cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2023-42443
2023-09-18T21:16:13.403
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine (EVM). In version 0.3.9 and prior, under certain conditions, the memory used by the builtins `raw_call`, `create_from_blueprint` and `create_copy_of` can be corrupted. For `raw_call`, the argument buffer of the call can be corrupted, leading t...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integ...
[ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/vyperlang/vyper/issues/3609" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*", "matchCriteriaId": "34B59539-E37F-462A-BB24-D952D027FAC5", "versionEndExcluding": "0.3.10", "versionEndIncluding": null, "versionStartE...
[ "787" ]
787
https://github.com/vyperlang/vyper/issues/3609
[ "Issue Tracking", "Vendor Advisory" ]
github.com
[ "vyperlang", "vyper" ]
tracking issue for https://github.com/vyperlang/vyper/security/advisories/GHSA-c647-pxm2-c52w
tracking issue for GHSA-c647-pxm2-c52w (memory initialization in builtins using msize)
https://api.github.com/repos/vyperlang/vyper/issues/3609/comments
1
2023-09-18T19:35:08Z
2023-09-25T15:30:18Z
https://github.com/vyperlang/vyper/issues/3609
1,901,615,052
3,609
5,591
CVE-2023-42446
2023-09-18T22:15:47.247
Pow is a authentication and user management solution for Phoenix and Plug-based apps. Starting in version 1.0.14 and prior to version 1.0.34, use of `Pow.Store.Backend.MnesiaCache` is susceptible to session hijacking as expired keys are not being invalidated correctly on startup. A session may expire when all `Pow.Stor...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/pow-auth/pow/issues/713" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/pow-auth/pow/sec...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powauth:pow:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C454727-43EF-432A-BBE4-528F776FB9BA", "versionEndExcluding": "1.0.34", "versionEndIncluding": null, "versionStartExcluding"...
[ "672" ]
672
https://github.com/pow-auth/pow/issues/713
[ "Exploit", "Issue Tracking" ]
github.com
[ "pow-auth", "pow" ]
Hello all! :) I have recently noticed a peculiar scenario in an API using Mnesia-backed Pow in production which I'm interested in reproducing to get to the bottom of it, but I've had no success thus far. Due to reasons yet unknown some sessions are seemingly persisting in the cache even after their TTL has passed...
Persistence of stale session ids in MnesiaCache
https://api.github.com/repos/pow-auth/pow/issues/713/comments
10
2023-09-13T20:37:24Z
2023-09-18T18:18:49Z
https://github.com/pow-auth/pow/issues/713
1,895,228,996
713
5,592
CVE-2023-42454
2023-09-18T22:15:47.547
SQLpage is a SQL-only webapp builder. Someone using SQLpage versions prior to 0.11.1, whose SQLpage instance is exposed publicly, with a database connection string specified in the `sqlpage/sqlpage.json` configuration file (not in an environment variable), with the web_root is the current working directory (the default...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "int...
[ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/lovasoa/SQLpage/issues/89" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes" ], "url": "https://github.com/lovasoa/SQLpage/re...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lovasoa:sqlpage:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC021A69-5F81-44F0-BB82-D20DD5E8F5EC", "versionEndExcluding": "0.11.1", "versionEndIncluding": null, "versionStartExclud...
[ "200" ]
200
https://github.com/lovasoa/SQLpage/issues/89
[ "Issue Tracking", "Patch" ]
github.com
[ "lovasoa", "SQLpage" ]
With the browser, we can download the files in the sqlpage folder. For example, it's possible to read the `sqlpage.json` configuration file. It's a security problem. The sqlpage folder must be keep hidden. It's possible to set rewrite rules on the proxy side to block the download. But, I think that it will be cool t...
The sqlpage folder can be read by HTTP client requests
https://api.github.com/repos/sqlpage/SQLPage/issues/89/comments
3
2023-09-18T07:34:12Z
2023-09-18T18:18:57Z
https://github.com/sqlpage/SQLPage/issues/89
1,900,340,633
89
5,593
CVE-2023-42399
2023-09-19T04:15:55.347
Cross Site Scripting vulnerability in xdsoft.net Jodit Editor v.4.0.0-beta.86 allows a remote attacker to obtain sensitive information via the rich text editor component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://jodit.com" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/xdan/jodit/issues/1017" }, { "source": "cve@mitre.org", "tags": [ "Product" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xdsoft:joditeditor:4.0.0:beta86:*:*:*:*:*:*", "matchCriteriaId": "74969402-E432-4197-BF0A-E2B20187D58C", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "79" ]
79
https://github.com/xdan/jodit/issues/1017
[ "Third Party Advisory" ]
github.com
[ "xdan", "jodit" ]
CVE ID: CVE-2023-42399 PRODUCT: JoditEditor < v.4.0.0-beta.86 DETAILS: Jodit Editor v.4.0.0 beta.86 has an XSS vulnerability where the rich text editor does not completely filter out malicious XSS attack statements. Using payload:<iframe src="JavaScript: alert (/xss/)"> can trigger
CVE-2023-42399
https://api.github.com/repos/xdan/jodit/issues/1017/comments
3
2023-09-18T12:46:48Z
2024-11-22T02:49:45Z
https://github.com/xdan/jodit/issues/1017
1,900,861,832
1,017
5,594
CVE-2023-26144
2023-09-20T05:15:39.923
Versions of the package graphql from 16.3.0 and before 16.8.1 are vulnerable to Denial of Service (DoS) due to insufficient checks in the OverlappingFieldsCanBeMergedRule.ts file when parsing large queries. This vulnerability allows an attacker to degrade system performance. **Note:** It was not proven that this vulne...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integ...
[ { "source": "report@snyk.io", "tags": [ "Patch" ], "url": "https://github.com/graphql/graphql-js/commit/f94b511386c7e47bd0380dcd56553dc063320226" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "http...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:graphql:graphql:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "F350F09D-E2EC-454B-AE86-D1685AFDD9D2", "versionEndExcluding": "16.8.1", "versionEndIncluding": null, "versionStart...
[ "400" ]
400
https://github.com/graphql/graphql-js/issues/3955
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "graphql", "graphql-js" ]
Re-posting here as advised in https://github.com/apollographql/apollo-server/issues/7688. Without digging into source code I'm not exactly sure which part of graphql-js is causing this. ### Issue Description We've identified a potential resource exhaustion vector which has a significant impact on our CPU and resp...
Resource exhaustion exploit when parsing queries
https://api.github.com/repos/graphql/graphql-js/issues/3955/comments
7
2023-08-18T01:14:29Z
2023-09-14T10:42:22Z
https://github.com/graphql/graphql-js/issues/3955
1,855,898,635
3,955
5,596
CVE-2023-43616
2023-09-20T06:15:10.523
An issue was discovered in Croc through 9.6.5. A sender can cause a receiver to overwrite files during ZIP extraction.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/09/21/5" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:schollz:croc:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B173A01-5175-444D-9651-68AD4E2C30C2", "versionEndExcluding": null, "versionEndIncluding": "9.6.5", "versionStartExcluding"...
[ "22" ]
22
https://github.com/schollz/croc/issues/594
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "schollz", "croc" ]
As mentioned in issue #593 there is a check on the receiver side of Croc whether an incoming file path will overwrite an existing file, and Croc will ask the user interactively whether it should be overwritten, if it already exists. This check works reasonably well, even if symlinks are involved. I did not look that de...
Interactive File Overwrite Prompt can be Circumvented by Sending ZIP file
https://api.github.com/repos/schollz/croc/issues/594/comments
4
2023-09-08T11:23:36Z
2024-05-20T15:33:12Z
https://github.com/schollz/croc/issues/594
1,887,485,959
594
5,597
CVE-2023-43617
2023-09-20T06:15:10.617
An issue was discovered in Croc through 9.6.5. When a custom shared secret is used, the sender and receiver may divulge parts of this secret to an untrusted Relay, as part of composing a room name.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2023/09/21/5" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/schollz/cr...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:schollz:croc:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B173A01-5175-444D-9651-68AD4E2C30C2", "versionEndExcluding": null, "versionEndIncluding": "9.6.5", "versionStartExcluding"...
[ "200" ]
200
https://github.com/schollz/croc/issues/596
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "schollz", "croc" ]
The leading three characters of the shared secret are implicitly used to select a common "room name" at the relay so that sender and receiver can find each other (croc.go:827, croc.go:769, croc.go:572, croc.go:483). When using shared secrets generated by Croc this is fine, because they are formatted just so that the...
Use of Parts of the Shared Secret as Room Name
https://api.github.com/repos/schollz/croc/issues/596/comments
4
2023-09-08T11:39:58Z
2024-05-20T16:08:51Z
https://github.com/schollz/croc/issues/596
1,887,513,001
596
5,598
CVE-2023-43618
2023-09-20T06:15:10.693
An issue was discovered in Croc through 9.6.5. The protocol requires a sender to provide its local IP addresses in cleartext via an ips? message.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2023/09/21/5" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/schollz/croc/issues/597" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:schollz:croc:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B173A01-5175-444D-9651-68AD4E2C30C2", "versionEndExcluding": null, "versionEndIncluding": "9.6.5", "versionStartExcluding"...
[ "311" ]
311
https://github.com/schollz/croc/issues/597
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "schollz", "croc" ]
As a typical part of the Croc protocol (if no explicit `--ip` is passed), the receiver will ask the sender about its locally assigned IP addresses via the `ips?` message (croc.go:792). This message and its reply are sent unencrypted. I assume there is no encryption, because the receiver might still switch the connectio...
Unencrypted "ips?" Message Leaks Information from the Sender Side
https://api.github.com/repos/schollz/croc/issues/597/comments
4
2023-09-08T11:48:36Z
2024-05-20T16:38:45Z
https://github.com/schollz/croc/issues/597
1,887,526,520
597
5,599
CVE-2023-43619
2023-09-20T06:15:10.773
An issue was discovered in Croc through 9.6.5. A sender may send dangerous new files to a receiver, such as executable content or a .ssh/authorized_keys file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2023/09/21/5" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/schollz/cr...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:schollz:croc:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B173A01-5175-444D-9651-68AD4E2C30C2", "versionEndExcluding": null, "versionEndIncluding": "9.6.5", "versionStartExcluding"...
[ "434" ]
434
https://github.com/schollz/croc/issues/593
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "schollz", "croc" ]
If more than one file is transferred via Croc then, before the transfer starts, the receiver only sees a summary line about the files about to be received, like: Accept 2 files (159 B)? (Y/n) Only after confirming this dialog the full file reception list will be printed, like: Receiving (<-[ip]:[port])...
Possible (Concealed) Creation of Files in Dangerous Path Locations
https://api.github.com/repos/schollz/croc/issues/593/comments
16
2023-09-08T11:12:32Z
2024-07-24T12:45:10Z
https://github.com/schollz/croc/issues/593
1,887,469,185
593
5,600
CVE-2023-43620
2023-09-20T06:15:10.870
An issue was discovered in Croc through 9.6.5. A sender may place ANSI or CSI escape sequences in a filename to attack the terminal device of a receiver.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2023/09/21/5" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/schollz/cr...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:schollz:croc:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B173A01-5175-444D-9651-68AD4E2C30C2", "versionEndExcluding": null, "versionEndIncluding": "9.6.5", "versionStartExcluding"...
[ "116" ]
116
https://github.com/schollz/croc/issues/595
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "schollz", "croc" ]
Filenames on Linux can contain arbitrary characters except for the path separator '/'. Thus filenames can also contain possibly dangerous characters like ASCII control codes (newline, linefeed, etc.) or even complete ANSI/CSI terminal escape sequences. On the Croc receiver side the filenames communicated by the send...
Escape Sequences in Filenames are not Filtered
https://api.github.com/repos/schollz/croc/issues/595/comments
5
2023-09-08T11:29:52Z
2024-07-24T12:50:32Z
https://github.com/schollz/croc/issues/595
1,887,497,669
595
5,601
CVE-2023-42464
2023-09-20T15:15:11.817
A Type Confusion vulnerability was found in the Spotlight RPC functions in afpd in Netatalk 3.1.x before 3.1.17. When parsing Spotlight RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the underlying protoco...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/Netatalk/netatalk/issues/486" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netatalk:netatalk:*:*:*:*:*:*:*:*", "matchCriteriaId": "D77B6D18-12B6-4124-B5A9-D202B7521EB7", "versionEndExcluding": "3.1.17", "versionEndIncluding": null, "versionStartExcl...
[ "843" ]
843
https://github.com/Netatalk/netatalk/issues/486
[ "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "Netatalk", "netatalk" ]
A Type Confusion vulnerability was found in the Spotlight RPC functions in Netatalk's afpd daemon. When parsing Spotlight RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the underlying protocol. Due to a la...
CVE-2023-42464
https://api.github.com/repos/Netatalk/netatalk/issues/486/comments
2
2023-09-16T16:13:51Z
2024-07-06T11:11:45Z
https://github.com/Netatalk/netatalk/issues/486
1,899,486,268
486
5,602
CVE-2023-41484
2023-09-20T20:15:11.747
An issue in cimg.eu Cimg Library v2.9.3 allows an attacker to obtain sensitive information via a crafted JPEG file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/eddieantonio/imgcat/issues/49" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cimg:cimg:2.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "210DEF50-BD39-432B-9B35-80F58CDF4C2C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "401" ]
401
https://github.com/eddieantonio/imgcat/issues/49
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "eddieantonio", "imgcat" ]
this bug was found with afl. proof: ================================================================= ==26325==ERROR: LeakSanitizer: detected memory leaks Direct leak of 7499 byte(s) in 1 object(s) allocated from: #0 0x7f7716c54cef in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_d...
A flaw of memory leak
https://api.github.com/repos/eddieantonio/imgcat/issues/49/comments
1
2022-08-19T09:31:54Z
2023-10-30T15:40:59Z
https://github.com/eddieantonio/imgcat/issues/49
1,344,193,223
49
5,603
CVE-2023-42331
2023-09-20T20:15:11.853
A file upload vulnerability in EliteCMS v1.01 allows a remote attacker to execute arbitrary code via the manage_uploads.php component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Num-Nine/CVE/issues/2" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "ur...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:elitecms:elite_cms:1.01:*:*:*:-:*:*:*", "matchCriteriaId": "6A277BC1-8C5E-49E5-A76C-8E1DFE30420E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "434" ]
434
https://github.com/Num-Nine/CVE/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Num-Nine", "CVE" ]
1.Loopholes in the http://127.0.0.1/CVE-Target/elitecms/admin/manage_uploads.php 2.Upload an a.php content as <? php phpinfo(); ? > 3.Click add image 4.Go to http://127.0.0.1/CVE-Target/elitecms/uploads/a.php
Any file is uploaded to eliteCMS
https://api.github.com/repos/QianGeG/CVE/issues/2/comments
0
2023-09-04T16:12:33Z
2023-09-04T16:12:33Z
https://github.com/QianGeG/CVE/issues/2
1,880,577,320
2
5,604
CVE-2023-42331
2023-09-20T20:15:11.853
A file upload vulnerability in EliteCMS v1.01 allows a remote attacker to execute arbitrary code via the manage_uploads.php component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Num-Nine/CVE/issues/2" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "ur...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:elitecms:elite_cms:1.01:*:*:*:-:*:*:*", "matchCriteriaId": "6A277BC1-8C5E-49E5-A76C-8E1DFE30420E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "434" ]
434
https://github.com/Num-Nine/CVE/issues/4
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Num-Nine", "CVE" ]
null
Any file is uploaded to eliteCMS1.01
https://api.github.com/repos/QianGeG/CVE/issues/4/comments
1
2023-09-19T02:52:11Z
2023-09-19T02:56:23Z
https://github.com/QianGeG/CVE/issues/4
1,902,114,633
4
5,605
CVE-2023-36109
2023-09-20T22:15:12.750
Buffer Overflow vulnerability in JerryScript version 3.0, allows remote attackers to execute arbitrary code via ecma_stringbuilder_append_raw component at /jerry-core/ecma/base/ecma-helpers-string.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/Limesss/CVE-2023-36109/tree/main" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5080" },...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6DB8D818-8F21-4FD3-8D4D-A024A6346CB4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "120" ]
120
https://github.com/jerryscript-project/jerryscript/issues/5080
[ "Exploit", "Issue Tracking" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Version: v3.0.0 ###### Build platform Linux cqian-s2 5.4.0-148-generic #165-Ubuntu SMP Tue Apr 18 08:53:12 UTC 2023 x86_64 x86_64 x86_64 GNU/Linu ###### Build steps python ./tools/build.py --clean --debug --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer --compile-flag=-f...
==1327323==ERROR: AddressSanitizer: memcpy-param-overlap: memory ranges [0x55fb3005c209,0x55fc3005c205) and [0x55fc3005c0f8, 0x55fd3005c0f4) overlap
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5080/comments
0
2023-05-10T17:32:09Z
2023-09-22T10:24:05Z
https://github.com/jerryscript-project/jerryscript/issues/5080
1,704,361,322
5,080
5,606
CVE-2023-36234
2023-09-20T22:15:12.920
Cross Site Scripting (XSS) vulnerability in Netbox 3.5.1, allows attackers to execute arbitrary code via Name field in device-roles/add function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/gozan10/cve/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/gozan10/cve/is...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/gozan10/cve/issues/6
[ "Exploit", "Issue Tracking" ]
github.com
[ "gozan10", "cve" ]
Exploit Title: XSS Stored Vulnerability in netbox Version: 3.5.1 (https://github.com/netbox-community/netbox) Date: 22/05/2023 Exploit Author: Gozan Contact: https://github.com/gozan10 Product: netbox (https://github.com/netbox-community/netbox) Vendor: netbox Version: 3.5.1 Description: XSS Stored exitst in modu...
CVE netbox 1
https://api.github.com/repos/gozan10/cve/issues/6/comments
0
2023-05-22T03:08:51Z
2023-06-13T04:11:39Z
https://github.com/gozan10/cve/issues/6
1,718,810,642
6
5,607
CVE-2023-42261
2023-09-21T22:15:11.823
Mobile Security Framework (MobSF) <=v3.7.8 Beta is vulnerable to Insecure Permissions. NOTE: the vendor's position is that authentication is intentionally not implemented because the product is not intended for an untrusted network environment. Use cases requiring authentication could, for example, use a reverse proxy ...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/MobSF/Mobile-Security-Framework-MobSF/blob/abb47659a19ac772765934f184c65fe16cb3bee7/docker-compose.yml#L30-L31" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensecurity:mobile_security_framework:*:*:*:*:*:*:*:*", "matchCriteriaId": "33891183-C56B-4054-8CC8-5AE4BF10C711", "versionEndExcluding": null, "versionEndIncluding": "3.7.6", ...
[ "276" ]
276
https://github.com/MobSF/Mobile-Security-Framework-MobSF/issues/1211
[ "Issue Tracking", "Vendor Advisory" ]
github.com
[ "MobSF", "Mobile-Security-Framework-MobSF" ]
First of all, thank you for your effort you put it in sech as great tools like this, I am suggested to add an authentication method on your tools for login to the portal. Also add some categorization of the users such as (admin, analyst, etc.). Also, it will be better for using MobSF in enterprise environment if it ...
[FEATURE] Add authentication method
https://api.github.com/repos/MobSF/Mobile-Security-Framework-MobSF/issues/1211/comments
5
2019-12-30T07:33:15Z
2024-05-24T19:22:07Z
https://github.com/MobSF/Mobile-Security-Framework-MobSF/issues/1211
543,779,545
1,211
5,608
CVE-2023-42261
2023-09-21T22:15:11.823
Mobile Security Framework (MobSF) <=v3.7.8 Beta is vulnerable to Insecure Permissions. NOTE: the vendor's position is that authentication is intentionally not implemented because the product is not intended for an untrusted network environment. Use cases requiring authentication could, for example, use a reverse proxy ...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/MobSF/Mobile-Security-Framework-MobSF/blob/abb47659a19ac772765934f184c65fe16cb3bee7/docker-compose.yml#L30-L31" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensecurity:mobile_security_framework:*:*:*:*:*:*:*:*", "matchCriteriaId": "33891183-C56B-4054-8CC8-5AE4BF10C711", "versionEndExcluding": null, "versionEndIncluding": "3.7.6", ...
[ "276" ]
276
https://github.com/MobSF/Mobile-Security-Framework-MobSF/issues/748
[ "Issue Tracking", "Vendor Advisory" ]
github.com
[ "MobSF", "Mobile-Security-Framework-MobSF" ]
<!-- ## IMPORTANT --> <!-- Issues are ONLY for reporting bugs and feature requests. For support, questions, queries and discussions use our slack channel. Slack Channel: https://mobsf.slack.com/ , Get Invitation: https://goo.gl/6cYU5a --> ## EXPLANATION OF THE ISSUE I'd like the end user to login the system first, ...
Do you have authentication for MobSF?
https://api.github.com/repos/MobSF/Mobile-Security-Framework-MobSF/issues/748/comments
5
2018-10-15T03:57:09Z
2024-05-24T19:21:03Z
https://github.com/MobSF/Mobile-Security-Framework-MobSF/issues/748
369,989,849
748
5,609
CVE-2023-5002
2023-09-22T14:15:47.213
A flaw was found in pgAdmin. This issue occurs when the pgAdmin server HTTP API validates the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. Versions of pgAdmin prior to 7.6 failed to properly control the server code executed on this API, allowing an authenticated user to run arbit...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integr...
[ { "source": "patrick@puiterwijk.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2239164" }, { "source": "patrick@puiterwijk.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pgadmin:pgadmin:*:*:*:*:*:postgresql:*:*", "matchCriteriaId": "15620E97-9BD2-4309-84E7-53EBF74D0CDE", "versionEndExcluding": "7.7", "versionEndIncluding": null, "versionStart...
[ "78" ]
78
https://github.com/pgadmin-org/pgadmin4/issues/6763
[ "Issue Tracking", "Patch" ]
github.com
[ "pgadmin-org", "pgadmin4" ]
Vulnerable versions: All prior to v7.6. The pgAdmin server includes an HTTP API that is intended to be used to validate the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. The utility is executed by the server to determine what PostgreSQL version it is from. Versions of pgAdmi...
Remote command Execution by an Authenticated user in pgAdmin 4
https://api.github.com/repos/pgadmin-org/pgadmin4/issues/6763/comments
1
2023-09-18T07:37:52Z
2025-03-13T18:56:35Z
https://github.com/pgadmin-org/pgadmin4/issues/6763
1,900,345,701
6,763
5,610
CVE-2023-43144
2023-09-22T15:15:12.827
Projectworldsl Assets-management-system-in-php 1.0 is vulnerable to SQL Injection via the "id" parameter in delete.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/projectworldsofficial/Assets-management-system-in-php/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:projectworlds:asset_management_system_project_in_php:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "025FA6B8-8B8C-435A-90FF-FAE7DA881F1C", "versionEndExcluding": null, "versionEndIncluding": nu...
[ "89" ]
89
https://github.com/projectworldsofficial/Assets-management-system-in-php/issues/2
[ "Exploit", "Issue Tracking" ]
github.com
[ "projectworldsofficial", "Assets-management-system-in-php" ]
**Steps to reproduce** 1. Create new account 2. Add new asset 3. Click on delete asset 4. Intercept the request and insert the payload in the value of parameter. 5. Forward the request Payload: ``` http://localhost/delete.php?id=4 AND (SELECT 8445 FROM (SELECT(SLEEP(5)))pmFJ) ``` **PoC** ``` sqlma...
SQL Injection vulnerability via the "id" parameter in delete.php
https://api.github.com/repos/projectworldsofficial/Assets-management-system-in-php/issues/2/comments
0
2023-09-08T14:02:47Z
2023-09-08T14:02:47Z
https://github.com/projectworldsofficial/Assets-management-system-in-php/issues/2
1,887,752,416
2
5,611
CVE-2023-42798
2023-09-22T16:15:09.753
AutomataCI is a template git repository equipped with a native built-in semi-autonomous CI tools. An issue in versions 1.4.1 and below can let a release job reset the git root repository to the first commit. Version 1.5.0 has a patch for this issue. As a workaround, make sure the `PROJECT_PATH_RELEASE` (e.g. `releases/...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrit...
[ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/ChewKeanHo/AutomataCI/issues/93" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/ChewKeanHo...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hollowaykeanho:automataci:*:*:*:*:*:*:*:*", "matchCriteriaId": "38ABEABE-2FD7-4B8C-B5B2-DDC892D2CE75", "versionEndExcluding": "1.5.0", "versionEndIncluding": null, "versionSt...
[ "20" ]
20
https://github.com/ChewKeanHo/AutomataCI/issues/93
[ "Issue Tracking", "Patch" ]
github.com
[ "ChewKeanHo", "AutomataCI" ]
### Description Apparently, if the releases directory is missing or malformed, Release job will hard reset the root repository to its first commit and official nuke the project. This is not desirable and safety check must me added here to prevent this from happening again. ### Expected Behavior Safety check is added...
Release Job Can Reset Git Root Repo to Nothing
https://api.github.com/repos/ChewKeanHo/AutomataCI/issues/93/comments
4
2023-09-20T03:07:07Z
2023-09-23T04:21:42Z
https://github.com/ChewKeanHo/AutomataCI/issues/93
1,904,016,759
93
5,612
CVE-2023-43338
2023-09-23T00:15:20.170
Cesanta mjs v2.20.0 was discovered to contain a function pointer hijacking vulnerability via the function mjs_get_ptr(). This vulnerability allows attackers to execute arbitrary code via a crafted input.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/cesanta/mjs/issues/250" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "787" ]
787
https://github.com/cesanta/mjs/issues/250
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "cesanta", "mjs" ]
# Function Pointer Hijack mjs/mjs.c in mjs_execute ## Affected Projects mjs 2.20.0 (https://github.com/cesanta/mjs) ## Problem Type CWE-822 (Untrusted Pointer Dereference) ## Description I discovered a vulnerability that could potentially lead to function pointer hijacking. I believe this is a logical vulnera...
Function Pointer Hijack mjs/mjs.c in mjs_execute
https://api.github.com/repos/cesanta/mjs/issues/250/comments
1
2023-09-17T15:24:27Z
2023-09-23T01:24:00Z
https://github.com/cesanta/mjs/issues/250
1,899,819,562
250
5,613
CVE-2023-0833
2023-09-27T15:16:03.257
A flaw was found in Red Hat's AMQ-Streams, which ships a version of the OKHttp component with an information disclosure flaw via an exception triggered by a header containing an illegal value. This issue could allow an authenticated attacker to access information outside of their regular permissions.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integ...
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2023:1241" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2023:3223" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:squareup:okhttp:*:*:*:*:*:*:*:*", "matchCriteriaId": "BEEBF288-A5A0-49DE-9291-249B9C805B35", "versionEndExcluding": "4.9.2", "versionEndIncluding": null, "versionStartExcludi...
[ "209" ]
209
https://github.com/square/okhttp/issues/6738
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "square", "okhttp" ]
If there's an illegal character in a header value, an IllegalArgumentException is thrown whose message includes the full header value. This is particularly bad if the header name is Authorization or Proxy-Authorization, which strongly suggests that the value is sensitive information. Just because it contains a non-p...
Exception for bad header can leak an Authorization secret
https://api.github.com/repos/square/okhttp/issues/6738/comments
16
2021-07-02T16:56:02Z
2022-11-30T16:31:29Z
https://github.com/square/okhttp/issues/6738
935,929,433
6,738
5,614
CVE-2023-43314
2023-09-27T23:15:12.057
** UNSUPPORTED WHEN ASSIGNED **The buffer overflow vulnerability in the Zyxel PMG2005-T20B firmware version V1.00(ABNK.2)b11_C0 could allow an unauthenticated attacker to cause a denial of service condition via a crafted uid.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "security@zyxel.com.tw", "tags": null, "url": "https://github.com/Rumble00/Rumble/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/Rumble00/Rumble/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:pmg2005-t20b_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D89EE1EA-F041-45D5-9E10-CC23F162373F", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "120" ]
120
https://github.com/Rumble00/Rumble/issues/1
null
github.com
[ "Rumble00", "Rumble" ]
# Rumble ZYXEL-PMG2005-T20B has a denial of service vulnerability.Buffer Overflow vulnerability in ZYXEL ZYXEL v.PMG2005-T20B allows a remote attacker to cause a denial of service via a crafted script to the uid parameter in the cgi-bin/login.asp component. Zyxel is a leading global provider of comprehensive commun...
ZYXEL-PMG2005-T20B has a denial of service vulnerability
https://api.github.com/repos/Rumble00/Rumble/issues/1/comments
0
2023-09-15T09:04:29Z
2024-01-30T02:08:14Z
https://github.com/Rumble00/Rumble/issues/1
1,898,016,105
1
5,615
CVE-2023-26149
2023-09-28T05:15:46.023
Versions of the package quill-mention before 4.0.0 are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization, via the renderList function. **Note:** If the mentions list is sourced from unsafe (user-sourced) data, this might allow an injection attack when a Quill user hits @.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "report@snyk.io", "tags": [ "Exploit" ], "url": "https://codepen.io/ALiangLiang/pen/mdQMJXK" }, { "source": "report@snyk.io", "tags": [ "Broken Link" ], "url": "https://github.com/quill-mention/quill-mention/blob/0aa9847719257496b14ac5401872c4e2ffcbc3d1/sr...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:quill-mention:quill_mention:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "FB0D0A07-8B68-4670-A50F-E1E9F45557BA", "versionEndExcluding": "4.0.0", "versionEndIncluding": null, "v...
[ "79" ]
79
https://github.com/quill-mention/quill-mention/issues/255
[ "Exploit", "Issue Tracking" ]
github.com
[ "quill-mention", "quill-mention" ]
In renderList, the list items are rendered using innerHTML with no escaping. If the mentions list is sourced from unsafe (user-sourced) data, this might allow an injection attack when a Quill user hits @. https://github.com/quill-mention/quill-mention/blob/0aa9847719257496b14ac5401872c4e2ffcbc3d1/src/quill.mention....
Uses innerHTML - potentially allows injection attacks
https://api.github.com/repos/quill-mention/quill-mention/issues/255/comments
14
2022-06-24T01:27:16Z
2023-09-11T13:18:38Z
https://github.com/quill-mention/quill-mention/issues/255
1,283,140,468
255
5,616
CVE-2023-5258
2023-09-29T12:15:13.093
A vulnerability classified as critical has been found in OpenRapid RapidCMS 1.3.1. This affects an unknown part of the file /resource/addgood.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/OpenRapid/rapidcms/issues/9" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/yhy217/rapidcms-vul/issues/4" }, { "sou...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrapid:rapidcms:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "D66CF166-4A08-45F5-9577-38D3CE25AFBA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "89" ]
89
https://github.com/OpenRapid/rapidcms/issues/9
[ "Issue Tracking" ]
github.com
[ "OpenRapid", "rapidcms" ]
RapidCMS Dev.1.3.1 was discovered to contain SQL injection vulnerability in /resource/addgood.php For more details, see: https://github.com/yhy217/rapidcms-vul/issues/4
SQL injection vulnerability exists in RapidCMS Dev.1.3.1 --3
https://api.github.com/repos/OpenRapid/rapidcms/issues/9/comments
0
2023-09-18T03:27:14Z
2023-09-18T09:28:01Z
https://github.com/OpenRapid/rapidcms/issues/9
1,900,098,851
9
5,617
CVE-2023-5262
2023-09-29T14:15:11.163
A vulnerability has been found in OpenRapid RapidCMS 1.3.1 and classified as critical. Affected by this vulnerability is the function isImg of the file /admin/config/uploadicon.php. The manipulation of the argument fileName leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclose...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/OpenRapid/rapidcms/issues/10" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/yhy217/rapidcms-vul/issues/5" }, { "so...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrapid:rapidcms:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "D66CF166-4A08-45F5-9577-38D3CE25AFBA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "434" ]
434
https://github.com/OpenRapid/rapidcms/issues/10
[ "Issue Tracking" ]
github.com
[ "OpenRapid", "rapidcms" ]
RapidCMS exists arbitrary file upload vulnerability in Icon upload operation For more details, see: https://github.com/yhy217/rapidcms-vul/issues/5
RapidCMS exists arbitrary file upload vulnerability in Icon upload operation
https://api.github.com/repos/OpenRapid/rapidcms/issues/10/comments
0
2023-09-18T09:26:24Z
2023-09-18T09:27:21Z
https://github.com/OpenRapid/rapidcms/issues/10
1,900,525,198
10
5,618
CVE-2023-5287
2023-09-29T21:15:10.097
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as problematic, was found in BEECMS 4.0. This affects an unknown part of the file /admin/admin_content_tag.php?action=save_content. The manipulation of the argument tag leads to cross site scripting. It is possible to initiate the attack remotely. Th...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/zhenjiaqi/CVE/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.co...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:beecms:beecms:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A4B13A33-C004-4AD8-A910-BA4A47604F90", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "79" ]
79
https://github.com/zhenjiaqi/CVE/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "zhenjiaqi", "CVE" ]
1. Download address: 1. http://beescms.com/cxxz.html 2. https://pan.baidu.com/s/1slSoqIx 2. The vulnerability is located at: /admin/admin_content_tag.php? action=save_content 3. The packet is as follows: POST /bees4.0/admin/admin_content_tag.php?action=save_content HTTP/1.1 Host: 127.0.0.1 User-A...
beescms4.0 has storage xss
https://api.github.com/repos/zhenjiaqi/CVE/issues/1/comments
0
2023-09-24T03:15:11Z
2023-09-24T03:25:27Z
https://github.com/zhenjiaqi/CVE/issues/1
1,910,074,724
1
5,619
CVE-2023-5293
2023-09-29T21:15:10.177
A vulnerability, which was classified as critical, was found in ECshop 4.1.5. Affected is an unknown function of the file /admin/leancloud.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The iden...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PAR...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xhcccan/code/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ],...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:shopex:ecshop:4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "FD6705D1-6449-4965-94CB-FE08E169D848", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "89" ]
89
https://github.com/xhcccan/code/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "xhcccan", "code" ]
1. First log in to the backend, then visit the page below and use burp to capture the packet and obtain the corresponding cookie. /ECShop_V4.1.5/source/ecshop/admin/leancloud.php?id=123 Note: The cookie must be the following key-value pair. If one item is missing, it means that the correct package is not captured...
EcShop v4.1.5 SQL injection vulnerability
https://api.github.com/repos/xhcccan/code/issues/1/comments
0
2023-09-24T10:00:49Z
2023-09-24T10:01:41Z
https://github.com/xhcccan/code/issues/1
1,910,177,226
1
5,620
CVE-2023-44270
2023-09-29T22:15:11.867
An issue was discovered in PostCSS before 8.4.31. The vulnerability affects linters using PostCSS to parse external untrusted CSS. An attacker can prepare CSS in such a way that it will contains parts parsed by PostCSS as a CSS comment. After processing by PostCSS, it will be included in the PostCSS output in CSS nodes...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/github/advisory-database/issues/2820" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/postcss/postcss/blob/main/lib/tokenize.js#L25" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:postcss:postcss:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "FB38A6C8-B41F-41C9-9093-E46BAC3B54CB", "versionEndExcluding": "8.4.31", "versionEndIncluding": null, "versionStart...
[ "74" ]
74
https://github.com/github/advisory-database/issues/2820
[ "Issue Tracking" ]
github.com
[ "github", "advisory-database" ]
The GHSA-7fh5-64p2-3v2j advisory seems to be in a poor state at the moment. Neither the advisory text nor any of the references contain any description of any security impact, and no CWE category is given either. Readers can't distinguish between this being a security bug or a normal bugfix that has been mistakenly gra...
GHSA-7fh5-64p2-3v2j contains no security impact
https://api.github.com/repos/github/advisory-database/issues/2820/comments
7
2023-10-05T12:48:54Z
2023-10-14T20:51:47Z
https://github.com/github/advisory-database/issues/2820
1,928,216,300
2,820
5,621
CVE-2023-5294
2023-09-29T22:15:12.033
A vulnerability has been found in ECshop 4.1.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/order.php. The manipulation of the argument goods_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PAR...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/xhcccan/code/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:shopex:ecshop:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E9829452-4A88-4E8A-8EAF-E3026FFC7C2C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "89" ]
89
https://github.com/xhcccan/code/issues/2
[ "Exploit", "Issue Tracking" ]
github.com
[ "xhcccan", "code" ]
1. First log in to the backend, then visit the page below and use bp to capture the packet to obtain the corresponding cookie. /ECShop_V4.1.1/source/ecshop/admin/order.php 2. Use sqlmap to test and find that the database data can be successfully obtained (note that the content in the cookie is replaced) sqlmap -u ...
EcShop v4.1.1 SQL injection vulnerability
https://api.github.com/repos/xhcccan/code/issues/2/comments
0
2023-09-24T10:04:04Z
2023-09-24T10:04:04Z
https://github.com/xhcccan/code/issues/2
1,910,178,178
2
5,622
CVE-2023-5296
2023-09-29T22:15:12.113
A vulnerability was found in Xinhu RockOA 1.1/2.3.2/15.X3amdi and classified as problematic. Affected by this issue is some unknown functionality of the file api.php?m=reimplat&a=index of the component Password Handler. The manipulation leads to weak password recovery. The attack may be launched remotely. The exploit h...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/magicwave18/vuldb/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.240926...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockoa:rockoa:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D257F2BB-97B9-4A69-B30C-0F15E38C451C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "640" ]
640
https://github.com/magicwave18/vuldb/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "magicwave18", "vuldb" ]
1、The payload generated to change the password is as follows: The data passed in is $data='{"msgtype":"editpass","user":"rock","pass":"123"}';, user is the username and pass is the password to be changed. <?php $data='{"msgtype":"editpass","user":"rock","pass":"123"}'; //$data = '{"basemodenum": "1","baseoptid...
Any user's password modification vulnerability in Xinhuo OA V2.3.2
https://api.github.com/repos/magicwave18/vuldb/issues/1/comments
0
2023-09-24T10:37:41Z
2023-09-24T10:38:19Z
https://github.com/magicwave18/vuldb/issues/1
1,910,187,402
1
5,623
CVE-2023-5297
2023-09-29T22:15:12.193
A vulnerability was found in Xinhu RockOA 2.3.2. It has been classified as problematic. This affects the function start of the file task.php?m=sys|runt&a=beifen. The manipulation leads to exposure of backup file to an unauthorized control sphere. It is possible to initiate the attack remotely. The complexity of an atta...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/magicwave18/vuldb/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.240927...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockoa:rockoa:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6955DED7-BC72-45EC-A056-B4119E6E4B92", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "552" ]
552
https://github.com/magicwave18/vuldb/issues/2
[ "Exploit", "Issue Tracking" ]
github.com
[ "magicwave18", "vuldb" ]
1、Access the url to back up the sql file and return success successfully. task.php?m=sys|runt&a=beifen ![图片2](https://github.com/magicwave18/vuldb/assets/52652537/ad27f2fa-7c89-475c-baf7-341637999c34) 2、Then the sql data will be backed up to upload/data in json format. ![图片3](https://github.com/magicwave18/vu...
Xinghu OA v2.3.2 sensitive information leaked
https://api.github.com/repos/magicwave18/vuldb/issues/2/comments
1
2023-09-24T10:43:31Z
2023-12-05T03:20:37Z
https://github.com/magicwave18/vuldb/issues/2
1,910,188,964
2
5,624
CVE-2023-43361
2023-10-02T21:15:34.520
Buffer Overflow vulnerability in Vorbis-tools v.1.4.2 allows a local attacker to execute arbitrary code and cause a denial of service during the conversion of wav files to ogg files.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "https://github.com/xiph/vorbis" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/xiph/vorbis-tools" }, { "source": "cve@mitre.org", "tags": [ "Exploit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xiph:vorbis-tools:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "5CA9C03F-AF50-4E6F-B972-F1B3BF87CEB1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/xiph/vorbis-tools/issues/41
[ "Exploit", "Issue Tracking" ]
github.com
[ "xiph", "vorbis-tools" ]
### Heap-buffer-overflow on vorbis-tools/oggenc ---- ### Description We found a heap-buffer-overflow when vorbis-tools/oggenc converted wav files to ogg files. It should be noted that vorbis-tools(version 1.4.0-11) downloaded through **apt-get** may also trigger this vulnerability, which may endanger the syst...
Heap-buffer-overflow on vorbis-tools/oggenc
https://api.github.com/repos/xiph/vorbis-tools/issues/41/comments
3
2023-09-16T18:12:01Z
2023-10-06T17:18:46Z
https://github.com/xiph/vorbis-tools/issues/41
1,899,524,625
41
5,625
CVE-2023-26150
2023-10-03T05:15:49.963
Versions of the package asyncua before 0.9.96 are vulnerable to Improper Authentication such that it is possible to access Address Space without encryption and authentication. **Note:** This issue is a result of missing checks for services that require an active session.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/artfire52/84f7279a4119d6f90381ac49d7121121" }, { "source": "report@snyk.io", "tags": [ "Patch" ], "url": "https://github.com/FreeOpcUa/opcua-asyncio/comm...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:freeopcua:opcua-asyncio:*:*:*:*:*:python:*:*", "matchCriteriaId": "D64D2A05-90B8-43AA-B8BE-9D79959CFC61", "versionEndExcluding": "0.9.96", "versionEndIncluding": null, "versi...
[ "287" ]
287
https://github.com/FreeOpcUa/opcua-asyncio/issues/1014
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FreeOpcUa", "opcua-asyncio" ]
**Bug** <br /> With the example of server-with-encryption, it is possible to acces Address Space without encryption and authentication. I create an issue instead of sending mail following instructions from [How to report a security issue? #902 ](https://github.com/FreeOpcUa/opcua-asyncio/issues/902) **To Reproduc...
Illegal access to Address Space
https://api.github.com/repos/FreeOpcUa/opcua-asyncio/issues/1014/comments
1
2022-08-29T14:54:34Z
2022-09-07T09:17:15Z
https://github.com/FreeOpcUa/opcua-asyncio/issues/1014
1,354,438,531
1,014
5,626
CVE-2023-26151
2023-10-03T05:15:50.507
Versions of the package asyncua before 0.9.96 are vulnerable to Denial of Service (DoS) such that an attacker can send a malformed packet and as a result, the server will enter into an infinite loop and consume excessive memory.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integ...
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/artfire52/1540b234350795e0ecb4d672608dbec8" }, { "source": "report@snyk.io", "tags": [ "Patch" ], "url": "https://github.com/FreeOpcUa/opcua-asyncio/comm...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:freeopcua:opcua-asyncio:*:*:*:*:*:python:*:*", "matchCriteriaId": "D64D2A05-90B8-43AA-B8BE-9D79959CFC61", "versionEndExcluding": "0.9.96", "versionEndIncluding": null, "versi...
[ "835" ]
835
https://github.com/FreeOpcUa/opcua-asyncio/issues/1013
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FreeOpcUa", "opcua-asyncio" ]
**The bug** It is possible to create a denial of service by sending a malformed packet. The server will be trap in an infinite loop and consume lot of memory. I create an issue instead of sending mail following instruction from [How to report a security issue? #902 ](https://github.com/FreeOpcUa/opcua-asyncio/issue...
Denial of Service
https://api.github.com/repos/FreeOpcUa/opcua-asyncio/issues/1013/comments
5
2022-08-29T14:26:10Z
2022-09-20T13:45:23Z
https://github.com/FreeOpcUa/opcua-asyncio/issues/1013
1,354,397,551
1,013
5,627
CVE-2023-43898
2023-10-03T21:15:10.440
Nothings stb 2.28 was discovered to contain a Null Pointer Dereference via the function stbi__convert_format. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted pic file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/1452" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_image.h:2.28:*:*:*:*:*:*:*", "matchCriteriaId": "76840B8F-81FC-4BC6-A92C-EBB978741DAB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "476" ]
476
https://github.com/nothings/stb/issues/1452
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
I discovered a [null pointer dereference](https://github.com/libsixel/libsixel/issues/73) vulnerability in the [stb_image.h](https://github.com/libsixel/libsixel/blob/490ec15087e37d8e1395e4dbfb99fc543c5bae5d/src/stb_image.h#L6446-L6458) of libsixel, which also exists in this project. Specifically, if the `stbi__pic...
NULL pointer dereference in the stb_image.h
https://api.github.com/repos/nothings/stb/issues/1452/comments
1
2023-02-21T09:09:52Z
2023-10-04T15:12:39Z
https://github.com/nothings/stb/issues/1452
1,593,103,519
1,452
5,628
CVE-2023-3153
2023-10-04T12:15:10.503
A flaw was found in Open Virtual Network where the service monitor MAC does not properly rate limit. This issue could allow an attacker to cause a denial of service, including on deployments with CoPP enabled and properly configured.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integ...
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2023-3153" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213279" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ovn:open_virtual_network:*:*:*:*:*:*:*:*", "matchCriteriaId": "5CA7DFF4-C739-4EE8-AC5D-6EC06E387309", "versionEndExcluding": "22.03.3", "versionEndIncluding": null, "versionS...
[ "770" ]
770
https://github.com/ovn-org/ovn/issues/198
[ "Issue Tracking" ]
github.com
[ "ovn-org", "ovn" ]
Issue: ===== The service monitor MAC is exposed through the following flow: ovn_lflow_add(lflows, od, S_SWITCH_IN_L2_LKUP, 110, "eth.dst == $svc_monitor_mac", "handle_svc_check(inport);"); This doesn't handle rate limit via CoPP. There is potential to DoS ovn-controller even on depl...
CVE-2023-3153 ovn: service monitor MAC flow is not rate limited
https://api.github.com/repos/ovn-org/ovn/issues/198/comments
3
2023-07-03T16:37:20Z
2025-04-24T06:05:18Z
https://github.com/ovn-org/ovn/issues/198
1,786,505,202
198
5,629
CVE-2023-3361
2023-10-04T12:15:10.567
A flaw was found in Red Hat OpenShift Data Science. When exporting a pipeline from the Elyra notebook pipeline editor as Python DSL or YAML, it reads S3 credentials from the cluster (ds pipeline server) and saves them in plain text in the generated output instead of an ID for a Kubernetes secret.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2023-3361" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/s...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opendatahub:open_data_hub_dashboard:*:*:*:*:*:*:*:*", "matchCriteriaId": "6767C5AA-B34C-40E7-9885-C09AA446D8BF", "versionEndExcluding": "1.28.1", "versionEndIncluding": null, ...
[ "319" ]
319
https://github.com/opendatahub-io/odh-dashboard/issues/1415
[ "Issue Tracking" ]
github.com
[ "opendatahub-io", "odh-dashboard" ]
### Feature description Currently, we are using the [cos_auth_type: 'USER_CREDENTIALS'](`https://github.com/opendatahub-io/odh-dashboard/blob/736bf82719fdfc29547277d99247fae1f3d49fb2/frontend/src/concepts/pipelines/elyra/utils.ts#L61) which is allowing the creds to be uploaded as env var in the elyra export pipeline....
[Feature Request]: Switch to kubernets_secret option in place of user_credential option on elyrasecret
https://api.github.com/repos/opendatahub-io/odh-dashboard/issues/1415/comments
4
2023-06-21T15:45:03Z
2023-06-21T18:18:49Z
https://github.com/opendatahub-io/odh-dashboard/issues/1415
1,767,901,250
1,415
5,630
CVE-2023-43809
2023-10-04T21:15:10.280
Soft Serve is a self-hostable Git server for the command line. Prior to version 0.6.2, a security vulnerability in Soft Serve could allow an unauthenticated, remote attacker to bypass public key authentication when keyboard-interactive SSH authentication is active, through the `allow-keyless` setting, and the public ke...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/charmbracelet/soft-serve/commit/407c4ec72d1006cee1ff8c1775e5bcc091c2bc89" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking" ], "url...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:charm:soft_serve:*:*:*:*:*:go:*:*", "matchCriteriaId": "962411DB-9A36-4D48-B5E5-BAC38703E87D", "versionEndExcluding": "0.6.2", "versionEndIncluding": null, "versionStartExclu...
[ "287" ]
287
https://github.com/charmbracelet/soft-serve/issues/389
[ "Exploit", "Issue Tracking" ]
github.com
[ "charmbracelet", "soft-serve" ]
**Describe the bug** **Summary:** Identity: publickey identity accepted, not invalidated/revoked when client-side key verification and thus publickey authentication method fails Authentication: publickey method failed, but `allow-keyless` always returns successful authentication using `keyboard-interactive` method to ...
Public key authentication bypass despite client-side keypair authn failure when `allow-keyless` is true
https://api.github.com/repos/charmbracelet/soft-serve/issues/389/comments
2
2023-09-27T20:14:13Z
2023-10-03T06:21:22Z
https://github.com/charmbracelet/soft-serve/issues/389
1,916,246,880
389
5,631
CVE-2023-44400
2023-10-09T16:15:10.567
Uptime Kuma is a self-hosted monitoring tool. Prior to version 1.23.3, attackers with access to a user's device can gain persistent account access. This is caused by missing verification of Session Tokens after password changes and/or elapsed inactivity periods. Version 1.23.3 has a patch for the issue.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integr...
[ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/louislam/uptime-kuma/commit/88afab6571ef7d4d41bb395cdb6ecd3968835a4a" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Mitigation" ], "url"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:uptime.kuma:uptime_kuma:*:*:*:*:*:*:*:*", "matchCriteriaId": "F178E40D-CC31-4E9A-B03C-A648C13E94D2", "versionEndExcluding": "1.23.3", "versionEndIncluding": null, "versionSta...
[ "384" ]
384
https://github.com/louislam/uptime-kuma/issues/3481
[ "Issue Tracking", "Mitigation" ]
github.com
[ "louislam", "uptime-kuma" ]
### ⚠️ Please verify that this feature request has NOT been suggested before. - [X] I checked and didn't find similar feature request ### 🏷️ Feature Request Type UI Feature, Other ### 🔖 Feature description Hi, Uptime Kuma does not currently support logs & audits for user activity within the portal. This is so...
Admin (portal user) Audit Logs and Activities
https://api.github.com/repos/louislam/uptime-kuma/issues/3481/comments
2
2023-07-25T23:37:31Z
2023-12-05T00:00:52Z
https://github.com/louislam/uptime-kuma/issues/3481
1,821,327,147
3,481
5,633
CVE-2023-42455
2023-10-09T17:15:09.923
Wazuh is a security detection, visibility, and compliance open source project. In versions 4.4.0 and 4.4.1, it is possible to get the Wazuh API administrator key used by the Dashboard using the browser development tools. This allows a logged user to the dashboard to become administrator of the API, even if their dashbo...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/wazuh/wazuh-dashboard-plugins/issues/5427" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/wazuh/wazuh-kibana-app/pu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wazuh:wazuh-dashboard:*:*:*:*:*:wazuh:*:*", "matchCriteriaId": "5819F13D-898C-4854-8968-469BDB5E450D", "versionEndExcluding": "4.4.2", "versionEndIncluding": null, "versionSt...
[ "639" ]
639
https://github.com/wazuh/wazuh-dashboard-plugins/issues/5427
[ "Issue Tracking" ]
github.com
[ "wazuh", "wazuh-dashboard-plugins" ]
| Wazuh | Elastic | Rev | Security | | ----- | ------- | ---- | -------- | | 4.4.0-4.4.1 | 7.x | 4xxx | Basic, ODFE, Xpack | | Browser | | ------- | | Chrome, Firefox, Safari, etc| **Description** We need to enhance the `getConfiguration` backend service to comply with the new requirements.
Enhance the `getConfiguration` backend service
https://api.github.com/repos/wazuh/wazuh-dashboard-plugins/issues/5427/comments
0
2023-05-10T14:37:55Z
2023-05-11T11:24:22Z
https://github.com/wazuh/wazuh-dashboard-plugins/issues/5427
1,704,086,477
5,427
5,634
CVE-2023-44821
2023-10-09T20:15:10.583
Gifsicle through 1.94, if deployed in a way that allows untrusted input to affect Gif_Realloc calls, might allow a denial of service (memory consumption). NOTE: this has been disputed by multiple parties because the Gifsicle code is not commonly used for unattended operation in which new input arrives for a long-runnin...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/kohler/gifsicle/issues/195" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/kohler...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lcdf:gifsicle:*:*:*:*:*:*:*:*", "matchCriteriaId": "47014BE5-591F-41C7-ACC4-E77C24495169", "versionEndExcluding": null, "versionEndIncluding": "1.94", "versionStartExcluding"...
[ "401" ]
401
https://github.com/kohler/gifsicle/issues/195
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "kohler", "gifsicle" ]
### Description **We found a memory leak error when running gifsicle with the "--crop 3,6+5x6 --crop-transparency" configuration options.** At the same time, because **gifsicle does not check repeated assignments of the "--crop" configuration**, each special assignment of the "--crop" configuration in the command...
Memory leak on gifsicle
https://api.github.com/repos/kohler/gifsicle/issues/195/comments
2
2023-09-26T17:58:54Z
2023-10-10T08:20:44Z
https://github.com/kohler/gifsicle/issues/195
1,914,023,505
195
5,635
CVE-2023-44821
2023-10-09T20:15:10.583
Gifsicle through 1.94, if deployed in a way that allows untrusted input to affect Gif_Realloc calls, might allow a denial of service (memory consumption). NOTE: this has been disputed by multiple parties because the Gifsicle code is not commonly used for unattended operation in which new input arrives for a long-runnin...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/kohler/gifsicle/issues/195" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/kohler...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lcdf:gifsicle:*:*:*:*:*:*:*:*", "matchCriteriaId": "47014BE5-591F-41C7-ACC4-E77C24495169", "versionEndExcluding": null, "versionEndIncluding": "1.94", "versionStartExcluding"...
[ "401" ]
401
https://github.com/kohler/gifsicle/issues/65
[ "Exploit", "Issue Tracking" ]
github.com
[ "kohler", "gifsicle" ]
Hi I've tested `gifsicle` and it have quite good results over `GraphicsMagick` For `GraphicsMagick` it have `MagicWand API` for C projects integration. I saw that you have code only for making command line calls from arguments. Can you give some instruction to convert your code into API library ? **I'll send also Pu...
How To use gifsicle as a library ?
https://api.github.com/repos/kohler/gifsicle/issues/65/comments
11
2016-04-03T16:33:29Z
2019-07-08T17:21:27Z
https://github.com/kohler/gifsicle/issues/65
145,516,460
65
5,636
CVE-2020-18336
2023-10-10T03:15:09.430
Cross Site Scripting (XSS) vulnerability found in Typora v.0.9.65 allows a remote attacker to obtain sensitive information via the PDF file exporting function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/typora/typora-issues/issues/2232" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Th...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:typora:typora:0.9.65:*:*:*:*:*:*:*", "matchCriteriaId": "41F82A87-F653-48AB-BDA5-3E657B2319EC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "79" ]
79
https://github.com/typora/typora-issues/issues/2232
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "typora", "typora-issues" ]
Tested on Win7 Ver0.9.65beta ![](https://raw.githubusercontent.com/yukiyukiiiii/pic/master/1.PNG) `<script>alert(document.location)</script>` xss when exporting to PDF ![](https://raw.githubusercontent.com/yukiyukiiiii/pic/master/2.PNG) ![](https://raw.githubusercontent.com/yukiyukiiiii/pic/master/3.PNG) and c...
Typora(v0.9.65) XSS when exporting to PDF
https://api.github.com/repos/typora/typora-issues/issues/2232/comments
2
2019-03-01T05:10:14Z
2019-03-15T10:31:37Z
https://github.com/typora/typora-issues/issues/2232
415,944,364
2,232
5,637
CVE-2023-42189
2023-10-10T03:15:09.530
Insecure Permissions vulnerability in Connectivity Standards Alliance Matter Official SDK v.1.1.0.0 , Nanoleaf Light strip v.3.5.10, Govee LED Strip v.3.00.42, switchBot Hub2 v.1.0-0.8, Phillips hue hub v.1.59.1959097030, and yeelight smart lamp v.1.12.69 allows a remote attacker to cause a denial of service via a craf...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/IoT-Fuzz/IoT-Fuzz/blob/main/Remove%20Key%20Set%20Vulnerability%20Report.pdf" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:tapo:mini_smart_wi-fi_plug_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABD30F53-CE65-4DB3-8A0B-B26367A58462", "versionEndExcluding": null, "versionEndIncluding": null, "ve...
[ "732" ]
732
https://github.com/project-chip/connectedhomeip/issues/28518
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "project-chip", "connectedhomeip" ]
### Reproduction steps **spec reference: 1**1.2.7.4. KeySetRemove Command This command SHALL fail with an INVALID_COMMAND status code back to the initiator if the GroupKeySetID being removed is 0, which is the Key Set associated with the Identity Protection Key (IPK). When key-set-remove command is issued with 0...
[BUG] KeySetRemove Command returns SUCCESS status code when GroupKeySetID 0 is being removed
https://api.github.com/repos/project-chip/connectedhomeip/issues/28518/comments
0
2023-08-04T07:33:10Z
2023-08-10T13:38:39Z
https://github.com/project-chip/connectedhomeip/issues/28518
1,836,225,014
28,518
5,638
CVE-2023-42189
2023-10-10T03:15:09.530
Insecure Permissions vulnerability in Connectivity Standards Alliance Matter Official SDK v.1.1.0.0 , Nanoleaf Light strip v.3.5.10, Govee LED Strip v.3.00.42, switchBot Hub2 v.1.0-0.8, Phillips hue hub v.1.59.1959097030, and yeelight smart lamp v.1.12.69 allows a remote attacker to cause a denial of service via a craf...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/IoT-Fuzz/IoT-Fuzz/blob/main/Remove%20Key%20Set%20Vulnerability%20Report.pdf" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:tapo:mini_smart_wi-fi_plug_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABD30F53-CE65-4DB3-8A0B-B26367A58462", "versionEndExcluding": null, "versionEndIncluding": null, "ve...
[ "732" ]
732
https://github.com/project-chip/connectedhomeip/issues/28679
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "project-chip", "connectedhomeip" ]
### Reproduction steps spec reference: 11.2.9.4. KeySetRemove Command This command SHALL fail with an INVALID_COMMAND status code back to the initiator if the GroupKeySetID being removed is 0, which is the Key Set associated with the Identity Protection Key (IPK). KeySetRemove Command field with uint16 type ...
[BUG] KeySetRemove Command returns SUCCESS status code when the parameter is {}
https://api.github.com/repos/project-chip/connectedhomeip/issues/28679/comments
3
2023-08-13T22:13:12Z
2023-08-29T20:44:35Z
https://github.com/project-chip/connectedhomeip/issues/28679
1,848,760,576
28,679
5,639
CVE-2023-30801
2023-10-10T14:15:10.493
All versions of the qBittorrent client through 4.5.5 use default credentials when the web user interface is enabled. The administrator is not forced to change the default credentials. As of 4.5.5, this issue has not been fixed. A remote attacker can use the default credentials to authenticate and execute arbitrary oper...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "disclosure@vulncheck.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/qbittorrent/qBittorrent/issues/18731" }, { "source": "disclosure@vulncheck.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorapro...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qbittorrent:qbittorrent:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1B8F48C-E176-4D0E-A303-596701DD2EF4", "versionEndExcluding": null, "versionEndIncluding": "4.5.5", "versionStar...
[ "798" ]
798
https://github.com/qbittorrent/qBittorrent/issues/18731
[ "Issue Tracking" ]
github.com
[ "qbittorrent", "qBittorrent" ]
### Suggestion Qbittorrent isn't quite secure since it has a default password and hardcoded webui port. Qb also allows executing random code directly through the webui. I've recently noticed the following entries in the log ``` (N) 2023-03-18T15:42:59 - Added new torrent. Torrent: "qBittorrent_update.elf" (N) 20...
Possible RCE being exploited
https://api.github.com/repos/qbittorrent/qBittorrent/issues/18731/comments
21
2023-03-20T00:37:18Z
2025-04-02T20:15:34Z
https://github.com/qbittorrent/qBittorrent/issues/18731
1,631,189,716
18,731
5,640
CVE-2023-44487
2023-10-10T14:15:10.883
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/10/13/4" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwal...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ietf:http:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5200E35-222B-42E0-83E0-5B702684D992", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
[ "400" ]
400
https://github.com/Azure/AKS/issues/3947
[ "Issue Tracking" ]
github.com
[ "Azure", "AKS" ]
https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/ ###Summary Beginning in September 2023, Microsoft was notified by industry partners about a newly identified Distributed Denial-of-Service (DDoS) attack technique being used in the wild target...
CVE-2023-44487: Distributed Denial of Service (DDoS) Attacks against HTTP/2
https://api.github.com/repos/Azure/AKS/issues/3947/comments
6
2023-10-12T13:11:07Z
2024-02-18T19:20:15Z
https://github.com/Azure/AKS/issues/3947
1,939,972,510
3,947
5,641
CVE-2023-44487
2023-10-10T14:15:10.883
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/10/13/4" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwal...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ietf:http:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5200E35-222B-42E0-83E0-5B702684D992", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
[ "400" ]
400
https://github.com/akka/akka-http/issues/4323
[ "Issue Tracking" ]
github.com
[ "akka", "akka-http" ]
Description A client might overload the server by issue frequent RST frames. This can cause a massive amount of load on the remote system and so cause a DDOS attack. References https://www.cve.org/CVERecord?id=CVE-2023-44487 https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/ https://c...
CVE-2023-44487
https://api.github.com/repos/akka/akka-http/issues/4323/comments
3
2023-10-12T06:16:57Z
2023-10-25T12:31:21Z
https://github.com/akka/akka-http/issues/4323
1,939,257,685
4,323
5,642
CVE-2023-44487
2023-10-10T14:15:10.883
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/10/13/4" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwal...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ietf:http:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5200E35-222B-42E0-83E0-5B702684D992", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
[ "400" ]
400
https://github.com/alibaba/tengine/issues/1872
[ "Issue Tracking" ]
github.com
[ "alibaba", "tengine" ]
### Ⅰ. Issue Description Tengine is likely affected by the recently disclosed CVE-2023-44487 vulnerability. ### Ⅱ. Describe what happened Nginx has committed a related changset in tip. https://hg.nginx.org/nginx/rev/cdda286c0f1b ### Ⅲ. Describe what you expected to happen Once Nginx releases complete fix for t...
CVE-2023-44487: HTTP/2 Rapid Reset Attack
https://api.github.com/repos/alibaba/tengine/issues/1872/comments
0
2023-10-10T13:55:27Z
2023-11-14T14:54:14Z
https://github.com/alibaba/tengine/issues/1872
1,935,430,819
1,872
5,643
CVE-2023-44487
2023-10-10T14:15:10.883
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/10/13/4" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwal...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ietf:http:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5200E35-222B-42E0-83E0-5B702684D992", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
[ "400" ]
400
https://github.com/apache/apisix/issues/10320
[ "Issue Tracking" ]
github.com
[ "apache", "apisix" ]
### Description A new vulnerability for http2, do we have any update fot this? https://github.com/advisories/GHSA-qppj-fm5r-hxr3 ### Environment - APISIX version (run `apisix version`): - Operating system (run `uname -a`): - OpenResty / Nginx version (run `openresty -V` or `nginx -V`): - etcd version, if releva...
help request: What's the action for CVE-2023-44487 ?
https://api.github.com/repos/apache/apisix/issues/10320/comments
2
2023-10-12T02:48:38Z
2023-12-12T07:55:48Z
https://github.com/apache/apisix/issues/10320
1,939,079,704
10,320
5,644
CVE-2023-44487
2023-10-10T14:15:10.883
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/10/13/4" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwal...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ietf:http:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5200E35-222B-42E0-83E0-5B702684D992", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
[ "400" ]
400
https://github.com/caddyserver/caddy/issues/5877
[ "Issue Tracking" ]
github.com
[ "caddyserver", "caddy" ]
Is caddy patched or vulnerable to the attack. See : CVE-2023-44487 https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/
HTTP/2 Rapid Reset : CVE-2023-44487
https://api.github.com/repos/caddyserver/caddy/issues/5877/comments
16
2023-10-10T12:45:08Z
2023-10-12T00:22:54Z
https://github.com/caddyserver/caddy/issues/5877
1,935,279,906
5,877
5,645
CVE-2023-44487
2023-10-10T14:15:10.883
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/10/13/4" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwal...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ietf:http:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5200E35-222B-42E0-83E0-5B702684D992", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
[ "400" ]
400
https://github.com/dotnet/announcements/issues/277
[ "Issue Tracking", "Mitigation" ]
github.com
[ "dotnet", "announcements" ]
# Microsoft Security Advisory CVE-2023-44487: .NET Denial of Service Vulnerability ## <a name="executive-summary"></a>Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 8.0 RC1, .NET 7.0 ,and .NET 6.0. This advisory also provides guidance on what ...
Microsoft Security Advisory CVE-2023-44487: .NET Denial of Service Vulnerability
https://api.github.com/repos/dotnet/announcements/issues/277/comments
1
2023-10-10T17:19:00Z
2023-10-24T17:20:29Z
https://github.com/dotnet/announcements/issues/277
1,935,860,595
277
5,646
CVE-2023-44487
2023-10-10T14:15:10.883
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/10/13/4" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwal...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ietf:http:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5200E35-222B-42E0-83E0-5B702684D992", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
[ "400" ]
400
https://github.com/eclipse/jetty.project/issues/10679
[ "Issue Tracking" ]
github.com
[ "eclipse", "jetty.project" ]
**Jetty version(s)** 10+ **Enhancement Description** Review HTTP/2 rate control in light of CVE-2023-44487, possibly incrementing the default rate. (in case https://github.com/github/advisory-database/issues/2869 isn't fixed, use top level link https://nvd.nist.gov/vuln/detail/CVE-2023-44487)
Allow HTTP/2 rate control to mitigate HTTP/2 floods (CVE-2023-44487)
https://api.github.com/repos/jetty/jetty.project/issues/10679/comments
0
2023-10-09T10:34:39Z
2023-10-19T15:48:02Z
https://github.com/jetty/jetty.project/issues/10679
1,932,769,835
10,679
5,647
CVE-2023-44487
2023-10-10T14:15:10.883
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/10/13/4" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwal...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ietf:http:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5200E35-222B-42E0-83E0-5B702684D992", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
[ "400" ]
400
https://github.com/etcd-io/etcd/issues/16740
[ "Issue Tracking", "Patch" ]
github.com
[ "etcd-io", "etcd" ]
### What would you like to be added? Refer to https://github.com/advisories/GHSA-qppj-fm5r-hxr3 ## Bump golang.org/x/net: - [x] 0.17.0 for 3.4/3.5/main - [X] https://github.com/etcd-io/etcd/pull/16739 - [x] https://github.com/etcd-io/etcd/pull/16743 - [x] https://github.com/etcd-io/etcd/pull/16746 ##...
Resolve CVE-2023-44487
https://api.github.com/repos/etcd-io/etcd/issues/16740/comments
31
2023-10-11T13:57:16Z
2023-11-23T09:52:04Z
https://github.com/etcd-io/etcd/issues/16740
1,937,850,660
16,740
5,648
CVE-2023-44487
2023-10-10T14:15:10.883
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/10/13/4" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwal...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ietf:http:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5200E35-222B-42E0-83E0-5B702684D992", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
[ "400" ]
400
https://github.com/golang/go/issues/63417
[ "Issue Tracking" ]
github.com
[ "golang", "go" ]
A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded to the [http2.Server.MaxConcurrentStreams](https://pkg.go.dev/golang.org/x/net/http2#Server.MaxConcurrentStreams) setting, resetting an i...
net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-39325)
https://api.github.com/repos/golang/go/issues/63417/comments
18
2023-10-06T15:52:23Z
2024-08-20T20:49:00Z
https://github.com/golang/go/issues/63417
1,930,490,789
63,417
5,649
CVE-2023-44487
2023-10-10T14:15:10.883
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/10/13/4" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwal...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ietf:http:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5200E35-222B-42E0-83E0-5B702684D992", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
[ "400" ]
400
https://github.com/haproxy/haproxy/issues/2312
[ "Issue Tracking" ]
github.com
[ "haproxy", "haproxy" ]
### Detailed Description of the Problem An issue for tracking how haproxy is affected by CVE-2023-44487 - https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack - https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/ - https://bl...
H2 rapid reset aka CVE-2023-44487
https://api.github.com/repos/haproxy/haproxy/issues/2312/comments
3
2023-10-10T14:08:18Z
2024-01-07T12:13:38Z
https://github.com/haproxy/haproxy/issues/2312
1,935,457,390
2,312
5,650
CVE-2023-44487
2023-10-10T14:15:10.883
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/10/13/4" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwal...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ietf:http:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5200E35-222B-42E0-83E0-5B702684D992", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
[ "400" ]
400
https://github.com/junkurihara/rust-rpxy/issues/97
[ "Issue Tracking" ]
github.com
[ "junkurihara", "rust-rpxy" ]
https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected https://github.com/hyperium/hyper/issues/3337 Thanks to the `hyper` lib!
[Announcement] CVE-2023-44487 (HTTP/2 Rapid Reset Attack) does not affect `rpxy`
https://api.github.com/repos/junkurihara/rust-rpxy/issues/97/comments
1
2023-10-11T01:36:15Z
2023-10-12T16:04:48Z
https://github.com/junkurihara/rust-rpxy/issues/97
1,936,612,626
97
5,651
CVE-2023-44487
2023-10-10T14:15:10.883
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/10/13/4" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwal...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ietf:http:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5200E35-222B-42E0-83E0-5B702684D992", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
[ "400" ]
400
https://github.com/kazu-yamamoto/http2/issues/93
[ "Issue Tracking" ]
github.com
[ "kazu-yamamoto", "http2" ]
Hello! I was recently reading an article about recent ddos strategies that exploit the http2 protocol https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/, and I was curious if haskells http2 package is impacted. I looked at the changelog ...
Does this recent http2 CVE affect this package?
https://api.github.com/repos/kazu-yamamoto/http2/issues/93/comments
10
2023-10-10T12:46:16Z
2023-11-02T00:34:34Z
https://github.com/kazu-yamamoto/http2/issues/93
1,935,283,382
93
5,652
CVE-2023-44487
2023-10-10T14:15:10.883
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/10/13/4" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwal...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ietf:http:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5200E35-222B-42E0-83E0-5B702684D992", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
[ "400" ]
400
https://github.com/ninenines/cowboy/issues/1615
[ "Issue Tracking" ]
github.com
[ "ninenines", "cowboy" ]
See: https://nvd.nist.gov/vuln/detail/CVE-2023-44487 Overview: https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/
Is Cowboy affected by the HTTP/2 Rapid Reset attack?
https://api.github.com/repos/ninenines/cowboy/issues/1615/comments
16
2023-10-11T07:09:09Z
2023-12-06T11:44:12Z
https://github.com/ninenines/cowboy/issues/1615
1,937,022,185
1,615
5,653
CVE-2023-44487
2023-10-10T14:15:10.883
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/10/13/4" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwal...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ietf:http:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5200E35-222B-42E0-83E0-5B702684D992", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
[ "400" ]
400
https://github.com/openresty/openresty/issues/930
[ "Issue Tracking" ]
github.com
[ "openresty", "openresty" ]
Kindly ask if openresty is vunerable to CVE-2023-44487? Some more information on: * https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/ * https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/ * https://cloud.google.com/blog/products/identity-security/how-it-w...
CVE-2023-44487 issue/fix?
https://api.github.com/repos/openresty/openresty/issues/930/comments
4
2023-10-10T13:32:39Z
2023-11-09T14:24:26Z
https://github.com/openresty/openresty/issues/930
1,935,385,581
930
5,654
CVE-2023-44487
2023-10-10T14:15:10.883
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/10/13/4" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwal...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ietf:http:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5200E35-222B-42E0-83E0-5B702684D992", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
[ "400" ]
400
https://github.com/opensearch-project/data-prepper/issues/3474
[ "Issue Tracking", "Patch" ]
github.com
[ "opensearch-project", "data-prepper" ]
## CVE-2023-44487 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>netty-codec-http2-4.1.96.Final.jar</b>, <b>http2-common-11.0.16.jar</b>, <b>http2-server-11.0.16.jar</b></p></summary...
CVE-2023-44487 (High) detected in multiple libraries
https://api.github.com/repos/opensearch-project/data-prepper/issues/3474/comments
0
2023-10-10T20:33:21Z
2023-10-10T23:33:28Z
https://github.com/opensearch-project/data-prepper/issues/3474
1,936,165,922
3,474
5,655
CVE-2023-44487
2023-10-10T14:15:10.883
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/10/13/4" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwal...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ietf:http:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5200E35-222B-42E0-83E0-5B702684D992", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
[ "400" ]
400
https://github.com/tempesta-tech/tempesta/issues/1986
[ "Issue Tracking" ]
github.com
[ "tempesta-tech", "tempesta" ]
# Motivation Provide protection against HTTP/2 Rapid Reset if TempestaFW is susceptible to this type of attack. # Links Original blog post: https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-44487 Po...
HTTP/2 Rapid Reset DDoS Mitigaton
https://api.github.com/repos/tempesta-tech/tempesta/issues/1986/comments
2
2023-10-11T11:46:56Z
2023-10-25T11:36:23Z
https://github.com/tempesta-tech/tempesta/issues/1986
1,937,579,979
1,986
5,656
CVE-2023-44487
2023-10-10T14:15:10.883
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/10/13/4" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwal...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ietf:http:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5200E35-222B-42E0-83E0-5B702684D992", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
[ "400" ]
400
https://github.com/varnishcache/varnish-cache/issues/3996
[ "Issue Tracking" ]
github.com
[ "varnishcache", "varnish-cache" ]
Hi. Brought this up on IRC, but I think there should be some public record of it as well. **How well does Varnish handle the Rapid Reset attack?** Consensus seems to be that some new rate limiting should be added to Varnish. Links: * https://ubuntu.com/security/CVE-2023-44487 * https://blog.qualys.com/vulner...
Handling of CVE-2023-44487 / HTTP2 Rapid Reset
https://api.github.com/repos/varnishcache/varnish-cache/issues/3996/comments
15
2023-10-11T12:18:43Z
2023-11-14T14:28:55Z
https://github.com/varnishcache/varnish-cache/issues/3996
1,937,638,423
3,996
5,657
CVE-2023-1943
2023-10-12T00:15:10.067
Privilege Escalation in kOps using GCE/GCP Provider in Gossip Mode.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", ...
[ { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking" ], "url": "https://github.com/kubernetes/kops/issues/15539" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List" ], "url": "https://groups.google.com/g/kubernetes-security-announce/c/yrCE1x89oaU" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:operations:*:*:*:*:*:*:*:*", "matchCriteriaId": "5488C983-38DD-4787-9956-C68D528D5ED1", "versionEndExcluding": "1.25.4", "versionEndIncluding": null, "versionStart...
[ "250" ]
250
https://github.com/kubernetes/kops/issues/15539
[ "Issue Tracking" ]
github.com
[ "kubernetes", "kops" ]
### Issue Details A security issue was reported in [kOps](https://github.com/kubernetes/kops) with the GCP Provider running in [Gossip Mode](https://kops.sigs.k8s.io/gossip/), where Node service account credentials could be used by a container running in the cluster to retrieve sensitive information from the state sto...
CVE-2023-1943: Privilege Escalation in kOps using GCE/GCP Provider in Gossip Mode
https://api.github.com/repos/kubernetes/kops/issues/15539/comments
5
2023-06-21T17:10:11Z
2024-03-24T13:51:01Z
https://github.com/kubernetes/kops/issues/15539
1,768,056,129
15,539
5,658
CVE-2023-42298
2023-10-12T04:15:13.053
An issue in GPAC GPAC v.2.2.1 and before allows a local attacker to cause a denial of service via the Q_DecCoordOnUnitSphere function of file src/bifs/unquantize.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/gpac/gpac/issues/2567" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/gpac/gpac/issues/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "047BC15F-5E51-48D9-B751-9DC9311FEBCF", "versionEndExcluding": null, "versionEndIncluding": "2.2.1", "versionStartExcluding": n...
[ "190" ]
190
https://github.com/gpac/gpac/issues/2567
[ "Issue Tracking", "Patch" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [Y] I looked for a similar issue and couldn't find any. - [Y] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [Y] I give enough info...
Integer overflow issue in bifs/unquantize.c:298
https://api.github.com/repos/gpac/gpac/issues/2567/comments
1
2023-08-29T07:37:50Z
2023-10-11T01:35:00Z
https://github.com/gpac/gpac/issues/2567
1,871,078,948
2,567
5,659
CVE-2023-5072
2023-10-12T17:15:10.187
Denial of Service in JSON-Java versions up to and including 20230618.  A bug in the parser means that an input string of modest size can lead to indefinite amounts of memory being used.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve-coordination@google.com", "tags": null, "url": "http://www.openwall.com/lists/oss-security/2023/12/13/4" }, { "source": "cve-coordination@google.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/stleary/JSON-java/issues/758" }, { "source": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:json-java_project:json-java:*:*:*:*:*:*:*:*", "matchCriteriaId": "13919820-D849-4641-A7E6-6E01A01862F2", "versionEndExcluding": null, "versionEndIncluding": "20230618", "vers...
[ "770" ]
770
https://github.com/stleary/JSON-java/issues/758
[ "Issue Tracking" ]
github.com
[ "stleary", "JSON-java" ]
`JSONTokener.next()` [uses](https://github.com/stleary/JSON-java/blob/402db6ad84353c84e4747510a8ac5322b32a8df4/src/main/java/org/json/JSONTokener.java#L182) a 0 return to indicate EOF. But 0 is also returned when an actual `\0` character is read. In some circumstances that can be used to circumvent parser checks. Parsi...
Confusion between `\0` and EOF can lead to OutOfMemoryError
https://api.github.com/repos/stleary/JSON-java/issues/758/comments
6
2023-08-01T18:29:19Z
2023-08-05T13:33:27Z
https://github.com/stleary/JSON-java/issues/758
1,831,811,460
758
5,660
CVE-2023-5072
2023-10-12T17:15:10.187
Denial of Service in JSON-Java versions up to and including 20230618.  A bug in the parser means that an input string of modest size can lead to indefinite amounts of memory being used.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve-coordination@google.com", "tags": null, "url": "http://www.openwall.com/lists/oss-security/2023/12/13/4" }, { "source": "cve-coordination@google.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/stleary/JSON-java/issues/758" }, { "source": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:json-java_project:json-java:*:*:*:*:*:*:*:*", "matchCriteriaId": "13919820-D849-4641-A7E6-6E01A01862F2", "versionEndExcluding": null, "versionEndIncluding": "20230618", "vers...
[ "770" ]
770
https://github.com/stleary/JSON-java/issues/771
[ "Exploit", "Issue Tracking" ]
github.com
[ "stleary", "JSON-java" ]
`JSONObject` contains [this logic](https://github.com/stleary/JSON-java/blob/01727fd0ed00c1f1f5582bdc97244356ac029f3b/src/main/java/org/json/JSONObject.java#L218-L222) to prevent a key in a JSON object from being another JSON object or an array: ```java case '{': case '[': if...
Logic to exclude object keys that are themselves objects is imperfect
https://api.github.com/repos/stleary/JSON-java/issues/771/comments
11
2023-09-20T17:48:30Z
2023-10-01T16:04:41Z
https://github.com/stleary/JSON-java/issues/771
1,905,464,604
771
5,661
CVE-2023-45510
2023-10-12T21:15:11.373
tsMuxer version git-2539d07 was discovered to contain an alloc-dealloc-mismatch (operator new [] vs operator delete) error.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/issues/778" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:justdan96:tsmuxer:nightly-2023-10-05-01-55-56:*:*:*:*:*:*:*", "matchCriteriaId": "06EE3DA3-2DA0-46A5-84DB-D82906A5B27A", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "762" ]
762
https://github.com/justdan96/tsMuxer/issues/778
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "justdan96", "tsMuxer" ]
### Description **We found a alloc-dealloc-mismatch (operator new [] vs operator delete) error when using tsMuxer/tsmuxer.** ### ASAN Log ```shell ================================================================= ==4087327==ERROR: AddressSanitizer: alloc-dealloc-mismatch (operator new [] vs operator delete) ...
Alloc-dealloc-mismatch on tsMuxer
https://api.github.com/repos/justdan96/tsMuxer/issues/778/comments
1
2023-10-06T08:07:19Z
2023-10-20T13:37:11Z
https://github.com/justdan96/tsMuxer/issues/778
1,929,651,252
778
5,662
CVE-2023-45511
2023-10-12T21:15:11.437
A memory leak in tsMuxer version git-2539d07 allows attackers to cause a Denial of Service (DoS) via a crafted MP4 file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/iss...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:justdan96:tsmuxer:nightly-2023-10-05-01-55-56:*:*:*:*:*:*:*", "matchCriteriaId": "06EE3DA3-2DA0-46A5-84DB-D82906A5B27A", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "401" ]
401
https://github.com/justdan96/tsMuxer/issues/780
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "justdan96", "tsMuxer" ]
# Memory leak on tsMuxer ### Description **We found a memory leak error when we used tsMuxer/tsmuxer to process mp4 format files.** (SUMMARY: AddressSanitizer: 26339 byte(s) leaked in **72** allocation(s).) ### Version ```shell ./tsmuxer --version tsMuxeR version git-2539d07. github.com/justdan96/tsMux...
Memory leak on tsMuxer
https://api.github.com/repos/justdan96/tsMuxer/issues/780/comments
3
2023-10-06T15:59:09Z
2023-10-18T07:03:59Z
https://github.com/justdan96/tsMuxer/issues/780
1,930,506,314
780
5,663
CVE-2023-26155
2023-10-14T05:15:55.183
All versions of the package node-qpdf are vulnerable to Command Injection such that the package-exported method encrypt() fails to sanitize its parameter input, which later flows into a sensitive command execution API. As a result, attackers may inject malicious commands once they can specify the input pdf file path.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrit...
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/nrhirani/node-qpdf/issues/23" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-JS-NO...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nrhirani:node-qpdf:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC0932B9-C3A4-46E0-B0FE-8E4B7937A0D3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "77" ]
77
https://github.com/nrhirani/node-qpdf/issues/23
[ "Exploit", "Issue Tracking" ]
github.com
[ "nrhirani", "node-qpdf" ]
Hi, We would like to report a potential security vulnerability. The bug is introduced because the package-exported method `encrypt()` fails to sanitize its parameter `input`, which later flows into a sensitive command execution API. As a result, attackers may inject malicious commands once they can specify the inpu...
Potential command injection vulnerability in node-qpdf
https://api.github.com/repos/nrhirani/node-qpdf/issues/23/comments
0
2023-06-08T14:48:20Z
2023-06-08T14:58:32Z
https://github.com/nrhirani/node-qpdf/issues/23
1,748,063,660
23
5,664
CVE-2018-25091
2023-10-15T19:15:09.213
urllib3 before 1.24.2 does not remove the authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the authorization header to be exposed to unintended hosts or transmitted in cleartext. NOTE: this issue exists because o...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/urllib3/urllib3/commit/adb358f8e06865406d1f05e581a16cbea2136fbc" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/urllib3/urllib3/compare/1.24.1...1.24.2" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0B5613A-F0A4-438A-A01E-4E2DAB4FAB8B", "versionEndExcluding": "1.24.2", "versionEndIncluding": null, "versionStartExcludi...
[ "601" ]
601
https://github.com/urllib3/urllib3/issues/1510
[ "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "urllib3", "urllib3" ]
#1346 fixes only "Authorization" header. "authorization" header isn't supported. RFC7230 section 3.2 "Header Fields" (https://tools.ietf.org/html/rfc7230#section-3.2) says the following. > Each header field consists of a case-insensitive field name followed by a colon (":"), optional leading whitespace, the f...
authorization header be forwarded to cross-site when redirecting
https://api.github.com/repos/urllib3/urllib3/issues/1510/comments
0
2018-12-29T01:37:50Z
2018-12-29T22:41:55Z
https://github.com/urllib3/urllib3/issues/1510
394,748,748
1,510
5,665
CVE-2023-45951
2023-10-17T20:15:10.213
lylme_spage v1.7.0 was discovered to contain a SQL injection vulnerability via the $userip parameter at function.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LyLme/lylme_spage/issues/32" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lylme:lylme_spage:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "AE00968C-F848-4DE2-B335-55A1680035FE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "89" ]
89
https://github.com/LyLme/lylme_spage/issues/32
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LyLme", "lylme_spage" ]
# Pre-auth SQL Injection Vulnerability in function.php ## 1.Steps to reproduce (复现步骤) 1.Access http://host/apply/index.php?submit=post via POST method and carry the follw data, the injection point is `Client-Ip` field within HTTP Header. > 1.根据下图所示构造请求数据包,漏洞存在于 HTTP Header 的 `Client-Ip` 字段。 ```php POST...
[vulnerability] Pre-auth SQL Injection Vulnerability in function.php (function.php 存在前台SQL注入漏洞)
https://api.github.com/repos/LyLme/lylme_spage/issues/32/comments
1
2023-10-09T13:44:26Z
2023-10-10T14:36:18Z
https://github.com/LyLme/lylme_spage/issues/32
1,933,112,422
32
5,667
CVE-2023-45952
2023-10-17T20:15:10.273
An arbitrary file upload vulnerability in the component ajax_link.php of lylme_spage v1.7.0 allows attackers to execute arbitrary code via uploading a crafted file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LyLme/lylme_spage/issues/33" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lylme:lylme_spage:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "AE00968C-F848-4DE2-B335-55A1680035FE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "434" ]
434
https://github.com/LyLme/lylme_spage/issues/33
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LyLme", "lylme_spage" ]
# Upload Shell Vulnerability in ajax_link.php ## 1.Steps to reproduce 1.Access http://host/admin/ajax_link.php?submit=update via POST method and carry the follw data, the injection point is `file` field within HTTP Body. > Although this is a backend vulnerability, the Pre-Auth chain to upload shell can ...
[vulnerability] Upload Shell Vulnerability in ajax_link.php
https://api.github.com/repos/LyLme/lylme_spage/issues/33/comments
1
2023-10-09T14:12:28Z
2023-11-14T23:31:44Z
https://github.com/LyLme/lylme_spage/issues/33
1,933,181,954
33
5,668
CVE-2023-36321
2023-10-17T23:15:11.513
Connected Vehicle Systems Alliance (COVESA) up to v2.18.8 was discovered to contain a buffer overflow via the component /shared/dlt_common.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/COVESA/dlt-daemon/issues/436" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/michael-methner/dlt-daemon/commit/8ac9a080bee25e67e49bd...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:covesa:dlt-daemon:*:*:*:*:*:*:*:*", "matchCriteriaId": "66004448-7EF2-4593-88DC-D85CB481BD06", "versionEndExcluding": null, "versionEndIncluding": "2.18.8", "versionStartExcl...
[ "120" ]
120
https://github.com/COVESA/dlt-daemon/issues/436
[ "Exploit", "Issue Tracking" ]
github.com
[ "COVESA", "dlt-daemon" ]
Hi COVESA Team! Contact us to report vulnerabilities. ## Summary I done dlt-sortbytimestamp(+dlt-* binary) source code auditing . And found that the exception handling was insufficient. Since I'm not familiar with the dlt structure, I created a simple fuzzer to fuzzing the dlt-sortbytimestamp binary. And I ...
[dlt-sortbytimestamp crash] Unreadable memory reference in my opinion
https://api.github.com/repos/COVESA/dlt-daemon/issues/436/comments
5
2023-01-24T08:38:50Z
2023-10-19T03:42:48Z
https://github.com/COVESA/dlt-daemon/issues/436
1,554,541,516
436
5,669
CVE-2023-5631
2023-10-18T15:15:08.727
Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker to load arbitrary JavaScript code.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "security@eset.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/11/01/1" }, { "source": "security@eset.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A35A7DC-58C4-43F7-A66C-229B0A409224", "versionEndExcluding": "1.4.15", "versionEndIncluding": null, "versionStartExcl...
[ "79" ]
79
https://github.com/roundcube/roundcubemail/issues/9168
[ "Exploit", "Issue Tracking" ]
github.com
[ "roundcube", "roundcubemail" ]
Hello dear developers! Next sample shows me XSS. Would be pleased if you could check it on latest Roundcube version. ### Reproduce: 1. Send html to your mailbox with following content ```html <svg><use href="dAta:image/s vg+xml;base64,PHN2ZyBpZD0ieDIiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAwL3N2ZyI+IDxpbWFn...
XSS with svg use tag on RC 1.5.3
https://api.github.com/repos/roundcube/roundcubemail/issues/9168/comments
5
2023-10-13T17:29:37Z
2023-10-19T20:30:23Z
https://github.com/roundcube/roundcubemail/issues/9168
1,942,353,001
9,168
5,670
CVE-2023-46009
2023-10-18T16:15:08.900
gifsicle-1.94 was found to have a floating point exception (FPE) vulnerability via resize_stream at src/xform.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/kohler/gifsicle/issues/196" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lcdf:gifsicle:1.94:*:*:*:*:*:*:*", "matchCriteriaId": "0E1FA5C7-B009-4B15-91A5-44CA8585663C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "697" ]
697
https://github.com/kohler/gifsicle/issues/196
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "kohler", "gifsicle" ]
We found 2 FPE bugs in gifsicle-1.94. Initially, we thought #193 would be applicable. However, upon discovering that the same reproduction steps didn't work in gifsicle-1.93, we believe this issue might be different. ### Reproduction Build gifsicle-1.94 with ASAN, then run ``` src/gifsicle --crop 0,0-256,256 --cr...
Two FPE bugs unique in gifsicle-1.94
https://api.github.com/repos/kohler/gifsicle/issues/196/comments
7
2023-10-10T10:34:07Z
2024-02-21T04:26:14Z
https://github.com/kohler/gifsicle/issues/196
1,935,016,338
196
5,671
CVE-2023-45909
2023-10-18T23:15:08.300
zzzcms v2.2.0 was discovered to contain an open redirect vulnerability.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/Num-Nine/CVE/issues/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advis...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zzzcms:zzzphp:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "410E39C6-3A1E-4E57-A6F9-CB2A08A76B80", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "601" ]
601
https://github.com/Num-Nine/CVE/issues/7
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "Num-Nine", "CVE" ]
Name of the affected product:zzzcms The affected version:2.2.0 Vulnerability type:Cross-site redirection 1. Download address: http://115.29.55.18/zzzphp.zip http://www.zzzcms.com/a/news/31_313.html 2. Feel free to register a user after installation Go to Message management: /? gbook/23 Copy...
zzzcms-V2.2.0 has cross-site redirection vulnerability
https://api.github.com/repos/QianGeG/CVE/issues/7/comments
0
2023-10-09T08:50:13Z
2023-10-09T08:50:13Z
https://github.com/QianGeG/CVE/issues/7
1,932,585,751
7
5,672
CVE-2022-42150
2023-10-19T20:15:08.710
TinyLab linux-lab v1.1-rc1 and cloud-labv0.8-rc2, v1.1-rc1 are vulnerable to insecure permissions. The default configuration could cause Container Escape.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "int...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/eBPF-Research/eBPF-Attack/blob/main/PoC.md#attack-requirements" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/tinyclub/cloud-...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tinylab:cloud_lab:0.8:rc2:*:*:*:*:*:*", "matchCriteriaId": "97511A97-0470-42FA-8D7A-132508A64C39", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "276" ]
276
https://github.com/tinyclub/linux-lab/issues/14
[ "Issue Tracking" ]
github.com
[ "tinyclub", "linux-lab" ]
Greetings! This is security research team from Tsinghua University, in recent research work, we found that linux-lab(one of the best cloudlabs) could be escaped by default configure. We do think it may somehow affect the project itself and users who build their own labs based-on linux-lab. Also, we will propose our ...
Default Configure Could Cause Container Escape Risk
https://api.github.com/repos/tinyclub/linux-lab/issues/14/comments
2
2022-06-29T01:20:33Z
2022-06-29T15:48:22Z
https://github.com/tinyclub/linux-lab/issues/14
1,288,061,751
14
5,673
CVE-2023-44690
2023-10-19T22:15:09.830
Inadequate encryption strength in mycli 1.27.0 allows attackers to view sensitive information via /mycli/config.py
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/dbcli/mycli/issues/1131" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/dbcli/mycli...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dbcli:mycli:1.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "5FCEBF9F-3FAA-4C7A-B35B-3AA6F62EC328", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "326" ]
326
https://github.com/dbcli/mycli/issues/1131
[ "Exploit", "Issue Tracking" ]
github.com
[ "dbcli", "mycli" ]
Description: I have identified a security vulnerability in the mycli project's use of AES ECB (Electronic Codebook) mode for configuration. This vulnerability can potentially expose sensitive information and compromise the security of the application. Locations: 1. https://github.com/dbcli/mycli/blob/main/mycli/...
Cryptographic API Misuse Vulnerability: AES ECB used for configuration
https://api.github.com/repos/dbcli/mycli/issues/1131/comments
4
2023-09-25T03:40:31Z
2023-12-10T17:25:29Z
https://github.com/dbcli/mycli/issues/1131
1,910,595,792
1,131
5,674
CVE-2023-45815
2023-10-19T22:15:10.407
ArchiveBox is an open source self-hosted web archiving system. Any users who are using the `wget` extractor and view the content it outputs. The impact is potentially severe if you are logged in to the ArchiveBox admin site in the same browser session and view an archived malicious page designed to target your ArchiveB...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "int...
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ArchiveBox/ArchiveBox/issues/239" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:archivebox:archivebox:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E721DF1-19BE-4E74-AAD8-C2C26FB0B887", "versionEndExcluding": null, "versionEndIncluding": "0.6.2", "versionStartE...
[ "79" ]
79
https://github.com/ArchiveBox/ArchiveBox/issues/239
[ "Exploit", "Issue Tracking" ]
github.com
[ "ArchiveBox", "ArchiveBox" ]
#### Describe the bug Hi there! There's an XSS vulnerability when you open your index.html if you saved a page with a title containing an XSS vector. #### Steps to reproduce 1. Save this page for example: [Twitter of @garethheyes] ](https://twitter.com/garethheyes/status/1126526480614416395) 2. Open your index....
Architecture: Archived JS executes in a context shared with all other archived content (and the admin UI!)
https://api.github.com/repos/ArchiveBox/ArchiveBox/issues/239/comments
8
2019-05-14T09:48:52Z
2023-11-04T04:24:10Z
https://github.com/ArchiveBox/ArchiveBox/issues/239
443,817,484
239
5,675
CVE-2021-46897
2023-10-22T19:15:08.240
views.py in Wagtail CRX CodeRed Extensions (formerly CodeRed CMS or coderedcms) before 0.22.3 allows upward protected/..%2f..%2f path traversal when serving protected media.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/coderedcorp/coderedcms/compare/v0.22.2...v0.22.3" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/coderedcorp/coderedcms/issues/448" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wagtailcrx:codered_extensions:*:*:*:*:*:*:*:*", "matchCriteriaId": "4195633E-6F79-4228-AB78-DB844B8FA484", "versionEndExcluding": "0.22.3", "versionEndIncluding": null, "vers...
[ "22" ]
22
https://github.com/coderedcorp/coderedcms/issues/448
[ "Exploit", "Issue Tracking" ]
github.com
[ "coderedcorp", "coderedcms" ]
#### Describe the bug The below code is accepting any url format. https://github.com/coderedcorp/coderedcms/blob/49673f2bec0ad70f3ea2e04b32a5fce9e63cb916/coderedcms/urls.py#L21-L25 And then passing path as an argument is a weakness to path traversal attack. https://github.com/coderedcorp/coderedcms/blob/dev/coder...
(security) An login user can access local files on coderedcms server
https://api.github.com/repos/coderedcorp/coderedcms/issues/448/comments
1
2021-09-26T11:43:52Z
2021-09-29T20:13:40Z
https://github.com/coderedcorp/coderedcms/issues/448
1,007,366,902
448
5,676
CVE-2021-46898
2023-10-22T19:15:08.297
views/switch.py in django-grappelli (aka Django Grappelli) before 2.15.2 attempts to prevent external redirection with startswith("/") but this does not consider a protocol-relative URL (e.g., //example.com) attack.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/sehmaschine/django-grappelli/commit/4ca94bcda0fa2720594506853d85e00c8212968f" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/sehmaschine/django-grappe...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vonautomatisch:django_grappelli:*:*:*:*:*:*:*:*", "matchCriteriaId": "01233523-51DB-4BA3-8508-64ED220ACB74", "versionEndExcluding": "2.15.2", "versionEndIncluding": null, "ve...
[ "601" ]
601
https://github.com/sehmaschine/django-grappelli/issues/975
[ "Exploit", "Issue Tracking" ]
github.com
[ "sehmaschine", "django-grappelli" ]
This code prevent reflected xss attack but allow to redirect untrusted site. https://github.com/sehmaschine/django-grappelli/blob/55f88d661c28598d059cf81dbfd38dacb945662f/grappelli/views/switch.py#L30-L32 **PoC** http://127.0.0.1:8000/grappelli/switch/user/2/?redirect=//example.com
Open redirect
https://api.github.com/repos/sehmaschine/django-grappelli/issues/975/comments
1
2021-09-26T18:34:09Z
2021-10-07T13:16:25Z
https://github.com/sehmaschine/django-grappelli/issues/975
1,007,467,736
975
5,677
CVE-2023-46315
2023-10-22T22:15:08.797
The zanllp sd-webui-infinite-image-browsing (aka Infinite Image Browsing) extension before 977815a for stable-diffusion-webui (aka Stable Diffusion web UI), if Gradio authentication is enabled without secret key configuration, allows remote attackers to read any local file via /file?path= in the URL, as demonstrated by...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/zanllp/sd-webui-infinite-image-browsing/issues/387" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/zanllp/sd-webui-infinite-...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zanllp:stable_diffusion_webui_infinite_image_browsing:*:*:*:*:*:*:*:*", "matchCriteriaId": "771E3DD2-F6D0-42B6-80FE-3568F6428E95", "versionEndExcluding": "5.0", "versionEndIncluding": nu...
[ "200" ]
200
https://github.com/zanllp/sd-webui-infinite-image-browsing/issues/387
[ "Issue Tracking", "Vendor Advisory" ]
github.com
[ "zanllp", "sd-webui-infinite-image-browsing" ]
# Issue The extension exposes the Web UI instance to an unauthenticated Local File Inclusion vulnerability. Example request: ``` GET /infinite_image_browsing/file?path=/proc/self/environ&t=2023-05-08%2017%3A55%3A10 HTTP/1.1 Host: redacted ``` An attacker could read the `/etc/passwd` file for example, `/e...
Security Vulnerability: Unauthenticated Local File Inclusion
https://api.github.com/repos/zanllp/sd-webui-infinite-image-browsing/issues/387/comments
5
2023-08-27T17:36:13Z
2023-09-01T20:50:39Z
https://github.com/zanllp/sd-webui-infinite-image-browsing/issues/387
1,868,573,229
387
5,678
CVE-2023-42295
2023-10-23T15:15:09.007
An issue in OpenImageIO oiio v.2.4.12.0 allows a remote attacker to execute arbitrary code and cause a denial of service via the read_rle_image function of file bifs/unquantize.c
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OpenImageIO/oiio/issues/3947" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openimageio:openimageio:2.4.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "28795C4C-8800-499D-8C41-5B27C2745310", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "190" ]
190
https://github.com/OpenImageIO/oiio/issues/3947
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "OpenImageIO", "oiio" ]
Describe the bug: Hi, I found runtime error: signed integer overflow in file src/bmp.imageio/bmpinput.cpp:302 To Reproduce: Steps to reproduce the behavior: 1. CC=afl-clang-fast CXX=afl-clang-fast++ CFLAGS="-gdwarf-2 -g3 -O0 -fsanitize=address -fno-omit-frame-pointer" CXXFLAGS="-gdwarf-2 -g3 -O0 -fsanitize=addres...
runtime error: signed integer overflow in file src/bmp.imageio/bmpinput.cpp:302
https://api.github.com/repos/AcademySoftwareFoundation/OpenImageIO/issues/3947/comments
1
2023-08-18T01:29:15Z
2023-10-21T02:09:33Z
https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/3947
1,855,907,885
3,947
5,679
CVE-2023-46122
2023-10-23T16:15:09.383
sbt is a build tool for Scala, Java, and others. Given a specially crafted zip or JAR file, `IO.unzip` allows writing of arbitrary file. This would have potential to overwrite `/root/.ssh/authorized_keys`. Within sbt's main code, `IO.unzip` is used in `pullRemoteCache` task and `Resolvers.remote`; however many projects...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityI...
[ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/sbt/io/commit/124538348db0713c80793cb57b915f97ec13188a" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:scala-sbt:io:*:*:*:*:*:sbt:*:*", "matchCriteriaId": "E26E7679-8BEF-4E54-9908-CD46A514E6CB", "versionEndExcluding": "1.9.7", "versionEndIncluding": null, "versionStartExcludin...
[ "22" ]
22
https://github.com/sbt/io/issues/358
[ "Issue Tracking", "Patch" ]
github.com
[ "sbt", "io" ]
- https://security.snyk.io/research/zip-slip-vulnerability - https://github.com/snyk/zip-slip-vulnerability How to fix? 🤔 - change `filter: NameFilter = AllPassFilter` default param? - https://github.com/sbt/io/blob/c0e002311523e1597063f7d75650a3bdb7fe2627/io/src/main/scala/sbt/io/IO.scala#L367-L386 - add ...
zip slip vulnerability
https://api.github.com/repos/sbt/io/issues/358/comments
1
2023-10-15T11:25:48Z
2023-10-22T09:20:37Z
https://github.com/sbt/io/issues/358
1,943,850,106
358
5,680
CVE-2023-46332
2023-10-23T16:15:09.457
WebAssembly wabt 1.0.33 contains an Out-of-Bound Memory Write in DataSegment::Drop(), which lead to segmentation fault.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/WebAssembly/wabt/issues/2311" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:webassembly_binary_toolkit:1.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "A9DCC3A8-9035-4F70-B914-493DD3140821", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "787" ]
787
https://github.com/WebAssembly/wabt/issues/2311
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "WebAssembly", "wabt" ]
### Environment ```shell OS : Linux 5.10.16.3-microsoft-standard-WSL2 #1 SMP Fri Apr 2 22:23:49 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux Commit : 0e78c24fd231d5ee67ccd271bfa317faa963281c Version : 1.0.33 (git~1.0.33-35-gdddc03d3) Clang Verison : 12.0.1 Build : mkdir...
Out-of-Bound Memory Write in DataSegment::Drop()
https://api.github.com/repos/WebAssembly/wabt/issues/2311/comments
0
2023-10-08T07:46:31Z
2024-09-24T00:46:04Z
https://github.com/WebAssembly/wabt/issues/2311
1,931,692,043
2,311
5,681
CVE-2023-46331
2023-10-23T17:15:08.590
WebAssembly wabt 1.0.33 has an Out-of-Bound Memory Read in in DataSegment::IsValidRange(), which lead to segmentation fault.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/WebAssembly/wabt/issues/2310" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:webassembly_binary_toolkit:1.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "A9DCC3A8-9035-4F70-B914-493DD3140821", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "125" ]
125
https://github.com/WebAssembly/wabt/issues/2310
[ "Issue Tracking", "Vendor Advisory" ]
github.com
[ "WebAssembly", "wabt" ]
### Environment ```shell OS : Linux 5.10.16.3-microsoft-standard-WSL2 #1 SMP Fri Apr 2 22:23:49 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux Commit : 0e78c24fd231d5ee67ccd271bfa317faa963281c Version : 1.0.33 (git~1.0.33-35-gdddc03d3) Clang Verison : 12.0.1 Build : mkdir...
Out-of-Bound Memory Read in DataSegment::IsValidRange()
https://api.github.com/repos/WebAssembly/wabt/issues/2310/comments
0
2023-10-08T07:32:47Z
2024-09-24T00:46:03Z
https://github.com/WebAssembly/wabt/issues/2310
1,931,687,191
2,310
5,682
CVE-2023-45966
2023-10-23T21:15:08.847
umputun remark42 version 1.12.1 and before has a Blind Server-Side Request Forgery (SSRF) vulnerability.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/jet-pentest/CVE-2023-45966" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/umputun/rema...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:remark42:remark42:*:*:*:*:*:*:*:*", "matchCriteriaId": "22D32364-59CB-4880-AEEA-36CFE60EF9E6", "versionEndExcluding": null, "versionEndIncluding": "1.12.1", "versionStartExcl...
[ "918" ]
918
https://github.com/umputun/remark42/issues/1677
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "umputun", "remark42" ]
Hi! I found an issue in remark42 engine. When field "title" is missing in comment request and attacker send a malicious URL which is a part of locator struct on POST request to ```/api/v1/comment?site=<SITE_ID>```, it leads to Blind SSRF vulnerability. As example, malicious URL looks like this: {"text":"qweqwe","l...
[CWE-918] Blind SSRF in /api/v1/comment
https://api.github.com/repos/umputun/remark42/issues/1677/comments
7
2023-10-10T09:06:43Z
2024-03-16T20:45:44Z
https://github.com/umputun/remark42/issues/1677
1,934,843,567
1,677
5,683
CVE-2023-44760
2023-10-23T22:15:09.257
Multiple Cross Site Scripting (XSS) vulnerabilities in Concrete CMS v.9.2.1 allow an attacker to execute arbitrary code via a crafted script to the Header and Footer Tracking Codes of the SEO & Statistics. NOTE: the vendor disputes this because these header/footer changes can only be made by an admin, and allowing an a...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/sromanhu/CVE-2023-44760_ConcreteCMS-Stored-XSS---TrackingCodes/issues/1" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:concretecms:concrete_cms:9.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "C7B776E3-2D7A-4BD9-9800-01AED3141336", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "79" ]
79
https://github.com/sromanhu/CVE-2023-44760_ConcreteCMS-Stored-XSS---TrackingCodes/issues/1
[ "Issue Tracking" ]
github.com
[ "sromanhu", "CVE-2023-44760_ConcreteCMS-Stored-XSS---TrackingCodes" ]
ConcreteCMS has a security program over at https://hackerone.com/concretecms, please use that to report suspected security issues. This specific CVE is not a vulnerability, the header tracking code's sole functionality is to allow an admin to add javascript to all pages.
Responsible disclosure
https://api.github.com/repos/sromanhu/CVE-2023-44760_ConcreteCMS-Stored-XSS---TrackingCodes/issues/1/comments
1
2023-10-30T21:36:09Z
2023-10-30T21:51:58Z
https://github.com/sromanhu/CVE-2023-44760_ConcreteCMS-Stored-XSS---TrackingCodes/issues/1
1,969,264,623
1
5,684
CVE-2023-31580
2023-10-25T18:17:27.680
light-oauth2 before version 2.1.27 obtains the public key without any verification. This could allow attackers to authenticate to the application with a crafted JWT token.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "int...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/KANIXB/JWTIssues/blob/main/Certification%20Verification%20issue%20in%20light-oauth2.md" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/networknt/li...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:networknt:light-oauth2:*:*:*:*:*:*:*:*", "matchCriteriaId": "C417726F-46BE-4EF6-B09C-6AAF93F7E905", "versionEndExcluding": "2.1.27", "versionEndIncluding": null, "versionStar...
[ "295" ]
295
https://github.com/networknt/light-oauth2/issues/369
[ "Issue Tracking" ]
github.com
[ "networknt", "light-oauth2" ]
Hi, we are a research group to help developers build secure applications. We designed a cryptographic misuse detector on Java language(Our main concern is the secure implementation and use of Json Web Token). We found your great public repository (i.e., light-oauth2) from Github, and a security issue detected by our de...
A certificate verification issue when get the public key used to verify JWT.
https://api.github.com/repos/networknt/light-oauth2/issues/369/comments
0
2022-12-01T12:40:24Z
2022-12-01T12:40:24Z
https://github.com/networknt/light-oauth2/issues/369
1,471,249,230
369
5,685
CVE-2023-31581
2023-10-25T18:17:27.727
Dromara Sureness before v1.0.8 was discovered to use a hardcoded key.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/dromara/sureness/issues/164" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/xubowenW/JWTissues/blob/main/sureness%20s...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dromara:sureness:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7545D77-A1B3-4DBA-8747-D603CA4F3011", "versionEndExcluding": "1.0.8", "versionEndIncluding": null, "versionStartExclud...
[ "798" ]
798
https://github.com/dromara/sureness/issues/164
[ "Exploit", "Issue Tracking" ]
github.com
[ "dromara", "sureness" ]
Hi, we are a research group to help developers build secure applications. We designed a cryptographic misuse detector on Java language(Our main concern is the secure implementation and use of Json Web Token). We found your great public repository (i.e., sureness) from Github, and several security issues detected by our...
Using hardcoded cryptographic key when creating and verifing Json Web Token.
https://api.github.com/repos/dromara/sureness/issues/164/comments
1
2022-09-06T06:47:00Z
2022-10-23T06:52:37Z
https://github.com/dromara/sureness/issues/164
1,362,787,663
164
5,686
CVE-2023-43961
2023-10-25T18:17:32.357
An issue in Dromara SaToken version 1.3.50RC and before when using Spring dynamic controllers, a specially crafted request may cause an authentication bypass.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/dromara/Sa-Token/issues/511" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/dromara...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dromara:sa-token:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1CB8EE7-AEB1-4131-95B2-4343DFB3967A", "versionEndExcluding": "1.36.0", "versionEndIncluding": null, "versionStartExclu...
[ "863" ]
863
https://github.com/dromara/Sa-Token/issues/511
[ "Exploit", "Issue Tracking" ]
github.com
[ "dromara", "Sa-Token" ]
### name of affected products SaToken ### affected version: version <= 1.3.50RC ### fixed version version = 1.36.0 ### description SaToken and Spring's differential handling of URIs raises authorization bypass vulnerabilities ### The steps to reproduce(复现步骤): First register the user, the permission is:...
SaToken and Spring's differential handling of URIs raises authorization bypass vulnerabilities (SaToken和Spring对uri处理的差异化引发的越权漏洞)
https://api.github.com/repos/dromara/Sa-Token/issues/511/comments
4
2023-09-20T12:12:38Z
2023-10-24T03:44:31Z
https://github.com/dromara/Sa-Token/issues/511
1,904,857,170
511
5,687
CVE-2023-44794
2023-10-25T18:17:32.863
An issue in Dromara SaToken version 1.36.0 and before allows a remote attacker to escalate privileges via a crafted payload to the URL.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/dromara/Sa-Token/issues/515" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advis...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dromara:sa-token:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCB07557-F15B-4319-B525-39764D2AB3A7", "versionEndExcluding": "1.37.0", "versionEndIncluding": null, "versionStartExclu...
[ "284" ]
284
https://github.com/dromara/Sa-Token/issues/515
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "dromara", "Sa-Token" ]
### affected version: SaToken version <= 1.36.0 and (SpringBoot version >= 2.3.1.RELEASE or Spring version >= 5.3.0) ### fixed version: version = 1.37.0 ### description When SaToken version <= 1.36.0, together with SpringBoot version >= 2.3.1.RELEASE or Spring version >= 5.3.0, a specially crafted HTTP reques...
SaToken和Spring对uri处理的差异化引发的越权漏洞(SaToken and Spring's differential handling of URIs raises authorization bypass vulnerabilities)
https://api.github.com/repos/dromara/Sa-Token/issues/515/comments
3
2023-09-24T06:52:31Z
2023-10-24T08:51:46Z
https://github.com/dromara/Sa-Token/issues/515
1,910,128,142
515
5,688
CVE-2023-45990
2023-10-25T18:17:35.553
Insecure Permissions vulnerability in WenwenaiCMS v.1.0 allows a remote attacker to escalate privileges.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/PwnCYN/Wenwenai/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/PwnCYN/Wen...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wenwen-ai:wenwenai_cms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "01A97BCE-49D0-460F-9ED6-67F77C20CBAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ "276" ]
276
https://github.com/PwnCYN/Wenwenai/issues/2
[ "Exploit", "Issue Tracking" ]
github.com
[ "PwnCYN", "Wenwenai" ]
**Product Name:** Wenwenai CMS **Affect version:** 1.0 Case Address: Demo:https://chat.wenwen-ai.com/ Target:https://laoluoai.com/ **Vulnerability Type:** Logical Fallacies **Description:** Discover the backend login address through directory scanning, obtain the developer's demo site addres...
WenwenAiCms Vulnerability Testing
https://api.github.com/repos/PwnCYN/Wenwenai/issues/2/comments
0
2023-10-10T17:55:33Z
2023-10-20T13:10:51Z
https://github.com/PwnCYN/Wenwenai/issues/2
1,935,911,889
2
5,689
CVE-2023-46120
2023-10-25T18:17:36.257
The RabbitMQ Java client library allows Java and JVM-based applications to connect to and interact with RabbitMQ nodes. `maxBodyLebgth` was not used when receiving Message objects. Attackers could send a very large Message causing a memory overflow and triggering an OOM Error. Users of RabbitMQ may suffer from DoS at...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/rabbitmq/rabbitmq-java-client/commit/714aae602dcae6cb4b53cadf009323ebac313cc8" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch" ], "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:rabbitmq_java_client:*:*:*:*:*:*:*:*", "matchCriteriaId": "41FC145C-896D-47CD-A362-57F4A21BE730", "versionEndExcluding": "5.18.0", "versionEndIncluding": null, "versio...
[ "400" ]
400
https://github.com/rabbitmq/rabbitmq-java-client/issues/1062
[ "Issue Tracking", "Patch" ]
github.com
[ "rabbitmq", "rabbitmq-java-client" ]
null
Add ability to specify maximum message size
https://api.github.com/repos/rabbitmq/rabbitmq-java-client/issues/1062/comments
8
2023-06-14T08:58:03Z
2024-02-20T00:28:22Z
https://github.com/rabbitmq/rabbitmq-java-client/issues/1062
1,756,399,738
1,062
5,690
CVE-2023-46135
2023-10-25T18:17:36.673
rs-stellar-strkey is a Rust lib for encode/decode of Stellar Strkeys. A panic vulnerability occurs when a specially crafted payload is used.`inner_payload_len` should not above 64. This vulnerability has been patched in version 0.0.8.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integ...
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/stellar/rs-stellar-strkey/issues/58" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stellar:rs-stellar-strkey:*:*:*:*:*:rust:*:*", "matchCriteriaId": "6DB1F40F-544B-4BB5-9B54-CD7F3C6D12F3", "versionEndExcluding": "0.0.8", "versionEndIncluding": null, "versio...
[ "248" ]
248
https://github.com/stellar/rs-stellar-strkey/issues/58
[ "Exploit", "Issue Tracking" ]
github.com
[ "stellar", "rs-stellar-strkey" ]
<!-- Please answer these questions before submitting your issue. Thanks! --> ### What version are you using? Most up-to-date codebase ### What did you do? Called `stellar_strkey::ed25519::SignedPayload::from_payload` with following payload: ```rust let payload: Vec<u8> = vec![ 0x00, 0x00, 0x00, 0...
u32 overflow in SignedPayload::from_payload
https://api.github.com/repos/stellar/rs-stellar-strkey/issues/58/comments
1
2023-10-18T00:30:10Z
2023-10-24T18:49:24Z
https://github.com/stellar/rs-stellar-strkey/issues/58
1,948,512,365
58
5,691
CVE-2022-4886
2023-10-25T20:15:09.790
Ingress-nginx `path` sanitization can be bypassed with `log_format` directive.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/10/25/5" }, { "source": "jordan@liggitt.net", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:ingress-nginx:*:*:*:*:*:*:*:*", "matchCriteriaId": "54E2DB85-1B0E-44DC-928F-28B1E1B74728", "versionEndExcluding": "1.8.0", "versionEndIncluding": null, "versionSta...
[ "20" ]
20
https://github.com/kubernetes/ingress-nginx/issues/10570
[ "Mitigation", "Vendor Advisory" ]
github.com
[ "kubernetes", "ingress-nginx" ]
### Issue Details A security issue was discovered in [ingress-nginx](https://github.com/kubernetes/ingress-nginx) where a user that can create or update ingress objects can use directives to bypass the sanitization of the `spec.rules[].http.paths[].path` field of an Ingress object (in the `networking.k8s.io` or `exten...
CVE-2022-4886: ingress-nginx path sanitization can be bypassed
https://api.github.com/repos/kubernetes/kubernetes/issues/126815/comments
11
2023-10-25T15:48:08Z
2024-08-20T17:53:08Z
https://github.com/kubernetes/kubernetes/issues/126815
2,475,633,416
126,815
5,692
CVE-2023-5043
2023-10-25T20:15:18.037
Ingress nginx annotation injection causes arbitrary command execution.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integri...
[ { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/10/25/4" }, { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking", "Mitigation", "Vendor Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:ingress-nginx:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1FAA6D4-954E-4E5F-AB9A-61E1A3F9CD9B", "versionEndExcluding": "1.9.0", "versionEndIncluding": null, "versionSta...
[ "74" ]
74
https://github.com/kubernetes/ingress-nginx/issues/10571
[ "Issue Tracking", "Mitigation", "Vendor Advisory" ]
github.com
[ "kubernetes", "ingress-nginx" ]
### Issue Details A security issue was identified in [ingress-nginx](https://github.com/kubernetes/ingress-nginx) where the nginx.ingress.kubernetes.io/configuration-snippet annotation on an Ingress object (in the `networking.k8s.io` or `extensions` API group) can be used to inject arbitrary commands, and obtain the...
CVE-2023-5043: Ingress nginx annotation injection causes arbitrary command execution
https://api.github.com/repos/kubernetes/kubernetes/issues/126816/comments
27
2023-10-25T15:48:20Z
2024-08-20T13:24:48Z
https://github.com/kubernetes/kubernetes/issues/126816
2,475,633,958
126,816
5,693