cve_id stringlengths 13 16 | cve_published stringdate 2019-01-01 16:29:00 2025-02-25 20:15:37 | cve_descriptions stringlengths 34 2.6k | cve_metrics dict | cve_references listlengths 1 281 | cve_configurations listlengths 1 70 | cve_cwe_list listlengths 1 1 | cve_primary_cwe stringclasses 164
values | url stringlengths 36 97 | cve_tags listlengths 1 5 ⌀ | domain stringclasses 1
value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 198k ⌀ | issue_title stringlengths 1 335 | issue_comments_url stringlengths 55 116 | issue_comments_count int64 0 338 | issue_created_at stringdate 2012-06-06 09:34:24 2025-04-02 09:37:20 | issue_updated_at stringdate 2014-04-01 20:16:21 2025-06-16 12:26:58 | issue_html_url stringlengths 36 97 | issue_github_id int64 4.93M 2.97B | issue_number int64 1 199k | __index_level_0__ int64 0 6.55k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2023-5044 | 2023-10-25T20:15:18.187 | Code injection via nginx.ingress.kubernetes.io/permanent-redirect annotation. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integri... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/10/25/3"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Issue Tracking",
"Mitigation",
"Vendor Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:ingress-nginx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B1FAA6D4-954E-4E5F-AB9A-61E1A3F9CD9B",
"versionEndExcluding": "1.9.0",
"versionEndIncluding": null,
"versionSta... | [
"94"
] | 94 | https://github.com/kubernetes/ingress-nginx/issues/10572 | [
"Issue Tracking",
"Mitigation",
"Vendor Advisory"
] | github.com | [
"kubernetes",
"ingress-nginx"
] | ### Issue Details
A security issue was identified in [ingress-nginx](https://github.com/kubernetes/ingress-nginx) where the nginx.ingress.kubernetes.io/permanent-redirect annotation on an Ingress object (in the `networking.k8s.io` or `extensions` API group) can be used to inject arbitrary commands, and obtain the cred... | CVE-2023-5044: Code injection via nginx.ingress.kubernetes.io/permanent-redirect annotation | https://api.github.com/repos/kubernetes/kubernetes/issues/126817/comments | 15 | 2023-10-25T15:48:28Z | 2024-08-20T13:24:56Z | https://github.com/kubernetes/kubernetes/issues/126817 | 2,475,634,462 | 126,817 | 5,694 |
CVE-2023-5793 | 2023-10-26T18:15:08.817 | A vulnerability was found in flusity CMS and classified as problematic. This issue affects the function loadCustomBlocCreateForm of the file /core/tools/customblock.php of the component Dashboard. The manipulation of the argument customblock_place leads to cross site scripting. The attack may be initiated remotely. The... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/flusity/flusity-CMS/commit/81252bc764e1de2422e79e36194bba1289e7a0a5"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/flusity/flusity-... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fluisity:fluisity:*:*:*:*:*:*:*:*",
"matchCriteriaId": "93C33CF6-8C36-4B0D-B551-B9CAB1C59219",
"versionEndExcluding": "2023-10-24",
"versionEndIncluding": null,
"versionStart... | [
"79"
] | 79 | https://github.com/flusity/flusity-CMS/issues/1 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"flusity",
"flusity-CMS"
] | After installation, log in to the backend using the default account password tester/1234

Select block
 exists for the place parameter | https://api.github.com/repos/flusity/flusity-CMS/issues/1/comments | 2 | 2023-10-23T07:43:56Z | 2024-04-19T02:35:15Z | https://github.com/flusity/flusity-CMS/issues/1 | 1,956,552,703 | 1 | 5,695 |
CVE-2023-42188 | 2023-10-27T00:15:09.287 | IceCMS v2.0.1 is vulnerable to Cross Site Request Forgery (CSRF). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/Thecosy/IceCMS/issues/17"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://topdayplus.github.io/2023/10/2... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:macwk:icecms:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C8043F07-E915-49DC-A4D8-DC34AC2B9770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"352"
] | 352 | https://github.com/Thecosy/IceCMS/issues/17 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"Thecosy",
"IceCMS"
] | After the administrator open the following page, and click the the Submit request, square message with ID 264 will be deleted.
```
<html>
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://192.168.146.129:8181/square/DelectSquareById/264">
<input type="submit" value="Submit ... | There is a CSRF vulnerability that can delete the message | https://api.github.com/repos/Thecosy/IceCMS/issues/17/comments | 0 | 2023-08-30T14:50:03Z | 2023-08-30T14:50:03Z | https://github.com/Thecosy/IceCMS/issues/17 | 1,873,843,313 | 17 | 5,696 |
CVE-2023-46505 | 2023-10-27T01:15:32.267 | Cross Site Scripting vulnerability in FanCMS v.1.0.0 allows an attacker to execute arbitrary code via the content1 parameter in the demo.php file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/PwnCYN/FanCMS/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/PwnCYN/FanCM... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pwncyn:fancms:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BA9EC6F1-F8D8-4020-A0F9-41A1BE75592F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"79"
] | 79 | https://github.com/PwnCYN/FanCMS/issues/1 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"PwnCYN",
"FanCMS"
] | **Software Address:**
https://down.chinaz.com/soft/38522.htm
**Product Name:**
FanCMS
**Affect version:**
Version 1.0.0
**Vulnerability Type:**
Cross Site Scripting
**Description:**
Navigate to the/themes/static/kindeditor-4.1.7/php --/demo. php file.
The content1 parameter was not filtered.
<img wid... | FanCMS vulnerability testing | https://api.github.com/repos/PwnCYN/FanCMS/issues/1/comments | 0 | 2023-10-20T13:05:45Z | 2023-10-20T13:05:45Z | https://github.com/PwnCYN/FanCMS/issues/1 | 1,954,255,666 | 1 | 5,697 |
CVE-2023-5810 | 2023-10-27T01:15:32.317 | A vulnerability, which was classified as problematic, has been found in flusity CMS. This issue affects the function loadPostAddForm of the file core/tools/posts.php. The manipulation of the argument edit_post_id leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "MULTIPLE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/flusity/flusity-CMS/commit/6943991c62ed87c7a57989a0cb7077316127def8"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:flusity:flusity:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9989CEDF-D8FF-40B5-8E62-E4ABECFDBADC",
"versionEndExcluding": "2023-10-24",
"versionEndIncluding": null,
"versionStartEx... | [
"79"
] | 79 | https://github.com/flusity/flusity-CMS/issues/2 | [
"Exploit",
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
] | github.com | [
"flusity",
"flusity-CMS"
] | After installation, log in to the backend using the default account password tester/1234
select posts

enter payload
`?edit_post_id=3);</script><script>alert(1024)</script>`
 exists for the place parameter | https://api.github.com/repos/flusity/flusity-CMS/issues/2/comments | 4 | 2023-10-24T10:36:35Z | 2023-10-24T17:50:22Z | https://github.com/flusity/flusity-CMS/issues/2 | 1,958,967,105 | 2 | 5,698 |
CVE-2023-5811 | 2023-10-27T01:15:32.383 | A vulnerability, which was classified as problematic, was found in flusity CMS. Affected is the function loadPostAddForm of the file core/tools/posts.php. The manipulation of the argument menu_id leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public an... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "MULTIPLE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/flusity/flusity-CMS/commit/6943991c62ed87c7a57989a0cb7077316127def8"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:flusity:flusity:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E9C3388B-D2C5-4EBE-9001-E438E4F263D6",
"versionEndExcluding": null,
"versionEndIncluding": "2.304",
"versionStartExcludi... | [
"79"
] | 79 | https://github.com/flusity/flusity-CMS/issues/3 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"flusity",
"flusity-CMS"
] | After installation, log in to the backend using the default account password tester/1234
select posts

enter payload
`?menu_id=3);</script><script>alert(1024)</script>`
 exists for the place parameter | https://api.github.com/repos/flusity/flusity-CMS/issues/3/comments | 3 | 2023-10-24T10:40:44Z | 2024-04-19T02:35:06Z | https://github.com/flusity/flusity-CMS/issues/3 | 1,958,975,399 | 3 | 5,699 |
CVE-2023-5812 | 2023-10-27T02:15:07.477 | A vulnerability has been found in flusity CMS and classified as critical. Affected by this vulnerability is the function handleFileUpload of the file core/tools/upload.php. The manipulation of the argument uploaded_file leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "MULTIPLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PAR... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/flusity/flusity-CMS/issues/4"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:flusity:flusity:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E9C3388B-D2C5-4EBE-9001-E438E4F263D6",
"versionEndExcluding": null,
"versionEndIncluding": "2.304",
"versionStartExcludi... | [
"434"
] | 434 | https://github.com/flusity/flusity-CMS/issues/4 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"flusity",
"flusity-CMS"
] | After installation, log in to the backend using the default account password tester/1234
select files

select upload_file
 vulnerability in PwnCYN YXBOOKCMS v.1.0.2 allows a remote attacker to execute arbitrary code via the reader management and book input modules. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/PwnCYN/YXBOOKCMS/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisor... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pwncyn:yxbookcms:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5A5194B7-87BF-49C7-A090-CEEEAEDC077E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"79"
] | 79 | https://github.com/PwnCYN/YXBOOKCMS/issues/2 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"PwnCYN",
"YXBOOKCMS"
] | **Product Name:**
YXBOOKCMS
**Affect version:**
1.0.2
**Case Address:**
https://down.chinaz.com/soft/37726.htm (Program download address)
https://www.ys-bs.com/ (The website address has been hacked)
**Vulnerability Type:**
Reflected XSS
**Description:**
The reader management and book input module in t... | YXBOOKCMS Reflected XSS | https://api.github.com/repos/PwnCYN/YXBOOKCMS/issues/2/comments | 0 | 2023-10-20T13:54:30Z | 2023-10-20T14:29:58Z | https://github.com/PwnCYN/YXBOOKCMS/issues/2 | 1,954,344,806 | 2 | 5,701 |
CVE-2023-46504 | 2023-10-27T04:15:10.723 | Cross Site Scripting (XSS) vulnerability in PwnCYN YXBOOKCMS v.1.0.2 allows a physically proximate attacker to execute arbitrary code via the library name function in the general settings component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/PwnCYN/YXBOOKCMS/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisor... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pwncyn:yxbookcms:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5A5194B7-87BF-49C7-A090-CEEEAEDC077E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"79"
] | 79 | https://github.com/PwnCYN/YXBOOKCMS/issues/1 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"PwnCYN",
"YXBOOKCMS"
] | **Product Name:**
YXBOOKCMS
**Affect version:**
1.0.2
**Case Address:**
https://down.chinaz.com/soft/37726.htm (Program download address)
https://www.ys-bs.com/ (The website address has been hacked)
**Vulnerability Type:**
Stored XSS
**Description:**
The library name can be modified in the general set... | YXBOOKCMS Stored XSS | https://api.github.com/repos/PwnCYN/YXBOOKCMS/issues/1/comments | 0 | 2023-10-20T13:09:52Z | 2023-10-20T13:53:48Z | https://github.com/PwnCYN/YXBOOKCMS/issues/1 | 1,954,262,432 | 1 | 5,702 |
CVE-2023-46569 | 2023-10-28T02:15:07.583 | An out-of-bounds read in radare2 v.5.8.9 and before exists in the print_insn32_fpu function of libr/arch/p/nds32/nds32-dis.h. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gist.github.com/gandalf4a/afeaf8cc958f95876f0ee245b8a002e8"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/radareorg/radare2/issues/223... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0E042C08-7911-4974-A2A6-95F0EFD10809",
"versionEndExcluding": "5.9.0",
"versionEndIncluding": null,
"versionStartExcludin... | [
"125"
] | 125 | https://github.com/radareorg/radare2/issues/22334 | [
"Exploit"
] | github.com | [
"radareorg",
"radare2"
] | # Version
```
$ r2 -v
radare2 5.8.9 31339 @ linux-x86-64
birth: git.5.8.8-691-gb2de2288d8 2023-10-17__01:18:28
commit: b2de2288d8299f89288c503fc2ce22381b61aba0
```
# Platform
```
$ uname -a
Linux user-GE40-2PC-Dragon-Eyes 6.2.0-33-generic #33~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Thu Sep 7 10:33:52 UTC 2 x86... | global-buffer-overflow in /radare2/libr/arch/p/nds32/nds32-dis.h:1219:33 in print_insn32 | https://api.github.com/repos/radareorg/radare2/issues/22334/comments | 2 | 2023-10-20T16:03:32Z | 2024-08-15T06:30:02Z | https://github.com/radareorg/radare2/issues/22334 | 1,954,595,581 | 22,334 | 5,703 |
CVE-2023-46570 | 2023-10-28T02:15:07.637 | An out-of-bounds read in radare2 v.5.8.9 and before exists in the print_insn32 function of libr/arch/p/nds32/nds32-dis.h. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gist.github.com/gandalf4a/d7fa58f1b3418ef08ad244acccc10ba6"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/radareorg/radare2/issues/223... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0E042C08-7911-4974-A2A6-95F0EFD10809",
"versionEndExcluding": "5.9.0",
"versionEndIncluding": null,
"versionStartExcludin... | [
"125"
] | 125 | https://github.com/radareorg/radare2/issues/22333 | [
"Exploit"
] | github.com | [
"radareorg",
"radare2"
] | # Version
```
$ r2 -v
radare2 5.8.9 31339 @ linux-x86-64
birth: git.5.8.8-691-gb2de2288d8 2023-10-17__01:18:28
commit: b2de2288d8299f89288c503fc2ce22381b61aba0
```
# Platform
```
$ uname -a
Linux user-GE40-2PC-Dragon-Eyes 6.2.0-33-generic #33~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Thu Sep 7 10:33:52 UTC 2 x86... | global-buffer-overflow in /radare2/libr/arch/p/nds32/nds32-dis.h:993:6 in print_insn32_fpu | https://api.github.com/repos/radareorg/radare2/issues/22333/comments | 1 | 2023-10-20T16:02:17Z | 2024-08-15T06:31:10Z | https://github.com/radareorg/radare2/issues/22333 | 1,954,592,663 | 22,333 | 5,704 |
CVE-2023-5837 | 2023-10-28T22:15:08.630 | A vulnerability classified as problematic was found in AlexanderLivanov FotosCMS2 up to 2.4.3. This vulnerability affects unknown code of the file profile.php of the component Cookie Handler. The manipulation of the argument username leads to cross site scripting. The attack can be initiated remotely. The exploit has b... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/AlexanderLivanov/FotosCMS2/issues/18"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.243802"
},
{
"sour... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:alexanderlivanov:fotoscms2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B9153B8F-7372-4019-B2FA-6BB712EC9E6B",
"versionEndExcluding": null,
"versionEndIncluding": "2.4.3",
"versionS... | [
"79"
] | 79 | https://github.com/AlexanderLivanov/FotosCMS2/issues/18 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"AlexanderLivanov",
"FotosCMS2"
] | On the profile.php page, line 20 will output, `echo$_ SESSION ['username '].' - Профиль';`, But`$_ SESSION ['username ']` is obtained through the` if (isset ($-COOKIE ['username cookie')) {$_SESSION ['username ']=$-COOKIE ['username cookie'];}` in the cfg. php file,`$_ COOKIE ['username cookie ']` is something that use... | The cookie parameter in profile.php has an XSS vulnerability. | https://api.github.com/repos/AlexanderLivanov/FotosCMS2/issues/18/comments | 4 | 2023-10-23T06:12:31Z | 2024-03-15T18:27:04Z | https://github.com/AlexanderLivanov/FotosCMS2/issues/18 | 1,956,426,373 | 18 | 5,705 |
CVE-2023-46863 | 2023-10-30T00:15:39.157 | Peppermint Ticket Management before 0.2.4 allows remote attackers to read arbitrary files via a /api/v1/users/file/download?filepath=./../ POST request. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/Peppermint-Lab/peppermint/issues/108"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Ven... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:peppermint:peppermint:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E427CA89-5AC0-4D9B-9187-4579D200803F",
"versionEndExcluding": "0.2.4",
"versionEndIncluding": null,
"versionStartE... | [
"22"
] | 22 | https://github.com/Peppermint-Lab/peppermint/issues/108 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"Peppermint-Lab",
"peppermint"
] | The application allows users to download files.
The `filepath` parameter is vulnerable to a path traversal resulting in reading/downloading arbitrary files from the server.
```http
POST /api/v1/users/file/download?filepath=./../../../../../etc/passwd HTTP/1.1
Host: localhost:5000
Content-Type: multipart/form-dat... | Vulnerability: Arbitrary File Download (unauthenticated) | https://api.github.com/repos/Peppermint-Lab/peppermint/issues/108/comments | 2 | 2022-07-21T04:59:27Z | 2023-06-10T11:40:16Z | https://github.com/Peppermint-Lab/peppermint/issues/108 | 1,312,603,587 | 108 | 5,706 |
CVE-2023-46864 | 2023-10-30T00:15:39.200 | Peppermint Ticket Management through 0.2.4 allows remote attackers to read arbitrary files via a /api/v1/ticket/1/file/download?filepath=../ POST request. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/Peppermint-Lab/peppermint/issues/171"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Ven... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:peppermint:peppermint:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B8FFA273-1A2B-4C79-921A-660D074E15A8",
"versionEndExcluding": null,
"versionEndIncluding": "0.2.4",
"versionStartE... | [
"22"
] | 22 | https://github.com/Peppermint-Lab/peppermint/issues/171 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"Peppermint-Lab",
"peppermint"
] | # Description
When downloading a file attached to a ticket, it was observed to be able to download arbitrary files off the web server due to the filepath query parameter not being validated and passed directly to fs.createReadStream. Instructions to download and run the latest release were followed from here: https://... | Path Traversal - Arbitrary File Download | https://api.github.com/repos/Peppermint-Lab/peppermint/issues/171/comments | 5 | 2023-10-26T17:12:41Z | 2023-11-24T20:17:26Z | https://github.com/Peppermint-Lab/peppermint/issues/171 | 1,964,005,471 | 171 | 5,707 |
CVE-2023-46865 | 2023-10-30T01:15:21.967 | /api/v1/company/upload-logo in CompanyController.php in crater through 6.0.6 allows a superadmin to execute arbitrary PHP code by placing this code into an image/png IDAT chunk of a Company Logo image. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/asylumdx/Crater-CVE-2023-46865-RCE"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/crater-invoice/crater/issues/1267"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:craterapp:crater:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3D402EFB-A3FF-49C9-81E8-EF904A46277E",
"versionEndExcluding": null,
"versionEndIncluding": "6.0.6",
"versionStartExclud... | [
"94"
] | 94 | https://github.com/crater-invoice/crater/issues/1267 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"crater-invoice",
"crater"
] | **Description**
This is a responsible disclosure. I've contacted the maintainers through huntr.dev on april and they have acknowledged the vulnerability but the project seems to be in maintanance for almost a year. I've given them 5 months to fix(they didnt respond after acknowledging it) and think I should let others... | Post auth remote code exec as superadmin, CVE-2023-46865 | https://api.github.com/repos/crater-invoice-inc/crater/issues/1267/comments | 5 | 2023-10-13T10:08:31Z | 2023-11-08T05:58:04Z | https://github.com/crater-invoice-inc/crater/issues/1267 | 1,941,653,997 | 1,267 | 5,708 |
CVE-2023-46866 | 2023-10-30T03:15:07.783 | In International Color Consortium DemoIccMAX 79ecb74, CIccCLUT::Interp3d in IccProfLib/IccTagLut.cpp in libSampleICC.a attempts to access array elements at out-of-bounds indexes. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/InternationalColorConsortium/DemoIccMAX/issues/54"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:color:demoiccmax:2022-06-21:*:*:*:*:*:*:*",
"matchCriteriaId": "10975878-B3F5-48A0-80B1-2AC1EBD0298D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"787"
] | 787 | https://github.com/InternationalColorConsortium/DemoIccMAX/issues/54 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"InternationalColorConsortium",
"DemoIccMAX"
] | ## Bug 1 - Heap Buffer Overflow in CIccCLUT::Interp3d | CVE-2023-46866
### Patch in PR https://github.com/InternationalColorConsortium/DemoIccMAX/pull/64
Severity: Reference Implementation | High
### Description
A heap buffer overflow has been identified in the CIccCLUT::Interp3d method. This vulnerability ... | Bugs from Fuzzing | https://api.github.com/repos/InternationalColorConsortium/DemoIccMAX/issues/54/comments | 0 | 2023-10-26T18:51:51Z | 2024-05-09T02:28:54Z | https://github.com/InternationalColorConsortium/DemoIccMAX/issues/54 | 1,964,174,295 | 54 | 5,709 |
CVE-2020-36767 | 2023-10-30T19:15:07.767 | tinyfiledialogs (aka tiny file dialogs) before 3.8.0 allows shell metacharacters in titles, messages, and other input data. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/servo/servo/issues/25498#issuecomment-703527082"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https:... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vareille:tinyfiledialogs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9EB85E3F-EB36-4152-9949-76F2A9FA6384",
"versionEndExcluding": "3.8.0",
"versionEndIncluding": null,
"versionSta... | [
"94"
] | 94 | https://github.com/servo/servo/issues/25498#issuecomment-703527082 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"servo",
"servo"
] | I took a quick look at the issues, but I didn't find a similar one. Also, I hope that this is the right repository to report this.
Opening this HTML file executes code on the client:
```html
<html>
<script>
alert("Hey, `id`!");
</script>
</html>
```
In the console this produces the following output which... | alert leads to code execution on Linux | https://api.github.com/repos/servo/servo/issues/25498/comments | 7 | 2020-01-12T13:28:18Z | 2025-04-24T22:44:48Z | https://github.com/servo/servo/issues/25498 | 548,570,631 | 25,498 | 5,710 |
CVE-2023-5349 | 2023-10-30T21:15:07.643 | A memory leak flaw was found in ruby-magick, an interface between Ruby and ImageMagick. This issue can lead to a denial of service (DOS) by memory exhaustion. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integ... | [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2023-5349"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/s... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rmagick:rmagick:*:*:*:*:*:ruby:*:*",
"matchCriteriaId": "B9093FAF-BBDD-4BAD-9274-6896A5F0BF47",
"versionEndExcluding": "5.3.0",
"versionEndIncluding": null,
"versionStartExcl... | [
"401"
] | 401 | https://github.com/rmagick/rmagick/issues/1401 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"rmagick",
"rmagick"
] | ### Description
Long running ruby process creating images with rmagick consumes massive amounts of memory since most recent ImageMagick-6.9.12-90.tar.gz release.
### Steps to Reproduce
Install latest imagemagick@6 (https://formulae.brew.sh/api/formula/imagemagick@6.json) and install rmagick 5.2.0. Long running ru... | Huge memory consumption with latest imagemagick@6 update | https://api.github.com/repos/rmagick/rmagick/issues/1401/comments | 29 | 2023-07-07T13:47:42Z | 2025-03-28T16:58:00Z | https://github.com/rmagick/rmagick/issues/1401 | 1,793,583,138 | 1,401 | 5,711 |
CVE-2015-20110 | 2023-10-31T03:15:07.613 | JHipster generator-jhipster before 2.23.0 allows a timing attack against validateToken due to a string comparison that stops at the first character that is different. Attackers can guess tokens by brute forcing one character at a time and observing the timing. This of course drastically reduces the search space to a li... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/jhipster/generator-jhipster/commit/79fe5626cb1bb80f9ac86cf46980748e65d2bdbc"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/jhipster/generator-jhipster/commit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jhipster:jhipster:*:*:*:*:*:*:*:*",
"matchCriteriaId": "975D9B1E-D46A-4E51-9190-4A5C1F050EB6",
"versionEndExcluding": "2.23.0",
"versionEndIncluding": null,
"versionStartExcl... | [
"307"
] | 307 | https://github.com/jhipster/generator-jhipster/issues/2095 | [
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"jhipster",
"generator-jhipster"
] | The TokenProvider uses `String.equals(str)` to compare the given token-signature with a calculated one. This method uses a break-on-inequality algorithm. This makes the TokenProvider vulnerable to timing attacks, where an attacker can forge a token with any username more easily than using brute force.
[Coda Hale did a... | Security: TokenProvider vulnerable to timing attacks | https://api.github.com/repos/jhipster/generator-jhipster/issues/2095/comments | 6 | 2015-10-06T16:05:56Z | 2016-08-12T02:42:34Z | https://github.com/jhipster/generator-jhipster/issues/2095 | 110,043,433 | 2,095 | 5,712 |
CVE-2023-45996 | 2023-10-31T06:15:07.883 | SQL injection vulnerability in Senayan Library Management Systems Slims v.9 and Bulian v.9.6.1 allows a remote attacker to obtain sensitive information and execute arbitrary code via a crafted script to the reborrowLimit parameter in the member_type.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Vuln0wned/slims_owned/blob/main/slims/slims9-bulian-9.6.1-SQLI-member_type.md"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vend... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:slims:senayan_library_management_system:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BA26D88B-C9C8-4F63-9953-F4F2520AD952",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/slims/slims9_bulian/issues/216 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"slims",
"slims9_bulian"
] | # The Bug
A SQL Injection has found in `admin/modules/membership/member_type.php` at the code below
```
$data['member_type_name'] = $dbs->escape_string($memberTypeName);
$data['loan_limit'] = trim($_POST['loanLimit']);
$data['loan_periode'] = trim($_POST['loanPeriode']);
$data['enable_reserve'] = $_POST['enable... | Vuln0wned Report: SQL Injection in member_type.php | https://api.github.com/repos/slims/slims9_bulian/issues/216/comments | 3 | 2023-10-08T16:42:47Z | 2025-01-01T11:05:28Z | https://github.com/slims/slims9_bulian/issues/216 | 1,931,906,656 | 216 | 5,713 |
CVE-2023-3676 | 2023-10-31T21:15:08.550 | A security issue was discovered in Kubernetes where a user
that can create pods on Windows nodes may be able to escalate to admin
privileges on those nodes. Kubernetes clusters are only affected if they
include Windows nodes. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Exploit",
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/119339"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory"
],
"url": "h... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FF4C81ED-BB69-490B-BABA-89C2501A5E6D",
"versionEndExcluding": "1.24.17",
"versionEndIncluding": null,
"versionStar... | [
"20"
] | 20 | https://github.com/kubernetes/kubernetes/issues/119339 | [
"Exploit",
"Mitigation",
"Patch",
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) - **HIGH** (8.8)
A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those no... | CVE-2023-3676: Insufficient input sanitization on Windows nodes leads to privilege escalation | https://api.github.com/repos/kubernetes/kubernetes/issues/119339/comments | 3 | 2023-07-14T18:27:48Z | 2023-10-31T20:30:00Z | https://github.com/kubernetes/kubernetes/issues/119339 | 1,805,330,606 | 119,339 | 5,714 |
CVE-2023-3955 | 2023-10-31T21:15:08.613 | A security issue was discovered in Kubernetes where a user
that can create pods on Windows nodes may be able to escalate to admin
privileges on those nodes. Kubernetes clusters are only affected if they
include Windows nodes. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Exploit",
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/119595"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Technical Description"
],
"url": "... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FF4C81ED-BB69-490B-BABA-89C2501A5E6D",
"versionEndExcluding": "1.24.17",
"versionEndIncluding": null,
"versionStar... | [
"20"
] | 20 | https://github.com/kubernetes/kubernetes/issues/119595 | [
"Exploit",
"Mitigation",
"Patch",
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: [CVSS:3.1/av:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) - **HIGH** (8.8)
A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those no... | CVE-2023-3955: Insufficient input sanitization on Windows nodes leads to privilege escalation | https://api.github.com/repos/kubernetes/kubernetes/issues/119595/comments | 2 | 2023-07-26T15:30:50Z | 2023-11-01T00:33:34Z | https://github.com/kubernetes/kubernetes/issues/119595 | 1,822,677,454 | 119,595 | 5,715 |
CVE-2023-46930 | 2023-11-01T14:15:38.250 | GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP4Box in gf_isom_find_od_id_for_track /afltest/gpac/src/isomedia/media_odf.c:522:14. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/commit/3809955065afa3da1ad580012ec43deadbb0f2c8"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/issues/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev605-gfc9e29089-master:*:*:*:*:*:*:*",
"matchCriteriaId": "276701A5-2ABB-4EDB-9E2A-96A6A9EA62D9",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"787"
] | 787 | https://github.com/gpac/gpac/issues/2666 | [
"Vendor Advisory"
] | github.com | [
"gpac",
"gpac"
] | # SEGV in MP4Box
### Description
SEGV in gpac/MP4Box.
#0 0x7ffff6697edd in gf_isom_find_od_id_for_track /afltest/gpac/src/isomedia/media_odf.c:522:14
### Version
```shell
MP4Box - GPAC version 2.3-DEV-rev605-gfc9e29089-master
(c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
... | SEGV in gpac/MP4Box in gf_isom_find_od_id_for_track /afltest/gpac/src/isomedia/media_odf.c:522:14 | https://api.github.com/repos/gpac/gpac/issues/2666/comments | 0 | 2023-10-25T06:06:04Z | 2023-10-26T10:37:04Z | https://github.com/gpac/gpac/issues/2666 | 1,960,612,139 | 2,666 | 5,716 |
CVE-2023-46931 | 2023-11-01T14:15:38.640 | GPAC 2.3-DEV-rev605-gfc9e29089-master contains a heap-buffer-overflow in ffdmx_parse_side_data /afltest/gpac/src/filters/ff_dmx.c:202:14 in gpac/MP4Box. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/commit/671976fccc971b3dff8d3dcf6ebd600472ca64bf."
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/issues... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev605-gfc9e29089-master:*:*:*:*:*:*:*",
"matchCriteriaId": "276701A5-2ABB-4EDB-9E2A-96A6A9EA62D9",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"787"
] | 787 | https://github.com/gpac/gpac/issues/2664 | [
"Vendor Advisory"
] | github.com | [
"gpac",
"gpac"
] | # heap-buffer-overflow in ffdmx_parse_side_data /afltest/gpac/src/filters/ff_dmx.c:202:14 in gpac/gpac
### Description
Heap-buffer-overflow in MP4Box.
### Version
```shell
MP4Box - GPAC version 2.3-DEV-rev605-gfc9e29089-master
(c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Pl... | heap-buffer-overflow in ffdmx_parse_side_data /afltest/gpac/src/filters/ff_dmx.c:202:14 in gpac/MP4Box | https://api.github.com/repos/gpac/gpac/issues/2664/comments | 0 | 2023-10-24T13:31:01Z | 2023-10-26T10:37:05Z | https://github.com/gpac/gpac/issues/2664 | 1,959,261,781 | 2,664 | 5,717 |
CVE-2023-46927 | 2023-11-01T15:15:08.707 | GPAC 2.3-DEV-rev605-gfc9e29089-master contains a heap-buffer-overflow in gf_isom_use_compact_size gpac/src/isomedia/isom_write.c:3403:3 in gpac/MP4Box. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/commit/a7b467b151d9b54badbc4dd71e7a366b7c391817"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/issues/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev605-gfc9e29089-master:*:*:*:*:*:*:*",
"matchCriteriaId": "276701A5-2ABB-4EDB-9E2A-96A6A9EA62D9",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"787"
] | 787 | https://github.com/gpac/gpac/issues/2657 | [
"Vendor Advisory"
] | github.com | [
"gpac",
"gpac"
] | # heap-buffer-overflow in gf_isom_use_compact_size gpac/src/isomedia/isom_write.c:3403:3 in gpac/gpac
### Description
Heap-buffer-overflow in MP4Box.
### Version
```shell
MP4Box - GPAC version 2.3-DEV-rev605-gfc9e29089-master
(c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Ple... | heap-buffer-overflow in gf_isom_use_compact_size gpac/src/isomedia/isom_write.c:3403:3 in gpac/gpac | https://api.github.com/repos/gpac/gpac/issues/2657/comments | 0 | 2023-10-22T20:14:14Z | 2023-10-23T13:23:29Z | https://github.com/gpac/gpac/issues/2657 | 1,956,040,458 | 2,657 | 5,718 |
CVE-2023-46928 | 2023-11-01T15:15:08.753 | GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP4Box in gf_media_change_pl /afltest/gpac/src/media_tools/isom_tools.c:3293:42. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/commit/0753bf6d867343a80a044bf47a27d0b7accc8bf1"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/issues/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev605-gfc9e29089-master:*:*:*:*:*:*:*",
"matchCriteriaId": "276701A5-2ABB-4EDB-9E2A-96A6A9EA62D9",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"787"
] | 787 | https://github.com/gpac/gpac/issues/2661 | [
"Vendor Advisory"
] | github.com | [
"gpac",
"gpac"
] | # SEGV in MP4Box
### Description
SEGV in gpac/MP4Box.
#0 0x7ffff6798224 in gf_media_change_pl /afltest/gpac/src/media_tools/isom_tools.c:3293:42
### Version
```shell
MP4Box - GPAC version 2.3-DEV-rev605-gfc9e29089-master
(c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Pleas... | SEGV in gpac/MP4Box in gf_media_change_pl /afltest/gpac/src/media_tools/isom_tools.c:3293:42 | https://api.github.com/repos/gpac/gpac/issues/2661/comments | 0 | 2023-10-24T08:08:44Z | 2023-10-26T10:37:05Z | https://github.com/gpac/gpac/issues/2661 | 1,958,731,162 | 2,661 | 5,719 |
CVE-2023-5916 | 2023-11-02T11:15:14.540 | A vulnerability classified as critical has been found in Lissy93 Dashy 2.1.1. This affects an unknown part of the file /config-manager/save of the component Configuration Handler. The manipulation of the argument config leads to improper access controls. It is possible to initiate the attack remotely. The exploit has b... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Lissy93/dashy/issues/1336"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://treasure-blarney-085.notion.site/Dashy-0dca8a0ebbd84f78ae6d03528ff1... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dashy:dashy:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "43ECA239-B554-4FF1-BDA4-CF648B2387CC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"284"
] | 284 | https://github.com/Lissy93/dashy/issues/1336 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"Lissy93",
"dashy"
] | ### Environment
Self-Hosted (Docker)
### System
_No response_
### Version
2.1.1
### Describe the problem
the "disableConfiguration" has set to "true" but the configuration is able to change via http request
... | [BUG] Unauthorized access | https://api.github.com/repos/Lissy93/dashy/issues/1336/comments | 2 | 2023-10-01T10:53:58Z | 2024-02-04T11:48:14Z | https://github.com/Lissy93/dashy/issues/1336 | 1,920,701,292 | 1,336 | 5,720 |
CVE-2023-46925 | 2023-11-02T17:15:11.567 | Reportico 7.1.21 is vulnerable to Cross Site Scripting (XSS). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/reportico-web/reportico/issues/47"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:reportico:reportico:7.1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "36090B19-CD3B-42FD-BDB2-C30FA144EDD0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | [
"79"
] | 79 | https://github.com/reportico-web/reportico/issues/47 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"reportico-web",
"reportico"
] | Cross-site scripting (XSS) is a web application vulnerability that permits an attacker to inject code, (typically HTML or JavaScript), into the contents of an outside website. When a victim views an infected page on the website, the injected code executes in the victim’s browser. Consequently, the attacker has bypassed... | Reflected XSS in Reportico-7.1 | https://api.github.com/repos/reportico-web/reportico/issues/47/comments | 4 | 2022-05-17T10:58:47Z | 2023-07-06T12:17:22Z | https://github.com/reportico-web/reportico/issues/47 | 1,238,463,044 | 47 | 5,721 |
CVE-2023-31579 | 2023-11-02T22:15:08.640 | Dromara Lamp-Cloud before v3.8.1 was discovered to use a hardcoded cryptographic key when creating and verifying a Json Web Token. This vulnerability allows attackers to authenticate to the application via a crafted JWT token. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/dromara/lamp-cloud/issues/183"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/xubowenW/JWTissu... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tangyh:lamp-cloud:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D2219072-7E2E-4806-9D8B-32064FA47067",
"versionEndExcluding": "3.8.1",
"versionEndIncluding": null,
"versionStartExclu... | [
"798"
] | 798 | https://github.com/dromara/lamp-cloud/issues/183 | [
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"dromara",
"lamp-cloud"
] | # 版本信息:
JDK 版本(必填) : --
源码版本(必填):3.7.0
MySQL(必填):--
Nacos(必填):--
# 问题描述:
Hi, we are a research group to help developers build secure applications. We designed a cryptographic misuse detector on Java language. We found your great public repository (i.e., lamp-cloud) from Github, and several security issues det... | Using predictable/constant cryptographic key when creating and verifing Json Web Token. | https://api.github.com/repos/dromara/lamp-cloud/issues/183/comments | 4 | 2022-09-05T07:52:22Z | 2023-08-24T01:41:03Z | https://github.com/dromara/lamp-cloud/issues/183 | 1,361,544,458 | 183 | 5,722 |
CVE-2023-42299 | 2023-11-02T22:15:09.113 | Buffer Overflow vulnerability in OpenImageIO oiio v.2.4.12.0 allows a remote attacker to execute arbitrary code and cause a denial of service via the read_subimage_data function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/OpenImageIO/oiio/issues/3840"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openimageio:openimageio:2.4.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "28795C4C-8800-499D-8C41-5B27C2745310",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | [
"120"
] | 120 | https://github.com/OpenImageIO/oiio/issues/3840 | [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"OpenImageIO",
"oiio"
] | Describe the bug:
Hi, I found heap-buffer-overflow in file src/gif.imageio/gifinput.cpp, line 368.
To Reproduce:
Steps to reproduce the behavior:
1. CC=afl-clang-fast CXX=afl-clang-fast++ CFLAGS="-gdwarf-2 -g3 -O0 -fsanitize=address -fno-omit-frame-pointer" CXXFLAGS="-gdwarf-2 -g3 -O0 -fsanitize=address -fno-omit... | heap-buffer-overflow in file src/gif.imageio/gifinput.cpp, line 368 | https://api.github.com/repos/AcademySoftwareFoundation/OpenImageIO/issues/3840/comments | 13 | 2023-05-15T11:55:43Z | 2024-09-05T17:39:38Z | https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/3840 | 1,709,938,318 | 3,840 | 5,723 |
CVE-2023-46947 | 2023-11-03T13:15:08.797 | Subrion 4.2.1 has a remote command execution vulnerability in the backend. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/intelliants/subrion/issues/909"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Thir... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:intelliants:subrion:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E9C1813C-DBF7-4ADF-8FC0-23608A417D29",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"94"
] | 94 | https://github.com/intelliants/subrion/issues/909 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"intelliants",
"subrion"
] | ## There is a remote command execution vulnerability
### Affected version
- subrion 4.2.1 lates
### login address
~~~ text
http://127.0.0.1/panel
~~~
Find `PHP info` in the `System` module
 - **HIGH** (8.8)
A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes running kubernetes-csi-proxy may be able to escalate to... | CVE-2023-3893: Insufficient input sanitization on kubernetes-csi-proxy leads to privilege escalation | https://api.github.com/repos/kubernetes/kubernetes/issues/119594/comments | 5 | 2023-07-26T15:30:26Z | 2023-11-04T16:10:06Z | https://github.com/kubernetes/kubernetes/issues/119594 | 1,822,676,744 | 119,594 | 5,725 |
CVE-2022-3172 | 2023-11-03T20:15:08.550 | A security issue was discovered in kube-apiserver that allows an
aggregated API server to redirect client traffic to any URL. This could
lead to the client performing unexpected actions as well as forwarding
the client's API server credentials to third parties. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/112513"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List"
],
"url": "https://groups.google.com/g/kubernetes-sec... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:apiserver:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D740494E-6332-4421-BE43-C0CEB179CBA6",
"versionEndExcluding": null,
"versionEndIncluding": "1.21.14",
"versionStart... | [
"918"
] | 918 | https://github.com/kubernetes/kubernetes/issues/112513 | [
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: [CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:L](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:L) (5.1, medium)
A security issue was discovered in kube-apiserver that allows an aggregated API server to redirect client traffic to any URL. This could lead to the clien... | CVE-2022-3172: Aggregated API server can cause clients to be redirected (SSRF) | https://api.github.com/repos/kubernetes/kubernetes/issues/112513/comments | 4 | 2022-09-16T13:14:50Z | 2022-11-10T03:57:00Z | https://github.com/kubernetes/kubernetes/issues/112513 | 1,375,935,782 | 112,513 | 5,726 |
CVE-2023-40660 | 2023-11-06T17:15:11.757 | A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanent... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"int... | [
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://access.redhat.com/errata/RHSA-2023:7876"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://access.redhat.com/errata/RHSA-2023:7879"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:opensc_project:opensc:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E6722AEB-DDA9-49E4-9D5C-FBE1F15230AF",
"versionEndExcluding": null,
"versionEndIncluding": "0.23.0",
"versionStart... | [
"287"
] | 287 | https://github.com/OpenSC/OpenSC/issues/2792#issuecomment-1674806651 | [
"Issue Tracking"
] | github.com | [
"OpenSC",
"OpenSC"
] | https://github.com/OpenSC/OpenSC/compare/0.23.0...master shows +250 commits since last release. Amongst those commits are some critical fixes.
Do you have any plans to release new version soon? 🤔 | New release 0.24.0 | https://api.github.com/repos/OpenSC/OpenSC/issues/2792/comments | 26 | 2023-06-02T11:38:07Z | 2023-12-13T11:29:55Z | https://github.com/OpenSC/OpenSC/issues/2792 | 1,738,037,344 | 2,792 | 5,727 |
CVE-2023-47004 | 2023-11-06T22:15:08.043 | Buffer Overflow vulnerability in Redis RedisGraph v.2.x through v.2.12.8 and fixed in v.2.12.9 allows an attacker to execute arbitrary code via the code logic after valid authentication. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/RedisGraph/RedisGraph/issues/3178"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redislabs:redisgraph:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AF83E4D7-A176-4767-A2C4-31B52259CBAB",
"versionEndExcluding": "2.12.9",
"versionEndIncluding": null,
"versionStartE... | [
"787"
] | 787 | https://github.com/RedisGraph/RedisGraph/issues/3178 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"RedisGraph",
"RedisGraph"
] | # Summary
I have found a security vulnerability in the latest codebase of RedisGraph.
With personal investigation, I think an attacker could leverage this vulnerability to archive a **remote code execution** on a vulnerable Redis instance.
The vulnerability exists in code logic after a valid authentication.
# PoC... | OOB-write vulnerability lead to REMOTE CODE EXECUTION | https://api.github.com/repos/RedisGraph/RedisGraph/issues/3178/comments | 4 | 2023-09-07T03:11:33Z | 2023-11-07T13:09:02Z | https://github.com/RedisGraph/RedisGraph/issues/3178 | 1,885,041,045 | 3,178 | 5,728 |
CVE-2023-46998 | 2023-11-07T05:15:13.657 | Cross Site Scripting vulnerability in BootBox Bootbox.js v.3.2 through 6.0 allows a remote attacker to execute arbitrary code via a crafted payload to alert(), confirm(), prompt() functions. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/bootboxjs/bootbox/issues/661"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/soy-oreocato/CVE-2023-46998/"
},
{
"s... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bootboxjs:bootbox:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "78B59235-F11D-45F3-BC6F-15B49C64CCC1",
"versionEndExcluding": null,
"versionEndIncluding": "6.0.0",
"versionStar... | [
"79"
] | 79 | https://github.com/bootboxjs/bootbox/issues/661 | [
"Issue Tracking"
] | github.com | [
"bootboxjs",
"bootbox"
] | bootbox.confirm and alert use jquery's .html() (and other functions) that add content to html elements. These are a potential XSS security issue since jquery evaluates the content.
Here's a working example (scroll down to the bottom of the JS window for the example code, I just borrowed somebody's fiddle and modi... | Document or fix possible XSS vulnerability (via jquery) | https://api.github.com/repos/bootboxjs/bootbox/issues/661/comments | 48 | 2018-05-24T01:16:44Z | 2025-03-28T02:13:21Z | https://github.com/bootboxjs/bootbox/issues/661 | 325,930,215 | 661 | 5,729 |
CVE-2023-33478 | 2023-11-07T15:15:10.630 | RemoteClinic 2.0 has a SQL injection vulnerability in the ID parameter of /medicines/stocks.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/remoteclinic/RemoteClinic/issues/22"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vend... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:remoteclinic:remote_clinic:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E545F721-A065-4091-8405-9B92071E1A44",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"89"
] | 89 | https://github.com/remoteclinic/RemoteClinic/issues/22 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"remoteclinic",
"RemoteClinic"
] | ### Vulnerable code:
[Line 51 in stocks.php](https://github.com/remoteclinic/RemoteClinic/blob/master/medicines/stocks.php#L51)
```php
$sql=mysqli_query($con, "select * from p_stock where branch='$id' order by code asc limit
20000")or die(mysqli_error());
```
User data flows into this manually-constructed SQ... | SQL injection vulnerability in `id` parameter of `/medicines/stocks.php` | https://api.github.com/repos/remoteclinic/RemoteClinic/issues/22/comments | 1 | 2023-05-05T12:17:42Z | 2023-11-09T15:25:43Z | https://github.com/remoteclinic/RemoteClinic/issues/22 | 1,697,523,258 | 22 | 5,730 |
CVE-2023-33479 | 2023-11-07T15:15:10.690 | RemoteClinic version 2.0 contains a SQL injection vulnerability in the /staff/edit.php file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/remoteclinic/RemoteClinic/issues/23"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vend... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:remoteclinic:remote_clinic:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E545F721-A065-4091-8405-9B92071E1A44",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"89"
] | 89 | https://github.com/remoteclinic/RemoteClinic/issues/23 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"remoteclinic",
"RemoteClinic"
] | ### Vulnerable code:
[Line 62 in staff/edit.php](https://github.com/remoteclinic/RemoteClinic/blob/master/staff/edit.php#L62)
```php
$profile=mysqli_fetch_object(mysqli_query($con, "select * from p_staff_dir where id='$id'"))
```
User data flows into this manually-constructed SQL string, leading to SQL injection... | SQL injection vulnerability in `id` parameter of `/staff/edit.php` | https://api.github.com/repos/remoteclinic/RemoteClinic/issues/23/comments | 1 | 2023-05-05T12:49:47Z | 2023-11-09T15:24:25Z | https://github.com/remoteclinic/RemoteClinic/issues/23 | 1,697,567,092 | 23 | 5,731 |
CVE-2023-33480 | 2023-11-07T15:15:10.743 | RemoteClinic 2.0 contains a critical vulnerability chain that can be exploited by a remote attacker with low-privileged user credentials to create admin users, escalate privileges, and execute arbitrary code on the target system via a PHP shell. The vulnerabilities are caused by a lack of input validation and access co... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/remoteclinic/RemoteClinic/issues/24"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vend... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:remoteclinic:remote_clinic:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E545F721-A065-4091-8405-9B92071E1A44",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"434"
] | 434 | https://github.com/remoteclinic/RemoteClinic/issues/24 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"remoteclinic",
"RemoteClinic"
] | ## Vulnerability chain in RemoteClinic application
### Vulnerability description
The RemoteClinic application contains a critical vulnerability chain that can be exploited by a remote attacker with low-privileged user credentials to create admin users, escalate privileges, and execute arbitrary code on the target s... | Privilege escalation and arbitrary file upload vulnerability leading to Remote Code Execution | https://api.github.com/repos/remoteclinic/RemoteClinic/issues/24/comments | 1 | 2023-05-06T03:16:43Z | 2023-11-09T15:20:47Z | https://github.com/remoteclinic/RemoteClinic/issues/24 | 1,698,401,625 | 24 | 5,732 |
CVE-2023-33481 | 2023-11-07T15:15:10.793 | RemoteClinic 2.0 is vulnerable to a time-based blind SQL injection attack in the 'start' GET parameter of patients/index.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/remoteclinic/RemoteClinic/issues/25"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vend... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:remoteclinic:remote_clinic:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E545F721-A065-4091-8405-9B92071E1A44",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"89"
] | 89 | https://github.com/remoteclinic/RemoteClinic/issues/25 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"remoteclinic",
"RemoteClinic"
] | ## Description
The web application is vulnerable to a time-based blind SQL injection attack in the 'start' GET parameter of `patients/index.php`. An attacker can inject malicious SQL statements into the application, causing it to respond with a time-delayed response that indicates the vulnerability. Exploiting this ... | SQL injection vulnerability in the 'start' GET parameter of `patients/index.php` | https://api.github.com/repos/remoteclinic/RemoteClinic/issues/25/comments | 1 | 2023-05-06T03:48:39Z | 2023-11-09T15:21:52Z | https://github.com/remoteclinic/RemoteClinic/issues/25 | 1,698,412,619 | 25 | 5,733 |
CVE-2023-46001 | 2023-11-07T22:15:11.473 | Buffer Overflow vulnerability in gpac MP4Box v.2.3-DEV-rev573-g201320819-master allows a local attacker to cause a denial of service via the gpac/src/isomedia/isom_read.c:2807:51 function in gf_isom_get_user_data. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/gpac/gpac/commit/e79b0cf7e72404750630bc01340e999f3940dbc4"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/gpac/gpac/i... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev573-g201320819-master:*:*:*:*:*:*:*",
"matchCriteriaId": "63154633-0211-47E2-861B-3FB9BE27BA70",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"120"
] | 120 | https://github.com/gpac/gpac/issues/2629 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"gpac",
"gpac"
] | # Version
```
root@4dd48d09e778:~/gpac/bin/gcc# ./MP4Box -version
MP4Box - GPAC version 2.3-DEV-rev573-g201320819-master
(c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC:... | SEGV in gpac/src/isomedia/isom_read.c:2807:51 in gf_isom_get_user_data | https://api.github.com/repos/gpac/gpac/issues/2629/comments | 0 | 2023-10-10T04:03:18Z | 2023-10-11T10:57:17Z | https://github.com/gpac/gpac/issues/2629 | 1,934,290,908 | 2,629 | 5,734 |
CVE-2023-45857 | 2023-11-08T21:15:08.550 | An issue discovered in Axios 1.5.1 inadvertently reveals the confidential XSRF-TOKEN stored in cookies by including it in the HTTP header X-XSRF-TOKEN for every request made to any host allowing attackers to view sensitive information. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/axios/axios/issues/6006"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://security.netapp.com/advisory/ntap-20240621-0006/"
},
{
"source": "af854a3a-2127-... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axios:axios:1.5.1:*:*:*:*:node.js:*:*",
"matchCriteriaId": "28179B3F-4DC0-416C-BC68-2678D3DF2313",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"352"
] | 352 | https://github.com/axios/axios/issues/6006 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"axios",
"axios"
] | ### Describe the bug
Hi team, @jasonsaayman and @DigitalBrainJS,
The library inserts the X-XSRF-TOKEN header using the secret XSRF-TOKEN cookie value in **all requests to any server** when the XSRF-TOKEN cookie is available, and the withCredentials setting is turned on. If a malicious user manages to obtain this ... | CVE-2023-45857 (CWE-359) XSRF-TOKEN value is disclosed to an unauthorised actor | https://api.github.com/repos/axios/axios/issues/6006/comments | 40 | 2023-10-16T20:36:35Z | 2024-04-19T20:29:13Z | https://github.com/axios/axios/issues/6006 | 1,946,049,542 | 6,006 | 5,735 |
CVE-2023-46362 | 2023-11-08T21:15:08.633 | jbig2enc v0.28 was discovered to contain a heap-use-after-free via jbig2enc_auto_threshold_using_hash in src/jbig2enc.cc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/agl/jbig2enc"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/agl/jbig2enc/issues/84"
},
{
"source... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jbig2enc_project:jbig2enc:0.28:*:*:*:*:*:*:*",
"matchCriteriaId": "5BB6C453-2F4A-4ED7-B529-879B4527FBE3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"416"
] | 416 | https://github.com/agl/jbig2enc/issues/84 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"agl",
"jbig2enc"
] | # heap-use-after-free in jbig2enc
### Description
jbig2enc v0.28 was discovered to contain a heap-use-after-free via jbig2enc_auto_threshold_using_hash in src/jbig2enc.cc. This vulnerability can lead to a Denial of Service (DoS).
### ASAN Log
./src/jbig2 -s -a -p Poc1jbig2enc
```shell
==================... | heap-use-after-free in jbig2enc via jbig2enc_auto_threshold_using_hash in src/jbig2enc.cc. | https://api.github.com/repos/agl/jbig2enc/issues/84/comments | 2 | 2023-10-16T17:25:59Z | 2024-12-19T17:54:29Z | https://github.com/agl/jbig2enc/issues/84 | 1,945,735,940 | 84 | 5,736 |
CVE-2023-46363 | 2023-11-08T21:15:08.673 | jbig2enc v0.28 was discovered to contain a SEGV via jbig2_add_page in src/jbig2enc.cc:512. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/agl/jbig2enc"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/agl/jbig2enc/issues/85"
},
{
"source... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jbig2enc_project:jbig2enc:0.28:*:*:*:*:*:*:*",
"matchCriteriaId": "5BB6C453-2F4A-4ED7-B529-879B4527FBE3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"120"
] | 120 | https://github.com/agl/jbig2enc/issues/85 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"agl",
"jbig2enc"
] | # SEGV in jbig2enc
### Description
jbig2enc v0.28 was discovered to contain a SEGV via jbig2_add_page in src/jbig2enc.cc:512. This vulnerability can lead to a Denial of Service (DoS).
### ASAN Log
./src/jbig2 -s -S -p -v -d -2 -O out.png Poc2jbig2enc
```shell
AddressSanitizer:DEADLYSIGNAL
============... | SEGV in jbig2enc | https://api.github.com/repos/agl/jbig2enc/issues/85/comments | 2 | 2023-10-16T17:34:18Z | 2024-12-19T18:03:12Z | https://github.com/agl/jbig2enc/issues/85 | 1,945,750,410 | 85 | 5,737 |
CVE-2023-4218 | 2023-11-09T09:15:08.320 | In Eclipse IDE versions < 2023-09 (4.29) some files with xml content are parsed vulnerable against all sorts of XXE attacks. The user just needs to open any evil project or update an open project with a vulnerable file (for example for review a foreign repository or patch).
| {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "emo@eclipse.org",
"tags": [
"Patch"
],
"url": "https://github.com/eclipse-cdt/cdt/commit/c7169b3186d2fef20f97467c3e2ad78e2943ed1b"
},
{
"source": "emo@eclipse.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ecl... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eclipse:eclipse_ide:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9B8336F1-FA6C-46B0-B4D2-F5B01D3F64DD",
"versionEndExcluding": "4.29",
"versionEndIncluding": null,
"versionStartExcl... | [
"611"
] | 611 | https://github.com/eclipse-emf/org.eclipse.emf/issues/10 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"eclipse-emf",
"org.eclipse.emf"
] | Please provide an XML load option for whether or not to resolve external entities.
And please disable external loading by default.
It would be ok, to have a fixed set of external files precached locally like in org.eclipse.help.internal.entityresolver.LocalEntityResolver / /org.eclipse.help/dtds/internal
| do not to resolve external entities | https://api.github.com/repos/eclipse-emf/org.eclipse.emf/issues/10/comments | 0 | 2023-07-31T16:07:39Z | 2023-08-01T12:52:20Z | https://github.com/eclipse-emf/org.eclipse.emf/issues/10 | 1,829,582,952 | 10 | 5,738 |
CVE-2023-46894 | 2023-11-09T16:15:34.887 | An issue discovered in esptool 4.6.2 allows attackers to view sensitive information via weak cryptographic algorithm. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/espressif/esptool/issues/926"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://github.com/espressif/esptool/issues/926"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:espressif:esptool:4.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "54405C4F-579C-43E5-B50E-AE8F473C7D49",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"326"
] | 326 | https://github.com/espressif/esptool/issues/926 | [
"Exploit"
] | github.com | [
"espressif",
"esptool"
] | ### Operating System
ALL
### Esptool Version
4.6.2
### Python Version
python3.x
### Full Esptool Command Line that Was Run
None
### Esptool Output
```shell
Description:
I have identified a security vulnerability in the esptool project's use of AES ECB (Electronic Codebook) mode for initiali... | Cryptographic API Misuse Vulnerability: AES ECB used for initialization (ESPTOOL-756) | https://api.github.com/repos/espressif/esptool/issues/926/comments | 1 | 2023-10-23T14:32:24Z | 2023-10-27T02:27:48Z | https://github.com/espressif/esptool/issues/926 | 1,957,318,275 | 926 | 5,739 |
CVE-2023-47390 | 2023-11-11T18:15:14.683 | Headscale through 0.22.3 writes bearer tokens to info-level logs. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/juanfont/headscale/issues/1259"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Thir... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:juanfont:headscale:*:*:*:*:*:*:*:*",
"matchCriteriaId": "42E94F72-9B5D-4380-A9C4-940FF6726DC5",
"versionEndExcluding": null,
"versionEndIncluding": "0.22.3",
"versionStartExc... | [
"532"
] | 532 | https://github.com/juanfont/headscale/issues/1259 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"juanfont",
"headscale"
] | <!-- Headscale is a multinational community across the globe. Our common language is English. Please consider raising the bug report in this language. -->
**Bug description**
Looking at the headscale logs, it logs this at info level when accessing the HTTP api:
```
2023-03-11T21:13:56Z INF unary dur=0.815623 md... | Headscale logs bearer tokens | https://api.github.com/repos/juanfont/headscale/issues/1259/comments | 13 | 2023-03-11T21:18:28Z | 2024-02-29T15:52:31Z | https://github.com/juanfont/headscale/issues/1259 | 1,620,148,580 | 1,259 | 5,740 |
CVE-2023-47346 | 2023-11-13T22:15:07.740 | Buffer Overflow vulnerability in free5gc 3.3.0, UPF 1.2.0, and SMF 1.2.0 allows attackers to cause a denial of service via crafted PFCP messages. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/free5gc/free5gc/issues/482"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/free5gc/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:free5gc:free5gc:3.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "89BA8BA8-E366-48F9-930A-91ED1442AAFE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"120"
] | 120 | https://github.com/free5gc/free5gc/issues/482 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"free5gc",
"free5gc"
] | ## Describe the bug
While testing the free5gc UPF for some PFCP basic and security features, I could trigger several crashes when it receives special kind of PFCP messages (the secondary IE type is larger than 0x7fff). This could cause DOS of any UPF instance, all memory issues due to this kind of PFCP messages are ca... | [Bugs] UPF crash caused by PFCP messages whose 2rd IE type larger than 0x7fff | https://api.github.com/repos/free5gc/free5gc/issues/482/comments | 3 | 2023-09-22T02:57:53Z | 2023-11-02T04:51:21Z | https://github.com/free5gc/free5gc/issues/482 | 1,908,102,486 | 482 | 5,741 |
CVE-2023-47384 | 2023-11-14T20:15:08.417 | MP4Box GPAC v2.3-DEV-rev617-g671976fcc-master was discovered to contain a memory leak in the function gf_isom_add_chapter at /isomedia/isom_write.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted MP4 file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2672"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https:... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev617-g671976fcc-master:*:*:*:*:*:*:*",
"matchCriteriaId": "F540C691-D615-4A9B-8DD6-69B8488E3BA1",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"401"
] | 401 | https://github.com/gpac/gpac/issues/2672 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | 1、Version
./MP4Box -version
MP4Box - GPAC version 2.3-DEV-rev617-g671976fcc-master
(c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Config... | Memory Leak in gf_isom_add_chapter isomedia/isom_write.c:3182 | https://api.github.com/repos/gpac/gpac/issues/2672/comments | 0 | 2023-11-01T09:16:33Z | 2023-12-04T10:07:48Z | https://github.com/gpac/gpac/issues/2672 | 1,971,994,862 | 2,672 | 5,742 |
CVE-2023-5528 | 2023-11-14T21:15:14.123 | A security issue was discovered in Kubernetes where a user that can create pods and persistent volumes on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they are using an in-tree storage plugin for Windows nodes. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/kubernetes/kubernetes/issues/121879"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List"
],
"url": "https://groups.google.com/g/kubernetes-security-anno... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "25FFBC6E-DCE9-4596-8ABE-AC6B6564AA40",
"versionEndExcluding": "1.25.16",
"versionEndIncluding": null,
"versionStar... | [
"20"
] | 20 | https://github.com/kubernetes/kubernetes/issues/121879 | [
"Issue Tracking",
"Patch"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) - **HIGH** (7.2)
A security issue was discovered in Kubernetes where a user that can create pods and persistent volumes on Windows nodes may be able to escalate to admin... | CVE-2023-5528: Insufficient input sanitization in in-tree storage plugin leads to privilege escalation on Windows nodes | https://api.github.com/repos/kubernetes/kubernetes/issues/121879/comments | 1 | 2023-11-14T15:54:16Z | 2023-11-16T13:42:24Z | https://github.com/kubernetes/kubernetes/issues/121879 | 1,993,034,362 | 121,879 | 5,743 |
CVE-2023-41597 | 2023-11-15T06:15:27.893 | EyouCms v1.6.2 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the component /admin/twitter.php?active_t. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/emlog/emlog/issues/238"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5B87F220-D05C-4885-8C0E-E5BD8D8DFB66",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"79"
] | 79 | https://github.com/emlog/emlog/issues/238 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"emlog",
"emlog"
] | EyouCms v1.6.2 存在反射型XSS漏洞,系twitter.php文件中active_t参数过滤不严。

攻击者构造恶意链接:
/admin/twitter.php?active_t=%22%3E%3Cscript%3Ealert(1)%3C/script%3E
登陆后的用户触发xss。

Virtual Machine 2: Ubuntu 22.04.3 (as XXL-Job-Executor)
### Vulnerability Information
It was found that the direct query of xxl-job-admin/joblog/clearLog and /xxl-job-admin/joblog/logDetailPage does not validat... | Permission Vulnerability of Path /xxl-job-admin/joblog/clearLog & /xxl-job-admin/joblog/logDetailCat | https://api.github.com/repos/xuxueli/xxl-job/issues/3330/comments | 3 | 2023-11-08T02:32:23Z | 2025-01-08T15:13:33Z | https://github.com/xuxueli/xxl-job/issues/3330 | 1,982,605,023 | 3,330 | 5,745 |
CVE-2023-48088 | 2023-11-15T15:15:07.510 | xxl-job-admin 2.4.0 is vulnerable to Cross Site Scripting (XSS) via /xxl-job-admin/joblog/logDetailPage. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/xuxueli/xxl-job/issues/3329"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/xuxueli... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xuxueli:xxl-job:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "122ECDB6-272C-4B31-907E-E9FFB36305EA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"79"
] | 79 | https://github.com/xuxueli/xxl-job/issues/3329 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"xuxueli",
"xxl-job"
] | ### Environment
MySQL 5.7.44, XXL-Job-Admin 2.4.0
Virtual Machine 1: Ubuntu 22.04.3 (as XXL-Job-Admin)
Virtual Machine 2: Ubuntu 22.04.3 (as XXL-Job-Executor)
### Vulnerability Information
During the query of /xxl-job-admin/joblog/logDetailPage, the xxl-job-admin will query the related log directly in the machin... | XSS attack appears in /xxl-job-admin/joblog/logDetailPage | https://api.github.com/repos/xuxueli/xxl-job/issues/3329/comments | 1 | 2023-11-08T02:03:54Z | 2023-11-23T09:50:55Z | https://github.com/xuxueli/xxl-job/issues/3329 | 1,982,577,272 | 3,329 | 5,746 |
CVE-2023-48011 | 2023-11-15T19:15:07.693 | GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a heap-use-after-free via the flush_ref_samples function at /gpac/src/isomedia/movie_fragments.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/gpac/gpac/commit/c70f49dda4946d6db6aa55588f6a756b76bd84ea"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/gpac/gpac/issues/2611"
}... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev566-g50c2ab06f-master:*:*:*:*:*:*:*",
"matchCriteriaId": "ECEFB340-26A2-43CD-A8DC-518262E4DC36",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"416"
] | 416 | https://github.com/gpac/gpac/issues/2611 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"gpac",
"gpac"
] | # Version
```
$ ./MP4Box -version
MP4Box - GPAC version 2.3-DEV-rev566-g50c2ab06f-master
```
# Platform
```
$ uname -a
Linux user-GE40-2PC-Dragon-Eyes 6.2.0-33-generic #33~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Thu Sep 7 10:33:52 UTC 2 x86_64 x86_64 x86_64 GNU/Linux
```
# Asan
```
[33m[iso file] extra box ... | heap-use-after-free in ./gpac/src/isomedia/movie_fragments.c:936:37 in flush_ref_samples | https://api.github.com/repos/gpac/gpac/issues/2611/comments | 0 | 2023-10-08T16:10:40Z | 2023-10-12T14:08:21Z | https://github.com/gpac/gpac/issues/2611 | 1,931,883,357 | 2,611 | 5,747 |
CVE-2023-48013 | 2023-11-15T19:15:07.753 | GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a double free via the gf_filterpacket_del function at /gpac/src/filter_core/filter.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/gpac/gpac/commit/cd8a95c1efb8f5bfc950b86c2ef77b4c76f6b893"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/gpac/gpac/issues/2612"
}... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev566-g50c2ab06f-master:*:*:*:*:*:*:*",
"matchCriteriaId": "ECEFB340-26A2-43CD-A8DC-518262E4DC36",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"415"
] | 415 | https://github.com/gpac/gpac/issues/2612 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"gpac",
"gpac"
] | # Version
```
$ ./MP4Box -version
MP4Box - GPAC version 2.3-DEV-rev566-g50c2ab06f-master
```
# Platform
```
$ uname -a
Linux user-GE40-2PC-Dragon-Eyes 6.2.0-33-generic #33~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Thu Sep 7 10:33:52 UTC 2 x86_64 x86_64 x86_64 GNU/Linux
```
# Asan
```
/home/user/vul/MP4Box_cra... | double-free in gf_filterpacket_del /home/user/fuzzing_gpac/gpac/src/filter_core/filter.c:38:17 | https://api.github.com/repos/gpac/gpac/issues/2612/comments | 0 | 2023-10-08T16:13:47Z | 2023-10-12T14:17:39Z | https://github.com/gpac/gpac/issues/2612 | 1,931,884,388 | 2,612 | 5,748 |
CVE-2023-48014 | 2023-11-15T19:15:07.803 | GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a stack overflow via the hevc_parse_vps_extension function at /media_tools/av_parsers.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/gpac/gpac/commit/66abf0887c89c29a484d9e65e70882794e9e3a1b"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/gpac/gpac/issues/2613"
}... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev566-g50c2ab06f-master:*:*:*:*:*:*:*",
"matchCriteriaId": "ECEFB340-26A2-43CD-A8DC-518262E4DC36",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"787"
] | 787 | https://github.com/gpac/gpac/issues/2613 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"gpac",
"gpac"
] | # Version
```
$ ./MP4Box -version
MP4Box - GPAC version 2.3-DEV-rev566-g50c2ab06f-master
```
# Platform
```
$ uname -a
Linux user-GE40-2PC-Dragon-Eyes 6.2.0-33-generic #33~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Thu Sep 7 10:33:52 UTC 2 x86_64 x86_64 x86_64 GNU/Linux
```
# Asan
```
/home/user/vul/MP4Box_cra... | stack-buffer-overflow in /gpac/src/media_tools/av_parsers.c:7735:42 in hevc_parse_vps_extension | https://api.github.com/repos/gpac/gpac/issues/2613/comments | 0 | 2023-10-08T16:15:17Z | 2023-10-12T14:46:27Z | https://github.com/gpac/gpac/issues/2613 | 1,931,886,016 | 2,613 | 5,749 |
CVE-2023-47345 | 2023-11-15T22:15:27.877 | Buffer Overflow vulnerability in free5gc 3.3.0 allows attackers to cause a denial of service via crafted PFCP message with malformed PFCP Heartbeat message whose Recovery Time Stamp IE length is mutated to zero. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/free5gc/free5gc/issues/483"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/free5gc/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:free5gc:free5gc:3.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "89BA8BA8-E366-48F9-930A-91ED1442AAFE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"120"
] | 120 | https://github.com/free5gc/free5gc/issues/483 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"free5gc",
"free5gc"
] | [Bugs] UPF crash caused by malformed PFCP messages whose 1st IE length is mutated to zero
## Describe the bug
While fuzzing the free5gc UPF for some PFCP basic and security features, I could trigger several crashes when send malformed PFCP Heartbeat Request whose Recovery Time Stamp IE length is mutated to zero. Th... | [Bugs] UPF crash caused by malformed PFCP messages whose 1st IE length is mutated to zero | https://api.github.com/repos/free5gc/free5gc/issues/483/comments | 4 | 2023-09-22T03:19:07Z | 2023-11-26T13:11:19Z | https://github.com/free5gc/free5gc/issues/483 | 1,908,115,920 | 483 | 5,750 |
CVE-2023-47347 | 2023-11-15T22:15:27.930 | Buffer Overflow vulnerability in free5gc 3.3.0 allows attackers to cause a denial of service via crafted PFCP messages whose Sequence Number is mutated to overflow bytes. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/free5gc/free5gc/issues/496"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/free5gc/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:free5gc:free5gc:3.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "89BA8BA8-E366-48F9-930A-91ED1442AAFE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"120"
] | 120 | https://github.com/free5gc/free5gc/issues/496 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"free5gc",
"free5gc"
] | [Bugs] UPF crash caused by malformed PFCP message whose Sequence Number is mutated to overflow bytes
## Describe the bug
While fuzzing the free5gc UPF for some PFCP basic and security features, I could trigger several crashes when send malformed PFCP Heartbeat Request whose Sequence Number is mutated to overflow by... | [Bugs] UPF crash caused by malformed PFCP messages whose Sequence Number is mutated to overflow bytes | https://api.github.com/repos/free5gc/free5gc/issues/496/comments | 1 | 2023-10-24T11:07:44Z | 2023-11-26T13:36:56Z | https://github.com/free5gc/free5gc/issues/496 | 1,959,013,436 | 496 | 5,751 |
CVE-2023-48204 | 2023-11-16T00:15:06.770 | An issue in PublicCMS v.4.0.202302.e allows a remote attacker to obtain sensitive information via the appToken and Parameters parameter of the api/method/getHtml component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/sanluan/PublicCMS/issues/77"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/sanluan... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:publiccms:publiccms:4.0.202302.e:*:*:*:*:*:*:*",
"matchCriteriaId": "696F37D9-7CB7-428B-ADE4-3EB40573111A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | [
"918"
] | 918 | https://github.com/sanluan/PublicCMS/issues/77 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"sanluan",
"PublicCMS"
] | 1.After logging into the backend system,add an application authorization to obtain an appKey and appSecret

2.Obtain apptoken through the /api/appToken interface with appkey and appsecret
 CREATE ()-[:A{n1:size([n2 IN [n3 IN [0] | x.n4] | 0])}]->()-[y:B]->() DELETE y
```
The RedisGraph instance crashes due to a null-pointer dereference.
I encountered this issue when testing queries against **RedisGraph v2.12.0** compiled with address sanitiz... | Query crashes in `DataBlock_ItemIsDeleted` | https://api.github.com/repos/RedisGraph/RedisGraph/issues/3063/comments | 0 | 2023-04-24T19:16:03Z | 2023-04-24T19:16:03Z | https://github.com/RedisGraph/RedisGraph/issues/3063 | 1,681,876,852 | 3,063 | 5,754 |
CVE-2023-47025 | 2023-11-16T23:15:08.123 | An issue in Free5gc v.3.3.0 allows a local attacker to cause a denial of service via the free5gc-compose component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/free5gc/free5gc/issues/501"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/free5gc/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:free5gc:free5gc:3.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "89BA8BA8-E366-48F9-930A-91ED1442AAFE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"400"
] | 400 | https://github.com/free5gc/free5gc/issues/501 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"free5gc",
"free5gc"
] |
## Describe the bug
When I try to send a captured UE registration request message to the AMF, the log shows 'sctp accept from <nil>,' and the AMF crashes, causing disconnection for other UEs as well.
## To Reproduce
Steps to reproduce the behavior:
1. Using free5gc-compose to establish the AMF.
2. run free5gc ... | [Bugs]Amf crashed when failed to resolve the IP of ngap message , resulting in a null pointer reference. | https://api.github.com/repos/free5gc/free5gc/issues/501/comments | 1 | 2023-10-29T12:48:07Z | 2023-12-04T08:48:37Z | https://github.com/free5gc/free5gc/issues/501 | 1,966,977,323 | 501 | 5,755 |
CVE-2023-48024 | 2023-11-17T17:15:07.893 | Liblisp through commit 4c65969 was discovered to contain a use-after-free vulnerability in void hash_destroy(hash_table_t *h) at hash.c | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/howerj/liblisp/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/howerj/libl... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:howerj:liblisp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "26CB9D0F-FF32-4225-84A4-B594E2F3ADEA",
"versionEndExcluding": null,
"versionEndIncluding": "2019-02-08",
"versionStartExc... | [
"416"
] | 416 | https://github.com/howerj/liblisp/issues/1 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"howerj",
"liblisp"
] | # Overview
Hi there @howerj! I love the library and per usual I ran my fuzz tests in the background and found just a couple of memory corruption bugs in liblisp through 4c65969. I have included all of the files necessary for reproducing each bug. If I get some time I'll work on submitting a pull request.
* Us... | Memory Corruption Bugs in Liblisp through commit 4c65969 | https://api.github.com/repos/howerj/liblisp/issues/1/comments | 1 | 2023-11-06T17:11:22Z | 2023-11-14T19:21:28Z | https://github.com/howerj/liblisp/issues/1 | 1,979,643,796 | 1 | 5,756 |
CVE-2023-6188 | 2023-11-17T18:15:07.150 | A vulnerability was found in GetSimpleCMS 3.3.16/3.4.0a. It has been rated as critical. This issue affects some unknown processing of the file /admin/theme-edit.php. The manipulation leads to code injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associat... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "MULTIPLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PAR... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1352"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1358"
},
{
"source": "cna@v... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:get-simple:getsimplecms:3.3.16:*:*:*:*:*:*:*",
"matchCriteriaId": "C4E0FD65-B030-462F-86BA-6CB5EDC80FE8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"94"
] | 94 | https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1358 | [
"Exploit"
] | github.com | [
"GetSimpleCMS",
"GetSimpleCMS"
] | There is a remote code execution vulnerability in GetSimpleCMS 3.4.0a version, the specific location is GetSimpleCMS/admin/theme-edit.php
Although this version fixes the problem raised by #1352, if you directly modify the template file, you also can write the PHP backdoor.
For example
![Screenshot 2023-11-09 at 15 4... | Remote command executioin vulnerability in 3.4.0a | https://api.github.com/repos/GetSimpleCMS/GetSimpleCMS/issues/1358/comments | 0 | 2023-11-09T08:08:10Z | 2024-04-19T02:36:20Z | https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1358 | 1,985,053,712 | 1,358 | 5,757 |
CVE-2023-44796 | 2023-11-18T00:15:07.133 | Cross Site Scripting (XSS) vulnerability in LimeSurvey before version 6.2.9-230925 allows a remote attacker to escalate privileges via a crafted script to the _generaloptions_panel.php component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/Hebing123/CVE-2023-44796/issues/1"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/Hebing123/cve/issues/4"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:limesurvey:limesurvey:*:*:*:*:*:*:*:*",
"matchCriteriaId": "05741E6D-3E8F-43BE-9EF7-4C535AAD6C3B",
"versionEndExcluding": "6.2.9",
"versionEndIncluding": null,
"versionStartE... | [
"79"
] | 79 | https://github.com/Hebing123/cve/issues/4 | null | github.com | [
"Hebing123",
"cve"
] | **LimeSurvey 6.2.9-230925 has a storage based XSS vulnerability caused by importManifest in [limesurvey/limesurvey](https://huntr.com/repos/limesurvey/limesurvey)**
### **Description**
A regular user with "theme" privileges who maliciously sets the "templatename" during the importManifest process can lead to a stor... | LimeSurvey 6.2.9-230925 has a storage based XSS vulnerability caused by importManifest in limesurvey/limesurvey | https://api.github.com/repos/Hebing123/cve/issues/4/comments | 1 | 2023-12-14T03:31:28Z | 2024-03-11T06:23:47Z | https://github.com/Hebing123/cve/issues/4 | 2,040,839,627 | 4 | 5,758 |
CVE-2023-48039 | 2023-11-20T15:15:09.820 | GPAC 2.3-DEV-rev617-g671976fcc-master is vulnerable to memory leak in gf_mpd_parse_string media_tools/mpd.c:75. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2679"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev617-g671976fcc-master:*:*:*:*:*:*:*",
"matchCriteriaId": "F540C691-D615-4A9B-8DD6-69B8488E3BA1",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"401"
] | 401 | https://github.com/gpac/gpac/issues/2679 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"gpac",
"gpac"
] | 1.Version
./MP4Box -version
MP4Box - GPAC version 2.3-DEV-rev617-g671976fcc-master
(c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io/
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configu... | memory leaks in gf_mpd_parse_string media_tools/mpd.c:75 | https://api.github.com/repos/gpac/gpac/issues/2679/comments | 0 | 2023-11-07T02:35:25Z | 2023-12-04T10:07:49Z | https://github.com/gpac/gpac/issues/2679 | 1,980,426,267 | 2,679 | 5,759 |
CVE-2023-48090 | 2023-11-20T15:15:09.863 | GPAC 2.3-DEV-rev617-g671976fcc-master is vulnerable to memory leaks in extract_attributes media_tools/m3u8.c:329. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2680"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev617-g671976fcc-master:*:*:*:*:*:*:*",
"matchCriteriaId": "F540C691-D615-4A9B-8DD6-69B8488E3BA1",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"401"
] | 401 | https://github.com/gpac/gpac/issues/2680 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"gpac",
"gpac"
] | 1.Version
./MP4Box -version
MP4Box - GPAC version 2.3-DEV-rev617-g671976fcc-master
(c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io/
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configu... | memory leaks in extract_attributes media_tools/m3u8.c:329 | https://api.github.com/repos/gpac/gpac/issues/2680/comments | 0 | 2023-11-07T07:24:45Z | 2023-12-04T10:07:50Z | https://github.com/gpac/gpac/issues/2680 | 1,980,712,658 | 2,680 | 5,760 |
CVE-2023-48300 | 2023-11-20T19:15:09.063 | The `Embed Privacy` plugin for WordPress that prevents the loading of embedded external content is vulnerable to Stored Cross-Site Scripting via `embed_privacy_opt_out` shortcode in versions up to, and including, 1.8.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integr... | [
{
"source": "security-advisories@github.com",
"tags": [
"Exploit"
],
"url": "https://d.pr/v/ORuIat"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/epiphyt/embed-privacy/commit/f80929992b2a5a66f4f4953cd6f46cc227154a5c"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:epiph:embed_privacy:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "A1422C6B-88AD-4A05-B4BA-3B2BDC88842B",
"versionEndExcluding": "1.8.1",
"versionEndIncluding": null,
"version... | [
"79"
] | 79 | https://github.com/epiphyt/embed-privacy/issues/199 | [
"Issue Tracking"
] | github.com | [
"epiphyt",
"embed-privacy"
] | ### Bug/Problem
The `show_all` property in the opt-out shortcode may execute unwanted code.
### Steps to reproduce
…
### Version
1.8.0
### Link
_No response_
### Environment info
_No response_
### Code of Conduct
- [X] I agree to follow this project's Code of Conduct | Fix sanitizing in show_all shortcode attribute | https://api.github.com/repos/epiphyt/embed-privacy/issues/199/comments | 0 | 2023-11-01T15:43:56Z | 2023-11-01T15:50:16Z | https://github.com/epiphyt/embed-privacy/issues/199 | 1,972,624,548 | 199 | 5,761 |
CVE-2023-46990 | 2023-11-20T20:15:07.407 | Deserialization of Untrusted Data in PublicCMS v.4.0.202302.e allows a remote attacker to execute arbitrary code via a crafted script to the writeReplace function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/sanluan/PublicCMS/issues/76#issue-1960443408"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://github.com/sanluan/PublicCMS/issues/76#issue-1960... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:publiccms:publiccms:4.0.202302.e:*:*:*:*:*:*:*",
"matchCriteriaId": "696F37D9-7CB7-428B-ADE4-3EB40573111A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | [
"502"
] | 502 | https://github.com/sanluan/PublicCMS/issues/76#issue-1960443408 | [
"Exploit"
] | github.com | [
"sanluan",
"PublicCMS"
] | Hello,I found a Deserialization vulnerability in the lastest version of PublicCMS- V4.0.202302.e
The prerequisite for this vulnerability is that the website uses redis cache and needs to obtain redis control permission to initiate deserialization, because redis will trigger deserialization when obtaining the value t... | Trigger deserialization rce through redis cache | https://api.github.com/repos/sanluan/PublicCMS/issues/76/comments | 1 | 2023-10-25T03:09:30Z | 2024-12-26T06:39:55Z | https://github.com/sanluan/PublicCMS/issues/76 | 1,960,443,408 | 76 | 5,762 |
CVE-2023-48051 | 2023-11-20T23:15:06.550 | An issue in /upydev/keygen.py in upydev v0.4.3 allows attackers to decrypt sensitive information via weak encryption padding. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Mitigation"
],
"url": "https://github.com/Carglglz/upydev/issues/38"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Mitigation"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:carglglz:upydev:0.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A264C36A-D2B3-4E62-BB7C-6B2E5C0054C4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"326"
] | 326 | https://github.com/Carglglz/upydev/issues/38 | [
"Exploit",
"Issue Tracking",
"Mitigation"
] | github.com | [
"Carglglz",
"upydev"
] | ### Description:
In the upydev repository, specifically within the keygen.py script, the RSA algorithm is implemented with PKCS 1v1.5 padding, which is known to be insecure and vulnerable to Bleichenbacher](https://link.springer.com/content/pdf/10.1007/bfb0055716.pdf) attack which is a chosen-ciphertext attack that e... | Cryptographic API Misuse Vulnerability: Do not use insecure algorithm(textbook or padding PKCS 1v1.5) for RSA | https://api.github.com/repos/Carglglz/upydev/issues/38/comments | 0 | 2023-11-07T10:12:14Z | 2023-11-07T10:12:14Z | https://github.com/Carglglz/upydev/issues/38 | 1,981,001,689 | 38 | 5,763 |
CVE-2023-46935 | 2023-11-21T07:15:09.967 | eyoucms v1.6.4 is vulnerable Cross Site Scripting (XSS), which can lead to stealing sensitive information of logged-in users. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/55"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/55"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8E52879A-3ABB-441B-B6A9-A91E6C700778",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"79"
] | 79 | https://github.com/weng-xianhu/eyoucms/issues/55 | [
"Exploit"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | Software Link : https://github.com/weng-xianhu/eyoucms
Website : http://www.eyoucms.com/
Vulnerable version 1.6.4 download address :https://qiniu.eyoucms.com/source/EyouCMS-V1.6.4-UTF8-SP1_1015.zip
After the installation is complete, log in as admin, open the page
[_.
- [X] Nextcloud Server **is** up to date. See [Maintenance and Release Schedule](https://github.com/nextclou... | [Bug]: user_ldap logs user passwords in plain text | https://api.github.com/repos/nextcloud/server/issues/38461/comments | 7 | 2023-05-25T12:57:10Z | 2023-08-24T09:42:53Z | https://github.com/nextcloud/server/issues/38461 | 1,725,776,026 | 38,461 | 5,765 |
CVE-2023-47016 | 2023-11-22T07:15:07.530 | radare2 5.8.9 has an out-of-bounds read in r_bin_object_set_items in libr/bin/bobj.c, causing a crash in r_read_le32 in libr/include/r_endian.h. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gist.github.com/gandalf4a/65705be4f84269cb7cd725a1d4ab2ffa"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/radareorg/radare2/commit/40c9f... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0E042C08-7911-4974-A2A6-95F0EFD10809",
"versionEndExcluding": "5.9.0",
"versionEndIncluding": null,
"versionStartExcludin... | [
"787"
] | 787 | https://github.com/radareorg/radare2/issues/22349 | [
"Exploit",
"Patch"
] | github.com | [
"radareorg",
"radare2"
] | # Version
```
$ r2 -v
radare2 5.8.9 31339 @ linux-x86-64
birth: git.5.8.8-691-gb2de2288d8 2023-10-17__01:18:28
commit: b2de2288d8299f89288c503fc2ce22381b61aba0
```
# Platform
```
$ uname -a
Linux user-GE40-2PC-Dragon-Eyes 6.2.0-33-generic #33~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Thu Sep 7 10:33:52 UTC 2 x86... | heap-buffer-overflow at /radare2/libr/include/r_endian.h:194:17 in r_read_le32 | https://api.github.com/repos/radareorg/radare2/issues/22349/comments | 1 | 2023-10-27T11:53:55Z | 2024-08-15T06:27:11Z | https://github.com/radareorg/radare2/issues/22349 | 1,965,363,992 | 22,349 | 5,766 |
CVE-2023-43887 | 2023-11-22T18:15:08.747 | Libde265 v1.0.12 was discovered to contain multiple buffer overflows via the num_tile_columns and num_tile_row parameters in the function pic_parameter_set::dump. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/strukturag/libde265/commit/63b596c915977f038eafd7647d1db25488a8c133"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/s... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "A736D1CB-9F33-4561-B10C-4074DF6C02F9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"120"
] | 120 | https://github.com/strukturag/libde265/issues/418 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"strukturag",
"libde265"
] | ## Summary
There is a segmentation fault caused by a buffer over-read on pic_parameter_set::dump due to an incorrect value of num_tile_columns or num_tile_rows.
## Tested with:
* Commit: 6fc550faeca2bbb1c82de5f29d970f6861146862 (master)
* PoC: [poc](https://drive.google.com/file/d/1ISOxgjmw9mPCs-vIh84hsgEB2MfMcwH... | Buffer over-read causes segmentation fault in pic_parameter_set::dump | https://api.github.com/repos/strukturag/libde265/issues/418/comments | 7 | 2023-08-30T14:08:02Z | 2024-09-05T13:23:53Z | https://github.com/strukturag/libde265/issues/418 | 1,873,762,647 | 418 | 5,767 |
CVE-2023-48106 | 2023-11-22T18:15:09.630 | Buffer Overflow vulnerability in zlib-ng minizip-ng v.4.0.2 allows an attacker to execute arbitrary code via a crafted file to the mz_path_resolve function in the mz_os.c file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/zlib-ng/minizip-ng/issues/740"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"u... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zlib-ng:minizip-ng:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D65B2CB9-EB98-4AA7-AEC5-FE76A1022E72",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"787"
] | 787 | https://github.com/zlib-ng/minizip-ng/issues/740 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"zlib-ng",
"minizip-ng"
] | #### Description
heap-buffer-overflow (/minizip-ng/build/minizip+0x976d) in mz_path_resolve
#### Version
```bash
$ ./minizip -h
minizip-ng 4.0.2 - https://github.com/zlib-ng/minizip-ng
---------------------------------------------------
-h
Usage: minizip [-x][-d dir|-l|-e][-o][-f][-y][-c cp][-a][-0 to -9][-b|-... | Heap-buffer-overflow in mz_os.c:188 in mz_path_resolve | https://api.github.com/repos/zlib-ng/minizip-ng/issues/740/comments | 5 | 2023-11-08T12:26:58Z | 2023-11-13T18:05:46Z | https://github.com/zlib-ng/minizip-ng/issues/740 | 1,983,488,868 | 740 | 5,768 |
CVE-2023-48105 | 2023-11-22T23:15:10.617 | An heap overflow vulnerability was discovered in Bytecode alliance wasm-micro-runtime v.1.2.3 allows a remote attacker to cause a denial of service via the wasm_loader_prepare_bytecode function in core/iwasm/interpreter/wasm_loader.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
],
"url": "http://bytecode.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://wasm-micro-runtime.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issu... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bytecodealliance:webassembly_micro_runtime:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "438EEBB6-205A-496A-A009-321357C86154",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"787"
] | 787 | https://github.com/bytecodealliance/wasm-micro-runtime/issues/2726 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"bytecodealliance",
"wasm-micro-runtime"
] | ## Environments
**OS** : Ubuntu 18.04 5.4.0-150-generic
**Commit** : 52db362b897221c2a438197a0f2e4a9a300becd4
**Version** : iwasm 1.2.3
## Vulnerability Description
**Affected Tool** : iwasm (linux build)
**Affected Version** : = 1.2.3
**Impact** : Heap out of bounds read (size of 1)
* There is Heap out... | Heap overflow in wasm_loader_prepare_bytecode | https://api.github.com/repos/bytecodealliance/wasm-micro-runtime/issues/2726/comments | 2 | 2023-11-06T17:37:06Z | 2024-01-05T11:35:46Z | https://github.com/bytecodealliance/wasm-micro-runtime/issues/2726 | 1,979,691,341 | 2,726 | 5,769 |
CVE-2023-48107 | 2023-11-22T23:15:10.663 | Buffer Overflow vulnerability in zlib-ng minizip-ng v.4.0.2 allows an attacker to execute arbitrary code via a crafted file to the mz_path_has_slash function in the mz_os.c file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/zlib-ng/minizip-ng/issues/739"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedo... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zlib-ng:minizip-ng:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D65B2CB9-EB98-4AA7-AEC5-FE76A1022E72",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"787"
] | 787 | https://github.com/zlib-ng/minizip-ng/issues/739 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"zlib-ng",
"minizip-ng"
] | #### Description
heap-buffer-overflow (/minizip-ng/build/minizip+0x8d5a) in mz_path_has_slash
#### Version
```bash
$ ./minizip -h
minizip-ng 4.0.2 - https://github.com/zlib-ng/minizip-ng
---------------------------------------------------
-h
Usage: minizip [-x][-d dir|-l|-e][-o][-f][-y][-c cp][-a][-0 to -9][-b... | Heap-buffer-overflow in mz_os.c:71 mz_path_has_slash | https://api.github.com/repos/zlib-ng/minizip-ng/issues/739/comments | 13 | 2023-11-08T12:19:50Z | 2023-11-13T18:05:37Z | https://github.com/zlib-ng/minizip-ng/issues/739 | 1,983,475,261 | 739 | 5,770 |
CVE-2023-49298 | 2023-11-24T19:15:07.587 | OpenZFS through 2.1.13 and 2.2.x through 2.2.1, in certain scenarios involving applications that try to rely on efficient copying of file data, can replace file contents with zero-valued bytes and thus potentially disable security mechanisms. NOTE: this issue is not always security related, but can be security related ... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=275308"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://bugs.gentoo.org/917224"
},
{
"source": "cve@mitre.org",
"tags": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openzfs:openzfs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FCB5B44F-BC91-4DBC-A67B-96D577834ACB",
"versionEndExcluding": null,
"versionEndIncluding": "2.1.13",
"versionStartExclud... | [
"639"
] | 639 | https://github.com/openzfs/zfs/issues/15526 | [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"openzfs",
"zfs"
] | <!-- Please fill out the following template, which will help other contributors address your issue. -->
<!--
Thank you for reporting an issue.
*IMPORTANT* - Please check our issue tracker before opening a new issue.
Additional valuable information can be found in the OpenZFS documentation
and mailing list arch... | some copied files are corrupted (chunks replaced by zeros) | https://api.github.com/repos/openzfs/zfs/issues/15526/comments | 338 | 2023-11-14T13:30:40Z | 2024-03-13T01:57:10Z | https://github.com/openzfs/zfs/issues/15526 | 1,992,751,216 | 15,526 | 5,771 |
CVE-2023-6309 | 2023-11-27T02:15:42.797 | A vulnerability, which was classified as critical, was found in moses-smt mosesdecoder up to 4.0. This affects an unknown part of the file contrib/iSenWeb/trans_result.php. The manipulation of the argument input1 leads to os command injection. The exploit has been disclosed to the public and may be used. The associated... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.2,
"confidentialityImpact... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"VDB Entry"
],
"url": "https://github.com/moses-smt/mosesdecoder/issues/237"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:moses-smt:mosesdecoder:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8F7BF510-5916-4C34-9DB3-7EB4C12A9DE3",
"versionEndExcluding": "4.0",
"versionEndIncluding": null,
"versionStartEx... | [
"78"
] | 78 | https://github.com/moses-smt/mosesdecoder/issues/237 | [
"Exploit",
"Issue Tracking",
"VDB Entry"
] | github.com | [
"moses-smt",
"mosesdecoder"
] | https://github.com/moses-smt/mosesdecoder/blob/master/contrib/iSenWeb/trans_result.php
poc: input1=;ls | webshell exists in the project | https://api.github.com/repos/moses-smt/mosesdecoder/issues/237/comments | 3 | 2023-11-03T02:31:42Z | 2025-01-16T18:24:05Z | https://github.com/moses-smt/mosesdecoder/issues/237 | 1,975,366,922 | 237 | 5,772 |
CVE-2023-29770 | 2023-11-28T00:15:07.033 | In Sentrifugo 3.5, the AssetsController::uploadsaveAction function allows an authenticated attacker to upload any file without extension filtering. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/sapplica/sentrifugo"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/sapplica/sentrifugo/issues/384"
},
{
"source": "... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sapplica:sentrifugo:3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9EC47DC7-B208-4E30-8B09-8FBCD3302E8D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"434"
] | 434 | https://github.com/sapplica/sentrifugo/issues/384 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"sapplica",
"sentrifugo"
] | # Bug: Authenticated - Unrestricted file upload
## Description
The `AssetsController::uploadsaveAction` function allows an authenticated attacker to upload any file without extension filtering.
## Vulnerability Detail
The `uploadsaveAction` function allows an attacker to take full control of the extension a... | Authenticated - Unrestricted file upload | https://api.github.com/repos/sapplica/sentrifugo/issues/384/comments | 0 | 2023-03-08T06:58:49Z | 2023-03-08T07:32:24Z | https://github.com/sapplica/sentrifugo/issues/384 | 1,614,753,704 | 384 | 5,773 |
CVE-2023-45286 | 2023-11-28T17:15:08.280 | A race condition in go-resty can result in HTTP request body disclosure across requests. This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn't had byt... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"int... | [
{
"source": "security@golang.org",
"tags": null,
"url": "https://github.com/go-resty/resty/commit/577fed8730d79f583eb48dfc81674164e1fc471e"
},
{
"source": "security@golang.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/go-resty/resty/issues/739"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:resty_project:resty:*:*:*:*:*:go:*:*",
"matchCriteriaId": "433974E8-CB64-4BBB-BB5A-9F072275B86F",
"versionEndExcluding": null,
"versionEndIncluding": "2.10.0",
"versionStartE... | [
"362"
] | 362 | https://github.com/go-resty/resty/issues/739 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"go-resty",
"resty"
] | We detected a data race in resty's middleware when releasing/resetting the buffer. Please check.
Go Version: 1.21.1
Resty Version: v2.10.0
```
==================
WARNING: DATA RACE
Read at 0x00c001e91ce0 by goroutine 537694:
bytes.(*Buffer).Reset()
/home/fwkadmin/.ift/import/content/go-1.21.1-bin-li... | DATA RACE in resty's middleware (go-resty/resty/v2.releaseBuffer()) | https://api.github.com/repos/go-resty/resty/issues/739/comments | 2 | 2023-10-25T13:29:37Z | 2024-01-11T10:14:09Z | https://github.com/go-resty/resty/issues/739 | 1,961,435,191 | 739 | 5,774 |
CVE-2023-45286 | 2023-11-28T17:15:08.280 | A race condition in go-resty can result in HTTP request body disclosure across requests. This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn't had byt... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"int... | [
{
"source": "security@golang.org",
"tags": null,
"url": "https://github.com/go-resty/resty/commit/577fed8730d79f583eb48dfc81674164e1fc471e"
},
{
"source": "security@golang.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/go-resty/resty/issues/739"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:resty_project:resty:*:*:*:*:*:go:*:*",
"matchCriteriaId": "433974E8-CB64-4BBB-BB5A-9F072275B86F",
"versionEndExcluding": null,
"versionEndIncluding": "2.10.0",
"versionStartE... | [
"362"
] | 362 | https://github.com/go-resty/resty/issues/743 | [
"Issue Tracking"
] | github.com | [
"go-resty",
"resty"
] | In v2.10.0, I've observed an issue where the request body passed to `.SetBody(...)` is intermittently written multiple times under certain conditions.
From what I gather, it is somehow related to the retry mechanism, or at the very least I was only able to reproduce by triggering that.
[In the repro here](https:/... | Request body is written multiple times | https://api.github.com/repos/go-resty/resty/issues/743/comments | 2 | 2023-10-30T10:41:32Z | 2023-12-27T05:37:48Z | https://github.com/go-resty/resty/issues/743 | 1,968,036,476 | 743 | 5,775 |
CVE-2023-49092 | 2023-11-28T21:15:08.530 | RustCrypto/RSA is a portable RSA implementation in pure Rust. Due to a non-constant-time implementation, information about the private key is leaked through timing information which is observable over the network. An attacker may be able to use that information to recover the key. There is currently no fix available. A... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"int... | [
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/RustCrypto/RSA/issues/19#issuecomment-1822995643"
},
{
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/RustCryp... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rustcrypto:rsa:*:*:*:*:*:rust:*:*",
"matchCriteriaId": "248AAFCD-E795-48F3-AC41-468B1E2EB267",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"203"
] | 203 | https://github.com/RustCrypto/RSA/issues/19#issuecomment-1822995643 | [
"Issue Tracking"
] | github.com | [
"RustCrypto",
"RSA"
] | Hi there,
I'm the author of sidefuzz (https://github.com/phayes/sidefuzz) and I have found what appears to be variable-time behavior in the `rsa::internals::encrypt()` function. Specifically, `rsa::internals::encrypt()` appears to be variable-time in relation to the message. Note that I haven't worked this up int... | modpow implementation is not constant-time | https://api.github.com/repos/RustCrypto/RSA/issues/19/comments | 81 | 2019-04-30T19:50:46Z | 2025-06-02T13:45:17Z | https://github.com/RustCrypto/RSA/issues/19 | 438,948,363 | 19 | 5,776 |
CVE-2023-48880 | 2023-11-29T16:15:07.167 | A stored cross-site scripting (XSS) vulnerability in EyouCMS v1.6.4-UTF8-SP1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Menu Name field at /login.php?m=admin&c=Index&a=changeTableVal&_ajax=1&lang=cn. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/52"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8E52879A-3ABB-441B-B6A9-A91E6C700778",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"79"
] | 79 | https://github.com/weng-xianhu/eyoucms/issues/52 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | **Version**:
<=EyouCMS-V1.6.4-UTF8-SP1

**Description**:
1. Login to the back-end with an administrator account, click "Member Center", select "Function Configuration", then find "Frontend Style Settings"... | EyouCMS-V1.6.4-UTF8-SP1 has a vulnerability, Stored Cross-Site Scripting | https://api.github.com/repos/weng-xianhu/eyoucms/issues/52/comments | 1 | 2023-08-23T11:20:28Z | 2024-03-22T06:45:21Z | https://github.com/weng-xianhu/eyoucms/issues/52 | 1,863,129,078 | 52 | 5,777 |
CVE-2023-48881 | 2023-11-29T16:15:07.217 | A stored cross-site scripting (XSS) vulnerability in EyouCMS v1.6.4-UTF8-SP1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Field Title field at /login.php?m=admin&c=Field&a=arctype_add&_ajax=1&lang=cn. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/53"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8E52879A-3ABB-441B-B6A9-A91E6C700778",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"79"
] | 79 | https://github.com/weng-xianhu/eyoucms/issues/53 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | **Version**:
<=EyouCMS-V1.6.4-UTF8-SP1

**Description**:
1. Log in to the backend with an administrator account, click on "Feature Map" and add "Column Fields".
 vulnerability in EyouCMS v1.6.4-UTF8-SP1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Document Properties field at /login.php m=admin&c=Index&a=changeTableVal&_ajax=1&lang=cn. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/54"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8E52879A-3ABB-441B-B6A9-A91E6C700778",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"79"
] | 79 | https://github.com/weng-xianhu/eyoucms/issues/54 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | **Version**:
<=EyouCMS-V1.6.4-UTF8-SP1

**Description**:
1. Log in to the backend with an administrator account, click on "Function Map" and add "Document Properties".
 via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1172"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*",
"matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ver... | [
"787"
] | 787 | https://github.com/openlink/virtuoso-opensource/issues/1172 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```sql
CREATE TABLE v0 ( v1 DECIMAL ) ;
INSERT INTO v0 VALUES ( 0 ) ;
INSERT INTO v0 ( v1 ) SELECT CASE v1 WHEN 49 THEN v1 ELSE -128 END FROM v0 AS v2 , v0 , v0 AS v3 GROUP BY v1 , v1 ;
UPDATE v0 SET v1 = ( SELECT DISTINCT * FROM v0 ) ;
```
Server Log:
```
... | Fuzzer: Virtuoso 7.2.11 crashed by stack smashing | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1172/comments | 2 | 2023-11-14T14:41:15Z | 2023-11-20T16:31:19Z | https://github.com/openlink/virtuoso-opensource/issues/1172 | 1,992,885,538 | 1,172 | 5,780 |
CVE-2023-48952 | 2023-11-29T20:15:08.133 | An issue in the box_deserialize_reusing function in openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) after running a SELECT statement. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1175"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://githu... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*",
"matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ver... | [
"502"
] | 502 | https://github.com/openlink/virtuoso-opensource/issues/1175 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE v0 ( v1 INT , v2 BIGINT PRIMARY KEY) ;
INSERT INTO v0 VALUES ( 20 , -1 ) ;
SELECT v1 + 77 , v2 FROM v0 UNION SELECT v2 , CASE WHEN 92 THEN 86 ELSE ( ( 32433852.000000 , 70038895.000000 ) , ( 64572024.000000 , 4442219.000000 ) ) END FROM v0 ORDER BY v2 + ... | Fuzzer: Virtuoso 7.2.11 crashed at box_deserialize_reusing | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1175/comments | 3 | 2023-11-14T15:13:36Z | 2023-12-04T14:53:16Z | https://github.com/openlink/virtuoso-opensource/issues/1175 | 1,992,951,081 | 1,175 | 5,781 |
CVE-2023-48813 | 2023-12-01T16:15:07.487 | Senayan Library Management Systems (Slims) 9 Bulian v9.6.1 is vulnerable to SQL Injection via admin/modules/reporting/customs/fines_report.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/komangsughosa/CVE-ID-not-yet/blob/main/slims/slims9_bulian-9.6.1-SQLI-fines_report.md"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:slims:senayan_library_management_system_bulian:9.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0439647C-9560-44A0-B186-BFDF828ECD17",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/slims/slims9_bulian/issues/217 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"slims",
"slims9_bulian"
] | **Describe the bug**
A SQL Injection exists in admin/modules/reporting/customs/fines_report.php at the code below
```php
$selected_year = date('Y');
if (isset($_GET['year']) AND !empty($_GET['year'])) {
$selected_year = (integer)$_GET['year'];
}
// month
$selected_month = date('m');
... | [Security Bugs] SQL Injection at fines_report.php | https://api.github.com/repos/slims/slims9_bulian/issues/217/comments | 1 | 2023-11-13T00:00:09Z | 2025-01-01T10:42:59Z | https://github.com/slims/slims9_bulian/issues/217 | 1,989,644,007 | 217 | 5,782 |
CVE-2023-48893 | 2023-12-01T16:15:07.607 | SLiMS (aka SENAYAN Library Management System) through 9.6.1 allows admin/modules/reporting/customs/staff_act.php SQL Injection via startDate or untilDate. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/Vuln0wned/slims_owned/blob/main/slims/slims9-bulian-9.6.1-SQLI-staff_act.md"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/slims/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:slims:senayan_library_management_system_bulian:9.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0439647C-9560-44A0-B186-BFDF828ECD17",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/slims/slims9_bulian/issues/209 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"slims",
"slims9_bulian"
] | ## The Bug
A SQL Injection exists in `admin/modules/reporting/customs/staff_act.php` at the code below
```php
// create datagrid
$reportgrid = new report_datagrid();
$reportgrid->setSQLColumn('u.realname AS \''.__('Real Name').'\'',
'u.username AS \''.__('Login Username').'\'',
'u.user_id AS \''._... | Vuln0wned Report: SQL Injection in staff_act.php | https://api.github.com/repos/slims/slims9_bulian/issues/209/comments | 0 | 2023-09-01T09:36:16Z | 2023-09-05T06:25:21Z | https://github.com/slims/slims9_bulian/issues/209 | 1,877,090,139 | 209 | 5,783 |
CVE-2023-48886 | 2023-12-01T23:15:07.920 | A deserialization vulnerability in NettyRpc v1.2 allows attackers to execute arbitrary commands via sending a crafted RPC request. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/luxiaoxun/NettyRpc"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/luxiaoxun/NettyRpc/issues/53"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:luxiaoxun:nettyrpc:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "950F4B86-CD1E-4630-B86F-B14F7439FF04",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"502"
] | 502 | https://github.com/luxiaoxun/NettyRpc/issues/53 | [
"Exploit"
] | github.com | [
"luxiaoxun",
"NettyRpc"
] | # Describe the Vulnerability
A deserialization vulnerability in NettyRpc v1.2 allows attackers to execute arbitrary commands via sending a crafted RPC request.
# Environment
- NettyRpc: v1.2
- JVM version: JDK 1.8(Tested on JDK 1.8.0_65)
# Preparation for Vulnerability Verification
#### For the purpose of th... | Kryo Deserialization Vulnerability in NettyRpc 1.2 | https://api.github.com/repos/luxiaoxun/NettyRpc/issues/53/comments | 0 | 2023-12-01T02:23:13Z | 2023-12-01T02:23:13Z | https://github.com/luxiaoxun/NettyRpc/issues/53 | 2,019,920,057 | 53 | 5,784 |
CVE-2023-48887 | 2023-12-01T23:15:07.967 | A deserialization vulnerability in Jupiter v1.3.1 allows attackers to execute arbitrary commands via sending a crafted RPC request. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/fengjiachun/Jupiter"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/fengjiachun/Jupiter/issues/115"
},
{
"source": "cve@mitre.org",
"tags": [
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fengjiachun:jupiter:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E43B5331-436C-4FB7-86F3-3CFC618F4E68",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"502"
] | 502 | https://github.com/fengjiachun/Jupiter/issues/115 | [
"Exploit"
] | github.com | [
"fengjiachun",
"Jupiter"
] | # Describe the Vulnerability
A deserialization vulnerability in Jupiter v1.3.1 allows attackers to execute arbitrary commands via sending a crafted RPC request.
# Environment
- Jupiter version: v1.3.1
- JVM version: JDK 1.8(Tested on JDK 1.8.0_65)
# Preparation for Vulnerability Verification
1. There is an a... | Kryo Deserialization Vulnerability in Jupiter v1.3.1 | https://api.github.com/repos/fengjiachun/Jupiter/issues/115/comments | 0 | 2023-12-01T02:14:00Z | 2023-12-01T02:14:00Z | https://github.com/fengjiachun/Jupiter/issues/115 | 2,019,911,389 | 115 | 5,785 |
CVE-2020-36768 | 2023-12-03T11:15:08.443 | A vulnerability was found in rl-institut NESP2 Initial Release/1.0. It has been classified as critical. Affected is an unknown function of the file app/database.py. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The pa... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/rl-institut/NESP2/commit/07c0cdf36cf6a4345086d07b54423723a496af5e"
},
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/rl-institut/NESP2/is... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:reiner-lemoine-institut:nesp2:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FCEB5AF1-39EE-4BAE-9D86-794A3A76FFD9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | [
"89"
] | 89 | https://github.com/rl-institut/NESP2/issues/334 | [
"Issue Tracking",
"Patch"
] | github.com | [
"rl-institut",
"NESP2"
] | Hi,
just passing by, but noticed (at least one) sql injection issue in
https://github.com/rl-institut/NESP2/blob/a82e6ce7ae6e81b2a1e08a31858399839c0fdf81/app/database.py#L66
user-controlled data is used without escaping in a raw sql query. I suggest either to use the orm layer, or maybe one of
```
table = Tabl... | possible sql injection | https://api.github.com/repos/rl-institut/NESP2/issues/334/comments | 6 | 2020-11-05T00:24:25Z | 2020-11-05T13:06:23Z | https://github.com/rl-institut/NESP2/issues/334 | 736,512,310 | 334 | 5,786 |
CVE-2023-48967 | 2023-12-04T17:15:07.190 | Ssolon <= 2.6.0 and <=2.5.12 is vulnerable to Deserialization of Untrusted Data. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/noear/solon/issues/226"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:noear:solon:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BD386ABC-5F19-4CAA-8AD4-795101461DE6",
"versionEndExcluding": null,
"versionEndIncluding": "2.5.12",
"versionStartExcluding"... | [
"502"
] | 502 | https://github.com/noear/solon/issues/226 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"noear",
"solon"
] | ### Issue Description
We recently discovered that Solon provides 'Fury' as a serialization and deserialization solution for RPC. However, our research has found that the corresponding component has a security vulnerability. Attackers can execute a JNDI injection attack using a carefully constructed attack payload.
... | A new RCE vulnerability | https://api.github.com/repos/opensolon/solon/issues/226/comments | 4 | 2023-11-16T11:03:17Z | 2025-03-31T03:44:33Z | https://github.com/opensolon/solon/issues/226 | 1,996,605,274 | 226 | 5,787 |
CVE-2023-49096 | 2023-12-06T20:15:07.287 | Jellyfin is a Free Software Media System for managing and streaming media. In affected versions there is an argument injection in the VideosController, specifically the `/Videos/<itemId>/stream` and `/Videos/<itemId>/stream.<container>` endpoints which are present in the current Jellyfin version. Additional endpoints i... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "security-advisories@github.com",
"tags": [
"Not Applicable"
],
"url": "https://cwe.mitre.org/data/definitions/88.html"
},
{
"source": "security-advisories@github.com",
"tags": [
"Not Applicable"
],
"url": "https://en.wikipedia.org/wiki/Pass_the_hash"
},... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jellyfin:jellyfin:*:*:*:*:*:*:*:*",
"matchCriteriaId": "93D6F598-55D9-4041-BED8-4448226B5EFF",
"versionEndExcluding": "10.8.13",
"versionEndIncluding": null,
"versionStartExc... | [
"88"
] | 88 | https://github.com/jellyfin/jellyfin/issues/5415 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jellyfin",
"jellyfin"
] | # Collection of *potential* security issues in Jellyfin
This is a non exhaustive list of *potential* security issues found in Jellyfin. Some of these might cause controversy. Some of these are design flaws and require breaking changes to correct them. I tried to categorize the issues in general topics. Expansions of t... | Collection of potential security issues in Jellyfin | https://api.github.com/repos/jellyfin/jellyfin/issues/5415/comments | 88 | 2021-03-08T17:36:50Z | 2025-04-23T19:55:37Z | https://github.com/jellyfin/jellyfin/issues/5415 | 824,791,596 | 5,415 | 5,788 |
CVE-2023-49958 | 2023-12-07T13:15:07.833 | An issue was discovered in Dalmann OCPP.Core through 1.2.0 for OCPP (Open Charge Point Protocol) for electric vehicles. The server processes mishandle StartTransaction messages containing additional, arbitrary properties, or duplicate properties. The last occurrence of a duplicate property is accepted. This could be ex... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/dallmann-consulting/OCPP.Core/issues/36"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dallmann-consulting:open_charge_point_protocol:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E2779F2A-1D74-4C69-8151-B5E9D49F025A",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.0",
... | [
"20"
] | 20 | https://github.com/dallmann-consulting/OCPP.Core/issues/36 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"dallmann-consulting",
"OCPP.Core"
] | **Issue Description**:
The server accepts additional, arbitrary properties in the `StartTransaction` message, and when duplicate properties are provided, it accepts the last occurrence without validation. For example, a message with two different `connectorId` properties is processed using the value of the last one.
... | Unvalidated Acceptance of Additional and Duplicate Properties in `StartTransaction` Message | https://api.github.com/repos/dallmann-consulting/OCPP.Core/issues/36/comments | 11 | 2023-11-06T19:10:53Z | 2023-12-28T12:59:10Z | https://github.com/dallmann-consulting/OCPP.Core/issues/36 | 1,979,885,162 | 36 | 5,789 |
CVE-2023-49492 | 2023-12-07T16:15:07.587 | DedeCMS v5.7.111 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the imgstick parameter at selectimages.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dedecms:dedecms:5.7.111:*:*:*:*:*:*:*",
"matchCriteriaId": "377F392A-A04B-4E7A-BBE8-F77CE65BDFCF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"79"
] | 79 | https://github.com/Hebing123/cve/issues/2 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Hebing123",
"cve"
] | **Description**
DedeCMS-V5.7.111 has Reflective XSS vulnerabilities in imgstick and v parameters of selectimages.php
**Proof of Concept**
`http://target-ip/uploads/include/dialog/select_images.php?activepath=/uploads/uploads/allimg&f=form1.pic1&imgstick=smallundefined%27%3E%3CScRiPt%20%3Ealert(document.cookie)%3C/... | DedeCMS-V5.7.111 Reflective XSS vulnerability | https://api.github.com/repos/Hebing123/cve/issues/2/comments | 2 | 2023-11-23T10:03:34Z | 2024-11-28T10:41:23Z | https://github.com/Hebing123/cve/issues/2 | 2,007,862,637 | 2 | 5,790 |
CVE-2023-49967 | 2023-12-07T16:15:07.680 | Typecho v1.2.1 was discovered to be vulnerable to an XML Quadratic Blowup attack via the component /index.php/action/xmlrpc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/typecho/typecho/issues/1648"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third P... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:typecho:typecho:1.2.1:-:*:*:*:*:*:*",
"matchCriteriaId": "0BE056CC-41EF-4C70-9B90-6C654B543A40",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"776"
] | 776 | https://github.com/typecho/typecho/issues/1648 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"typecho",
"typecho"
] | ### Vulnerability report
**Description**
DoS via XML Quadratic Blowup Attack
**Proof of Concept**

```
POST /index.php/action/xmlrpc HTTP/1.1
Content-Length: 83630
Accept: text/html,application/xhtml+xml,applicat... | Typecho v1.2.1 XML Blowup Attack DoS vulnerability | https://api.github.com/repos/typecho/typecho/issues/1648/comments | 0 | 2023-11-27T08:12:21Z | 2024-01-23T10:30:18Z | https://github.com/typecho/typecho/issues/1648 | 2,011,731,209 | 1,648 | 5,791 |
CVE-2023-46871 | 2023-12-07T18:15:08.030 | GPAC version 2.3-DEV-rev602-ged8424300-master in MP4Box contains a memory leak in NewSFDouble scenegraph/vrml_tools.c:300. This vulnerability may lead to a denial of service. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gist.github.com/ReturnHere/d0899bb03b8f5e8fae118f2b76888486"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Adviso... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "373C4F43-207C-47CB-B454-BD90A52F0ECF",
"versionEndExcluding": null,
"versionEndIncluding": "2.3-dev-rev602-ged8424300-master",
... | [
"401"
] | 401 | https://github.com/gpac/gpac/issues/2658 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [ ] I looked for a similar issue and couldn't find any.
- [ ] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [ ] I give enough info... | Memory leaks in NewSFDouble scenegraph/vrml_tools.c:300 | https://api.github.com/repos/gpac/gpac/issues/2658/comments | 2 | 2023-10-23T06:39:49Z | 2023-12-09T11:54:02Z | https://github.com/gpac/gpac/issues/2658 | 1,956,459,097 | 2,658 | 5,792 |
CVE-2023-48958 | 2023-12-07T18:15:08.130 | gpac 2.3-DEV-rev617-g671976fcc-master contains memory leaks in gf_mpd_resolve_url media_tools/mpd.c:4589. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gist.github.com/dr0v/1204f7a5f1e1497e7bca066638acfbf5"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https:/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev617-g671976fcc-master:*:*:*:*:*:*:*",
"matchCriteriaId": "F540C691-D615-4A9B-8DD6-69B8488E3BA1",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"401"
] | 401 | https://github.com/gpac/gpac/issues/2689 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | 1、Version
./MP4Box -version
MP4Box - GPAC version 2.3-DEV-rev617-g671976fcc-master
(c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io/
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configu... | LeakSanitizer: detected memory leaks in in gf_mpd_resolve_url media_tools/mpd.c:4589 | https://api.github.com/repos/gpac/gpac/issues/2689/comments | 0 | 2023-11-16T01:53:56Z | 2023-11-16T10:21:02Z | https://github.com/gpac/gpac/issues/2689 | 1,995,888,449 | 2,689 | 5,793 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.