cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2023-31975
2023-05-09T13:15:18.590
yasm v1.3.0 was discovered to contain a memory leak via the function yasm_intnum_copy at /libyasm/intnum.c. Note: Multiple third parties dispute this as a bug and not a vulnerability according to the YASM security policy.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityI...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/06/20/6" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwal...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "AD6556F7-3880-452A-ABA9-1A8A14BA41F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "401" ]
401
https://github.com/yasm/yasm/issues/210
[ "Exploit", "Issue Tracking" ]
github.com
[ "yasm", "yasm" ]
I found a memory leak bug in yasm. Please confirm. Thanks! ### Test Environment Ubuntu 20.04, 64 bit yasm (version: v1.3.0 ;master) ### How to trigger Compile the program with AddressSanitizer Run command $ touch u $ ./yasm -ium u ### Details ASAN report $./yasm -ium u ``` yasm: file name ...
yasm memory leak
https://api.github.com/repos/yasm/yasm/issues/210/comments
5
2023-03-01T02:27:11Z
2024-03-22T11:43:38Z
https://github.com/yasm/yasm/issues/210
1,604,119,944
210
5,089
CVE-2023-31973
2023-05-09T14:15:13.737
yasm v1.3.0 was discovered to contain a use after free via the function expand_mmac_params at /nasm/nasm-pp.c. Note: Multiple third parties dispute this as a bug and not a vulnerability according to the YASM security policy.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/yasm/yasm/issues/207" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/yasm/yasm/issu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "401" ]
401
https://github.com/yasm/yasm/issues/207
[ "Exploit", "Issue Tracking" ]
github.com
[ "yasm", "yasm" ]
I found a heap-use-after-free in yasm. Please confirm. Thanks! Test Environment Ubuntu 20.04, 64 bit yasm (version: v1.3.0 ;master) How to trigger Compile the program with AddressSanitizer Run command $ ./yasm -w -W -M $PoC Details ASAN report $./yasm -w -W -M $PoC ``` yasm: warning: unrecognized ...
yasm heap use-after-free bug
https://api.github.com/repos/yasm/yasm/issues/207/comments
1
2023-03-01T02:03:35Z
2023-05-10T05:20:08Z
https://github.com/yasm/yasm/issues/207
1,604,096,378
207
5,090
CVE-2023-31976
2023-05-09T14:15:13.780
libming v0.4.8 was discovered to contain a stack buffer overflow via the function makeswf_preprocess at /util/makeswf_utils.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/265" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "787" ]
787
https://github.com/libming/libming/issues/265
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
When the program input contains the option of "-D" or "-o" , the program will cause stack buffer overflow error. Test Environment Ubuntu 20.04, 64 bit libming (master ; commit [04aee52](https://github.com/libming/libming/commit/04aee52363688426eab74f5d6180c149654a6473)) How to trigger Compile the progra...
makeswf stack buffer overflow
https://api.github.com/repos/libming/libming/issues/265/comments
0
2023-02-28T06:17:08Z
2023-02-28T06:17:08Z
https://github.com/libming/libming/issues/265
1,602,439,311
265
5,091
CVE-2023-31979
2023-05-09T14:15:13.820
Catdoc v0.95 was discovered to contain a global buffer overflow via the function process_file at /src/reader.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/petewarden/catdoc/issues/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:catdoc_project:catdoc:0.95:*:*:*:*:*:*:*", "matchCriteriaId": "6CE9FF5B-A288-4C98-B162-231FDEDCE4AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ "120" ]
120
https://github.com/petewarden/catdoc/issues/9
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "petewarden", "catdoc" ]
When the program input contains the option of "-b" , the program will cause global buffer overflow error. Test Environment Ubuntu 20.04, 64 bit catdoc (version: 0.95; ) How to trigger Compile the program with AddressSanitizer Run command $ .catdoc -b $POC Details ASAN report $./catdoc -b $POC ``` ===...
catdoc global buffer overflow -- by misuse of the option "-b"
https://api.github.com/repos/petewarden/catdoc/issues/9/comments
2
2023-02-27T08:00:11Z
2023-07-04T14:54:44Z
https://github.com/petewarden/catdoc/issues/9
1,600,670,457
9
5,092
CVE-2023-31981
2023-05-09T14:15:13.863
Sngrep v1.6.0 was discovered to contain a stack buffer overflow via the function packet_set_payload at /src/packet.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/irontec/sngrep/issues/430" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Par...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:irontec:sngrep:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "86F5A8B5-378C-45C8-8F83-4012F88FBEFD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "787" ]
787
https://github.com/irontec/sngrep/issues/430
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "irontec", "sngrep" ]
I found a stack buffer overflow in sngrep. Please confirm. Thanks! Test Environment Ubuntu 20.04, 64 bit sngrep (version: v1.6.0 ;[5089514](https://github.com/irontec/sngrep/commit/5089514cd83b88016c9876a6e4d8a33b56e58123)) How to trigger Compile the program with AddressSanitizer Run command $ ./sngr...
[bug] sngrep stack buffer overflow
https://api.github.com/repos/irontec/sngrep/issues/430/comments
4
2023-03-01T02:37:56Z
2023-07-17T09:13:55Z
https://github.com/irontec/sngrep/issues/430
1,604,128,076
430
5,093
CVE-2023-31982
2023-05-09T14:15:13.907
Sngrep v1.6.0 was discovered to contain a heap buffer overflow via the function capture_packet_reasm_ip at /src/capture.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/irontec/sngrep/issues/431" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Par...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:irontec:sngrep:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "86F5A8B5-378C-45C8-8F83-4012F88FBEFD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "787" ]
787
https://github.com/irontec/sngrep/issues/431
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "irontec", "sngrep" ]
I found a heap buffer overflow in sngrep. Please confirm. Thanks! Test Environment Ubuntu 20.04, 64 bit sngrep (version: v1.6.0 ;[5089514](https://github.com/irontec/sngrep/commit/5089514cd83b88016c9876a6e4d8a33b56e58123)) How to trigger Compile the program with AddressSanitizer Run command $ ./sngre...
[bug] sngrep heap buffer overflow
https://api.github.com/repos/irontec/sngrep/issues/431/comments
1
2023-03-01T02:42:36Z
2023-03-03T11:54:45Z
https://github.com/irontec/sngrep/issues/431
1,604,131,402
431
5,094
CVE-2020-18280
2023-05-09T16:15:13.690
Cross Site Scripting vulnerability found in Phodal CMD v.1.0 allows a local attacker to execute arbitrary code via the EMBED SRC function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/phodal/md/issues/20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/phodal/md/issue...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:md_project:md:1.0:*:*:*:*:wechat:*:*", "matchCriteriaId": "57E51B10-D8B1-455E-9D8C-71E59C88D892", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "79" ]
79
https://github.com/phodal/md/issues/20
[ "Exploit", "Issue Tracking" ]
github.com
[ "phodal", "md" ]
This label and attack vector will cause dom-based XSS. if you type `<EMBED SRC="data:image/svg+xml;base64,PHN2ZyB4bWxuczpzdmc9Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hsaW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9IjAiIHdpZHRoPSIxOTQi...
XSS vulnerability in <EMBED> label,SVG include attack vector.
https://api.github.com/repos/phodal/md/issues/20/comments
1
2019-07-02T05:42:18Z
2021-01-05T12:55:51Z
https://github.com/phodal/md/issues/20
463,030,721
20
5,095
CVE-2020-23362
2023-05-09T16:15:13.963
Insecure Permissons vulnerability found in Shop_CMS YerShop all versions allows a remote attacker to escalate privileges via the cover_id parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/huyiwill/shopcms_lang/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Ad...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yershop_project:yershop:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EA9478C-AE02-4BEA-9ECF-CBE71D8FB501", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "269" ]
269
https://github.com/huyiwill/shopcms_lang/issues/1
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "huyiwill", "shopcms_lang" ]
Yershop mall has a horizontal ultra vires vulnerability, which can be used to maliciously change any user name for the full version of the vulnerability, resulting in the user unable to log in the account. The account passwords of the following cases are all below Account 1: lu0r3n Password: lu0r3n Account ...
Beyond authority loophole in Yershop
https://api.github.com/repos/huyiwill/shopcms_lang/issues/1/comments
0
2020-05-21T14:42:48Z
2020-05-21T14:43:58Z
https://github.com/huyiwill/shopcms_lang/issues/1
622,548,363
1
5,096
CVE-2020-23363
2023-05-09T16:15:14.090
Cross Site Request Forgery (CSRF) vulnerability found in Verytops Verydows all versions that allows an attacker to execute arbitrary code via a crafted script.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Verytops/verydows/issues/17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Verytop...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:verydows:verydows:-:*:*:*:*:*:*:*", "matchCriteriaId": "88077CEC-9C13-4061-9A3C-AB0E61FF0587", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "352" ]
352
https://github.com/Verytops/verydows/issues/17
[ "Exploit", "Issue Tracking" ]
github.com
[ "Verytops", "verydows" ]
There is a CSRF vulnerability that allows information and other operations to be changed [http://dcbang.net/QQ.PNG](url) POC: `<html> <!-- CSRF PoC - generated by Burp Suite Professional --> <body> <script>history.pushState('', '', '/')</script> <form action="http://demo.verydows.com/user/profile.htm...
Existence CSRF Vulnerability
https://api.github.com/repos/Verytops/verydows/issues/17/comments
1
2020-06-11T15:51:50Z
2020-06-11T15:59:19Z
https://github.com/Verytops/verydows/issues/17
637,134,811
17
5,097
CVE-2021-31240
2023-05-09T16:15:14.147
An issue found in libming v.0.4.8 allows a local attacker to execute arbitrary code via the parseSWF_IMPORTASSETS function in the parser.c file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/218" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "401" ]
401
https://github.com/libming/libming/issues/218
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
Hi, I found a memory leak problem. version: 0.4.8 command: swftophp poc poc: [parser.c_2556.zip](https://github.com/libming/libming/files/6276040/parser.c_2556.zip) Here is the report from ASAN: ``` `header indicates a filesize of 761 but filesize is 550 <?php $m = new SWFMovie(8); ming_setscale(1.0); $m...
Memory leaks in parseSWF_IMPORTASSETS
https://api.github.com/repos/libming/libming/issues/218/comments
0
2021-04-08T04:46:50Z
2021-04-08T04:46:50Z
https://github.com/libming/libming/issues/218
853,054,686
218
5,098
CVE-2021-31711
2023-05-09T16:15:14.197
Cross Site Scripting vulnerability found in Trippo ResponsiveFilemanager v.9.14.0 and before allows a remote attacker to execute arbitrary code via the sort_by parameter in the dialog.php file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/trippo/ResponsiveFilemanager/issues/661" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:responsivefilemanager:responsivefilemanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "097E3AFD-7F03-4CD4-B4BB-6B73C8622F63", "versionEndExcluding": null, "versionEndIncluding": "9.4.10", ...
[ "79" ]
79
https://github.com/trippo/ResponsiveFilemanager/issues/661
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "trippo", "ResponsiveFilemanager" ]
After taking another look at the ResponsiveFilemanager 9.14.0 i noticed that in the dialog.php file on line 229 that if the $_SESSION['RF']['sort_by'] is already set that there would not be done any validation. https://github.com/trippo/ResponsiveFilemanager/blob/master/filemanager/dialog.php#L235 This created a prob...
Stored xss in v9.14.0 in dialog.php in $_SESSION['RF']["sort_by"] because of no validation if ajax_calls.php setted this session.
https://api.github.com/repos/trippo/ResponsiveFilemanager/issues/661/comments
0
2021-04-19T15:54:05Z
2021-04-19T18:43:04Z
https://github.com/trippo/ResponsiveFilemanager/issues/661
861,465,010
661
5,099
CVE-2023-30083
2023-05-09T16:15:14.373
Buffer Overflow vulnerability found in Libming swftophp v.0.4.8 allows a local attacker to cause a denial of service via the newVar_N in util/decompile.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/266" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "120" ]
120
https://github.com/libming/libming/issues/266
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
Heap buffer overflow in the latest version of libming at function newVar_N in util/decompile.c:654. ## Environment Ubuntu 18.04, 64 bit libming 0.4.8 ## Steps to reproduce 1. download file ``` wget https://github.com/libming/libming/archive/refs/tags/ming-0_4_8.tar.gz tar -zxvf ming-0_4_8.tar.gz ``` 2. co...
Heap buffer overflow in newVar_N() at decompile.c:654
https://api.github.com/repos/libming/libming/issues/266/comments
0
2023-03-21T06:45:54Z
2023-03-21T06:45:54Z
https://github.com/libming/libming/issues/266
1,633,318,454
266
5,100
CVE-2023-30084
2023-05-09T16:15:14.423
An issue found in libming swftophp v.0.4.8 allows a local attacker to cause a denial of service via the stackVal function in util/decompile.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/268" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "125" ]
125
https://github.com/libming/libming/issues/268
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
Invalid memory read in the latest version of libming at function stackVal in util/decompile.c:1238. ## Environment Ubuntu 18.04, 64 bit libming 0.4.8 ## Steps to reproduce 1. download file ``` wget https://github.com/libming/libming/archive/refs/tags/ming-0_4_8.tar.gz tar -zxvf ming-0_4_8.tar.gz ``` 2. co...
Invalid memory read in stackVal() at decompile.c:1238
https://api.github.com/repos/libming/libming/issues/268/comments
0
2023-03-21T06:53:51Z
2023-03-21T06:53:51Z
https://github.com/libming/libming/issues/268
1,633,325,057
268
5,101
CVE-2023-30085
2023-05-09T16:15:14.470
Buffer Overflow vulnerability found in Libming swftophp v.0.4.8 allows a local attacker to cause a denial of service via the cws2fws function in util/decompile.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/267" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "120" ]
120
https://github.com/libming/libming/issues/267
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
Allocation size overflow in the latest version of libming at function cws2fws in util/main.c:111. ## Environment Ubuntu 18.04, 64 bit libming 0.4.8 ## Steps to reproduce 1. download file ``` wget https://github.com/libming/libming/archive/refs/tags/ming-0_4_8.tar.gz tar -zxvf ming-0_4_8.tar.gz ``` 2. comp...
Allocation size overflow in cws2fws() at main.c:111
https://api.github.com/repos/libming/libming/issues/267/comments
0
2023-03-21T06:50:17Z
2023-03-21T06:50:17Z
https://github.com/libming/libming/issues/267
1,633,322,109
267
5,102
CVE-2023-30087
2023-05-09T16:15:14.547
Buffer Overflow vulnerability found in Cesanta MJS v.1.26 allows a local attacker to cause a denial of service via the mjs_mk_string function in mjs.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/cesanta/mjs/issues/244" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:1.26:*:*:*:*:*:*:*", "matchCriteriaId": "25C97820-C80A-41CE-B510-F292D2AF665E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding":...
[ "787" ]
787
https://github.com/cesanta/mjs/issues/244
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "cesanta", "mjs" ]
Heap buffer overflow in mjs at function mjs_mk_string in mjs.c:13671. ## Environment Ubuntu 18.04, 64 bit ## Steps to reproduce 1. download file ``` git clone https://github.com/cesanta/mjs.git mjs cd mjs git checkout 9eae0e6 ``` 2. compile libming with ASAN ``` clang -fsanitize=address mjs.c -o mjs_asa...
Heap buffer overflow in mjs_mk_string() at mjs.c:13671
https://api.github.com/repos/cesanta/mjs/issues/244/comments
0
2023-03-22T09:15:39Z
2023-03-22T09:15:39Z
https://github.com/cesanta/mjs/issues/244
1,635,358,781
244
5,103
CVE-2023-30088
2023-05-09T16:15:14.583
An issue found in Cesanta MJS v.1.26 allows a local attacker to cause a denial of service via the mjs_execute function in mjs.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/cesanta/mjs/issues/243" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:1.26:*:*:*:*:*:*:*", "matchCriteriaId": "25C97820-C80A-41CE-B510-F292D2AF665E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding":...
[ "119" ]
119
https://github.com/cesanta/mjs/issues/243
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "cesanta", "mjs" ]
Invalid memory read in mjs at function mjs_execute in mjs.c:9320. ## Environment Ubuntu 18.04, 64 bit ## Steps to reproduce 1. download file ``` git clone https://github.com/cesanta/mjs.git mjs cd mjs git checkout d6c06a6 ``` 2. compile libming with ASAN ``` clang -fsanitize=address mjs.c -o mjs_asan `...
Invalid memory read in mjs_execute() at mjs.c:9320
https://api.github.com/repos/cesanta/mjs/issues/243/comments
1
2023-03-22T09:15:01Z
2023-05-15T14:19:13Z
https://github.com/cesanta/mjs/issues/243
1,635,357,898
243
5,104
CVE-2023-31906
2023-05-10T15:15:10.187
Jerryscript 3.0.0(commit 1a2c047) was discovered to contain a heap-buffer-overflow via the component lexer_compare_identifier_to_chars at /jerry-core/parser/js/js-lexer.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5066" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "787" ]
787
https://github.com/jerryscript-project/jerryscript/issues/5066
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: https://github.com/jerryscript-project/jerryscript/commit/1a2c04763aba49f52b1537acd3730098c873511c Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --debug --compile-flag=-m32...
heap-buffer-overflow in lexer_compare_identifier_to_chars
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5066/comments
0
2023-04-08T12:50:49Z
2024-11-22T09:18:15Z
https://github.com/jerryscript-project/jerryscript/issues/5066
1,659,514,220
5,066
5,105
CVE-2023-31907
2023-05-10T15:15:10.353
Jerryscript 3.0.0 was discovered to contain a heap-buffer-overflow via the component scanner_literal_is_created at /jerry-core/parser/js/js-scanner-util.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5073" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "787" ]
787
https://github.com/jerryscript-project/jerryscript/issues/5073
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: https://github.com/jerryscript-project/jerryscript/commit/05dbbd134c3b9e2482998f267857dd3722001cd7 Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --compile-flag=-m32 --compi...
heap-buffer-overflow in scanner_literal_is_created
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5073/comments
0
2023-04-19T12:27:29Z
2023-04-19T12:27:29Z
https://github.com/jerryscript-project/jerryscript/issues/5073
1,674,802,543
5,073
5,106
CVE-2023-31908
2023-05-10T15:15:10.533
Jerryscript 3.0 (commit 05dbbd1) was discovered to contain a heap-buffer-overflow via the component ecma_builtin_typedarray_prototype_sort.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5067" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6DB8D818-8F21-4FD3-8D4D-A024A6346CB4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "787" ]
787
https://github.com/jerryscript-project/jerryscript/issues/5067
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: 05dbbd13[](05dbbd134c3b9e2482998f267857dd3722001cd7) Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer --c...
heap-buffer-overflow in ecma_builtin_typedarray_prototype_sort
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5067/comments
0
2023-04-08T13:31:08Z
2023-04-08T13:39:28Z
https://github.com/jerryscript-project/jerryscript/issues/5067
1,659,524,592
5,067
5,107
CVE-2023-31910
2023-05-10T15:15:10.697
Jerryscript 3.0 (commit 05dbbd1) was discovered to contain a heap-buffer-overflow via the component parser_parse_function_statement at /jerry-core/parser/js/js-parser-statm.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5076" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "787" ]
787
https://github.com/jerryscript-project/jerryscript/issues/5076
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: 05dbbd13[](05dbbd134c3b9e2482998f267857dd3722001cd7) Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer --c...
heap-buffer-overflow in parser_parse_function_statement
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5076/comments
0
2023-04-23T16:01:47Z
2023-04-23T16:01:47Z
https://github.com/jerryscript-project/jerryscript/issues/5076
1,680,076,342
5,076
5,108
CVE-2023-31556
2023-05-10T16:15:12.367
podofoinfo 0.10.0 was discovered to contain a segmentation violation via the function PoDoFo::PdfDictionary::findKeyParent.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/podofo/podofo/issues/66" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:podofo_project:podofo:0.10.0:-:*:*:*:*:*:*", "matchCriteriaId": "E83D1F81-EBA4-47E8-BA9A-23EBABDB99BD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "787" ]
787
https://github.com/podofo/podofo/issues/66
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "podofo", "podofo" ]
We found a stack overflow on podofo 0.10.0. **Command Input** `podofopdfinfo poc_file ` poc_file are attached. **Sanitizer Dump** ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==2639991==ERROR: AddressSanitizer: stack-overflow on address 0x7ffd0a...
[podofo-0.10.0]Stack-Overflow
https://api.github.com/repos/podofo/podofo/issues/66/comments
1
2023-04-10T17:05:40Z
2023-04-12T22:17:02Z
https://github.com/podofo/podofo/issues/66
1,661,075,393
66
5,109
CVE-2023-31566
2023-05-10T16:15:12.567
Podofo v0.10.0 was discovered to contain a heap-use-after-free via the component PoDoFo::PdfEncrypt::IsMetadataEncrypted().
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/podofo/podofo/issues/70" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:podofo_project:podofo:0.10.0:-:*:*:*:*:*:*", "matchCriteriaId": "E83D1F81-EBA4-47E8-BA9A-23EBABDB99BD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "416" ]
416
https://github.com/podofo/podofo/issues/70
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "podofo", "podofo" ]
We found a heap-use-after-free in podofo 0.10.0(main/PdfEncrypt.h:352:47 in PoDoFo::PdfEncrypt::IsMetadataEncrypted()). **Command Input** `podofoencrypt -rc4v2 -u 1232321 -o 24 poc_file /dev/null` poc_file are attached. **Sanitizer Dump** ``` ==3903368==ERROR: AddressSanitizer: heap-use-after-free on ad...
Heap-use-after-free in podofo 0.10.0(main/PdfEncrypt.h:352:47 in PoDoFo::PdfEncrypt::IsMetadataEncrypted())
https://api.github.com/repos/podofo/podofo/issues/70/comments
3
2023-04-25T03:59:25Z
2023-06-27T21:14:29Z
https://github.com/podofo/podofo/issues/70
1,682,386,495
70
5,110
CVE-2023-31567
2023-05-10T16:15:12.720
Podofo v0.10.0 was discovered to contain a heap buffer overflow via the component PoDoFo::PdfEncryptAESV3::PdfEncryptAESV3.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/podofo/podofo/issues/71" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:podofo_project:podofo:0.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D2B6FCB-1882-4BAA-B8BE-25E150D012D7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "787" ]
787
https://github.com/podofo/podofo/issues/71
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "podofo", "podofo" ]
We found multiple heap-buffer-overflow in podofo 0.10.0(main/PdfEncrypt.cpp in PoDoFo::PdfEncryptAESV3::PdfEncryptAESV3). **Command Input** `podofoencrypt -rc4v2 -u 1232321 -o 24 poc_file /dev/null` All poc_file are attached. **Sanitizer Dump** ``` ==3904316==ERROR: AddressSanitizer: heap-buffer-overfl...
Heap-buffer-overflow in podofo 0.10.0(main/PdfEncrypt.cpp in PoDoFo::PdfEncryptAESV3::PdfEncryptAESV3)
https://api.github.com/repos/podofo/podofo/issues/71/comments
1
2023-04-25T04:12:26Z
2023-06-28T08:43:22Z
https://github.com/podofo/podofo/issues/71
1,682,396,886
71
5,111
CVE-2023-31568
2023-05-10T16:15:12.810
Podofo v0.10.0 was discovered to contain a heap buffer overflow via the component PoDoFo::PdfEncryptRC4::PdfEncryptRC4.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/podofo/podofo/issues/72" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:podofo_project:podofo:0.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D2B6FCB-1882-4BAA-B8BE-25E150D012D7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "787" ]
787
https://github.com/podofo/podofo/issues/72
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "podofo", "podofo" ]
We found a heap-buffer-overflow in podofo 0.10.0(main/PdfEncrypt.cpp:1132:5 in PoDoFo::PdfEncryptRC4::PdfEncryptRC4). **Command Input** `podofopdfinfo poc_file ` poc_file is attached. **Sanitizer Dump** ``` ==3975233==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60300000122f at pc 0x000000...
Heap-buffer-overflow in podofo 0.10.0(main/PdfEncrypt.cpp:1132:5 in PoDoFo::PdfEncryptRC4::PdfEncryptRC4)
https://api.github.com/repos/podofo/podofo/issues/72/comments
2
2023-04-25T05:16:58Z
2023-04-25T12:51:18Z
https://github.com/podofo/podofo/issues/72
1,682,445,671
72
5,112
CVE-2023-29986
2023-05-11T02:15:08.780
spring-boot-actuator-logview 0.2.13 allows Directory Traversal to sibling directories via LogViewEndpoint.view.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/lukashinsch/spring-boot-actuator-logview/issues/33" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/lukashinsch/spring...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:spring-boot-actuator-logview_project:spring-boot-actuator-logview:0.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "C07110E8-29F7-4F8B-A497-6E6081D13FDF", "versionEndExcluding": null, "versionE...
[ "22" ]
22
https://github.com/lukashinsch/spring-boot-actuator-logview/issues/33
[ "Issue Tracking" ]
github.com
[ "lukashinsch", "spring-boot-actuator-logview" ]
The patch file for CVE-2021-21234 still has a vulnerability, which is a partial path traversal vulnerability. In commit [1c76e1e](https://github.com/lukashinsch/spring-boot-actuator-logview/commit/1c76e1ec3588c9f39e1a94bf27b5ff56eb8b17d6), the securityCheck function use canonicalLoggingPath.startsWith(baseCanonicalPat...
Issue about Partial Path Traversal
https://api.github.com/repos/lukashinsch/spring-boot-actuator-logview/issues/33/comments
0
2023-02-12T11:17:09Z
2023-02-12T11:17:09Z
https://github.com/lukashinsch/spring-boot-actuator-logview/issues/33
1,581,218,091
33
5,113
CVE-2023-30172
2023-05-11T02:15:08.880
A directory traversal vulnerability in the /get-artifact API method of the mlflow platform up to v2.0.1 allows attackers to read arbitrary files on the server via the path parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/mlflow/mlflow/issues/7166" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/mlflow/mlflow/issues/7166#issuecomment-1541543234" }, { "s...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8083039-5842-4214-A757-1A798CA15C30", "versionEndExcluding": "2.0.1", "versionEndIncluding": null, "versionStartExclu...
[ "22" ]
22
https://github.com/mlflow/mlflow/issues/7166
[ "Issue Tracking" ]
github.com
[ "mlflow", "mlflow" ]
**Vulnerability details** Local file inclusion in the MLFlow server, additional details may be provided upon request. **MLFlow version** Reproduced in 1.26.1 and 1.30.0
[BUG] Security Vulnerability
https://api.github.com/repos/mlflow/mlflow/issues/7166/comments
10
2022-10-26T07:09:54Z
2023-05-11T07:53:56Z
https://github.com/mlflow/mlflow/issues/7166
1,423,542,761
7,166
5,114
CVE-2023-30172
2023-05-11T02:15:08.880
A directory traversal vulnerability in the /get-artifact API method of the mlflow platform up to v2.0.1 allows attackers to read arbitrary files on the server via the path parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/mlflow/mlflow/issues/7166" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/mlflow/mlflow/issues/7166#issuecomment-1541543234" }, { "s...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8083039-5842-4214-A757-1A798CA15C30", "versionEndExcluding": "2.0.1", "versionEndIncluding": null, "versionStartExclu...
[ "22" ]
22
https://github.com/mlflow/mlflow/issues/7166#issuecomment-1541543234
[ "Issue Tracking" ]
github.com
[ "mlflow", "mlflow" ]
**Vulnerability details** Local file inclusion in the MLFlow server, additional details may be provided upon request. **MLFlow version** Reproduced in 1.26.1 and 1.30.0
[BUG] Security Vulnerability
https://api.github.com/repos/mlflow/mlflow/issues/7166/comments
10
2022-10-26T07:09:54Z
2023-05-11T07:53:56Z
https://github.com/mlflow/mlflow/issues/7166
1,423,542,761
7,166
5,115
CVE-2021-34076
2023-05-11T12:15:09.070
File Upload vulnerability in PHPOK 5.7.140 allows remote attackers to run arbitrary code and gain escalated privileges via crafted zip file upload.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/HolaAsuka/CVE/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/HolaAsuka/CV...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpok:phpok:5.7.140:*:*:*:*:*:*:*", "matchCriteriaId": "6394DEF4-4A1B-4B3F-A7B9-8A0D87FDEB33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "434" ]
434
https://github.com/HolaAsuka/CVE/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "HolaAsuka", "CVE" ]
File Upload vulnerability in PHPOK 5.7.140 ## PoC Enter the background and switch to development mode in the upper right corner ![1](https://user-images.githubusercontent.com/67731575/237042482-d0653243-9f0c-4c2e-b0bd-e4afcf01cb6e.jpg) Click Install Application - Import and upload a zip-compressed php fil...
File Upload vulnerability in PHPOK 5.7.140
https://api.github.com/repos/HolaAsuka/CVE/issues/1/comments
0
2023-05-09T08:39:43Z
2023-05-09T08:41:57Z
https://github.com/HolaAsuka/CVE/issues/1
1,701,618,743
1
5,116
CVE-2023-31913
2023-05-12T14:15:09.773
Jerryscript 3.0 *commit 1a2c047) was discovered to contain an Assertion Failure via the component parser_parse_class at jerry-core/parser/js/js-parser-expr.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5061" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "617" ]
617
https://github.com/jerryscript-project/jerryscript/issues/5061
[ "Exploit", "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: https://github.com/jerryscript-project/jerryscript/commit/1a2c04763aba49f52b1537acd3730098c873511c Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --debug --compile-flag=-m32...
Assertion 'context_p->scope_stack_size == PARSER_MAXIMUM_DEPTH_OF_SCOPE_STACK' failed at jerryscript/jerry-core/parser/js/js-parser-expr.c(parser_parse_class):1068.
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5061/comments
0
2023-04-06T10:46:13Z
2024-11-22T09:11:34Z
https://github.com/jerryscript-project/jerryscript/issues/5061
1,657,176,424
5,061
5,118
CVE-2023-31914
2023-05-12T14:15:09.807
Jerryscript 3.0 (commit 05dbbd1) was discovered to contain out-of-memory issue in malloc.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5071" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "770" ]
770
https://github.com/jerryscript-project/jerryscript/issues/5071
[ "Exploit", "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: https://github.com/jerryscript-project/jerryscript/commit/05dbbd134c3b9e2482998f267857dd3722001cd7 Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --debug --compile-flag=-m32...
AddressSanitizer: allocator is out of memory trying to allocate
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5071/comments
0
2023-04-19T11:36:46Z
2023-04-19T11:36:46Z
https://github.com/jerryscript-project/jerryscript/issues/5071
1,674,723,917
5,071
5,119
CVE-2023-31916
2023-05-12T14:15:09.847
Jerryscript 3.0 (commit 1a2c047) was discovered to contain an Assertion Failure via the jmem_heap_finalize at jerry-core/jmem/jmem-heap.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "617" ]
617
https://github.com/jerryscript-project/jerryscript/issues/5062
[ "Exploit", "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: https://github.com/jerryscript-project/jerryscript/commit/1a2c04763aba49f52b1537acd3730098c873511c Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --debug --compile-flag=-m32...
Assertion 'JERRY_CONTEXT (jmem_heap_allocated_size) == 0' failed at jerryscript/jerry-core/jmem/jmem-heap.c(jmem_heap_finalize):108.
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5062/comments
0
2023-04-06T13:12:15Z
2024-11-22T09:13:35Z
https://github.com/jerryscript-project/jerryscript/issues/5062
1,657,404,755
5,062
5,120
CVE-2023-31918
2023-05-12T14:15:09.890
Jerryscript 3.0 (commit 1a2c047) was discovered to contain an Assertion Failure via the parser_parse_function_arguments at jerry-core/parser/js/js-parser.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5064" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "617" ]
617
https://github.com/jerryscript-project/jerryscript/issues/5064
[ "Exploit", "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: https://github.com/jerryscript-project/jerryscript/commit/1a2c04763aba49f52b1537acd3730098c873511c Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --debug --compile-flag=-m32...
Assertion 'context_p->next_scanner_info_p->type == SCANNER_TYPE_FUNCTION' failed at jerryscript/jerry-core/parser/js/js-parser.c(parser_parse_function_arguments)
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5064/comments
0
2023-04-06T14:02:51Z
2023-04-06T14:02:51Z
https://github.com/jerryscript-project/jerryscript/issues/5064
1,657,488,796
5,064
5,121
CVE-2023-31919
2023-05-12T14:15:09.927
Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the jcontext_raise_exception at jerry-core/jcontext/jcontext.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5069" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "617" ]
617
https://github.com/jerryscript-project/jerryscript/issues/5069
[ "Exploit", "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: 05dbbd13[](05dbbd134c3b9e2482998f267857dd3722001cd7) Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --debug --compile-flag=-m32 --compile-flag=-fno-omit-frame-poi...
Assertion '!jcontext_has_pending_exception ()' failed at /jerryscript/jerry-core/jcontext/jcontext.c(jcontext_raise_exception):88.
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5069/comments
0
2023-04-16T13:13:26Z
2024-11-22T09:21:07Z
https://github.com/jerryscript-project/jerryscript/issues/5069
1,669,965,859
5,069
5,122
CVE-2023-31920
2023-05-12T14:15:09.963
Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the vm_loop at jerry-core/vm/vm.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5070" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "617" ]
617
https://github.com/jerryscript-project/jerryscript/issues/5070
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: 05dbbd13[](05dbbd134c3b9e2482998f267857dd3722001cd7) Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --debug --compile-flag=-m32 --compile-flag=-fno-omit-frame-poi...
Assertion 'ecma_find_named_property (func_obj_p, ecma_get_magic_string (LIT_MAGIC_STRING_NAME)) == NULL' failed at /jerryscript/jerry-core/vm/vm.c(vm_loop):2173.
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5070/comments
0
2023-04-19T03:29:02Z
2024-11-22T09:26:01Z
https://github.com/jerryscript-project/jerryscript/issues/5070
1,674,113,082
5,070
5,123
CVE-2023-31921
2023-05-12T14:15:10.007
Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the ecma_big_uint_div_mod at jerry-core/ecma/operations/ecma-big-uint.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5068" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "617" ]
617
https://github.com/jerryscript-project/jerryscript/issues/5068
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: 05dbbd13[](05dbbd134c3b9e2482998f267857dd3722001cd7) Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --debug --compile-flag=-m32 --compile-flag=-fno-omit-frame-poi...
Assertion 'dividend_end_p[0] == divisor_high && dividend_end_p[-1] < divisor_high' failed at /jerryscript/jerry-core/ecma/operations/ecma-big-uint.c(ecma_big_uint_div_mod)
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5068/comments
0
2023-04-08T14:19:33Z
2024-11-22T09:20:07Z
https://github.com/jerryscript-project/jerryscript/issues/5068
1,659,537,585
5,068
5,124
CVE-2023-31922
2023-05-12T14:15:10.043
QuickJS commit 2788d71 was discovered to contain a stack-overflow via the component js_proxy_isArray at quickjs.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/bellard/quickjs/issues/178" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/bellard/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:quickjs_project:quickjs:2022-03-06:*:*:*:*:*:*:*", "matchCriteriaId": "99632CE3-97CF-4901-BADD-4E8A8A659528", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "787" ]
787
https://github.com/bellard/quickjs/issues/178
[ "Exploit", "Issue Tracking" ]
github.com
[ "bellard", "quickjs" ]
QuickJS Version --- Version : https://github.com/bellard/quickjs/commit/2788d71e823b522b178db3b3660ce93689534e6d platform --- Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) Build --- - Address Sanitizer=On - Debug (and Release) PoC --- <details><summary>testcase</summary> <p> ```javascript ...
AddressSanitizer: stack-overflow
https://api.github.com/repos/bellard/quickjs/issues/178/comments
2
2023-04-22T08:59:26Z
2023-12-01T17:15:15Z
https://github.com/bellard/quickjs/issues/178
1,679,428,623
178
5,125
CVE-2023-31607
2023-05-15T15:15:11.573
An issue in the __libc_malloc component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1120
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE t1(x VARCHAR, k VARCHAR); CREATE INDEX t1i1 ON t1(c1,c2,c3,c4,c5,c6,c7,c8,c9,c10,c11,c12,c13,c14,c15,c16,c17,c18,c19,c20,c21,c22,c23,c24,c25,c26,c27,c28,c29,c30,c31,c32,c33,c34,c35,c36,c37,c38,c39,c40,c41,c42,c43,c44,c45,c46,c47,c48,c49,c50,c51,c52,c53,c54,...
virtuoso 7.2.9 crashed at __libc_malloc
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1120/comments
0
2023-04-12T18:42:34Z
2023-04-14T08:12:11Z
https://github.com/openlink/virtuoso-opensource/issues/1120
1,665,064,064
1,120
5,126
CVE-2023-31608
2023-05-15T15:15:11.623
An issue in the artm_div_int component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1123
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL SELECT CAST('-9223372036854775808' AS INTEGER) / CAST('-1' AS SMALLINT); ``` backtrace: ```c #0 0xc227a4 (artm_div_int+0xf4) #1 0xc23766 (artm_vec+0x7d6) #2 0x7518c2 (code_vec_run_v+0x10e2) #3 0x7ac3ff (qn_input+0x38f) #4 0x7ac8a6 (qn_send_output+0x236) #5 0x81e...
virtuoso 7.2.9 crashed at artm_div_int
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1123/comments
0
2023-04-12T18:49:08Z
2023-04-14T08:12:12Z
https://github.com/openlink/virtuoso-opensource/issues/1123
1,665,072,694
1,123
5,127
CVE-2023-31609
2023-05-15T15:15:11.673
An issue in the dfe_unit_col_loci component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1126" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1126
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE b ( folders VARCHAR(80), folderid VARCHAR(80), parentid VARCHAR(80), rootid VARCHAR(80), c INTEGER, path VARCHAR(80), id VARCHAR(80), i VARCHAR(80), d VARCHAR(80), e VARCHAR(80), f ...
virtuoso 7.2.9 crashed at dfe_unit_col_loci
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1126/comments
1
2023-04-12T18:58:35Z
2023-04-17T19:06:54Z
https://github.com/openlink/virtuoso-opensource/issues/1126
1,665,085,302
1,126
5,128
CVE-2023-31610
2023-05-15T15:15:11.720
An issue in the _IO_default_xsputn component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1118" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1118
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE t2(x VARCHAR, y VARCHAR, c VARCHAR); CREATE VIEW t2 AS SELECT * FROM t2; INSERT INTO t2 VALUES(8,8,RDF_SYS.xsd_hexBinary_fromBinary(SYSTEM_BASE64_ENCODE(zeroblob(200)))); ``` backtrace: ```c #0 0x7f87bcd56050 (_IO_default_xsputn+0xa0) #1 0x7f87bcd3b0f...
virtuoso 7.2.9 crashed at _IO_default_xsputn
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1118/comments
0
2023-04-12T18:33:19Z
2023-04-14T08:12:10Z
https://github.com/openlink/virtuoso-opensource/issues/1118
1,665,051,847
1,118
5,129
CVE-2023-31611
2023-05-15T15:15:11.770
An issue in the __libc_longjmp component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1119" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1119
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE hist ( cnt VARCHAR NOT NULL, y VARCHAR NOT NULL, z VARCHAR, PRIMARY KEY (cnt,y) ); CREATE TABLE t19d AS (SELECT * FROM hist UNION ALL SELECT 1234); ``` backtrace: ```c #0 0x7f523bf87dbe (__libc_longjmp+0xde) #1 0x5177d573a547bfaf -- no sym...
virtuoso 7.2.9 crashed at __libc_longjmp
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1119/comments
0
2023-04-12T18:38:29Z
2023-04-14T08:12:10Z
https://github.com/openlink/virtuoso-opensource/issues/1119
1,665,059,115
1,119
5,130
CVE-2023-31612
2023-05-15T15:15:11.813
An issue in the dfe_qexp_list component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1125" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1125
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE t1 ( x VARCHAR, y VARCHAR ); SELECT IFNULL(MIN(x), -1), IFNULL(MAX(x), -1) FROM ( SELECT x FROM t1 UNION ALL SELECT NULL ) AS temp; ``` backtrace: ```c #0 0x737010 (dfe_qexp_list+0x40) #1 0x73711d (dfe_qexp_list+0x14d) #2 0x747...
virtuoso 7.2.9 crashed at dfe_qexp_list
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1125/comments
1
2023-04-12T18:52:59Z
2023-04-17T19:07:44Z
https://github.com/openlink/virtuoso-opensource/issues/1125
1,665,077,173
1,125
5,131
CVE-2023-31613
2023-05-15T15:15:11.867
An issue in the __nss_database_lookup component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1121" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1121
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE t1 (c1 INT, c2 BINARY(100),c3 FLOAT); INSERT INTO t1 VALUES (100,'abcdefghij',3.0); CREATE TABLE t2 (c1 INT, c2 VARCHAR(100)); INSERT INTO t2 VALUES (2,'abcde'); UPDATE t1 SET c2 = (SELECT MAX(c1) FROM t2); ``` backtrace: ```c #0 0x7fd63dbe3a7d (__ns...
virtuoso 7.2.9 crashed at __nss_database_lookup
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1121/comments
0
2023-04-12T18:46:15Z
2023-04-17T09:13:45Z
https://github.com/openlink/virtuoso-opensource/issues/1121
1,665,069,177
1,121
5,132
CVE-2023-31614
2023-05-15T15:15:11.913
An issue in the mp_box_deserialize_string function in openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) after running a SELECT statement.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1117" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1117
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
## Description When running the following statement on an empty virtuoso-opensource database, the database just crashed: ```sql SELECT table_name as name, 'TABLE' as type, '' as parentname FROM information_schema.tables UNION SELECT column_name as name, data_type as type, table_name as parentname FROM informati...
virtuoso *crashed* after running a SELECT statement
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1117/comments
2
2023-04-10T17:55:59Z
2023-04-17T09:13:46Z
https://github.com/openlink/virtuoso-opensource/issues/1117
1,661,128,936
1,117
5,133
CVE-2023-31615
2023-05-15T15:15:11.963
An issue in the chash_array component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1124" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1124
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE t1(x INTEGER UNIQUE); CREATE TABLE k(v varchar(255), excluded varchar(255)); INSERT INTO t1(x, x, x, x, x, x, x) VALUES(16183,15638,6,0,5,2,0); SELECT 'one', t1.* FROM t1 LEFT JOIN k ON t1.x=k.v WHERE k.v IS NULL; ``` backtrace: ```c #0 0x4257c4 (chas...
virtuoso 7.2.9 crashed at chash_array
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1124/comments
0
2023-04-12T18:50:37Z
2023-04-14T12:55:18Z
https://github.com/openlink/virtuoso-opensource/issues/1124
1,665,074,357
1,124
5,134
CVE-2023-31616
2023-05-15T15:15:12.010
An issue in the bif_mod component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1122" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1122
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL SELECT MOD(-9223372036854775808, -1); ``` backtrace: ```c #0 0x66a32e (bif_mod+0xce) #1 0x74ae62 (sqlr_run_bif_in_sandbox+0x392) #2 0x79b598 (sqlp_patch_call_if_special_or_optimizable+0x1148) #3 0xccffe7 (scn3yyparse+0xc5d7) #4 0x6b995b (sql_compile_1+0x129b) #5...
virtuoso 7.2.9 crashed at bif_mod
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1122/comments
0
2023-04-12T18:47:44Z
2023-04-14T08:12:11Z
https://github.com/openlink/virtuoso-opensource/issues/1122
1,665,070,884
1,122
5,135
CVE-2023-31617
2023-05-15T15:15:12.057
An issue in the dk_set_delete component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1127" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1127
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE b ( folders VARCHAR(80), folderid VARCHAR(80), parentid VARCHAR(80), rootid VARCHAR(80), c INTEGER, path VARCHAR(80), id VARCHAR(80), i VARCHAR(80), d VARCHAR(80), e VARCHAR(80), f ...
virtuoso 7.2.9 crashed at dk_set_delete
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1127/comments
0
2023-04-12T19:01:25Z
2023-04-14T08:12:12Z
https://github.com/openlink/virtuoso-opensource/issues/1127
1,665,089,526
1,127
5,136
CVE-2023-31618
2023-05-15T15:15:12.110
An issue in the sqlc_union_dt_wrap component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1136" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1136
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL SELECT SUM(v), COUNT(*) FROM gstest_empty UNION ALL SELECT SUM(v), NULL FROM gstest_empty UNION ALL SELECT NULL, COUNT(*) FROM gstest_empty UNION ALL SELECT NULL, NULL ``` backtrace: ```c #0 0x81a65e (sqlc_union_dt_wrap+0x5e) #1 0x81a783 (sqlc_union_order+0x33...
virtuoso 7.2.9 crashed at sqlc_union_dt_wrap
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1136/comments
0
2023-04-12T19:34:10Z
2023-04-14T08:12:15Z
https://github.com/openlink/virtuoso-opensource/issues/1136
1,665,129,009
1,136
5,137
CVE-2023-31619
2023-05-15T15:15:12.170
An issue in the sch_name_to_object component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1133" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1133
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE t1(x VARCHAR, k VARCHAR, v VARCHAR); CREATE VIEW t1 AS SELECT x, x FROM t1; UPDATE t1 SET x = x + 100; ``` backtrace: ```c #0 0x6080d1 (sch_name_to_object+0x11) #1 0x7dcf6f (sqlc_update_searched+0x6f) #2 0x817cd1 (sqlc_update_view+0xaa1) #3 0x7ddad0...
virtuoso 7.2.9 crashed at sch_name_to_object
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1133/comments
1
2023-04-12T19:26:23Z
2023-04-14T08:41:03Z
https://github.com/openlink/virtuoso-opensource/issues/1133
1,665,120,116
1,133
5,138
CVE-2023-31620
2023-05-15T15:15:12.237
An issue in the dv_compare component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1128
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE element ( name VARCHAR(80), test1 VARCHAR(80), f1 VARCHAR(80), f2 VARCHAR(80), code INTEGER, t1 VARCHAR(80), a VARCHAR(80), example VARCHAR(80), b VARCHAR(80), c VARCHAR(80), folder...
virtuoso 7.2.9 crashed at dv_compare
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1128/comments
0
2023-04-12T19:03:51Z
2023-04-17T18:53:42Z
https://github.com/openlink/virtuoso-opensource/issues/1128
1,665,092,932
1,128
5,139
CVE-2023-31621
2023-05-15T15:15:12.300
An issue in the kc_var_col component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1130" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1130
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE brin_test(a INTEGER NOT NULL); INSERT INTO brin_test (a) VALUES(5); INSERT INTO brin_test (a) VALUES(5); ALTER TABLE brin_test ADD c1 VARCHAR(20) NOT NULL ; UPDATE brin_test SET a = a + 1 WHERE a = 5; ``` backtrace: ```c #0 0x5cfed5 (kc_var_col+0x1...
virtuoso 7.2.9 crashed at kc_var_col
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1130/comments
0
2023-04-12T19:18:19Z
2023-04-14T12:55:17Z
https://github.com/openlink/virtuoso-opensource/issues/1130
1,665,110,745
1,130
5,140
CVE-2023-31622
2023-05-15T15:15:12.347
An issue in the sqlc_make_policy_trig component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1135
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL DELETE FROM ucview WHERE CURRENT OF c1; ``` backtrace: ```c #0 0x7d8904 (sqlc_make_policy_trig+0x54) #1 0x7ddf99 (sqlc_delete_pos+0x2e9) #2 0x6b6e53 (sql_stmt_comp+0x453) #3 0x6ba122 (sql_compile_1+0x1a62) #4 0x7c8cd0 (stmt_set_query+0x340) #5 0x7cabc2 (sf_sql_e...
virtuoso 7.2.9 crashed at sqlc_make_policy_trig
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1135/comments
0
2023-04-12T19:32:30Z
2023-04-14T08:12:14Z
https://github.com/openlink/virtuoso-opensource/issues/1135
1,665,127,014
1,135
5,141
CVE-2023-31623
2023-05-15T15:15:12.390
An issue in the mp_box_copy component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1131" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1131
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE t1( x INTEGER PRIMARY KEY, k VARCHAR ); CREATE VIEW t1 AS SELECT k, k FROM t1; UPDATE t1 SET k = k-1 WHERE k > 100 AND x = 128; ``` backtrace: ```c #0 0xe086e9 (mp_box_copy+0x9) #1 0xe08dd0 (mp_box_copy_tree+0xc0) #2 0x815b3a (sqlc_col_t...
virtuoso 7.2.9 crashed at mp_box_copy
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1131/comments
1
2023-04-12T19:21:09Z
2023-04-14T08:41:41Z
https://github.com/openlink/virtuoso-opensource/issues/1131
1,665,114,015
1,131
5,142
CVE-2023-31624
2023-05-15T15:15:12.437
An issue in the sinv_check_exp component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1134
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE base_tbl (a int, b int); CREATE VIEW rw_view1 AS SELECT * FROM base_tbl; INSERT INTO rw_view1 VALUES (15); ``` backtrace: ```c #0 0x788dc0 (sinv_check_exp+0x120) #1 0x78a03d (sinv_sqlo_check_col_val+0xad) #2 0x816d50 (sqlc_insert_view+0x330) #3 0x6b...
virtuoso 7.2.9 crashed at sinv_check_exp
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1134/comments
0
2023-04-12T19:29:32Z
2023-04-14T08:12:14Z
https://github.com/openlink/virtuoso-opensource/issues/1134
1,665,123,657
1,134
5,143
CVE-2023-31625
2023-05-15T15:15:12.487
An issue in the psiginfo component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1132" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1132
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE t1 ( x LONG VARCHAR, a INTEGER DEFAULT 0, b LONG VARCHAR, t2 LONG VARCHAR ); CREATE VIEW t1 AS SELECT * FROM t1; INSERT INTO t1(t2, x, x) VALUES('one-toasted,one-null', '', repeat('1234567890',50000)); ``` backtrace: ```c #0 0x7f42...
virtuoso 7.2.9 crashed at psiginfo (maybe the same as #1118)
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1132/comments
1
2023-04-12T19:23:55Z
2023-04-14T08:20:16Z
https://github.com/openlink/virtuoso-opensource/issues/1132
1,665,117,118
1,132
5,144
CVE-2023-31626
2023-05-15T15:15:12.540
An issue in the gpf_notice component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1129" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1129
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
**This crash seems can only be reproduced when compiling virtuoso with --with-debug.** **When using the docker container, the SQL statement will strangely make the client shell STUCK, but will not crash the server.** The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE t4 ( a VARCHAR, b VARCHAR ); ...
virtuoso 7.2.9 crashed at gpf_notice
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1129/comments
0
2023-04-12T19:16:37Z
2023-04-14T08:12:13Z
https://github.com/openlink/virtuoso-opensource/issues/1129
1,665,108,794
1,129
5,145
CVE-2023-31627
2023-05-15T15:15:12.587
An issue in the strhash component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1140
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE t1 ( a varchar(255) DEFAULT NULL ); SELECT * FROM t1 WHERE CONTAINS(*, 'tutorial & (mysql & -VÐƷWİ)'); ``` backtrace: ```c #0 0xdece40 (strhash+0x20) #1 0xdec783 (id_hash_get+0x33) #2 0x59c5d1 (tb_name_to_column+0x41) #3 0x76aed1 (ot_is_defd+0x21...
virtuoso 7.2.9 crashed at strhash
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1140/comments
0
2023-04-12T19:41:37Z
2023-04-14T08:12:17Z
https://github.com/openlink/virtuoso-opensource/issues/1140
1,665,138,910
1,140
5,146
CVE-2023-31628
2023-05-15T15:15:12.633
An issue in the stricmp component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1141" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1141
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE t1 ( x VARCHAR, k VARCHAR ); CREATE VIEW t1 AS SELECT x, k FROM t1; INSERT INTO t1 VALUES ('x', 'y'); ``` backtrace: ```c #0 0xeff7b6 (stricmp+0x6) #1 0x607569 (strihashcmp+0x29) #2 0xdec7af (id_hash_get+0x5f) #3 0x607e58 (sch_name_to_object_...
virtuoso 7.2.9 crashed at stricmp (maybe the same as #1118)
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1141/comments
1
2023-04-12T19:43:47Z
2023-04-14T08:19:06Z
https://github.com/openlink/virtuoso-opensource/issues/1141
1,665,143,521
1,141
5,147
CVE-2023-31629
2023-05-15T15:15:12.677
An issue in the sqlo_union_scope component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1139" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1139
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL SELECT CASE WHEN EXISTS ( SELECT 1 FROM t2 WHERE x=1 INTERSECT SELECT 1 FROM t2 WHERE y=2 ) THEN 1 ELSE 0 END; ``` backtrace: ```c #0 0x76cd17 (sqlo_union_scope+0x67) #1 0x76cd10 (sqlo_union_scope+0x60) #2 0x76cd10 (sqlo_union_scope+0x60) #3 0x76dc84 ...
virtuoso 7.2.9 crashed at sqlo_union_scope
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1139/comments
0
2023-04-12T19:40:20Z
2023-04-14T08:12:16Z
https://github.com/openlink/virtuoso-opensource/issues/1139
1,665,136,195
1,139
5,148
CVE-2023-31630
2023-05-15T15:15:12.723
An issue in the sqlo_query_spec component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1138" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1138
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE mvtest_pdt1 AS (SELECT 1 AS col1) WITH DATA; ``` backtrace: ```c #0 0x70d571 (sqlo_query_spec+0x41) #1 0x7da2d4 (sqlc_insert+0x13b4) #2 0x6b7387 (sql_stmt_comp+0x987) #3 0x6ba122 (sql_compile_1+0x1a62) #4 0x68276d (bif_exec+0x67d) #5 0x74b044 (ins_c...
virtuoso 7.2.9 crashed at sqlo_query_spec
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1138/comments
0
2023-04-12T19:38:44Z
2023-04-14T08:12:16Z
https://github.com/openlink/virtuoso-opensource/issues/1138
1,665,134,343
1,138
5,149
CVE-2023-31631
2023-05-15T15:15:12.777
An issue in the sqlo_preds_contradiction component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1137" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1137
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE VIEW t1(a) AS SELECT 1; SELECT a, a, a FROM t1 WHERE a IN (1,5) AND a IN (9,8,3025,1000,3969) ORDER BY a, a DESC; ``` backtrace: ```c #0 0x6f6462 (sqlo_preds_contradiction+0x442) #1 0x6fec43 (sqlo_place_table+0xe23) #2 0x706bab (sqlo_try+0xdb) #3 0...
virtuoso 7.2.9 crashed at sqlo_preds_contradiction
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1137/comments
0
2023-04-12T19:36:18Z
2023-04-14T08:12:15Z
https://github.com/openlink/virtuoso-opensource/issues/1137
1,665,131,513
1,137
5,150
CVE-2023-31890
2023-05-16T16:15:10.343
An XML Deserialization vulnerability in glazedlists v1.11.0 allows an attacker to execute arbitrary code via the BeanXMLByteCoder.decode() parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/glazedlists/glazedlists/issues/709" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:glazedlists:glazed_lists:1.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "8694E3AB-31F4-48E5-B2DD-7EF368721DD6", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "502" ]
502
https://github.com/glazedlists/glazedlists/issues/709
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "glazedlists", "glazedlists" ]
vulnerability location: `ca.odell.glazedlists.impl.io.BeanXMLByteCoder` `BeanXMLByteCoder` class provides `decode()` method to decode the Object from a InputStream. When the `decode()` method is called, the program will call `XMLDecoder.readObject()` to parse the XML string without any check, which causing a XML ...
XML Deserialization vulnerability in BeanXMLByteCoder
https://api.github.com/repos/glazedlists/glazedlists/issues/709/comments
5
2023-04-26T11:01:08Z
2025-05-11T21:48:17Z
https://github.com/glazedlists/glazedlists/issues/709
1,684,793,557
709
5,151
CVE-2023-31544
2023-05-16T21:15:09.027
A stored cross-site scripting (XSS) vulnerability in alkacon-OpenCMS v11.0.0.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title field under the Upload Image module.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/alkacon/opencms-core/commit/21bfbeaf6b038e2c03bb421ce7f0933dd7a7633e" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "http...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alkacon:opencms:11.0:-:*:*:*:*:*:*", "matchCriteriaId": "745FD94C-C000-4E6B-B294-2805AC3616F2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "79" ]
79
https://github.com/alkacon/opencms-core/issues/652
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "alkacon", "opencms-core" ]
Hello Team, I would like to report a vulnerability (cross-site-scripting) which I have observed in current version v11.0.0.0 and before. Cross-Site Scripting (XSS) allows attacker to inject the malicious JavaScript as user input and then malicious script can access any cookies, session tokens, or other sensitive ...
Found Stored XSS in Opencms 11.0.0.0
https://api.github.com/repos/alkacon/opencms-core/issues/652/comments
0
2019-05-07T13:36:57Z
2019-08-27T13:31:17Z
https://github.com/alkacon/opencms-core/issues/652
441,237,287
652
5,152
CVE-2023-31848
2023-05-17T00:15:09.150
davinci 0.3.0-rc is vulnerable to Server-side request forgery (SSRF).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/edp963/davinci/issues/2326" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "h...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:davinci_project:davinci:0.3.0:rc:*:*:*:*:*:*", "matchCriteriaId": "DD59B0B9-4295-4442-B22D-93823ED9406F", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "918" ]
918
https://github.com/edp963/davinci/issues/2326
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "edp963", "davinci" ]
use a malicious mysql server: login and then Mysql JDBC Connection is set as a malicious server ![image](https://user-images.githubusercontent.com/103489279/233828650-d98596e5-8c65-41a4-afbb-e3fbed047bed.png) Click Test Connection two vulnerabilities : 1.arbitrary file read: ![image](https://user-images.git...
DataSource Mysql JDBC Connection has two vulnerabilities : arbitrary file read and Server-side request forgery(SSRF)
https://api.github.com/repos/edp963/davinci/issues/2326/comments
0
2023-04-23T08:40:55Z
2023-04-27T06:52:26Z
https://github.com/edp963/davinci/issues/2326
1,679,927,837
2,326
5,153
CVE-2023-31698
2023-05-17T13:15:09.463
Bludit v3.14.1 is vulnerable to Stored Cross Site Scripting (XSS) via SVG file on site logo. NOTE: the product's security model is that users are trusted by the administrator to insert arbitrary content (users cannot create their own accounts through self-registration).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/172462/Bludit-CMS-3.14.1-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/bludit/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1884F54-CD39-43CC-B52B-8B2335A09CDB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "79" ]
79
https://github.com/bludit/bludit/issues/1212#issuecomment-649514491
null
github.com
[ "bludit", "bludit" ]
### Describe your problem https://github.com/bludit/bludit/blob/master/bl-kernel/ajax/logo-upload.php Logo upload only determines the suffix, but not the content, which causes XSS and the user can inject any javascript and html code in the page payload ![image](https://user-images.githubusercontent.com/8120951...
Store XSS
https://api.github.com/repos/bludit/bludit/issues/1212/comments
10
2020-06-19T07:23:19Z
2022-02-22T16:10:21Z
https://github.com/bludit/bludit/issues/1212
641,764,976
1,212
5,154
CVE-2023-31698
2023-05-17T13:15:09.463
Bludit v3.14.1 is vulnerable to Stored Cross Site Scripting (XSS) via SVG file on site logo. NOTE: the product's security model is that users are trusted by the administrator to insert arbitrary content (users cannot create their own accounts through self-registration).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/172462/Bludit-CMS-3.14.1-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/bludit/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1884F54-CD39-43CC-B52B-8B2335A09CDB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "79" ]
79
https://github.com/bludit/bludit/issues/1369#issuecomment-940806199
null
github.com
[ "bludit", "bludit" ]
Hi i have identified a security vulnerability in your application. Kindly do let me know if we can discuss this in detail.
Alert: Vulnerability in bludit
https://api.github.com/repos/bludit/bludit/issues/1369/comments
6
2021-10-08T11:24:40Z
2021-10-19T07:40:57Z
https://github.com/bludit/bludit/issues/1369
1,020,989,213
1,369
5,155
CVE-2023-31698
2023-05-17T13:15:09.463
Bludit v3.14.1 is vulnerable to Stored Cross Site Scripting (XSS) via SVG file on site logo. NOTE: the product's security model is that users are trusted by the administrator to insert arbitrary content (users cannot create their own accounts through self-registration).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/172462/Bludit-CMS-3.14.1-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/bludit/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1884F54-CD39-43CC-B52B-8B2335A09CDB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "79" ]
79
https://github.com/bludit/bludit/issues/1509
[ "Exploit" ]
github.com
[ "bludit", "bludit" ]
**Description:** I found Stored Cross-site scripting (XSS) vulnerability in your Bludit - Flat-File CMS (v3.14.1) on "General" settings to "Logo" field. When I send malicious code use svg file after then the browser give me result. **CMS Version:** v3.14.1 **Affected URL:** http://127.0.0.1/bludit/admin/settin...
Stored XSS via SVG file Vulnerability on Bludit v3.14.1
https://api.github.com/repos/bludit/bludit/issues/1509/comments
2
2023-04-14T22:43:13Z
2023-07-10T21:54:40Z
https://github.com/bludit/bludit/issues/1509
1,669,025,725
1,509
5,156
CVE-2023-31699
2023-05-17T13:15:09.517
ChurchCRM v4.5.4 is vulnerable to Reflected Cross-Site Scripting (XSS) via image file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ChurchCRM/CRM/issues/6471" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ChurchCRM/CRM/issues/6471" } ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:churchcrm:churchcrm:4.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "B55D7EE2-CEB8-45EC-A48C-C0A8B90E4E53", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "79" ]
79
https://github.com/ChurchCRM/CRM/issues/6471
[ "Third Party Advisory" ]
github.com
[ "ChurchCRM", "CRM" ]
**If you have the ChurchCRM software running, please file an issue using the _Report an issue_ in the help menu.** #### On what page in the application did you find this issue? I got issue CSVImport.php page. #### On what type of server is this running? Dedicated / Shared hosting? Linux / Windows? Windows Ser...
XSS via Image File
https://api.github.com/repos/ChurchCRM/CRM/issues/6471/comments
4
2023-04-16T18:04:50Z
2024-05-27T02:46:17Z
https://github.com/ChurchCRM/CRM/issues/6471
1,670,071,780
6,471
5,157
CVE-2023-31725
2023-05-17T15:15:08.957
yasm 1.3.0.55.g101bc was discovered to contain a heap-use-after-free via the function expand_mmac_params at yasm/modules/preprocs/nasm/nasm-pp.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/DaisyPo/fuzzing-vulncollect/tree/main/yasm/heap-use-after-free/nasm-pp.c:3878%20in%20expand_mmac_params" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Is...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*", "matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ "416" ]
416
https://github.com/yasm/yasm/issues/221
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yasm", "yasm" ]
# There exists heap-use-after-free in yasm/modules/preprocs/nasm/nasm-pp.c:3878 in expand_mmac_params ## asan info: ``` ==708699==ERROR: AddressSanitizer: heap-use-after-free on address 0x60e0000012a8 at pc 0x55647c385147 bp 0x7ffe09f5d870 sp 0x7ffe09f5d860 READ of size 8 at 0x60e0000012a8 thread T0 #0 0x556...
There exists heap-use-after-free in yasm/modules/preprocs/nasm/nasm-pp.c:3878 in expand_mmac_params
https://api.github.com/repos/yasm/yasm/issues/221/comments
1
2023-04-17T16:39:42Z
2024-03-22T11:51:42Z
https://github.com/yasm/yasm/issues/221
1,671,576,475
221
5,158
CVE-2023-27233
2023-05-17T20:15:09.933
Piwigo before 13.6.0 was discovered to contain a SQL injection vulnerability via the order[0][dir] parameter at user_list_backend.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/renanavs/dcb13bb1cd618ce7eb0c80290b837245" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/Piwigo/Piwigo/issues/18...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:*", "matchCriteriaId": "86097A18-F13B-45AC-B24B-5A879C3A2DE2", "versionEndExcluding": "13.6.0", "versionEndIncluding": null, "versionStartExcludin...
[ "89" ]
89
https://github.com/Piwigo/Piwigo/issues/1872
[ "Release Notes" ]
github.com
[ "Piwigo", "Piwigo" ]
Without entering too much into details there is a possible SQL injection in file `admin/user_list_backend.php`. This file has no reason to be still in Piwigo since version 12 and the new user manager (which relies on `ws.php` as backend). This file must simply be removed.
[13.x] SQL injection on user_list_backend.php
https://api.github.com/repos/Piwigo/Piwigo/issues/1872/comments
0
2023-02-24T08:42:01Z
2023-02-24T08:42:44Z
https://github.com/Piwigo/Piwigo/issues/1872
1,598,184,264
1,872
5,159
CVE-2023-30124
2023-05-18T01:15:09.163
LavaLite v9.0.0 is vulnerable to Cross Site Scripting (XSS).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LavaLite/cms/issues/389#issue-1636041104" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lavalite:lavalite:9.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6150AF5B-17E6-4BFB-9980-F181A335022D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "79" ]
79
https://github.com/LavaLite/cms/issues/389#issue-1636041104
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LavaLite", "cms" ]
# I find a Stored XSS client user can use this vulnerability to attack administrator users,Can use js to send post request, indirectly operate the administrator account,a serious threat to website security。 # exploit client login site,and modify the account name to `</span><img src=1 onerror=alert(1) /><span>` no...
There is a Stored XSS
https://api.github.com/repos/LavaLite/cms/issues/389/comments
0
2023-03-22T15:44:16Z
2023-08-13T10:30:29Z
https://github.com/LavaLite/cms/issues/389
1,636,041,104
389
5,160
CVE-2023-29720
2023-05-18T20:15:09.357
SofaWiki <=3.8.9 is vulnerable to Cross Site Scripting (XSS) via index.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/bellenuit/sofawiki/issues/26" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sofawiki_project:sofawiki:*:*:*:*:*:*:*:*", "matchCriteriaId": "7860B5D2-9810-4846-89E3-1CE46CA3194A", "versionEndExcluding": null, "versionEndIncluding": "3.8.9", "versionSt...
[ "79" ]
79
https://github.com/bellenuit/sofawiki/issues/26
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "bellenuit", "sofawiki" ]
1. The variable name is being sanitized for XSS using the function swSimpleSanitize(). ``` // index.php $name = swGetArrayValue($_REQUEST,'name',$swMainName); $name = swSimpleSanitize($name); // XSS ``` 2. The function swSimpleSanitize() only filters "<" and ">". ``` // /inc/utilities.php function swSimpleSa...
[Vuln]There is a reflected XSS vulnerability.
https://api.github.com/repos/bellenuit/sofawiki/issues/26/comments
1
2023-03-15T04:52:26Z
2023-03-15T20:09:32Z
https://github.com/bellenuit/sofawiki/issues/26
1,624,742,932
26
5,161
CVE-2023-29720
2023-05-18T20:15:09.357
SofaWiki <=3.8.9 is vulnerable to Cross Site Scripting (XSS) via index.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/bellenuit/sofawiki/issues/26" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sofawiki_project:sofawiki:*:*:*:*:*:*:*:*", "matchCriteriaId": "7860B5D2-9810-4846-89E3-1CE46CA3194A", "versionEndExcluding": null, "versionEndIncluding": "3.8.9", "versionSt...
[ "79" ]
79
https://github.com/xul18/Showcase/issues/1
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "xul18", "Showcase" ]
**the name of an affected Product:** SofaWiki **the affected or fixed version(s):** SofaWiki < 3.8.9 Hotfix 8e1a572 **the CVE ID for the entry (if possible):** CVE-2023-29720 **a prose description:** SofaWiki is a filebased CMS built on PHP.There is a reflected XSS vulnerability.Details can be seen in [https...
XSS
https://api.github.com/repos/xul18/Showcase/issues/1/comments
0
2023-05-18T07:25:11Z
2023-05-18T07:25:21Z
https://github.com/xul18/Showcase/issues/1
1,715,156,164
1
5,162
CVE-2023-31862
2023-05-19T13:15:08.920
jizhicms v2.4.6 is vulnerable to Cross Site Scripting (XSS). The content of the article published in the front end is only filtered in the front end, without being filtered in the background, which allows attackers to publish an article containing malicious JavaScript scripts by modifying the request package.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Cherry-toto/jizhicms/issues/86" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thir...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jizhicms:jizhicms:2.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "04F7D759-846C-44B6-970B-81213312CBE0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "79" ]
79
https://github.com/Cherry-toto/jizhicms/issues/86
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Cherry-toto", "jizhicms" ]
The content of the article published in the front end is only filtered in the front end, without being filtered in the background, which allows attackers to publish an article containing malicious JavaScript scripts by modifying the request package. However, the backend administrator clicking on the article preview wil...
jizhicms v2.4.6 has a XSS vulnerability in the post article
https://api.github.com/repos/Cherry-toto/jizhicms/issues/86/comments
5
2023-04-23T03:02:05Z
2023-04-25T08:37:50Z
https://github.com/Cherry-toto/jizhicms/issues/86
1,679,831,200
86
5,163
CVE-2021-46888
2023-05-21T20:15:09.240
An issue was discovered in hledger before 1.23. A Stored Cross-Site Scripting (XSS) vulnerability exists in toBloodhoundJson that allows an attacker to execute JavaScript by encoding user-controlled values in a payload with base64 and parsing them with the atob function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/simonmichael/hledger/issues/1525" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Adv...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hledger:hledger:*:*:*:*:*:*:*:*", "matchCriteriaId": "600B56CE-4478-4153-A735-BE58CC01399E", "versionEndExcluding": "1.23", "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/simonmichael/hledger/issues/1525
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "simonmichael", "hledger" ]
hledger-web's forms sanitise obvious javascript, but not obfuscated javascript (cf https://owasp.org/www-community/xss-filter-evasion-cheatsheet). This means hledger-web instances, especially anonymously-writable ones like demo.hledger.org, could be loaded with malicious javascript to be executed by subsequent visitors...
XSS vulnerability: malicious javascript can be stored via hledger-web add/edit
https://api.github.com/repos/simonmichael/hledger/issues/1525/comments
4
2021-04-11T03:48:02Z
2023-07-22T06:25:59Z
https://github.com/simonmichael/hledger/issues/1525
855,210,963
1,525
5,164
CVE-2023-33297
2023-05-22T05:15:09.460
Bitcoin Core before 24.1, when debug mode is not used, allows attackers to cause a denial of service (e.g., CPU consumption) because draining the inventory-to-send queue is inefficient, as exploited in the wild in May 2023.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/bitcoin/bitcoin/blob/master/doc/release-notes/re...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD299C72-AD8C-479D-9606-2CE3FEA945FB", "versionEndExcluding": "24.1", "versionEndIncluding": null, "versionStartExc...
[ "400" ]
400
https://github.com/bitcoin/bitcoin/issues/27586
[ "Issue Tracking" ]
github.com
[ "bitcoin", "bitcoin" ]
I've been seeing 100% cpu usage on one of my bitcoind nodes recently, with transactions taking >60s to be accepted into the mempool. Digging into it, the problem seems to be `BOOST_MULTI_INDEX_ENABLE_SAFE_MODE` which was introduced in #24395. That results in iterator destruction taking O(n) time (in the number of othe...
CPU DoS on mainnet in debug mode
https://api.github.com/repos/bitcoin/bitcoin/issues/27586/comments
31
2023-05-06T02:00:35Z
2024-05-28T12:53:26Z
https://github.com/bitcoin/bitcoin/issues/27586
1,698,374,069
27,586
5,165
CVE-2023-33297
2023-05-22T05:15:09.460
Bitcoin Core before 24.1, when debug mode is not used, allows attackers to cause a denial of service (e.g., CPU consumption) because draining the inventory-to-send queue is inefficient, as exploited in the wild in May 2023.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/bitcoin/bitcoin/blob/master/doc/release-notes/re...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD299C72-AD8C-479D-9606-2CE3FEA945FB", "versionEndExcluding": "24.1", "versionEndIncluding": null, "versionStartExc...
[ "400" ]
400
https://github.com/bitcoin/bitcoin/issues/27623
[ "Issue Tracking" ]
github.com
[ "bitcoin", "bitcoin" ]
### Is there an existing issue for this? - [X] I have searched the existing issues ### Current behaviour We are the technical team from AntPool. We found that when the Bitcoin wallet node processes the process message recently, the single-threaded CPU 100% causes block parsing delays, resulting in serious technical ...
One core in CPU usage rate remains at 100% for a long time, causing serious delays in new blocks and forks
https://api.github.com/repos/bitcoin/bitcoin/issues/27623/comments
5
2023-05-11T07:49:14Z
2024-05-17T12:51:22Z
https://github.com/bitcoin/bitcoin/issues/27623
1,705,261,393
27,623
5,166
CVE-2023-33297
2023-05-22T05:15:09.460
Bitcoin Core before 24.1, when debug mode is not used, allows attackers to cause a denial of service (e.g., CPU consumption) because draining the inventory-to-send queue is inefficient, as exploited in the wild in May 2023.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/bitcoin/bitcoin/blob/master/doc/release-notes/re...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD299C72-AD8C-479D-9606-2CE3FEA945FB", "versionEndExcluding": "24.1", "versionEndIncluding": null, "versionStartExc...
[ "400" ]
400
https://github.com/dogecoin/dogecoin/issues/3243#issuecomment-1712575544
null
github.com
[ "dogecoin", "dogecoin" ]
**edit**: this was a dos/crash that ran resources sky high and could've netsplit bitcoin and could probably still rock dogecoin, litecoin and even bitcoin because i outmaneuver core like a monster in the game you heard me https://nvd.nist.gov/vuln/detail/CVE-2023-33297 this cve links to this issue tbh thanks **origin...
remote p2p bandwidth/cpu attack
https://api.github.com/repos/dogecoin/dogecoin/issues/3243/comments
14
2023-04-04T10:02:54Z
2025-04-29T04:36:01Z
https://github.com/dogecoin/dogecoin/issues/3243
1,653,572,803
3,243
5,167
CVE-2023-31689
2023-05-22T20:15:10.887
In Wcms 0.3.2, an attacker can send a crafted request from a vulnerable web application backend server /wcms/wex/html.php via the finish parameter and the textAreaCode parameter. It can write arbitrary strings into custom file names and upload any files, and write malicious code to execute scripts to trigger command ex...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/vedees/wcms/issues/15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/vedees/wcms/i...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wcms:wcms:0.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "95CE7D1E-E919-449E-88D4-F6A0FCADFAF0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "434" ]
434
https://github.com/vedees/wcms/issues/15
[ "Exploit", "Issue Tracking" ]
github.com
[ "vedees", "wcms" ]
Hi, dev team! The code in this file is vulnerable: Arbitrary file write And execute the command through this file # Vulnerability discovery Vulnerable code found on lines 20 to 23 in the /wcms/wex/html.php file ```php if (isset($_GET['finish'])) { $path = $_GET['finish']; file_put_contents($path, $_POST['...
Arbitrary file write vulnerability in /wcms/wex/html.php
https://api.github.com/repos/vedees/wcms/issues/15/comments
0
2023-04-14T16:41:40Z
2023-04-14T17:36:38Z
https://github.com/vedees/wcms/issues/15
1,668,576,560
15
5,168
CVE-2023-31708
2023-05-23T01:15:09.960
A Cross-Site Request Forgery (CSRF) in EyouCMS v1.6.2 allows attackers to execute arbitrary commands via a supplying a crafted HTML file to the Upload software format function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/41" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/weng-...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B87F220-D05C-4885-8C0E-E5BD8D8DFB66", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "352" ]
352
https://github.com/weng-xianhu/eyoucms/issues/41
[ "Exploit", "Issue Tracking" ]
github.com
[ "weng-xianhu", "eyoucms" ]
let's see the operation: First,we should add the js and html in "Upload software format" . Second,we clicked the submit,and use Burp suite to Intercept the packet. <img width="1251" alt="屏幕截图 2023-04-16 170400" src="https://user-images.githubusercontent.com/60973265/232288495-074b92f6-7789-4a20-879d-ef7fd31a3a08.p...
Three csrf vulnerabilities, you can modify Settings, you can delete articles, you can delete users
https://api.github.com/repos/weng-xianhu/eyoucms/issues/41/comments
0
2023-04-16T10:54:52Z
2024-03-22T06:50:30Z
https://github.com/weng-xianhu/eyoucms/issues/41
1,669,861,738
41
5,169
CVE-2023-31826
2023-05-23T01:15:10.127
Skyscreamer Open Source Nevado JMS v1.3.2 does not perform security checks when receiving messages. This allows attackers to execute arbitrary commands via supplying crafted data.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://nevado.skyscreamer.org/" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/skyscreamer/nevado/issues/121" }, { "source": "cve@mitre.org", "tags": [ ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:skyscreamer:nevado_jms:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "37A120A3-A27D-498C-AA78-6CE81B8AF39B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "862" ]
862
https://github.com/skyscreamer/nevado/issues/121
[ "Issue Tracking" ]
github.com
[ "skyscreamer", "nevado" ]
I have a security vulnerability that I want to report to this project, but I cannot contact the email on the official website,prompt "The system cannot find the email address screamers@skyscreamer.org ” or "The system cannot find the email address nevado-dev@skyscreamer.org ”. Is there no one running it? If the develo...
Is this project still operated by anyone else?
https://api.github.com/repos/skyscreamer/nevado/issues/121/comments
0
2023-04-14T03:11:17Z
2023-05-18T01:40:19Z
https://github.com/skyscreamer/nevado/issues/121
1,667,441,255
121
5,170
CVE-2023-31669
2023-05-23T12:15:09.173
WebAssembly wat2wasm v1.0.32 allows attackers to cause a libc++abi.dylib crash by putting '@' before a quote (").
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/wabt/issues/2165" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announc...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:webassembly_binary_toolkit:1.0.32:*:*:*:*:*:*:*", "matchCriteriaId": "AFE1D9C5-6B44-494E-9964-8B5A1374C154", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "116" ]
116
https://github.com/WebAssembly/wabt/issues/2165
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "WebAssembly", "wabt" ]
### Describe the bug '@' before a quote (") causes a libc++abi.dylib crash while converting ".wat" format into ".wasm" format using wat2wasm. `wat2wasm --version`: 1.0.32 (git~1.0.32-35-g9990b0cf) --------------- The following minimized code causes wat2wasm to crash. ``` (module (memory $mem 1) ;;(@...
'@' before a quote (") causes a libc++abi.dylib crash using wat2wasm.
https://api.github.com/repos/WebAssembly/wabt/issues/2165/comments
2
2023-03-09T23:07:30Z
2023-06-17T09:47:53Z
https://github.com/WebAssembly/wabt/issues/2165
1,618,118,032
2,165
5,171
CVE-2023-33359
2023-05-23T14:15:09.813
Piwigo 13.6.0 is vulnerable to Cross Site Request Forgery (CSRF) in the "add tags" function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Piwigo/Piwigo/issues/1908" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Piwigo/Pi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:13.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B279DE47-F1F5-4BB9-A47B-1C9B73DD9076", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "352" ]
352
https://github.com/Piwigo/Piwigo/issues/1908
[ "Exploit", "Issue Tracking" ]
github.com
[ "Piwigo", "Piwigo" ]
This vulnerability lies in the 'add tags' function in the backend. ![image](https://user-images.githubusercontent.com/27283436/235408051-ac0c44e8-32e0-4912-a260-83f0b8891db2.png) Try creating a new label here. ![image](https://user-images.githubusercontent.com/27283436/235408127-ba083289-7885-4be2-8ce4-942db7401af...
There is a CSRF vulnerability in the "add tags" function of piwigo
https://api.github.com/repos/Piwigo/Piwigo/issues/1908/comments
3
2023-05-01T04:58:37Z
2023-05-05T08:07:10Z
https://github.com/Piwigo/Piwigo/issues/1908
1,690,372,075
1,908
5,172
CVE-2023-33361
2023-05-23T14:15:09.863
Piwigo 13.6.0 is vulnerable to SQL Injection via /admin/permalinks.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/Piwigo/Piwigo/issues/1910" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:13.6.0:-:*:*:*:*:*:*", "matchCriteriaId": "C0F29243-1953-4593-9D93-65BAF0D5D0EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "89" ]
89
https://github.com/Piwigo/Piwigo/issues/1910
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "Piwigo", "Piwigo" ]
Before replicating this vulnerability, you need to first create a new album and access the "photos_add" function, and choose to create a new album ![image](https://user-images.githubusercontent.com/27283436/235838268-ab39be83-c3da-446c-bb35-714a9dfd6c7d.png) //like this ![image](https://user-images.githubusercontent...
There is a SQL Injection in the "permalinks" function of piwigo
https://api.github.com/repos/Piwigo/Piwigo/issues/1910/comments
0
2023-05-03T06:02:27Z
2023-05-05T08:24:43Z
https://github.com/Piwigo/Piwigo/issues/1910
1,693,458,747
1,910
5,173
CVE-2023-33362
2023-05-23T14:15:09.917
Piwigo 13.6.0 is vulnerable to SQL Injection via in the "profile" function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/Piwigo/Piwigo/issues/1911" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:13.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B279DE47-F1F5-4BB9-A47B-1C9B73DD9076", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "89" ]
89
https://github.com/Piwigo/Piwigo/issues/1911
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "Piwigo", "Piwigo" ]
Accessing the 'profile' page ![image](https://user-images.githubusercontent.com/27283436/236197441-196a43d0-f0ba-43ac-9448-f029bec196c7.png) Add the 'user_id' parameter with single quotes ![image](https://user-images.githubusercontent.com/27283436/236197644-ae97d84c-4296-4721-aa16-b21665c9500e.png) Discovering ...
There is a SQL Injection in the "profile" function of piwigo
https://api.github.com/repos/Piwigo/Piwigo/issues/1911/comments
0
2023-05-04T12:22:34Z
2023-05-05T08:25:03Z
https://github.com/Piwigo/Piwigo/issues/1911
1,695,904,246
1,911
5,174
CVE-2023-33599
2023-05-23T15:15:09.343
EasyImages2.0 ≤ 2.8.1 is vulnerable to Cross Site Scripting (XSS) via viewlog.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/icret/EasyImages2.0/issues/115" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:easyimages2.0_project:easyimages2.0:*:*:*:*:*:*:*:*", "matchCriteriaId": "7726676D-5277-4B11-80A3-E05703A11242", "versionEndExcluding": "2.8.3", "versionEndIncluding": null, ...
[ "79" ]
79
https://github.com/icret/EasyImages2.0/issues/115
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "icret", "EasyImages2.0" ]
# EasyImages2.0 Cross-site scripting(xss) vulnerability ## Impact version EasyImages2.0 ≤ 2.8.1 ## Analysis Report #### Vulnerability file /app/viewlog.php When displaying logs, the file directly outputs the log content to the front-end page without taking any preventive measures #### Vulnerability exploit...
EasyImages2.0 Cross-site scripting(xss) vulnerability
https://api.github.com/repos/icret/EasyImages2.0/issues/115/comments
1
2023-05-11T06:54:28Z
2023-05-13T16:50:28Z
https://github.com/icret/EasyImages2.0/issues/115
1,705,186,404
115
5,175
CVE-2023-31518
2023-05-23T20:15:09.947
A heap use-after-free in the component CDataFileReader::GetItem of teeworlds v0.7.5 allows attackers to cause a Denial of Service (DoS) via a crafted map file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/manba-bryant/9ca95d69c65f4d2c55946932c946fb9b" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/teeworlds/teeworld...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:teeworlds:teeworlds:0.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "C8D5BD38-F074-48E6-89FF-64FB9BAD3B3C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "416" ]
416
https://github.com/teeworlds/teeworlds/issues/2970
[ "Exploit", "Issue Tracking" ]
github.com
[ "teeworlds", "teeworlds" ]
The client crashes (only with ASAN) when an invalid map ([3.map.zip](https://github.com/teeworlds/teeworlds/files/7402684/3.map.zip)) is loaded. Such a map can be delivered to the client by a malicious server. Tested on Ubuntu 20.04 x86_64, Teeworlds version: [f35da54b6f2c5f9fd4bbd4559f887ccf8f8cc526](https://github...
Heap use after free (read) while loading map in CDataFileReader::GetItem, datafile.cpp:406
https://api.github.com/repos/teeworlds/teeworlds/issues/2970/comments
0
2021-10-23T10:25:51Z
2021-11-28T09:06:51Z
https://github.com/teeworlds/teeworlds/issues/2970
1,034,134,339
2,970
5,176
CVE-2023-31860
2023-05-23T20:15:10.040
Wuzhi CMS v3.1.2 has a storage type XSS vulnerability in the backend of the Five Finger CMS b2b system.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/wuzhicms/b2b/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/wuzhicms/b2b/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wuzhicms:wuzhi_cms:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "552B5653-A850-4D01-A659-253F424096DF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "79" ]
79
https://github.com/wuzhicms/b2b/issues/3
[ "Exploit", "Issue Tracking" ]
github.com
[ "wuzhicms", "b2b" ]
Affected version: Wuzhi CMS v3.1.2 Github download address: https://github.com/wuzhicms/b2b Usage tool: Burpsuite Vulnerability recurrence process: (1) Firstly, enter the website backend, click on the extension module, and then click on online payment, as shown in the following figure: ![图片](https://user-image...
There is a storage type XSS vulnerability in the backend of the Five Finger CMS b2b system v3.1.2
https://api.github.com/repos/wuzhicms/b2b/issues/3/comments
0
2023-04-24T10:01:57Z
2023-04-24T10:01:57Z
https://github.com/wuzhicms/b2b/issues/3
1,680,896,765
3
5,177
CVE-2021-25748
2023-05-24T17:15:09.253
A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use a newline character to bypass the sanitization of the `spec.rules[].http.paths[].path` field of an Ingress object (in the `networking.k8s.io` or `extensions` API group) to obtain the credentials of the ingres...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integri...
[ { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking", "Mitigation", "Vendor Advisory" ], "url": "https://github.com/kubernetes/ingress-nginx/issues/8686" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Mitigation", "Vendor Advis...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:ingress-nginx:*:*:*:*:*:*:*:*", "matchCriteriaId": "E43BDC85-F198-4126-B487-21F6C3667561", "versionEndExcluding": "1.2.1", "versionEndIncluding": null, "versionSta...
[ "20" ]
20
https://github.com/kubernetes/ingress-nginx/issues/8686
[ "Issue Tracking", "Mitigation", "Vendor Advisory" ]
github.com
[ "kubernetes", "ingress-nginx" ]
### Issue Details A security issue was discovered in [ingress-nginx](https://github.com/kubernetes/ingress-nginx) where a user that can create or update ingress objects can use a newline character to bypass the sanitization of the `spec.rules[].http.paths[].path` field of an Ingress object (in the `networking.k8s.io` ...
CVE-2021-25748: Ingress-nginx `path` sanitization can be bypassed with newline character
https://api.github.com/repos/kubernetes/kubernetes/issues/126814/comments
8
2022-06-10T16:01:41Z
2024-08-20T13:21:36Z
https://github.com/kubernetes/kubernetes/issues/126814
2,475,632,907
126,814
5,178
CVE-2023-33785
2023-05-24T20:15:10.210
A stored cross-site scripting (XSS) vulnerability in the Create Rack Roles (/dcim/rack-roles/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/netbox/issues/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/n...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/anhdq201/netbox/issues/8
[ "Exploit", "Issue Tracking" ]
github.com
[ "anhdq201", "netbox" ]
# Version: 3.5.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Rack Roles" function in the "Organization" feature. # Proof of Concept **Step 1:** Go to `/dcim/rack-roles/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`...
Stored Cross Site Scripting Vulnerability in "Create Rack Roles" function in Netbox 3.5.1
https://api.github.com/repos/anhdq201/netbox/issues/8/comments
0
2023-05-18T16:20:48Z
2023-05-18T16:20:48Z
https://github.com/anhdq201/netbox/issues/8
1,715,908,948
8
5,179
CVE-2023-33786
2023-05-24T20:15:10.263
A stored cross-site scripting (XSS) vulnerability in the Create Circuit Types (/circuits/circuit-types/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/netbox/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/n...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/anhdq201/netbox/issues/2
[ "Exploit", "Issue Tracking" ]
github.com
[ "anhdq201", "netbox" ]
# Version: 3.5.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Circuit Types" function in the "Circuits" feature. # Proof of Concept **Step 1:** Go to `/circuits/circuit-types/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cooki...
Stored Cross Site Scripting Vulnerability in "Create Circuit Types" function in Netbox 3.5.1
https://api.github.com/repos/anhdq201/netbox/issues/2/comments
0
2023-05-18T15:09:47Z
2023-05-18T15:25:56Z
https://github.com/anhdq201/netbox/issues/2
1,715,807,069
2
5,180
CVE-2023-33787
2023-05-24T20:15:10.317
A stored cross-site scripting (XSS) vulnerability in the Create Tenant Groups (/tenancy/tenant-groups/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/netbox/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/n...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/anhdq201/netbox/issues/6
[ "Exploit", "Issue Tracking" ]
github.com
[ "anhdq201", "netbox" ]
# Version: 3.5.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Tenant Groups" function in the "Organization" feature. # Proof of Concept **Step 1:** Go to `/tenancy/tenant-groups/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.co...
Stored Cross Site Scripting Vulnerability in "Create Tenant Groups" function in Netbox 3.5.1
https://api.github.com/repos/anhdq201/netbox/issues/6/comments
0
2023-05-18T16:08:05Z
2023-05-18T16:08:05Z
https://github.com/anhdq201/netbox/issues/6
1,715,892,519
6
5,181
CVE-2023-33788
2023-05-24T20:15:10.373
A stored cross-site scripting (XSS) vulnerability in the Create Providers (/circuits/providers/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/netbox/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/n...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/anhdq201/netbox/issues/3
[ "Exploit", "Issue Tracking" ]
github.com
[ "anhdq201", "netbox" ]
# Version: 3.5.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Providers" function in the "Circuits" feature. # Proof of Concept **Step 1:** Go to `/circuits/providers/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" ...
Stored Cross Site Scripting Vulnerability in "Create Providers" function in Netbox 3.5.1
https://api.github.com/repos/anhdq201/netbox/issues/3/comments
0
2023-05-18T15:18:30Z
2023-05-18T15:25:34Z
https://github.com/anhdq201/netbox/issues/3
1,715,819,719
3
5,182
CVE-2023-33789
2023-05-24T20:15:10.430
A stored cross-site scripting (XSS) vulnerability in the Create Contact Groups (/tenancy/contact-groups/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/netbox/issues/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/n...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/anhdq201/netbox/issues/7
[ "Exploit", "Issue Tracking" ]
github.com
[ "anhdq201", "netbox" ]
# Version: 3.5.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Contact Groups" function in the "Organization" feature. # Proof of Concept **Step 1:** Go to `/tenancy/contact-groups/`, click "Add" and insert payload "`<img src=1 onerror='alert(document....
Stored Cross Site Scripting Vulnerability in "Create Contact Groups" function in Netbox 3.5.1
https://api.github.com/repos/anhdq201/netbox/issues/7/comments
0
2023-05-18T16:12:20Z
2023-05-18T16:12:20Z
https://github.com/anhdq201/netbox/issues/7
1,715,897,991
7
5,183
CVE-2023-33790
2023-05-24T20:15:10.487
A stored cross-site scripting (XSS) vulnerability in the Create Locations (/dcim/locations/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/netbox/issues/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/n...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/anhdq201/netbox/issues/9
[ "Exploit", "Issue Tracking" ]
github.com
[ "anhdq201", "netbox" ]
# Version: 3.5.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Locations" function in the "Organization" feature. # Proof of Concept **Step 1:** Go to `/dcim/locations/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" ...
Stored Cross Site Scripting Vulnerability in "Create Locations" function in Netbox 3.5.1
https://api.github.com/repos/anhdq201/netbox/issues/9/comments
0
2023-05-18T16:26:30Z
2023-05-18T16:30:19Z
https://github.com/anhdq201/netbox/issues/9
1,715,915,970
9
5,184
CVE-2023-33791
2023-05-24T20:15:10.543
A stored cross-site scripting (XSS) vulnerability in the Create Provider Accounts (/circuits/provider-accounts/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/netbox/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/n...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/anhdq201/netbox/issues/4
[ "Exploit", "Issue Tracking" ]
github.com
[ "anhdq201", "netbox" ]
# Version: 3.5.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Provider Accounts" function in the "Circuits" feature. # Proof of Concept **Step 1:** Go to `/circuits/provider-accounts/`, click "Add" and insert payload "`<img src=1 onerror='alert(docume...
Stored Cross Site Scripting Vulnerability in "Create Provider Accounts" function in Netbox 3.5.1
https://api.github.com/repos/anhdq201/netbox/issues/4/comments
0
2023-05-18T15:25:19Z
2023-05-18T15:25:19Z
https://github.com/anhdq201/netbox/issues/4
1,715,829,577
4
5,185
CVE-2023-33792
2023-05-24T20:15:10.607
A stored cross-site scripting (XSS) vulnerability in the Create Site Groups (/dcim/site-groups/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/netbox/issues/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/anhdq201/netbox/issues/10
[ "Exploit", "Issue Tracking" ]
github.com
[ "anhdq201", "netbox" ]
# Version: 3.5.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Site Groups" function in the "Organization" feature. # Proof of Concept **Step 1:** Go to `/dcim/site-groups/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/...
Stored Cross Site Scripting Vulnerability in "Create Site Groups" function in Netbox 3.5.1
https://api.github.com/repos/anhdq201/netbox/issues/10/comments
0
2023-05-18T16:29:59Z
2023-05-18T16:29:59Z
https://github.com/anhdq201/netbox/issues/10
1,715,921,814
10
5,186
CVE-2023-33793
2023-05-24T20:15:10.663
A stored cross-site scripting (XSS) vulnerability in the Create Power Panels (/dcim/power-panels/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/netbox/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/n...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/anhdq201/netbox/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "anhdq201", "netbox" ]
# Version: 3.5.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Power Panels" function in the "Power" feature. # Proof of Concept **Step 1:** Go to `/dcim/power-panels/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" i...
Stored Cross Site Scripting Vulnerability in "Create Power Panels" function in Netbox 3.5.1
https://api.github.com/repos/anhdq201/netbox/issues/1/comments
0
2023-05-18T15:04:10Z
2023-05-18T15:26:12Z
https://github.com/anhdq201/netbox/issues/1
1,715,798,041
1
5,187
CVE-2023-33794
2023-05-24T20:15:10.717
A stored cross-site scripting (XSS) vulnerability in the Create Tenants (/tenancy/tenants/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/netbox/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/n...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/anhdq201/netbox/issues/5
[ "Exploit", "Issue Tracking" ]
github.com
[ "anhdq201", "netbox" ]
# Version: 3.5.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Tenants" function in the "Organization" feature. # Proof of Concept **Step 1:** Go to `/tenancy/tenants/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" i...
Stored Cross Site Scripting Vulnerability in "Create Tenants" function in Netbox 3.5.1
https://api.github.com/repos/anhdq201/netbox/issues/5/comments
0
2023-05-18T16:03:50Z
2023-05-18T16:03:50Z
https://github.com/anhdq201/netbox/issues/5
1,715,886,167
5
5,188
CVE-2023-33795
2023-05-24T20:15:10.773
A stored cross-site scripting (XSS) vulnerability in the Create Contact Roles (/tenancy/contact-roles/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/netbox/issues/15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/anhdq201/netbox/issues/15
[ "Exploit", "Issue Tracking" ]
github.com
[ "anhdq201", "netbox" ]
# Version: 3.5.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Contacts" function in the "Organization" feature. # Proof of Concept **Step 1:** Go to `/tenancy/contact-roles/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)...
Stored Cross Site Scripting Vulnerability in "Create Contact Roles" function in Netbox 3.5.1
https://api.github.com/repos/anhdq201/netbox/issues/15/comments
0
2023-05-18T16:44:45Z
2023-05-18T16:44:45Z
https://github.com/anhdq201/netbox/issues/15
1,715,942,924
15
5,189