsigned char*, long, short const*, short const*, long, int, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofile.bin The video...
Heap-buffer-overflow in sse-motion.cc: ff_hevc_put_weighted_pred_avg_8_sse
https://api.github.com/repos/strukturag/libde265/issues/339/comments
2
2022-10-10T14:36:46Z
2023-01-24T16:05:54Z
https://github.com/strukturag/libde265/issues/339
1,403,282,810
339
4,347
CVE-2022-43244
2022-11-02T14:15:13.967
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via put_qpel_fallback<unsigned short> in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/342" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/strukturag/libde265/issues/342
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Heap-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x14b860) in void put_qpel_fallback<unsigned short>(short*, long, unsigned short const*, long, int, int, short*, int, int, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofile.b...
Heap-buffer-overflow in fallback-motion.cc: in void put_qpel_fallback<unsigned short>
https://api.github.com/repos/strukturag/libde265/issues/342/comments
2
2022-10-10T14:58:45Z
2023-01-24T16:05:26Z
https://github.com/strukturag/libde265/issues/342
1,403,314,932
342
4,348
CVE-2022-43248
2022-11-02T14:15:14.393
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via put_weighted_pred_avg_16_fallback in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/349" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/strukturag/libde265/issues/349
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Heap-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x146253) in put_weighted_pred_avg_16_fallback(unsigned short*, long, short const*, short const*, long, int, int, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofile.bin The v...
Heap-buffer-overflow in fallback-motion.cc: put_weighted_pred_avg_16_fallback
https://api.github.com/repos/strukturag/libde265/issues/349/comments
2
2022-10-10T15:25:07Z
2023-01-24T16:03:47Z
https://github.com/strukturag/libde265/issues/349
1,403,353,624
349
4,349
CVE-2022-43249
2022-11-02T14:15:14.653
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via put_epel_hv_fallback<unsigned short> in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/345" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/strukturag/libde265/issues/345
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Heap-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x148fda) in void put_epel_hv_fallback<unsigned short>(short*, long, unsigned short const*, long, int, int, int, int, short*, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofil...
Heap-buffer-overflow in fallback-motion.cc: void put_epel_hv_fallback<unsigned short>(
https://api.github.com/repos/strukturag/libde265/issues/345/comments
7
2022-10-10T15:09:37Z
2023-01-24T16:04:57Z
https://github.com/strukturag/libde265/issues/345
1,403,331,318
345
4,350
CVE-2022-43250
2022-11-02T14:15:14.913
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via put_qpel_0_0_fallback_16 in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/346" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/strukturag/libde265/issues/346
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Heap-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x146a04) in put_qpel_0_0_fallback_16(short*, long, unsigned short const*, long, int, int, short*, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofile.bin The video file must ...
Heap-buffer-overflow in fallback-motion.cc: in put_qpel_0_0_fallback_16
https://api.github.com/repos/strukturag/libde265/issues/346/comments
2
2022-10-10T15:14:22Z
2023-01-24T16:04:19Z
https://github.com/strukturag/libde265/issues/346
1,403,337,666
346
4,351
CVE-2022-43252
2022-11-02T14:15:15.163
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via put_epel_16_fallback in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/347" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/strukturag/libde265/issues/347
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Heap-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x1465fb) in put_epel_16_fallback(short*, long, unsigned short const*, long, int, int, int, int, short*, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofile.bin The video file...
Heap-buffer-overflow in fallback-motion.cc in put_epel_16_fallback
https://api.github.com/repos/strukturag/libde265/issues/347/comments
2
2022-10-10T15:16:32Z
2023-01-24T16:04:09Z
https://github.com/strukturag/libde265/issues/347
1,403,340,599
347
4,352
CVE-2022-43253
2022-11-02T14:15:15.450
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via put_unweighted_pred_16_fallback in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/348" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/strukturag/libde265/issues/348
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Heap-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x145b6b) in put_unweighted_pred_16_fallback(unsigned short*, long, short const*, long, int, int, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofile.bin The video file must b...
Heap-buffer-overflow in fallback-motion.cc: put_unweighted_pred_16_fallback
https://api.github.com/repos/strukturag/libde265/issues/348/comments
2
2022-10-10T15:23:13Z
2023-01-24T16:03:58Z
https://github.com/strukturag/libde265/issues/348
1,403,349,600
348
4,353
CVE-2022-43254
2022-11-02T14:15:15.637
GPAC v2.1-DEV-rev368-gfd054169b-master was discovered to contain a memory leak via the component gf_list_new at utils/list.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2284" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
[ "401" ]
401
https://github.com/gpac/gpac/issues/2284
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
### Description Memory Leak in gf_list_new utils/list.c:601 ### Version ``` $ ./MP4Box -version MP4Box - GPAC version 2.1-DEV-rev368-gfd054169b-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.114...
Memory Leak in gf_list_new utils/list.c:601
https://api.github.com/repos/gpac/gpac/issues/2284/comments
0
2022-10-11T07:44:42Z
2022-10-11T11:02:16Z
https://github.com/gpac/gpac/issues/2284
1,404,158,827
2,284
4,354
CVE-2022-43255
2022-11-02T14:15:15.917
GPAC v2.1-DEV-rev368-gfd054169b-master was discovered to contain a memory leak via the component gf_odf_new_iod at odf/odf_code.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2285" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
[ "401" ]
401
https://github.com/gpac/gpac/issues/2285
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
### Description Memory Leak in gf_odf_new_iod odf/odf_code.c:415 ### Version ``` $ ./MP4Box -version MP4Box - GPAC version 2.1-DEV-rev368-gfd054169b-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/1...
Memory Leak in gf_odf_new_iod odf/odf_code.c:415
https://api.github.com/repos/gpac/gpac/issues/2285/comments
0
2022-10-11T07:56:13Z
2022-10-11T11:02:17Z
https://github.com/gpac/gpac/issues/2285
1,404,173,443
2,285
4,355
CVE-2022-39381
2022-11-02T15:15:10.543
Muhammara is a node module with c/cpp bindings to modify PDF with js for node or electron (based/replacement on/of galkhana/hummusjs). The package muhammara before 2.6.0; all versions of package hummus are vulnerable to Denial of Service (DoS) when supplied with a maliciously crafted PDF file to be appended to another....
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/galkahana/HummusJS/issues/293" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:muhammarajs_project:muhammarajs:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "F63EAAE0-D342-4D4B-945E-82FA10CCD315", "versionEndExcluding": null, "versionEndIncluding": "2.6.0", ...
[ "476" ]
476
https://github.com/galkahana/HummusJS/issues/293
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "galkahana", "HummusJS" ]
Hi Gal, We are using Node.js, It is crashing when we trying to process some PDFs. I have attached the sample for reference. We are getting the following error ``` " Unable to create form xobject from PDF page, parhaps the page index does not fit the total pages count " ``` After this error, When we try t...
Hummus exception causes Node.js crashing
https://api.github.com/repos/galkahana/HummusJS/issues/293/comments
4
2018-06-15T05:56:54Z
2024-10-25T07:39:56Z
https://github.com/galkahana/HummusJS/issues/293
332,654,623
293
4,356
CVE-2022-39381
2022-11-02T15:15:10.543
Muhammara is a node module with c/cpp bindings to modify PDF with js for node or electron (based/replacement on/of galkhana/hummusjs). The package muhammara before 2.6.0; all versions of package hummus are vulnerable to Denial of Service (DoS) when supplied with a maliciously crafted PDF file to be appended to another....
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/galkahana/HummusJS/issues/293" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:muhammarajs_project:muhammarajs:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "F63EAAE0-D342-4D4B-945E-82FA10CCD315", "versionEndExcluding": null, "versionEndIncluding": "2.6.0", ...
[ "476" ]
476
https://github.com/julianhille/MuhammaraJS/issues/191
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "julianhille", "MuhammaraJS" ]
Found the issue already reported at hummus with this file it's reproducible: [test12345.pdf](https://github.com/julianhille/MuhammaraJS/files/9013622/test12345.pdf) https://github.com/galkahana/HummusJS/issues/293#issuecomment-532085832
segmentation fault for specific file when appending to another
https://api.github.com/repos/julianhille/MuhammaraJS/issues/191/comments
0
2022-06-29T19:26:44Z
2022-06-30T15:58:50Z
https://github.com/julianhille/MuhammaraJS/issues/191
1,289,193,944
191
4,357
CVE-2022-39353
2022-11-02T17:15:17.387
xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) `DOMParser` and `XMLSerializer` module. xmldom parses XML that is not well-formed because it contains multiple top level elements, and adds all root nodes to the `childNodes` collection of the `Document`, without reporting any error or throwing. This...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.4, "baseSeverity": "CRITICAL", "confidentialityImpact": "LOW", "int...
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jindw/xmldom/issues/150" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xmldom_project:xmldom:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "AE53B86A-F7D4-47C7-ADB7-E88EAD0C2044", "versionEndExcluding": "0.6.0", "versionEndIncluding": null, "version...
[ "20" ]
20
https://github.com/jindw/xmldom/issues/150
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jindw", "xmldom" ]
###### Bug Description: xmldom allows incoming documents to have multiple root element nodes. This appears to me to be a violation of the [W3C DOM Level 2 Core Specification](http://www.w3.org/TR/2000/REC-DOM-Level-2-Core-20001113/DOM2-Core.pdf): > […] Each document contains zero or one doctype nodes, **one root elem...
Missing error for XML documents with multiple root element nodes
https://api.github.com/repos/jindw/xmldom/issues/150/comments
8
2016-01-20T00:49:35Z
2023-06-15T23:42:59Z
https://github.com/jindw/xmldom/issues/150
127,575,968
150
4,358
CVE-2022-3675
2022-11-03T18:15:14.627
Fedora CoreOS supports setting a GRUB bootloader password using a Butane config. When this feature is enabled, GRUB requires a password to access the GRUB command-line, modify kernel command-line arguments, or boot non-default OSTree deployments. Recent Fedora CoreOS releases have a misconfiguration which allows booti...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 2.6, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integr...
[ { "source": "patrick@puiterwijk.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.fedoraproject.org/en-US/fedora-coreos/grub-password/" }, { "source": "patrick@puiterwijk.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:fedora_coreos:*:*:*:*:*:*:*:*", "matchCriteriaId": "E39CD0D4-960C-48F7-BD25-1362B062C27B", "versionEndExcluding": "37.20221031.1.0", "versionEndIncluding": null, "vers...
[ "306" ]
306
https://github.com/coreos/fedora-coreos-tracker/issues/1333
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "coreos", "fedora-coreos-tracker" ]
Fedora CoreOS recently added support for [setting a GRUB password](https://docs.fedoraproject.org/en-US/fedora-coreos/grub-password/). When this feature is enabled, GRUB requires a password to access the GRUB command-line, modify kernel command-line arguments, or boot non-default OSTree deployments. Recent Fedora Co...
Non-default OSTree deployments accessible without GRUB password (CVE-2022-3675)
https://api.github.com/repos/coreos/fedora-coreos-tracker/issues/1333/comments
7
2022-11-01T19:56:50Z
2022-11-17T20:49:14Z
https://github.com/coreos/fedora-coreos-tracker/issues/1333
1,432,007,781
1,333
4,359
CVE-2022-43372
2022-11-03T18:15:17.987
Emlog Pro v1.7.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability at /admin/store.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/emlog/emlog/issues/195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emlog:emlog:1.7.1:*:*:*:pro:*:*:*", "matchCriteriaId": "BFC4BB7B-FCA0-4826-AD2E-790A7DBBDD17", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/emlog/emlog/issues/195
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "emlog", "emlog" ]
### **Which version of emlog do you using?** emlog_pro_1.7.1 ### **Expected behavior** Search store templates ### **Actual behavior** Reflected XSS vulnerabilities ### **Steps to reproduce the behavior** > Url:https://github.com/emlog/emlog/blob/master/admin/store.php > > poc:"%2F><img+src%3Dx+onerror%3Dale...
Reflected-XSS vulnerabilities via '/admin/store.php' #1
https://api.github.com/repos/emlog/emlog/issues/195/comments
1
2022-10-16T17:27:37Z
2022-10-19T15:57:30Z
https://github.com/emlog/emlog/issues/195
1,410,558,751
195
4,360
CVE-2021-34055
2022-11-04T17:15:10.547
jhead 3.06 is vulnerable to Buffer Overflow via exif.c in function Put16u.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/Matthias-Wandel/jhead/issues/36" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jhead_project:jhead:3.06:*:*:*:*:*:*:*", "matchCriteriaId": "D05C20ED-B09A-43EE-8D82-0524C33E0E60", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "120" ]
120
https://github.com/Matthias-Wandel/jhead/issues/36
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "Matthias-Wandel", "jhead" ]
Hi jhead Team I found an overflow error. System info: Ubuntu 20.04 : clang 10.0.0 , gcc 9.3.0 Fedora 33: clang 11.0.0 , gcc 10.2.1 jhead version 3.06 commit be7e43c6f27c7e5dc6a0d229925a60ec91e06aee file: [jhead_poc.zip](https://github.com/Matthias-Wandel/jhead/files/6530013/jhead_poc.zip) Verificati...
[ Security] heap-buffer-overflow of exif.c in function Put16u
https://api.github.com/repos/Matthias-Wandel/jhead/issues/36/comments
1
2021-05-20T09:23:55Z
2021-09-01T22:04:21Z
https://github.com/Matthias-Wandel/jhead/issues/36
896,534,669
36
4,361
CVE-2021-39432
2022-11-04T17:15:10.627
diplib v3.0.0 is vulnerable to Double Free.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/DIPlib/diplib/commit/8b9a2670ce66ff2fd5addf592f7825e1f5adb5b5" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:diplib:diplib:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "27F31D36-AC0B-4786-AEA1-AAC19D1F70F1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "415" ]
415
https://github.com/DIPlib/diplib/issues/80
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "DIPlib", "diplib" ]
Hi I found an crash erro. System info: Ubuntu 20.04 : clang 10.0.0 , gcc 9.3.0 DIPliB Release v3.0.0 commit:7db848500f4cc5db676b32e9a95dcbc94d976339 `[poc1.zip](https://github.com/DIPlib/diplib/files/6966666/poc1.zip)` (edit: careful with this, looks malicious) --------------------------------------...
Double-Free of ImageReadJPEG
https://api.github.com/repos/DIPlib/diplib/issues/80/comments
1
2021-08-11T07:45:05Z
2021-08-12T16:40:06Z
https://github.com/DIPlib/diplib/issues/80
966,154,908
80
4,362
CVE-2021-39473
2022-11-04T19:15:10.813
Saibamen HotelManager v1.2 is vulnerable to Cross Site Scripting (XSS) due to improper sanitization of comment and contact fields.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/BrunoTeixeira1996/CVE-2021-39473" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/Saibamen/HotelManager" }, { "source": "cve@mitre.org", "tags": [ "Issue Tr...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hotelmanager_project:hotelmanager:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "09A97DF6-C3F3-4DEC-A837-520D3B76E2D9", "versionEndExcluding": null, "versionEndIncluding": null, "ve...
[ "79" ]
79
https://github.com/Saibamen/HotelManager/issues/49
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Saibamen", "HotelManager" ]
# Affected Product Code Base HotelManager - v1.2 # Affected Component Kernel.php; Middleware # Attack Type Remote # Attack Vectors To exploit this vulnerability the user needs to create "rooms" or "guests" or "reservations" or "users" and in the "comment" or "contact" field can execute a xss payload witho...
HotelManager v1.2 is vulnerable to Cross Site Scripting (Stored XSS).
https://api.github.com/repos/Saibamen/HotelManager/issues/49/comments
0
2022-11-04T15:55:40Z
2022-11-05T12:21:32Z
https://github.com/Saibamen/HotelManager/issues/49
1,436,296,671
49
4,363
CVE-2022-44792
2022-11-07T03:15:09.303
handle_ipDefaultTTL in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.8 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker (who has write access) to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/menglong2234/b7bc13ae1a144f47cc3c95a7ea062428" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:net-snmp:net-snmp:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE83A82E-9510-4CE7-81D6-532499896986", "versionEndExcluding": null, "versionEndIncluding": "5.9.3", "versionStartExclu...
[ "476" ]
476
https://github.com/net-snmp/net-snmp/issues/474
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "net-snmp", "net-snmp" ]
`handle_ipDefaultTTL()` in `agent/mibgroup/ip-mib/ip_scalars.c` in Net-SNMP from 5.8 to latest(5.9.3) version has a NULL Pointer Exception bug that can be used by an unauthenticated attacker to remotely cause the instance to crash via a crafted UDP packet, resulting in Denial of Service. The PoC is [here](https://gist....
NULL Pointer Exception when handling ipDefaultTTL
https://api.github.com/repos/net-snmp/net-snmp/issues/474/comments
5
2022-10-31T05:05:15Z
2022-12-29T15:30:02Z
https://github.com/net-snmp/net-snmp/issues/474
1,429,260,955
474
4,364
CVE-2022-44793
2022-11-07T03:15:09.363
handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.4.3 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/menglong2234/d07a65b5028145c9f4e1d1db8c4c202f" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:net-snmp:net-snmp:*:*:*:*:*:*:*:*", "matchCriteriaId": "97E267EC-2F41-4233-8647-3BE21B487713", "versionEndExcluding": null, "versionEndIncluding": "5.9.3", "versionStartExclu...
[ "476" ]
476
https://github.com/net-snmp/net-snmp/issues/475
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "net-snmp", "net-snmp" ]
`handle_ipv6IpForwarding()` in `agent/mibgroup/ip-mib/ip_scalars.c` in Net-SNMP from 5.4.3 to latest(5.9.3) version has a NULL Pointer Exception bug that can be used by an unauthenticated attacker to remotely cause the instance to crash via a crafted UDP packet, resulting in Denial of Service. The PoC is [here](https:/...
NULL Pointer Exception when handling pv6IpForwarding
https://api.github.com/repos/net-snmp/net-snmp/issues/475/comments
17
2022-10-31T05:36:34Z
2023-02-06T16:31:26Z
https://github.com/net-snmp/net-snmp/issues/475
1,429,283,805
475
4,365
CVE-2022-43343
2022-11-08T15:15:11.207
N-Prolog v1.91 was discovered to contain a global buffer overflow vulnerability in the function gettoken() at Main.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sasagawa888/nprolog/issues/75" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:n-prolog_project:n-prolog:1.91:*:*:*:*:*:*:*", "matchCriteriaId": "C7BABC64-C1F3-4862-A4E4-E84364CC0B5C", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "120" ]
120
https://github.com/sasagawa888/nprolog/issues/75
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sasagawa888", "nprolog" ]
Hi @sasagawa888, I pulled down the most recent version of nprolog (Ver 1.91) and ran it through my fuzz tests. It looks like there is a global buffer overflow in gettoken at Main.c when you tell NPL to run a file in script mode. ![npl_crash](https://user-images.githubusercontent.com/42481692/196007594-70d23636-...
Global Buffer overflow in gettoken at Main.c (Ver 1.91)
https://api.github.com/repos/sasagawa888/nprolog/issues/75/comments
12
2022-10-15T21:12:47Z
2022-11-21T02:17:47Z
https://github.com/sasagawa888/nprolog/issues/75
1,410,291,931
75
4,366
CVE-2022-44311
2022-11-08T15:15:11.263
html2xhtml v1.3 was discovered to contain an Out-Of-Bounds read in the function static void elm_close(tree_node_t *nodo) at procesador.c. This vulnerability allows attackers to access sensitive files or cause a Denial of Service (DoS) via a crafted html file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jfisteus/html2xhtml/issues/19" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:html2xhtml_project:html2xhtml:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "17602F0C-863E-4C7B-B673-0FF7D2F16BA5", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ "125" ]
125
https://github.com/jfisteus/html2xhtml/issues/19
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jfisteus", "html2xhtml" ]
Hi there! Great work on html2xhtml, I find myself using it quite often. While I was using the tool I created some fuzz tests to run in the background. A couple of test cases led to a segfault when using the '-t frameset' option, which led me to further investigate the crash. ### Valgrind I started with Valgrin...
Out of Bounds Read In static void elm_close(tree_node_t *nodo)
https://api.github.com/repos/jfisteus/html2xhtml/issues/19/comments
2
2022-10-24T16:57:36Z
2022-10-25T17:58:56Z
https://github.com/jfisteus/html2xhtml/issues/19
1,421,138,511
19
4,367
CVE-2022-44312
2022-11-08T15:15:11.327
PicoC Version 3.2.2 was discovered to contain a heap buffer overflow in the ExpressionCoerceInteger function in expression.c when called from ExpressionInfixOperator.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jpoirier/picoc/issues/37" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:picoc_project:picoc:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "CE8B76ED-7C7C-41CE-9129-DA7B04DC5B55", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "787" ]
787
https://github.com/jpoirier/picoc/issues/37
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jpoirier", "picoc" ]
Hi, I was running my fuzz tests in the background and discovered multiple heap buffer overflows in PicoC Version 3.2.2 at various locations. After triaging all of the crashes, I can verify that there are 10 separate and unique heap buffer overflows at the following locations: * **StdioBasePrintf in cstdlib/stdio...
Multiple Heap Buffer Overflows in PicoC at Various Locations
https://api.github.com/repos/jpoirier/picoc/issues/37/comments
0
2022-10-25T17:31:35Z
2022-10-25T17:31:35Z
https://github.com/jpoirier/picoc/issues/37
1,422,824,405
37
4,368
CVE-2022-3821
2022-11-08T22:15:16.700
An off-by-one Error issue was discovered in Systemd in format_timespan() function of time-util.c. An attacker could supply specific values for time and accuracy that leads to buffer overrun in format_timespan(), leading to a Denial of Service.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139327" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*", "matchCriteriaId": "52303FA5-37AB-4D24-8121-64BBF929D93B", "versionEndExcluding": null, "versionEndIncluding": "251", "versionStartE...
[ "193" ]
193
https://github.com/systemd/systemd/issues/23928
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "systemd", "systemd" ]
### systemd version the issue has been seen with 251 ### Used distribution _No response_ ### Linux kernel version used _No response_ ### CPU architectures issue was seen on _No response_ ### Component _No response_ ### Expected behaviour you didn't see _No response_ ### Unexpected be...
Buffer overrun in format_timespan
https://api.github.com/repos/systemd/systemd/issues/23928/comments
0
2022-07-07T04:59:07Z
2022-07-08T14:09:47Z
https://github.com/systemd/systemd/issues/23928
1,296,813,982
23,928
4,369
CVE-2022-45061
2022-11-09T07:15:09.887
An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote serv...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/python/cpython/issues/98433" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html" }...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "matchCriteriaId": "20A23D09-CFA7-4028-A5E9-7AD784C2B9D8", "versionEndExcluding": null, "versionEndIncluding": "3.7.15", "versionStartExcludin...
[ "407" ]
407
https://github.com/python/cpython/issues/98433
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "python", "cpython" ]
# Bug report Originally reported to the security address on September 9. ```python ('xn--016c'+'a'*5000).encode('utf-8').decode('idna') ``` The execution time is not linear in relation to the input string size, which can cause slowness with large inputs: 10 chars = 0.016 seconds 100 chars = 0.047 seconds...
Slow IDNA decoding with large strings [CVE-2022-45061]
https://api.github.com/repos/python/cpython/issues/98433/comments
4
2022-10-19T06:12:24Z
2022-11-09T10:50:40Z
https://github.com/python/cpython/issues/98433
1,414,357,245
98,433
4,370
CVE-2022-43320
2022-11-09T14:15:16.917
FeehiCMS v2.1.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the id parameter at /web/admin/index.php?r=log%2Fview-layer.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/liufee/feehicms/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:feehi:feehicms:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "DBEE4749-21CC-4336-8565-A05BC680EDF2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "79" ]
79
https://github.com/liufee/feehicms/issues/4
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "liufee", "feehicms" ]
**Which version of FeehiCMS do you tesing?** v2.1.1 **Expected behavior** View log details **Actual behavior** View log details Reflected-XSS vulnerabilities in the background of FeehiCMS . **Steps to reproduce the behavior** { URL:http://127.0.0.1:8080/feehicms/frontend/web/admin/index.php?r=log...
View log details Reflected-XSS vulnerabilities in the background.
https://api.github.com/repos/liufee/feehicms/issues/4/comments
0
2022-10-14T11:29:17Z
2022-10-14T11:29:17Z
https://github.com/liufee/feehicms/issues/4
1,409,206,668
4
4,371
CVE-2022-43118
2022-11-09T16:15:18.347
A cross-site scripting (XSS) vulnerability in flatCore-CMS v2.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Username text field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/flatCore/flatCore-CMS/issues/86" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flatcore:flatcore-cms:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEB0AB5E-562A-4F43-8CDE-78A773E21CA8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "79" ]
79
https://github.com/flatCore/flatCore-CMS/issues/86
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "flatCore", "flatCore-CMS" ]
**Describe the bug** Cross Site Scripting (XSS) in the username section of the install page. version: 2.1.0 **To Reproduce** Steps to reproduce the behavior: 1. Go to 'CMS Install Page' 2. Insert into a XSS payload in username section 3. And XSS save 4. See error <script>alert(1)</script> ![image](https...
Cross Site Scripting (XSS) in Install
https://api.github.com/repos/flatCore/flatCore-CMS/issues/86/comments
1
2022-10-07T19:14:28Z
2023-01-05T10:52:18Z
https://github.com/flatCore/flatCore-CMS/issues/86
1,401,576,779
86
4,372
CVE-2022-43120
2022-11-09T16:15:18.500
A cross-site scripting (XSS) vulnerability in the /panel/fields/add component of Intelliants Subrion CMS v4.2.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Field default value text field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/intelliants/subrion/issues/894" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thir...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intelliants:subrion_cms:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1964CC54-4FD5-44DF-A183-0538C48EA988", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "79" ]
79
https://github.com/intelliants/subrion/issues/894
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "intelliants", "subrion" ]
Describe the bug Cross Site Scripting (XSS) in the default value section of the Add Field page. version: 4.2.1 To Reproduce Steps to reproduce the behavior: Go to 'CMS Add Field page' http://IP/panel/fields/add Insert into a XSS payload in field default value section ![image](https://user-images.githubuserco...
Cross Site Scripting (XSS) in Add Field Page
https://api.github.com/repos/intelliants/subrion/issues/894/comments
2
2022-10-08T13:13:13Z
2022-10-11T08:32:10Z
https://github.com/intelliants/subrion/issues/894
1,401,943,358
894
4,373
CVE-2022-43121
2022-11-09T16:15:18.573
A cross-site scripting (XSS) vulnerability in the CMS Field Add page of Intelliants Subrion CMS v4.2.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the tooltip text field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/intelliants/subrion/issues/895" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://git...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intelliants:subrion_cms:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1964CC54-4FD5-44DF-A183-0538C48EA988", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "79" ]
79
https://github.com/intelliants/subrion/issues/895
[ "Exploit", "Third Party Advisory" ]
github.com
[ "intelliants", "subrion" ]
Describe the bug Cross Site Scripting (XSS) in the fiekd tooltip section of the members add page. version: 4.2.1 To Reproduce Steps to reproduce the behavior: Go to 'CMS Field Add page' Insert into a XSS payload in tooltip section And XSS save Go to 'Members add page' xss payload works automatically ![i...
Cross Site Scripting (XSS) in Members Add
https://api.github.com/repos/intelliants/subrion/issues/895/comments
5
2022-10-08T13:42:14Z
2023-11-04T20:51:36Z
https://github.com/intelliants/subrion/issues/895
1,401,951,464
895
4,374
CVE-2021-40289
2022-11-10T18:15:10.497
mm-wki v0.2.1 is vulnerable to Cross Site Scripting (XSS).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/phachon/mm-wiki/issues/319" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mm-wki_project:mm-wki:0.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A1C89304-5877-4354-A437-4D5D22A89C72", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "79" ]
79
https://github.com/phachon/mm-wiki/issues/319
[ "Exploit", "Third Party Advisory" ]
github.com
[ "phachon", "mm-wiki" ]
xxxxx这里是问题描述xxxx 1. 当前使用的版本号 v0.2.1 2. 是否已经升级到新版本 yes 3. 当前遇到的问题 There is an XSS vulnerability in the create new space page when you POST /system/space/save `space_ id=&name=hcw&description=11E&tags=</span></td><img src=1 onerror=alert(1)>&visit_ level=public&is_ share=1 ` A stored XSS is raised 4. 错误...
There is an XSS vulnerability
https://api.github.com/repos/phachon/mm-wiki/issues/319/comments
0
2021-08-27T12:01:11Z
2021-08-27T12:01:11Z
https://github.com/phachon/mm-wiki/issues/319
981,177,877
319
4,375
CVE-2022-3944
2022-11-11T08:15:15.027
A vulnerability was found in jerryhanjj ERP. It has been declared as critical. Affected by this vulnerability is the function uploadImages of the file application/controllers/basedata/inventory.php of the component Commodity Management. The manipulation leads to unrestricted upload. The attack can be launched remotely....
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integr...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jerryhanjj/ERP/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.213451" },...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:erp_project:erp:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A1C4602-B05A-4E61-83CC-5FCE706D0C55", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "434" ]
434
https://github.com/jerryhanjj/ERP/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jerryhanjj", "ERP" ]
## 一. ERP has file upload vulnerability getshell ```php+HTML Build environment: Apache: 2.4.39; MySQL:5.7.26 ``` ERP is available in application/controllers/basedata/inventory In php, the uploadImages function controls the file upload. It does not check the uploaded files. The uploaded files are saved in the pa...
File upload vulnerability getshell
https://api.github.com/repos/jerryhanjj/ERP/issues/3/comments
0
2022-11-08T12:37:44Z
2022-11-11T09:36:24Z
https://github.com/jerryhanjj/ERP/issues/3
1,440,118,923
3
4,376
CVE-2022-3955
2022-11-11T16:15:16.387
A vulnerability was found in tholum crm42. It has been rated as critical. This issue affects some unknown processing of the file crm42\class\class.user.php of the component Login. The manipulation of the argument user_name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to t...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrit...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tholum/crm42/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:crm42_project:crm42:-:*:*:*:*:*:*:*", "matchCriteriaId": "23AA35C1-25A1-4746-BD9F-E299E990497D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "89" ]
89
https://github.com/tholum/crm42/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "tholum", "crm42" ]
## Crm42 SQL injection vulnerability in login function Crm42 does not filter the content entered by the user in the login function, resulting in a SQL injection vulnerability Build environment: PHP 5.5.9 MySQL database version: MySQL 5.1.60 Vulnerability source code location: In crm42\class\class.user.php, at lin...
Crm42 SQL injection vulnerability in login function
https://api.github.com/repos/tholum/crm42/issues/1/comments
0
2022-11-07T06:11:35Z
2022-11-11T16:07:05Z
https://github.com/tholum/crm42/issues/1
1,437,822,755
1
4,377
CVE-2022-3956
2022-11-11T16:15:16.600
A vulnerability classified as critical has been found in tsruban HHIMS 2.1. Affected is an unknown function of the component Patient Portrait Handler. The manipulation of the argument PID leads to sql injection. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. VDB-2134...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integr...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tsruban/HHIMS/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ]...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hhims_project:hhims:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "2F28FC5A-E893-4329-9C9E-EC815596E624", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "89" ]
89
https://github.com/tsruban/HHIMS/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "tsruban", "HHIMS" ]
## 1.SQL injection vulnerability exists in HHIMS V2.1 of patient medical record system System version: 2.1 Vulnerability URL:http://hhims.test/index.php/attach/portrait/1 Build environment: Apache 2.4.39; MySQL5.0.96; PHP5.6.9 Vulnerability description: ```html HHIMS is a free and open-source software s...
SQL injection vulnerability exists in HHIMS V2.1 of patient medical record system
https://api.github.com/repos/tsruban/HHIMS/issues/1/comments
2
2022-11-10T13:05:49Z
2022-11-10T13:58:09Z
https://github.com/tsruban/HHIMS/issues/1
1,443,876,875
1
4,378
CVE-2022-45196
2022-11-12T20:15:09.823
Hyperledger Fabric 2.3 allows attackers to cause a denial of service (orderer crash) by repeatedly sending a crafted channel tx with the same Channel name. NOTE: the official Fabric with Raft prevents exploitation via a locking mechanism and a check for names that already exist.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/SmartBFT-Go/fabric/issues/286" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://githu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hyperledger:fabric:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "DA27BCA0-DBBB-4594-973D-6E59942CF97B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "670" ]
670
https://github.com/SmartBFT-Go/fabric/issues/286
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "SmartBFT-Go", "fabric" ]
System information: version: fabric 2.3 OS: ubuntu 20.04 Experiments setup: Using first-network in https://github.com/SmartBFT-Go/fabric-samples. Repeatedly sending fuzzed channel tx with the same Channel name. Expected behavior: Orderers run as usual. Actual behaviour: orderers crash down, and can not be...
orderer crashes down after receiving fuzzed channel tx.
https://api.github.com/repos/SmartBFT-Go/fabric/issues/286/comments
3
2022-11-07T02:25:58Z
2022-11-11T20:46:58Z
https://github.com/SmartBFT-Go/fabric/issues/286
1,437,672,374
286
4,379
CVE-2022-3972
2022-11-13T10:15:10.130
A vulnerability was found in Pingkon HMS-PHP. It has been rated as critical. This issue affects some unknown processing of the file admin/adminlogin.php. The manipulation of the argument uname/pass leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrit...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Pingkon/HMS-PHP/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.213551" }...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hms-php_project:hms-php:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB18A451-A1EB-411C-8E11-B32C79754ED3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "707" ]
707
https://github.com/Pingkon/HMS-PHP/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Pingkon", "HMS-PHP" ]
Hello, my brother ## HMS has two SQL injection vulnerabilities ```html Building environment: Apace2.4.39; MySQL5.7.26; PHP7.3.4 ``` ### 1.SQL injection vulnerability exists in adminlogin.php In admin/adminlogin.php, line 6 - line 34 ![](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/denglukua...
HMS has two SQL injection vulnerabilities
https://api.github.com/repos/Pingkon/HMS-PHP/issues/1/comments
0
2022-11-09T06:48:08Z
2022-11-13T11:34:40Z
https://github.com/Pingkon/HMS-PHP/issues/1
1,441,487,078
1
4,380
CVE-2022-3974
2022-11-13T10:15:10.333
A vulnerability classified as critical was found in Axiomatic Bento4. Affected by this vulnerability is the function AP4_StdcFileByteStream::ReadPartial of the file Ap4StdCFileByteStream.cpp of the component mp4info. The manipulation leads to heap-based buffer overflow. The attack can be launched remotely. The exploit ...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integr...
[ { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/files/9987970/mp4info_overflow_ReadPartial341.zip" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:2022-10-08:*:*:*:*:*:*:*", "matchCriteriaId": "E6D96205-9447-4E3E-B05C-A45E8353CF6C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "787" ]
787
https://github.com/axiomatic-systems/Bento4/issues/812
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, there. There is an heap overflow in ReadPartial, Ap4StdCFileByteStream.cpp:341, in the newest master branch 5e7bb34a08272c49242196eba1cefab8af55f381, which seems to be incomplete fix of issue #510. Here is the reproducing command: ~~~~ mp42info poc ~~~~ POC: [mp4info_overflow_ReadPartial341.zip](htt...
Heap overflow in mp4info, ReadPartial, Ap4StdCFileByteStream.cpp:341
https://api.github.com/repos/axiomatic-systems/Bento4/issues/812/comments
0
2022-11-11T07:45:28Z
2022-11-11T07:46:10Z
https://github.com/axiomatic-systems/Bento4/issues/812
1,445,073,819
812
4,381
CVE-2022-3978
2022-11-13T14:15:10.487
A vulnerability, which was classified as problematic, was found in NodeBB up to 2.5.7. This affects an unknown part of the file /register/abort. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. Upgrading to version 2.5.8 is able to address this issue. The name of the...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cna@vuldb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/NodeBB/NodeBB/commit/2f9d8c350e54543f608d3d4c8e1a49bbb6cdea38" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nodebb:nodebb:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FB1FA81-94BA-4943-B016-35E191A9682B", "versionEndExcluding": "2.5.8", "versionEndIncluding": null, "versionStartExcluding...
[ "352" ]
352
https://github.com/NodeBB/NodeBB/issues/11017
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "NodeBB", "NodeBB" ]
https://github.com/NodeBB/nodebb-theme-persona/blob/98edd2c19ae934414dc7519bb01c9ef0bb10ee56/templates/registerComplete.tpl#L43-L51 Does not pass in CSRF token. https://github.com/NodeBB/NodeBB/blob/5d8df407a91197541f96a4c44416065a16035056/src/routes/authentication.js#L174 Does not check for CSRF token. ---...
`/register/abort` should check for CSRF token
https://api.github.com/repos/NodeBB/NodeBB/issues/11017/comments
0
2022-11-09T16:36:29Z
2022-11-09T17:17:52Z
https://github.com/NodeBB/NodeBB/issues/11017
1,442,405,831
11,017
4,382
CVE-2022-43288
2022-11-14T15:16:22.987
Rukovoditel v3.2.1 was discovered to contain a SQL injection vulnerability via the order_by parameter at /rukovoditel/index.php?module=logs/view&type=php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Kubozz/rukovoditel-3.2.1/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF93014A-D2CB-48B2-AB57-692E95E5702D", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "89" ]
89
https://github.com/Kubozz/rukovoditel-3.2.1/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Kubozz", "rukovoditel-3.2.1" ]
Description: I download Rukovoditel-3.2.1 from **https://www.rukovoditel.net/download.php** The SQL Injection vulnerability can be exploited by injecting inside the field **order_by** parameter to generate error and get the query output. PoC: 1. Login account 2. Go to 'rukovoditel/index.php?module=logs/view&typ...
SQL Injection Vulnerability on "order_by" parameter in Rukovoditel-3.2.1
https://api.github.com/repos/Kubozz/rukovoditel-3.2.1/issues/2/comments
0
2022-10-15T10:04:54Z
2022-10-15T10:06:33Z
https://github.com/Kubozz/rukovoditel-3.2.1/issues/2
1,410,116,320
2
4,383
CVE-2022-0137
2022-11-14T18:15:15.903
A heap buffer overflow in image_set_mask function of HTMLDOC before 1.9.15 allows an attacker to write outside the buffer boundaries.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integ...
[ { "source": "patrick@puiterwijk.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/71fe87878c9cbc3db429f5e5c70f28e4b3d96e3b" }, { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*", "matchCriteriaId": "76FBE339-551C-4C28-B91E-6E18D158C9C7", "versionEndExcluding": "1.9.15", "versionEndIncluding": null, "versionSta...
[ "787" ]
787
https://github.com/michaelrsweet/htmldoc/issues/461
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
# Heap-buffer-overflow in image_set_mask(image_t*, int, int, unsigned char) I've attached [poc.zip](https://github.com/michaelrsweet/htmldoc/files/7793648/poc.zip) that contains a malicious gif and a html file. To reproduce and get the segmentation fault: ``` $ unzip poc.zip $ htmldoc --webpage -f output.pdf...
Heap-buffer-overflow in image_set_mask(image_t*, int, int, unsigned char)
https://api.github.com/repos/michaelrsweet/htmldoc/issues/461/comments
2
2021-12-30T15:54:02Z
2021-12-30T18:34:58Z
https://github.com/michaelrsweet/htmldoc/issues/461
1,091,182,106
461
4,384
CVE-2022-43323
2022-11-14T20:15:17.740
EyouCMS V1.5.9-UTF8-SP1 was discovered to contain a Cross-Site Request Forgery (CSRF) via the Top Up Balance component under the Edit Member module.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/28#issue-1410026516" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracki...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "42A15197-E862-429C-8ECB-79D0B850C9C5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "352" ]
352
https://github.com/weng-xianhu/eyoucms/issues/28#issue-1410026516
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
EyouCMS v1.5.9 has a vulnerability, Cross-site request forgery(CSRF).Located in the backend, member center, editing, Top up balance. To exploit this vulnerability, a quasi-prepared HTML file needs to be opened 1、Go to the background --> member center--> edit member--> Top up balance ![图片1](https://user-images.githubu...
EyouCMS v1.5.9 has a vulnerability, Cross-site request forgery(CSRF)
https://api.github.com/repos/weng-xianhu/eyoucms/issues/28/comments
1
2022-10-15T03:24:29Z
2023-02-28T02:38:05Z
https://github.com/weng-xianhu/eyoucms/issues/28
1,410,026,516
28
4,385
CVE-2022-44387
2022-11-14T20:15:18.233
EyouCMS V1.5.9-UTF8-SP1 was discovered to contain a Cross-Site Request Forgery (CSRF) via the Basic Information component under the Edit Member module.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/29" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "42A15197-E862-429C-8ECB-79D0B850C9C5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "352" ]
352
https://github.com/weng-xianhu/eyoucms/issues/29
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
EyouCMS v1.5.9 has a vulnerability, Cross-site request forgery(CSRF).Located in the backend, member center, edit member profile. To exploit this vulnerability, a constructed HTML file needs to be opened 1. Enter the background - > member center - > edit members - > basic information ![图片1](https://user-images.githubu...
EyouCMS v1.5.9 has a vulnerability, Cross-site request forgery(CSRF)
https://api.github.com/repos/weng-xianhu/eyoucms/issues/29/comments
1
2022-10-27T13:36:23Z
2023-02-24T07:42:24Z
https://github.com/weng-xianhu/eyoucms/issues/29
1,425,651,916
29
4,386