cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2023-51252
2024-01-10T09:15:44.340
PublicCMS 4.0 is vulnerable to Cross Site Scripting (XSS). Because files can be uploaded and online preview function is provided, pdf files and html files containing malicious code are uploaded, an XSS popup window is realized through online viewing.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/sanluan/PublicCMS/issues/79" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/sanluan...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:publiccms:publiccms:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "DA4CCE59-6A71-4BC4-86D4-3110B04C1082", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "79" ]
79
https://github.com/sanluan/PublicCMS/issues/79
[ "Exploit", "Issue Tracking" ]
github.com
[ "sanluan", "PublicCMS" ]
1.Vulnerability description Because files can be uploaded and online preview function is provided, pdf files and html files containing malicious code are uploaded, and xss popup window is realized through online viewing 2.Vulnerability exploitation process Function point: Development - Website file management - U...
There is an xss vulnerability caused by file uploads in PublicCMS V4.0
https://api.github.com/repos/sanluan/PublicCMS/issues/79/comments
2
2023-12-15T07:30:41Z
2023-12-15T08:52:18Z
https://github.com/sanluan/PublicCMS/issues/79
2,043,057,805
79
5,895
CVE-2023-52064
2024-01-10T21:15:09.180
Wuzhicms v4.1.0 was discovered to contain a SQL injection vulnerability via the $keywords parameter at /core/admin/copyfrom.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/n0Sleeper/544b38c95715b13efadab329692c8aea" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/wuzhicms/wuzhicms/iss...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wuzhicms:wuzhi_cms:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4749403-9C42-40DF-A695-A9E31BD37D84", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "89" ]
89
https://github.com/wuzhicms/wuzhicms/issues/208
[ "Exploit", "Issue Tracking" ]
github.com
[ "wuzhicms", "wuzhicms" ]
### Vulnerable file `/coreframe/app/core/admin/copyfrom.php` `22-37` ``` public function listing() { $siteid = get_cookie('siteid'); $page = isset($GLOBALS['page']) ? intval($GLOBALS['page']) : 1; $page = max($page,1); if(isset($GLOBALS['keywords'])) { $keywords = $GL...
Wuzhicms v4.1.0/coreframe/app/core/admin/copyfrom.php hava a SQL Injection Vulnerability casused by listing()
https://api.github.com/repos/wuzhicms/wuzhicms/issues/208/comments
0
2023-12-25T14:02:10Z
2023-12-25T14:04:59Z
https://github.com/wuzhicms/wuzhicms/issues/208
2,055,704,891
208
5,896
CVE-2023-52274
2024-01-11T03:15:10.843
member/index/register.html in YzmCMS 6.5 through 7.0 allows XSS via the Referer HTTP header.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/yzmcms/yzmcms/issues/65" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/yzmcms/yzmcms/tags" }, { "source": "af854a3a-2127-...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yzmcms:yzmcms:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6DD9CD8-B8DA-4454-81A7-91D18DA1E1BD", "versionEndExcluding": null, "versionEndIncluding": "7.0", "versionStartExcluding":...
[ "79" ]
79
https://github.com/yzmcms/yzmcms/issues/65
[ "Exploit", "Issue Tracking" ]
github.com
[ "yzmcms", "yzmcms" ]
1、利用前提:开启调试模式,APP_DEBUG为true Usage prerequisite: Enable debugging mode and set APP_DEBUG to true 2、若管理员未开启会员注册,访问 member/index/register.html if the administrator has not open membership registration, access to the member/index/register.html ![c26551cb3477176637177e408d2bacf](https://github.com/yzmcm...
XSS vulnerabilities exist on the YzmCMS 7.0 debugging mode message interface
https://api.github.com/repos/yzmcms/yzmcms/issues/65/comments
3
2024-01-06T08:42:56Z
2025-06-04T07:28:20Z
https://github.com/yzmcms/yzmcms/issues/65
2,068,473,744
65
5,897
CVE-2023-37644
2024-01-11T08:15:35.737
SWFTools 0.9.2 772e55a allows attackers to trigger a large memory-allocation attempt via a crafted document, as demonstrated by pdf2swf. This occurs in png_read_chunk in lib/png.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/202" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/matthiaskramm/swftools/issues/202
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
Hi there We would like to share that the latest version of pdf2swf causes heap-buffer-overflow when executed with a crafted png input. We assume that the invalid memory access happens due to the improper processing malformed input in png_read_chunk() in spite of the error handling. Here is the output of progra...
Heap-buffer-overflow when processing an png file in png_read_chunk()
https://api.github.com/repos/swftools/swftools/issues/202/comments
1
2023-07-01T08:50:15Z
2023-09-06T08:36:00Z
https://github.com/swftools/swftools/issues/202
1,783,702,020
202
5,898
CVE-2022-4958
2024-01-11T12:15:42.767
A vulnerability classified as problematic has been found in qkmc-rk redbbs 1.0. Affected is an unknown function of the component Post Handler. The manipulation of the argument title leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used....
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/qkmc-rk/redbbs/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.250236" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qkmc-rk:redbbs:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "32FA7E12-C02B-4209-B181-395F66D654D7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "79" ]
79
https://github.com/qkmc-rk/redbbs/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "qkmc-rk", "redbbs" ]
The foreground post function module modifies the existence of storage XSS at the post Therefore, when Posting with a title that contains xss payload, only browsing is affected by xss Register a new test user ![image](https://user-images.githubusercontent.com/110451039/209512008-85383021-0903-49e2-b346-4ddc6a2ee35e.p...
Redbbs has a storage XSS defect
https://api.github.com/repos/qkmc-rk/redbbs/issues/1/comments
0
2022-12-26T06:29:59Z
2022-12-26T06:29:59Z
https://github.com/qkmc-rk/redbbs/issues/1
1,510,657,965
1
5,899
CVE-2022-4959
2024-01-11T21:15:09.617
A vulnerability classified as problematic was found in qkmc-rk redbbs 1.0. Affected by this vulnerability is an unknown functionality of the component Nickname Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/qkmc-rk/redbbs/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.250237" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qkmc-rk:redbbs:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "32FA7E12-C02B-4209-B181-395F66D654D7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "79" ]
79
https://github.com/qkmc-rk/redbbs/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "qkmc-rk", "redbbs" ]
nickname xss filtering was not performed for the nickname in the browser Posting user name. The nickname was not filtered. Because the user name that contains xss payload is used for Posting, xss affects browsing Register the nickname for xss payload: <script>alert('Hello, hacking! '); </script> ![image](https://use...
Redbbs has a storage XSS defect
https://api.github.com/repos/qkmc-rk/redbbs/issues/2/comments
0
2022-12-26T06:31:59Z
2022-12-26T06:31:59Z
https://github.com/qkmc-rk/redbbs/issues/2
1,510,658,971
2
5,900
CVE-2023-52339
2024-01-12T02:15:44.637
In libebml before 1.4.5, an integer overflow in MemIOCallback.cpp can occur when reading or writing. It may result in buffer overflows.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/Matroska-Org/libebml/blob/v1.x/NEWS.md" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/Matroska-Org/libebml/compare/release-1.4.4...release-1....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:matroska:libebml:*:*:*:*:*:*:*:*", "matchCriteriaId": "E313D822-BEBC-43B6-BDA3-8221A80B66C6", "versionEndExcluding": "1.4.5", "versionEndIncluding": null, "versionStartExclud...
[ "190" ]
190
https://github.com/Matroska-Org/libebml/issues/147
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "Matroska-Org", "libebml" ]
function MemIOCallback::read at line 70 has an integer overflow: <img width="948" alt="image" src="https://github.com/Matroska-Org/libebml/assets/10611970/ed169f1c-9ab3-43dd-8aa0-9f210130d544"> POC code as below: ``` #include "ebml/MemIOCallback.h" using namespace libebml; int main() { char buff[128] =...
MemIOCallback::read has a integer overflow bug
https://api.github.com/repos/Matroska-Org/libebml/issues/147/comments
1
2023-11-01T06:27:46Z
2023-11-04T09:53:44Z
https://github.com/Matroska-Org/libebml/issues/147
1,971,784,738
147
5,901
CVE-2022-4960
2024-01-12T03:15:08.683
A vulnerability, which was classified as problematic, has been found in cloudfavorites favorites-web 1.3.0. Affected by this issue is some unknown functionality of the component Nickname Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the p...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cloudfavorites/favorites-web/issues/127" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.250238" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:favorites-web_project:favorites-web:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "EA6820ED-A192-4723-8DEA-F30271C86F9C", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "79" ]
79
https://github.com/cloudfavorites/favorites-web/issues/127
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cloudfavorites", "favorites-web" ]
favorites-web has a stored-type XSS flaw that allows you to register user nicknames for XSSpayload, such as <script>alert('hello, SB! '); </script>, register a new user with the payload, and then comment, ![image](https://user-images.githubusercontent.com/110451039/209119967-4087c610-c582-473e-ba8a-45ed215c3c00.png)
favorites- Stored XSS defect in web,
https://api.github.com/repos/cloudfavorites/favorites-web/issues/127/comments
0
2022-12-22T10:59:06Z
2022-12-22T10:59:06Z
https://github.com/cloudfavorites/favorites-web/issues/127
1,507,663,486
127
5,902
CVE-2022-48620
2024-01-12T04:15:08.123
uev (aka libuev) before 2.4.1 has a buffer overflow in epoll_wait if maxevents is a large number.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/troglobit/libuev/commit/2d9f1c9ce655cc38511aeeb6e95ac30914f7aec9" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/troglobit/libuev/compare/v2.4.0...v2....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:troglobit:libeuv:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFF2C023-36E0-4067-8541-A9B49FF7361B", "versionEndExcluding": "2.4.1", "versionEndIncluding": null, "versionStartExclud...
[ "120" ]
120
https://github.com/troglobit/libuev/issues/27
[ "Issue Tracking" ]
github.com
[ "troglobit", "libuev" ]
In functions `uev_run`, the variable `ee` is declared to be an array of `struct epoll_event` with size `UEV_MAX_EVENTS`. This buffer is used in a call to `epoll_wait` with its `maxevent` parameter set to `ctx->maxevents`. It may be that the intent is that ctx->maxevents can not be bigger than `UEV_MAX_EVENTS`, but ...
Possible event buffer overrun
https://api.github.com/repos/troglobit/libuev/issues/27/comments
1
2022-12-17T11:44:21Z
2022-12-17T14:04:43Z
https://github.com/troglobit/libuev/issues/27
1,501,352,045
27
5,903
CVE-2023-51790
2024-01-12T13:15:11.733
Cross Site Scripting vulnerability in piwigo v.14.0.0 allows a remote attacker to obtain sensitive information via the lang parameter in the Admin Tools plug-in component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/Piwigo/AdminTools/issues/21" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DF997677-CC8C-40D2-BAA6-EF1374DC731F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "79" ]
79
https://github.com/Piwigo/AdminTools/issues/21
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "Piwigo", "AdminTools" ]
### **Summary** A reflected cross-site scripting (XSS) vulnerability has been discovered in the "ato_lang" parameter. This vulnerability can be exploited by an attacker to inject malicious HTML and JS code into the HTML page, which could then be executed by webmaster or administrators when they visit the URL with the...
piwigo v14.0.0 has a reflected XSS vulnerability
https://api.github.com/repos/Piwigo/AdminTools/issues/21/comments
0
2023-12-18T04:03:44Z
2024-06-06T09:48:54Z
https://github.com/Piwigo/AdminTools/issues/21
2,054,769,328
21
5,904
CVE-2023-51790
2024-01-12T13:15:11.733
Cross Site Scripting vulnerability in piwigo v.14.0.0 allows a remote attacker to obtain sensitive information via the lang parameter in the Admin Tools plug-in component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/Piwigo/AdminTools/issues/21" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DF997677-CC8C-40D2-BAA6-EF1374DC731F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "79" ]
79
https://github.com/Piwigo/Piwigo/issues/2069
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
### **Summary** A reflected cross-site scripting (XSS) vulnerability has been discovered in the "ato_lang" parameter. This vulnerability can be exploited by an attacker to inject malicious HTML and JS code into the HTML page, which could then be executed by webmaster or administrators when they visit the URL with the...
piwigo v14.0.0 has a reflected XSS vulnerability
https://api.github.com/repos/Piwigo/AdminTools/issues/21/comments
0
2023-12-18T04:03:44Z
2024-06-06T09:48:54Z
https://github.com/Piwigo/AdminTools/issues/21
2,054,769,328
21
5,905
CVE-2022-4962
2024-01-12T22:15:44.877
A vulnerability was found in Apollo 2.0.0/2.0.1 and classified as problematic. Affected by this issue is some unknown functionality of the file /users of the component Configuration Center. The manipulation leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed to the publi...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/apolloconfig/apollo/issues/4684" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apolloconfig:apollo:2.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "2FEAB0BE-294C-4E3F-9FFB-3E841F14B82B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "285" ]
285
https://github.com/apolloconfig/apollo/issues/4684
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "apolloconfig", "apollo" ]
Apollo V2.0.0, V2.0.1 Unauthorized access vulnerability exists in the configuration center. This vulnerability is caused by the failure to perform proper permission verification on some interfaces in the administrator tool of the configuration center. As a result, common users with low permission can access these inter...
Apollo V2.0.0, V2.0.1 Unauthorized access vulnerability
https://api.github.com/repos/apolloconfig/apollo/issues/4684/comments
4
2022-12-20T13:00:18Z
2023-01-27T21:54:13Z
https://github.com/apolloconfig/apollo/issues/4684
1,504,523,089
4,684
5,906
CVE-2023-51804
2024-01-13T02:15:07.257
An issue in rymcu forest v.0.02 allows a remote attacker to obtain sensitive information via manipulation of the HTTP body URL in the com.rymcu.forest.web.api.common.UploadController file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/rymcu/forest/issues/149" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rymcu:forest:0.02:*:*:*:*:*:*:*", "matchCriteriaId": "D7E2A207-8139-4AD2-840D-80DC0532F40E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "918" ]
918
https://github.com/rymcu/forest/issues/149
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "rymcu", "forest" ]
## 1. Steps to reproduce (复现步骤) ### 1.1 Pull the latest code and set up a test environment(拉取最新代码,搭建测试环境) Register a user using the system's registration function (使用系统的注册功能,注册一个用户) ![image](https://github.com/rymcu/forest/assets/18633010/e81c7888-485b-4f04-9a12-a598bdbb5b9e) ### 1.2 Construct a request using the t...
Server-side-request-forgery (SSRF) vulnerability allow registered users to Vulnerability in com.rymcu.forest.web.api.common.UploadController(UploadControlle.java存在ssrf漏洞)
https://api.github.com/repos/rymcu/forest/issues/149/comments
6
2023-12-18T09:14:50Z
2024-01-17T01:43:40Z
https://github.com/rymcu/forest/issues/149
2,046,124,585
149
5,907
CVE-2023-51805
2024-01-13T02:15:07.303
SQL Injection vulnerability in TDuckCLoud tduck-platform v.4.0 allows a remote attacker to obtain sensitive information via the getFormKey parameter in the search function of FormDataMysqlService.java file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/TDuckCloud/tduck-platform/issues/22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Trackin...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tduckcloud:tduck-platform:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "BB4EF1A5-DC74-4333-B8F8-92B85275839C", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "89" ]
89
https://github.com/TDuckCloud/tduck-platform/issues/22
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "TDuckCloud", "tduck-platform" ]
## 1.Steps to reproduce (复现步骤) ### 1.Use the demo environment on the official website for authentication (`https://demo.tduckapp.com/project`) and register a user using the registration function (1b7pl_dp@linshiyouxiang.net/123456) (使用官网的demo环境进行验证(`https://demo.tduckapp.com/project`),使用注册功能注册一个用户(1b7pl_dp@linshiyouxi...
[vulnerability] Back-office management statistics function sql injection in FormDataMysqlService.java (FormDataMysqlService.java 存在后管SQL注入漏洞)
https://api.github.com/repos/TDuckCloud/tduck-platform/issues/22/comments
0
2023-12-19T12:18:29Z
2025-03-16T02:23:45Z
https://github.com/TDuckCloud/tduck-platform/issues/22
2,048,546,424
22
5,908
CVE-2023-43449
2024-01-16T02:15:28.420
An issue in HummerRisk HummerRisk v.1.10 thru 1.4.1 allows an authenticated attacker to execute arbitrary code via a crafted request to the service/LicenseService component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/HummerRisk/HummerRisk/issues/446" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Hu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hummerrisk:hummerrisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "0086E3E1-F2CB-4CDA-9D18-D658B50E70E0", "versionEndExcluding": null, "versionEndIncluding": "1.4.1", "versionStartE...
[ "94" ]
94
https://github.com/HummerRisk/HummerRisk/issues/446
[ "Exploit", "Issue Tracking" ]
github.com
[ "HummerRisk", "HummerRisk" ]
**漏洞影响范围** v1.1.0-最新版(v1.4.1) **运行方式(安装包运行 or 源码运行 ?)** 安装包 **严重程度(高、中、低)** 高 **漏洞详情** 漏洞主要位于 `HummerRisk/HummerRisk/hummer-modules/hummer-system/src/main/java/com/hummer/system/service/LicenseService#validateLicense`方法将用户上传的文件内容拼接至验证许可证的命令中。 ![image](https://github.com/HummerRisk/HummerRisk/...
安全漏洞 HummerRisk认证后远程命令执行
https://api.github.com/repos/HummerRisk/HummerRisk/issues/446/comments
1
2023-09-15T12:21:53Z
2023-09-17T16:55:11Z
https://github.com/HummerRisk/HummerRisk/issues/446
1,898,325,482
446
5,909
CVE-2023-51257
2024-01-16T02:15:28.537
An invalid memory write issue in Jasper-Software Jasper v.4.1.1 and before allows a local attacker to execute arbitrary code.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jasper-software/jasper/issues/367" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fe...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jasper_project:jasper:*:*:*:*:*:*:*:*", "matchCriteriaId": "ACA20DFB-15D5-49D4-97AC-8BDAAA71453E", "versionEndExcluding": null, "versionEndIncluding": "4.1.1", "versionStartE...
[ "119" ]
119
https://github.com/jasper-software/jasper/issues/367
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jasper-software", "jasper" ]
## Environment Ubuntu 22.04.3 LTS ## Compiler clang version 11.0.0 Target: x86_64-unknown-linux-gnu Thread model: posix ## Affected Version jasper 4.1.1 ## Step to reproduce ``` pushd jasper mkdir builds mkdir install export SOURCE_DIR=$PWD export INSTALL_DIR=$SOURCE_DIR/install export BUILD_DIR=$...
Invalid memory write in jas_icc.c:1333:23
https://api.github.com/repos/jasper-software/jasper/issues/367/comments
9
2023-12-15T01:27:55Z
2024-01-15T20:06:21Z
https://github.com/jasper-software/jasper/issues/367
2,042,740,773
367
5,910
CVE-2024-23525
2024-01-18T00:15:38.590
The Spreadsheet::ParseXLSX package before 0.30 for Perl allows XXE attacks because it neglects to use the no_xxe option of XML::Twig.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2024/01/18/4" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tozt:spreadsheet\\:\\:parsexlsx:*:*:*:*:*:perl:*:*", "matchCriteriaId": "F5BD291B-0392-4D28-B6E8-BF2574B1637B", "versionEndExcluding": "0.30", "versionEndIncluding": null, "v...
[ "611" ]
611
https://github.com/MichaelDaum/spreadsheet-parsexlsx/issues/10
[ "Issue Tracking" ]
github.com
[ "MichaelDaum", "spreadsheet-parsexlsx" ]
Don't allow external entities by default. Reported by @phvietan. see https://gist.github.com/phvietan/d1c95a88ab6e17047b0248d6bf9eac4a
XXE in default configuration of Spreadsheet::ParseXLSX
https://api.github.com/repos/MichaelDaum/spreadsheet-parsexlsx/issues/10/comments
6
2024-01-17T10:03:28Z
2024-01-18T16:16:51Z
https://github.com/MichaelDaum/spreadsheet-parsexlsx/issues/10
2,085,833,418
10
5,911
CVE-2024-22419
2024-01-18T19:15:10.550
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. The `concat` built-in can write over the bounds of the memory buffer that was allocated for it and thus overwrite existing valid data. The root cause is that the `build_IR` for `concat` doesn't properly adhere to the API of copy functions (fo...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrit...
[ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/vyperlang/vyper/commit/55e18f6d128b2da8986adbbcccf1cd59a4b9ad6f" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*", "matchCriteriaId": "832C489D-4288-46B4-A29E-0E7168748042", "versionEndExcluding": null, "versionEndIncluding": "0.3.10", "versionStartE...
[ "787" ]
787
https://github.com/vyperlang/vyper/issues/3737
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "vyperlang", "vyper" ]
### Version Information * vyper Version (output of `vyper --version`): x.x.x * OS: osx/linux/win * Python Version (output of `python --version`): ### What's your issue about? tracking issue for https://github.com/vyperlang/vyper/security/advisories/GHSA-2q8v-3gqq-4f8p ### How can it be fixed? Fill this...
concat builtin can overrun memory
https://api.github.com/repos/vyperlang/vyper/issues/3737/comments
0
2024-01-18T16:14:44Z
2024-01-18T18:08:04Z
https://github.com/vyperlang/vyper/issues/3737
2,088,619,961
3,737
5,912
CVE-2024-22424
2024-01-19T01:15:09.317
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. The Argo CD API prior to versions 2.10-rc2, 2.9.4, 2.8.8, and 2.7.15 are vulnerable to a cross-server request forgery (CSRF) attack when the attacker has the ability to write HTML to a page on the same parent domain as Argo CD. A CSRF attack work...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integ...
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/argoproj/argo-cd/issues/2496" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://gi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CED13D7-50A9-4645-9D05-29C9F0DE1968", "versionEndExcluding": "2.8.8", "versionEndIncluding": null, "versionStartExclud...
[ "352" ]
352
https://github.com/argoproj/argo-cd/issues/2496
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "argoproj", "argo-cd" ]
**Describe the bug** Currently, argocd does not provide CSRF protection. When users log in the UI, a malicious script could be executed on behalf of user **To Reproduce** 1. Expose argocd through load-balancer 2. Create an application 3. Paste the following in html file ``` <HTML> <HEAD> ...
ArgoCD does not provide CSRF protection
https://api.github.com/repos/argoproj/argo-cd/issues/2496/comments
7
2019-10-14T11:13:14Z
2024-01-16T18:54:15Z
https://github.com/argoproj/argo-cd/issues/2496
506,588,108
2,496
5,913
CVE-2024-22562
2024-01-19T15:15:09.463
swftools 0.9.2 was discovered to contain a Stack Buffer Underflow via the function dict_foreach_keyvalue at swftools/lib/q.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/210" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/matthiaskramm/swftools/issues/210
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# project https://github.com/matthiaskramm/swftools version:0.9.2 # os info Ubuntu18.04 TLS # poc [poc.zip](https://github.com/matthiaskramm/swftools/files/13785772/poc.zip) # build git clone https://github.com/matthiaskramm/swftools.git cd swftools ./configure --disable-shared && make /swftools/src/swfc ./p...
stack-buffer-underflow exists in the function dict_foreach_keyvalue in swftools/lib/q.c
https://api.github.com/repos/swftools/swftools/issues/210/comments
0
2023-12-28T11:52:17Z
2024-01-10T03:23:59Z
https://github.com/swftools/swftools/issues/210
2,058,345,861
210
5,914
CVE-2024-22563
2024-01-19T15:15:09.513
openvswitch 2.17.8 was discovered to contain a memory leak via the function xmalloc__ in openvswitch-2.17.8/lib/util.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/openvswitch/ovs-issues/issues/315" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/openvswitch/ovs-issues/issues/315" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openvswitch:openvswitch:2.17.8:*:*:*:*:*:*:*", "matchCriteriaId": "67FDBB4C-C2FE-47C6-A0A1-CDCAE3CA8846", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "401" ]
401
https://github.com/openvswitch/ovs-issues/issues/315
[ "Issue Tracking" ]
github.com
[ "openvswitch", "ovs-issues" ]
# project https://www.openvswitch.org/download/ version:2.17.8 # os info Ubuntu18.04 TLS # poc [poc.zip](https://github.com/openvswitch/ovs-issues/files/13786555/poc.zip) # build wget https://www.openvswitch.org/releases/openvswitch-2.17.8.tar.gz ./configure CFLAGS="-g -O2 -fno-omit-frame-pointer -fno-common" ...
memory leak exists in the function ovs_pcap_open
https://api.github.com/repos/openvswitch/ovs-issues/issues/315/comments
6
2023-12-28T12:45:15Z
2024-01-29T13:13:42Z
https://github.com/openvswitch/ovs-issues/issues/315
2,058,395,797
315
5,915
CVE-2024-22920
2024-01-19T15:15:09.560
swftools 0.9.2 was discovered to contain a heap-use-after-free via the function bufferWriteData in swftools/lib/action/compile.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/211" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "416" ]
416
https://github.com/matthiaskramm/swftools/issues/211
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# project https://github.com/matthiaskramm/swftools version 0.9.2 # os info Ubuntu18.04 TLS # poc [poc.zip](https://github.com/matthiaskramm/swftools/files/13786202/poc.zip) # build git clone https://github.com/matthiaskramm/swftools.git cd swftools ./configure --disable-shared && make ./swftools/src/swfc ./...
heap-use-after-free exists in the function bufferWriteData in swftools/lib/action/compile.c:223
https://api.github.com/repos/swftools/swftools/issues/211/comments
1
2023-12-28T12:06:28Z
2024-12-02T11:46:34Z
https://github.com/swftools/swftools/issues/211
2,058,359,151
211
5,916
CVE-2024-22911
2024-01-19T18:15:08.680
A stack-buffer-underflow vulnerability was found in SWFTools v0.9.2, in the function parseExpression at src/swfc.c:2602.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/216" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/matthiaskramm/swftools/issues/216
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# Summary A stack-buffer-overflow caused when using swfc. # Version ``` $ ./swfc -V swfc - part of swftools 0.9.2 $ git log --oneline -1 772e55a2 (HEAD, origin/master, origin/HEAD, master) ``` # Platform ``` $ uname -a Linux 1cc373898f58 5.4.0-150-generic #167~18.04.1-Ubuntu SMP Wed May 24 00:51:42 UTC 2023...
stack-buffer-overflow exit in parseExpression at src/swfc.c:2602
https://api.github.com/repos/swftools/swftools/issues/216/comments
0
2024-01-10T13:04:05Z
2024-01-11T06:44:59Z
https://github.com/swftools/swftools/issues/216
2,074,336,039
216
5,917
CVE-2024-22912
2024-01-19T18:15:08.723
A global-buffer-overflow was found in SWFTools v0.9.2, in the function countline at swf5compiler.flex:327. It allows an attacker to cause code execution.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/212" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "120" ]
120
https://github.com/matthiaskramm/swftools/issues/212
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# Summary A global-buffer-overflow caused when using swfc. # Version ``` $ ./swfc -V swfc - part of swftools 0.9.2 $ git log --oneline -1 772e55a2 (HEAD, origin/master, origin/HEAD, master) ``` # Platform ``` $ uname -a Linux 1cc373898f58 5.4.0-150-generic #167~18.04.1-Ubuntu SMP Wed May 24 00:51:42 UTC 202...
global-buffer-overflow exists in countline() at lib/swf5compiler.flex:327
https://api.github.com/repos/swftools/swftools/issues/212/comments
0
2024-01-10T12:20:57Z
2024-01-11T06:47:20Z
https://github.com/swftools/swftools/issues/212
2,074,257,410
212
5,918
CVE-2024-22913
2024-01-19T18:15:08.767
A heap-buffer-overflow was found in SWFTools v0.9.2, in the function swf5lex at lex.swf5.c:1321. It allows an attacker to cause code execution.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/213" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/matthiaskramm/swftools/issues/213
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# Summary A heap-buffer-overflow caused when using swfc, which results in out-of-bounds write. # Version ``` $ ./swfc -V swfc - part of swftools 0.9.2 $ git log --oneline -1 772e55a2 (HEAD, origin/master, origin/HEAD, master) ``` # Platform ``` $ uname -a Linux 1cc373898f58 5.4.0-150-generic #167~18.04.1-Ub...
heap-buffer-overflow exit in swf5lex() at lib/lex.swf5.c:1321
https://api.github.com/repos/swftools/swftools/issues/213/comments
1
2024-01-10T12:41:19Z
2024-10-11T15:06:09Z
https://github.com/swftools/swftools/issues/213
2,074,294,602
213
5,919
CVE-2024-22914
2024-01-19T18:15:08.807
A heap-use-after-free was found in SWFTools v0.9.2, in the function input at lex.swf5.c:2620. It allows an attacker to cause denial of service.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/214" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "416" ]
416
https://github.com/matthiaskramm/swftools/issues/214
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# Summary A heap-use-after-free caused when using swfc. # Version ``` $ ./swfc -V swfc - part of swftools 0.9.2 $ git log --oneline -1 772e55a2 (HEAD, origin/master, origin/HEAD, master) ``` # Platform ``` $ uname -a Linux 1cc373898f58 5.4.0-150-generic #167~18.04.1-Ubuntu SMP Wed May 24 00:51:42 UTC 2023 x...
heap-use-after-free exit in input() at lib/lex.swf5.c:2620
https://api.github.com/repos/swftools/swftools/issues/214/comments
0
2024-01-10T12:47:45Z
2024-01-11T06:46:39Z
https://github.com/swftools/swftools/issues/214
2,074,305,829
214
5,920
CVE-2024-22915
2024-01-19T18:15:08.847
A heap-use-after-free was found in SWFTools v0.9.2, in the function swf_DeleteTag at rfxswf.c:1193. It allows an attacker to cause code execution.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/215" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "416" ]
416
https://github.com/matthiaskramm/swftools/issues/215
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# Summary A heap-use-after-free caused when using swfc, which results in out-of-bounds write. # Version ``` $ ./swfc -V swfc - part of swftools 0.9.2 $ git log --oneline -1 772e55a2 (HEAD, origin/master, origin/HEAD, master) ``` # Platform ``` $ uname -a Linux 1cc373898f58 5.4.0-150-generic #167~18.04.1-Ubu...
heap-use-after-free exit in swf_DeleteTag() at lib/rfxswf.c:1193
https://api.github.com/repos/swftools/swftools/issues/215/comments
0
2024-01-10T12:59:20Z
2024-01-11T06:45:39Z
https://github.com/swftools/swftools/issues/215
2,074,326,548
215
5,921
CVE-2024-22919
2024-01-19T18:15:08.950
swftools0.9.2 was discovered to contain a global-buffer-overflow vulnerability via the function parseExpression at swftools/src/swfc.c:2587.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/209" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "120" ]
120
https://github.com/matthiaskramm/swftools/issues/209
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# project https://github.com/matthiaskramm/swftools version:0.9.2 # os info Ubuntu20.04 TLS # poc [poc.zip](https://github.com/matthiaskramm/swftools/files/13783540/poc.zip) # build git clone https://github.com/matthiaskramm/swftools.git cd swftools ./configure --disable-shared && make ./swftools/src...
global-buffer-overflow exists in the function parseExpression in swftools/src/swfc.c:2587
https://api.github.com/repos/swftools/swftools/issues/209/comments
0
2023-12-28T05:21:08Z
2024-01-11T01:14:11Z
https://github.com/swftools/swftools/issues/209
2,058,003,911
209
5,922
CVE-2024-22955
2024-01-19T18:15:09.003
swftools 0.9.2 was discovered to contain a stack-buffer-underflow vulnerability via the function parseExpression at swftools/src/swfc.c:2576.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/207" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/matthiaskramm/swftools/issues/207
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# project https://github.com/matthiaskramm/swftools version:0.9.2 # os info Ubuntu20.04 TLS # poc [gbo_poc.zip](https://github.com/matthiaskramm/swftools/files/13783442/gbo_poc.zip) # build git clone https://github.com/matthiaskramm/swftools.git cd swftools ./configure --disable-shared && make ./swftools/s...
stack-buffer-underflow exists in the function parseExpression in swftools/src/swfc.c:2576
https://api.github.com/repos/swftools/swftools/issues/207/comments
1
2023-12-28T05:05:17Z
2024-12-02T11:45:06Z
https://github.com/swftools/swftools/issues/207
2,057,993,750
207
5,923
CVE-2024-22956
2024-01-19T18:15:09.050
swftools 0.9.2 was discovered to contain a heap-use-after-free vulnerability via the function removeFromTo at swftools/src/swfc.c:838
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/208" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "416" ]
416
https://github.com/matthiaskramm/swftools/issues/208
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# project https://github.com/matthiaskramm/swftools version:0.9.2 # os info Ubuntu18.04 TLS # poc [poc.zip](https://github.com/matthiaskramm/swftools/files/13783478/poc.zip) # build git clone https://github.com/matthiaskramm/swftools.git cd swftools ./configure --disable-shared && make ./swftools/src/s...
heap-use-after-free exists in the function removeFromTo in swftools/src/swfc.c:838
https://api.github.com/repos/swftools/swftools/issues/208/comments
1
2023-12-28T05:12:39Z
2024-12-02T11:45:49Z
https://github.com/swftools/swftools/issues/208
2,057,998,005
208
5,924
CVE-2024-22957
2024-01-19T18:15:09.093
swftools 0.9.2 was discovered to contain an Out-of-bounds Read vulnerability via the function dict_do_lookup in swftools/lib/q.c:1190.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/206" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "125" ]
125
https://github.com/matthiaskramm/swftools/issues/206
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# project https://github.com/matthiaskramm/swftools version:0.9.2 # os info Ubuntu18.04 TLS # poc [swfc_crash.zip](https://github.com/matthiaskramm/swftools/files/13815139/swfc_crash.zip) # build git clone https://github.com/matthiaskramm/swftools.git cd swftools ./configure --disable-shared && make ./sw...
Out-of-bounds Read swftools/lib/q.c:1190 in dict_do_lookup
https://api.github.com/repos/swftools/swftools/issues/206/comments
1
2023-12-28T04:25:13Z
2024-12-02T11:42:15Z
https://github.com/swftools/swftools/issues/206
2,057,972,921
206
5,925
CVE-2024-23679
2024-01-19T21:15:10.073
Enonic XP versions less than 7.7.4 are vulnerable to a session fixation issue. An remote and unauthenticated attacker can use prior sessions due to the lack of invalidating session attributes.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "disclosure@vulncheck.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/advisories/GHSA-4m5p-5w5w-3jcf" }, { "source": "disclosure@vulncheck.com", "tags": [ "Patch" ], "url": "https://github.com/enonic/xp/commit/0189975691e9e6407a9fee870...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enonic:xp:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FC6521F-C0B8-4FE8-BE06-FAB57CFFE61A", "versionEndExcluding": "7.7.4", "versionEndIncluding": null, "versionStartExcluding": n...
[ "384" ]
384
https://github.com/enonic/xp/issues/9253
[ "Issue Tracking" ]
github.com
[ "enonic", "xp" ]
lib-auth should invalidate old session after login and replicate session attributes in a new one.
Invalidate old session after login
https://api.github.com/repos/enonic/xp/issues/9253/comments
0
2021-12-06T12:54:41Z
2021-12-14T12:48:55Z
https://github.com/enonic/xp/issues/9253
1,072,117,958
9,253
5,926
CVE-2024-23689
2024-01-19T21:15:10.520
Exposure of sensitive information in exceptions in ClichHouse's clickhouse-r2dbc, com.clickhouse:clickhouse-jdbc, and com.clickhouse:clickhouse-client versions less than 0.4.6 allows unauthorized users to gain access to client certificate passwords via client exception logs. This occurs when 'sslkey' is specified and a...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "disclosure@vulncheck.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ClickHouse/clickhouse-java/issues/1331" }, { "source": "disclosure@vulncheck.com", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clickhouse:java_libraries:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7EFEC79-6EFB-4FCD-A772-C6A600512D6A", "versionEndExcluding": "0.4.6", "versionEndIncluding": null, "versionSt...
[ "209" ]
209
https://github.com/ClickHouse/clickhouse-java/issues/1331
[ "Exploit", "Issue Tracking" ]
github.com
[ "ClickHouse", "clickhouse-java" ]
<!-- delete unnecessary items --> ### Describe the bug The following exception or similar exceptions have ClickHouseNode information converted to string and inserted into Exception message. This also is done for SSL key - exposing it, which is giant vulnerability. org.springframework.jdbc.CannotGetJdbcConnectionEx...
SSL key is exposed in SQLException "No client available, ..."
https://api.github.com/repos/ClickHouse/clickhouse-java/issues/1331/comments
1
2023-04-25T11:21:17Z
2023-04-26T12:07:06Z
https://github.com/ClickHouse/clickhouse-java/issues/1331
1,682,970,719
1,331
5,928
CVE-2023-52353
2024-01-21T23:15:44.220
An issue was discovered in Mbed TLS through 3.5.1. In mbedtls_ssl_session_reset, the maximum negotiable TLS version is mishandled. For example, if the last connection negotiated TLS 1.2, then 1.2 becomes the new maximum.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/Mbed-TLS/mbedtls/issues/8654" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "ur...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*", "matchCriteriaId": "251B083F-CA00-4956-8244-5CF8A610094F", "versionEndExcluding": "3.5.2", "versionEndIncluding": null, "versionStartExcluding"...
[ "384" ]
384
https://github.com/Mbed-TLS/mbedtls/issues/8654
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "Mbed-TLS", "mbedtls" ]
### Summary programs/ssl/ssl_server2 refuses following tls1.3 connections from a peer if that peer used to establish tls1.2 connections with the server previously. ### System information Mbed TLS version (number or commit id): 3.4.0 f1c032adb Operating system and version: Ubuntu 22.04.2 LTS Configuration (if n...
programs/ssl/ssl_server2 bug
https://api.github.com/repos/Mbed-TLS/mbedtls/issues/8654/comments
3
2023-12-22T13:31:22Z
2024-04-08T09:35:12Z
https://github.com/Mbed-TLS/mbedtls/issues/8654
2,053,928,933
8,654
5,929
CVE-2024-23744
2024-01-21T23:15:44.833
An issue was discovered in Mbed TLS 3.5.1. There is persistent handshake denial if a client sends a TLS 1.3 ClientHello without extensions.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/Mbed-TLS/mbedtls/issues/8694" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "ur...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*", "matchCriteriaId": "F77B65FC-D81F-4AB6-A4EA-2E48AD58FFEA", "versionEndExcluding": null, "versionEndIncluding": "3.5.1", "versionStartExcluding"...
[ "400" ]
400
https://github.com/Mbed-TLS/mbedtls/issues/8694
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "Mbed-TLS", "mbedtls" ]
### Summary Send a TLS 1.3 ClientHello without extensions cause programs/ssl/ssl_server and ssl_server2 DoS. ### System information Mbed TLS version (number or commit id): 3.4.0 f1c032a Operating system and version: Ubuntu 22.04.2 LTS Configuration (if not default, please attach mbedtls_config.h): #define MB...
programs/ssl/ssl_server DoS
https://api.github.com/repos/Mbed-TLS/mbedtls/issues/8694/comments
9
2024-01-10T12:27:30Z
2024-01-15T11:55:42Z
https://github.com/Mbed-TLS/mbedtls/issues/8694
2,074,269,016
8,694
5,930
CVE-2024-23750
2024-01-22T01:15:08.507
MetaGPT through 0.6.4 allows the QaEngineer role to execute arbitrary code because RunCode.run_script() passes shell metacharacters to subprocess.Popen.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/geekan/MetaGPT/issues/731" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisor...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:deepwisdom:metagpt:*:*:*:*:*:*:*:*", "matchCriteriaId": "D05F5DEF-ACD0-4B99-AA6D-A6F59B31026D", "versionEndExcluding": null, "versionEndIncluding": "0.6.4", "versionStartExcl...
[ "94" ]
94
https://github.com/geekan/MetaGPT/issues/731
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "geekan", "MetaGPT" ]
**Vulnerability description** When we use QaEngineer role, arbitrary code execution could happen because QaEngineer adopt a dangerous action `RunCode` to test codes generated by Engineer. `RunCode.run_script()` method invokes `subprocess.Popen` without any check. Evil guys can manipulate prompts to execute some sensit...
[Vulnerability] Arbitrary code execution when use QaEngineer role
https://api.github.com/repos/FoundationAgents/MetaGPT/issues/731/comments
5
2024-01-10T02:21:24Z
2025-03-12T00:31:49Z
https://github.com/FoundationAgents/MetaGPT/issues/731
2,073,465,949
731
5,931
CVE-2024-23751
2024-01-22T01:15:08.557
LlamaIndex (aka llama_index) through 0.9.34 allows SQL injection via the Text-to-SQL feature in NLSQLTableQueryEngine, SQLTableRetrieverQueryEngine, NLSQLRetriever, RetrieverQueryEngine, and PGVectorSQLQueryEngine. For example, an attacker might be able to delete this year's student records via "Drop the Students table...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/run-llama/llama_index/issues/9957" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:llamaindex:llamaindex:*:*:*:*:*:*:*:*", "matchCriteriaId": "A85457FA-3A68-45F3-9AB7-7E367D18EC67", "versionEndExcluding": null, "versionEndIncluding": "0.9.34", "versionStart...
[ "89" ]
89
https://github.com/run-llama/llama_index/issues/9957
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "run-llama", "llama_index" ]
### Bug Description `NLSQLTableQueryEngine`, `SQLTableRetrieverQueryEngine`, `NLSQLRetriever`, `RetrieverQueryEngine`, and `PGVectorSQLQueryEngine` have Text-to-SQL ability. However, by prompt injection, we could let them execute arbitary SQL statement such as dropping tables, which leads to serious security issue whe...
[Bug]: Text-to-SQL have serious SQL injection issue which can execute arbitary SQL statement
https://api.github.com/repos/run-llama/llama_index/issues/9957/comments
19
2024-01-10T10:02:54Z
2024-11-18T17:18:28Z
https://github.com/run-llama/llama_index/issues/9957
2,074,014,169
9,957
5,932
CVE-2024-23752
2024-01-22T01:15:08.607
GenerateSDFPipeline in synthetic_dataframe in PandasAI (aka pandas-ai) through 1.5.17 allows attackers to trigger the generation of arbitrary Python code that is executed by SDFCodeExecutor. An attacker can create a dataframe that provides an English language specification of this Python code. NOTE: the vendor previous...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Mailing List", "Vendor Advisory" ], "url": "https://github.com/gventuri/pandas-ai/issues/868" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Vendor Advisor...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gabrieleventuri:pandasai:*:*:*:*:*:python:*:*", "matchCriteriaId": "14CBB3DD-8C76-4489-9ED7-97DF5E46B561", "versionEndExcluding": null, "versionEndIncluding": "1.5.17", "vers...
[ "862" ]
862
https://github.com/gventuri/pandas-ai/issues/868
[ "Exploit", "Mailing List", "Vendor Advisory" ]
github.com
[ "gventuri", "pandas-ai" ]
### System Info OS version: WSL 2 of Ubuntu 20.04.6 Python version: 3.11.7 pandasai version: 1.5.13 ### 🐛 Describe the bug When I use `GenerateSDFPipeline`, if dataframe content is maliciously crafted, prompt injection would happen. This will cause arbitary command execution which could lead to serious security r...
[Vulnerability] synthetic_dataframe has serious prompt injection issue which could lead to arbitary command execution
https://api.github.com/repos/sinaptik-ai/pandas-ai/issues/868/comments
1
2024-01-11T08:40:34Z
2024-05-28T14:10:33Z
https://github.com/sinaptik-ai/pandas-ai/issues/868
2,076,057,059
868
5,933
CVE-2024-21484
2024-01-22T05:15:08.720
Versions of the package jsrsasign before 11.0.0 are vulnerable to Observable Discrepancy via the RSA PKCS1.5 or RSAOAEP decryption process. An attacker can decrypt ciphertexts by exploiting the Marvin security flaw. Exploiting this vulnerability requires the attacker to have access to a large number of ciphertexts encr...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/kjur/jsrsasign/issues/598" }, { "source": "report@snyk.io", "tags": [ "Patch", "Release Notes" ], "url": "https://github.com/kjur/jsr...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsrsasign_project:jsrsasign:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "4651F559-5FE3-40F1-94FD-355954307381", "versionEndExcluding": "11.0.0", "versionEndIncluding": null, "...
[ "203" ]
203
https://github.com/kjur/jsrsasign/issues/598
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "kjur", "jsrsasign" ]
_(Since I haven't found a security policy that would ask for filing security issues over email, I'm making a regular bug report)_ I've tested jsrsasign 10.8.6 on nodejs 21.1.0 and I have found it vulnerable to the [Marvin Attack](https://people.redhat.com/~hkario/marvin/). Looking at the results, both the bit siz...
jsrsasign vulnerable to the Marvin Attack
https://api.github.com/repos/kjur/jsrsasign/issues/598/comments
3
2023-11-21T10:02:42Z
2024-01-17T08:05:39Z
https://github.com/kjur/jsrsasign/issues/598
2,003,900,052
598
5,934
CVE-2021-42141
2024-01-22T23:15:08.120
An issue was discovered in Contiki-NG tinyDTLS through 2018-08-30. One incorrect handshake could complete with different epoch numbers in the packets Client_Hello, Client_key_exchange, and Change_cipher_spec, which may cause denial of service.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/176625/Contiki-NG-tinyDTLS-Denial-Of-Service.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/contiki-...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contiki-ng:tinydtls:*:*:*:*:*:*:*:*", "matchCriteriaId": "E938DF84-2663-4516-87E3-B7E46789F6A1", "versionEndExcluding": null, "versionEndIncluding": "2018-08-30", "versionSta...
[ "755" ]
755
https://github.com/contiki-ng/tinydtls/issues/27
[ "Patch" ]
github.com
[ "contiki-ng", "tinydtls" ]
Until the master branch 53a0d97, one incorrect handshake is completed with different epoch numbers in the packets Client_Hello, Client_key_exchange and Change_cipher_spec. Here are captured packets with Wireshark, ![invalidhandshake](https://user-images.githubusercontent.com/10736214/136697769-5ea6fa77-cb41-4deb-...
One incorrect handshake is completed with differenct epoch numbers
https://api.github.com/repos/contiki-ng/tinydtls/issues/27/comments
0
2021-10-10T13:29:15Z
2021-10-10T13:29:15Z
https://github.com/contiki-ng/tinydtls/issues/27
1,021,984,774
27
5,935
CVE-2021-42142
2024-01-23T22:15:16.270
An issue was discovered in Contiki-NG tinyDTLS through master branch 53a0d97. DTLS servers mishandle the early use of a large epoch number. This vulnerability allows remote attackers to cause a denial of service and false-positive packet drops.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/contiki-ng/tinydtls/issues/24" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/fulldisclosure/20...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contiki-ng:tinydtls:*:*:*:*:*:*:*:*", "matchCriteriaId": "E938DF84-2663-4516-87E3-B7E46789F6A1", "versionEndExcluding": null, "versionEndIncluding": "2018-08-30", "versionSta...
[ "755" ]
755
https://github.com/contiki-ng/tinydtls/issues/24
[ "Issue Tracking", "Patch" ]
github.com
[ "contiki-ng", "tinydtls" ]
In the master branch 53a0d97, DTLS servers mishandle the early use of a large epoch number. This vulnerability allows remote attackers to cause a denial of service and false-positive packet drops. This vulnerability could be reproduced by sending packets to complete two times of handshakes. The epoch number in the f...
wrong packets drops
https://api.github.com/repos/contiki-ng/tinydtls/issues/24/comments
1
2021-10-10T12:45:56Z
2024-02-07T14:59:42Z
https://github.com/contiki-ng/tinydtls/issues/24
1,021,974,680
24
5,936
CVE-2021-43584
2024-01-24T20:15:53.610
DOM-based Cross Site Scripting (XSS vulnerability in 'Tail Event Logs' functionality in Nagios Nagios Cross-Platform Agent (NCPA) before 2.4.0 allows attackers to run arbitrary code via the name element when filtering for a log.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/NagiosEnterprises/ncpa/issues/830" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nagios:nagios_cross_platform_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "E69DEC17-2E27-4E85-9728-A0E837ECA3F3", "versionEndExcluding": "2.4.0", "versionEndIncluding": null, "...
[ "79" ]
79
https://github.com/NagiosEnterprises/ncpa/issues/830
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "NagiosEnterprises", "ncpa" ]
### Vulnerability Description [CENSUS](https://census-labs.com/) identified that the 'Tail Event Logs' functionality of the Nagios Cross-Platform Agent (NCPA) is susceptible to a self-inflicted DOM-based Cross-Site Scripting (XSS) vulnerability via the `name` element. DOM-based Cross-Site Scripting is a vulnerabi...
CVE-2021-43584 - DOM-based XSS via 'name' element of 'Tail Event Logs' functionality
https://api.github.com/repos/NagiosEnterprises/ncpa/issues/830/comments
4
2021-11-29T17:55:16Z
2022-11-18T16:40:30Z
https://github.com/NagiosEnterprises/ncpa/issues/830
1,066,330,637
830
5,937
CVE-2024-22749
2024-01-25T16:15:09.010
GPAC v2.3 was detected to contain a buffer overflow via the function gf_isom_new_generic_sample_description function in the isomedia/isom_write.c:4577
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/gpac/gpac/issues/2713" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hanxuer/crashes...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "58C43523-0CB3-474F-B88B-6ACA538645FF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
[ "120" ]
120
https://github.com/gpac/gpac/issues/2713
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at https://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough inf...
buffer-overflow in gf_isom_new_generic_sample_description function at isomedia/isom_write.c:4577
https://api.github.com/repos/gpac/gpac/issues/2713/comments
1
2024-01-06T06:07:11Z
2024-01-08T10:22:24Z
https://github.com/gpac/gpac/issues/2713
2,068,418,306
2,713
5,938
CVE-2024-23656
2024-01-25T20:15:41.107
Dex is an identity service that uses OpenID Connect to drive authentication for other apps. Dex 2.37.0 serves HTTPS with insecure TLS 1.0 and TLS 1.1. `cmd/dex/serve.go` line 425 seemingly sets TLS 1.2 as minimum version, but the whole `tlsConfig` is ignored after `TLS cert reloader` was introduced in v2.37.0. Configur...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "security-advisories@github.com", "tags": [ "Product" ], "url": "https://github.com/dexidp/dex/blob/70d7a2c7c1bb2646b1a540e49616cbc39622fb83/cmd/dex/serve.go#L425" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:linuxfoundation:dex:2.37.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFFADC7B-A8BE-437B-B1A8-868ECD4ED5E9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ "326" ]
326
https://github.com/dexidp/dex/issues/2848
[ "Issue Tracking" ]
github.com
[ "dexidp", "dex" ]
### Preflight Checklist - [X] I agree to follow the [Code of Conduct](https://github.com/dexidp/dex/blob/master/.github/CODE_OF_CONDUCT.md) that this project adheres to. - [X] I have searched the [issue tracker](https://www.github.com/dexidp/dex/issues) for an issue that matches the one I want to file, without success...
Support configuration of TLS min and max versions
https://api.github.com/repos/dexidp/dex/issues/2848/comments
2
2023-03-07T13:26:00Z
2024-01-25T17:18:38Z
https://github.com/dexidp/dex/issues/2848
1,613,446,688
2,848
5,939
CVE-2023-52389
2024-01-27T03:15:07.883
UTF32Encoding.cpp in POCO has a Poco::UTF32Encoding integer overflow and resultant stack buffer overflow because Poco::UTF32Encoding::convert() and Poco::UTF32::queryConvert() may return a negative integer if a UTF-32 byte sequence evaluates to a value of 0x80000000 or higher. This is fixed in 1.11.8p2, 1.12.5p2, and 1...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/pocoproject/poco/compare/poco-1.12.5p2-release...poco-1.13.0-release" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/pocoproject/poco/issues/4320" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pocoproject:poco:*:*:*:*:*:*:*:*", "matchCriteriaId": "62FA172D-0501-4F88-A7FC-39ECF76B75FA", "versionEndExcluding": "1.11.8", "versionEndIncluding": null, "versionStartExclu...
[ "190" ]
190
https://github.com/pocoproject/poco/issues/4320
[ "Patch" ]
github.com
[ "pocoproject", "poco" ]
`Poco::UTF32Encoding::convert()` and `Poco::UTF32::queryConvert()` may return a negative integer of the UTF-32 byte sequence evaluates to a value >= 0x80000000.
Integer overflow in Poco::UTF32Encoding
https://api.github.com/repos/pocoproject/poco/issues/4320/comments
0
2023-12-04T14:16:54Z
2023-12-26T11:58:02Z
https://github.com/pocoproject/poco/issues/4320
2,023,962,150
4,320
5,940
CVE-2024-0962
2024-01-27T13:15:07.973
A vulnerability was found in obgm libcoap 4.3.4. It has been rated as critical. Affected by this issue is the function get_split_entry of the file src/coap_oscore.c of the component Configuration File Handler. The manipulation leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has be...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/obgm/libcoap/issues/1310" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/obgm/libcoap/issues/1310#issue-2099860835"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libcoap:libcoap:4.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "6015782B-1A2E-4F55-BA3F-D40FDAFAD2CE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "787" ]
787
https://github.com/obgm/libcoap/issues/1310
[ "Exploit", "Patch" ]
github.com
[ "obgm", "libcoap" ]
## Environment - Build System: [Make] - Operating System: [Linux] - Operating System Version: [Ubuntu 20.04] - Hosted Environment: [None] ## Report - **[1] Vulnerabilities:** Stack-buffer-overflow in libcoap. - **[2] Affected Versions:** Unspecified version (additiona...
Stack-buffer-overflow in libcoap
https://api.github.com/repos/obgm/libcoap/issues/1310/comments
9
2024-01-25T08:41:58Z
2024-09-29T07:24:58Z
https://github.com/obgm/libcoap/issues/1310
2,099,860,835
1,310
5,941
CVE-2024-0962
2024-01-27T13:15:07.973
A vulnerability was found in obgm libcoap 4.3.4. It has been rated as critical. Affected by this issue is the function get_split_entry of the file src/coap_oscore.c of the component Configuration File Handler. The manipulation leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has be...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/obgm/libcoap/issues/1310" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/obgm/libcoap/issues/1310#issue-2099860835"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libcoap:libcoap:4.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "6015782B-1A2E-4F55-BA3F-D40FDAFAD2CE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "787" ]
787
https://github.com/obgm/libcoap/issues/1310#issue-2099860835
[ "Exploit", "Issue Tracking" ]
github.com
[ "obgm", "libcoap" ]
## Environment - Build System: [Make] - Operating System: [Linux] - Operating System Version: [Ubuntu 20.04] - Hosted Environment: [None] ## Report - **[1] Vulnerabilities:** Stack-buffer-overflow in libcoap. - **[2] Affected Versions:** Unspecified version (additiona...
Stack-buffer-overflow in libcoap
https://api.github.com/repos/obgm/libcoap/issues/1310/comments
9
2024-01-25T08:41:58Z
2024-09-29T07:24:58Z
https://github.com/obgm/libcoap/issues/1310
2,099,860,835
1,310
5,942
CVE-2024-22559
2024-01-29T14:15:09.940
LightCMS v2.0 is vulnerable to Cross Site Scripting (XSS) in the Content Management - Articles field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/eddy8/LightCMS/issues/34" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lightcms_project:lightcms:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "188FCA72-D81E-48AA-8C49-58CB4BCD877F", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "79" ]
79
https://github.com/eddy8/LightCMS/issues/34
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "eddy8", "LightCMS" ]
The lightcms content management system uses an outdated ueditor component, therefore there is a domxss vulnerability that allows users to upload an XML file containing a malicious payload which could trigger the vulnerability and lead to an XSS attack. # 00x1 Log into the admin backend, click on Content Management ...
A stored cross-site scripting (XSS) vulnerability exists in LightCMS "Content Management - Articles" field
https://api.github.com/repos/eddy8/LightCMS/issues/34/comments
0
2023-12-29T03:01:49Z
2024-07-23T15:02:11Z
https://github.com/eddy8/LightCMS/issues/34
2,059,018,555
34
5,943
CVE-2023-51839
2024-01-29T20:15:15.047
DeviceFarmer stf v3.6.6 suffers from Use of a Broken or Risky Cryptographic Algorithm.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/DeviceFarmer/stf" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/DeviceFarmer/stf/issues/736" }, { "source": "cve@...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:devicefarmer:smartphone_test_farm:3.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "7E2F07D0-CA08-40E2-B7FE-3353CD83B6D1", "versionEndExcluding": null, "versionEndIncluding": null, "...
[ "327" ]
327
https://github.com/DeviceFarmer/stf/issues/736
[ "Issue Tracking", "Vendor Advisory" ]
github.com
[ "DeviceFarmer", "stf" ]
Please check if there is any problem with using DES-ECB to encrypt. 1. lib/util/vncauth.js, line 35 This algorithm is known to have significant vulnerabilities that can be exploited by attackers, compromising the confidentiality and integrity of sensitive data. DES-ECB uses a fixed encryption key and does not in...
Use of Outdated and Insecure Algorithm DES-ECB to encrypt
https://api.github.com/repos/DeviceFarmer/stf/issues/736/comments
0
2023-12-08T13:59:31Z
2023-12-08T13:59:31Z
https://github.com/DeviceFarmer/stf/issues/736
2,032,704,832
736
5,944
CVE-2023-51840
2024-01-29T20:15:15.100
DoraCMS 2.1.8 is vulnerable to Use of Hard-coded Cryptographic Key.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/doramart/DoraCMS" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/doramart/DoraCMS/issues/262" }, { "source": "cve@...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:html-js:doracms:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "1FFA2258-7C76-482B-8076-AAD87B371A21", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "798" ]
798
https://github.com/doramart/DoraCMS/issues/262
[ "Issue Tracking", "Vendor Advisory" ]
github.com
[ "doramart", "DoraCMS" ]
Please check if there is any problem with the hard-coded key. 1. backstage/adminGroup/src/utils/crypto.js, line12 Using fixed keys may reduce encryption security because an attacker can guess or predict them. To enhance security, it is recommended to use randomly generated keys and ensure secure storage and trans...
Usage of Fixed Key
https://api.github.com/repos/doramart/DoraCMS/issues/262/comments
0
2023-12-14T08:08:20Z
2023-12-14T08:08:20Z
https://github.com/doramart/DoraCMS/issues/262
2,041,163,539
262
5,945
CVE-2024-22570
2024-01-29T20:15:15.420
A stored cross-site scripting (XSS) vulnerability in /install.php?m=install&c=index&a=step3 of GreenCMS v2.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/Num-Nine/CVE/issues/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/Num-Nine/CVE/issues/11" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:njtech:greencms:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "7271D633-9BD0-4E2B-BA69-E732E3E19D43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/Num-Nine/CVE/issues/11
[ "Issue Tracking" ]
github.com
[ "Num-Nine", "CVE" ]
1.Download address: https://codeload.github.com/GreenCMS/GreenCMS/zip/refs/heads/beta 2.Hole location: http://greencms.com/install.php?m=install&c=index&a=step3 3.Fill in the payload at the site name `<script>alert(/xss/)</script>` 4.After the installation is complete, xss can be triggered by visiting the fol...
GreenCMS v2.3 exists storage xss
https://api.github.com/repos/QianGeG/CVE/issues/11/comments
0
2023-12-30T08:57:42Z
2023-12-30T08:57:42Z
https://github.com/QianGeG/CVE/issues/11
2,060,685,426
11
5,946
CVE-2023-51843
2024-01-30T01:15:58.967
react-dashboard 1.4.0 is vulnerable to Cross Site Scripting (XSS) as httpOnly is not set.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/flatlogic/react-dashboard" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/flatlogic/react-dashboard/issues/65" }, { "source": "cve@mitre.or...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flatlogic:react_dashboard:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "AD546A44-7F1A-4D13-9AF4-2D04C0BA7F7F", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "79" ]
79
https://github.com/flatlogic/react-dashboard/issues/65
[ "Issue Tracking" ]
github.com
[ "flatlogic", "react-dashboard" ]
Please check if there is a security issue. 1. server/server.js, line 40. Setting "httpOnly" to false may be due to specific design needs or use cases. In some cases, applications may need to access cookie data via JavaScript to implement specific functionality or to interact with other components. However, to be ...
JWT Should be Stored in an HttpOnly Cookie
https://api.github.com/repos/flatlogic/react-dashboard/issues/65/comments
0
2023-12-17T12:40:24Z
2024-11-29T05:26:24Z
https://github.com/flatlogic/react-dashboard/issues/65
2,045,203,378
65
5,947
CVE-2023-51982
2024-01-30T01:15:59.013
CrateDB 5.5.1 is contains an authentication bypass vulnerability in the Admin UI component. After configuring password authentication and_ Local_ In the case of an address, identity authentication can be bypassed by setting the X-Real IP request header to a specific value and accessing the Admin UI directly using the d...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/crate/crate/issues/15231" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/crate/crat...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cratedb:cratedb:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DCA795AD-7B75-41DA-B82D-3A032DBAE7BF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "287" ]
287
https://github.com/crate/crate/issues/15231
[ "Exploit", "Issue Tracking" ]
github.com
[ "crate", "crate" ]
### CrateDB version 5.5.1 ### CrateDB setup information number of nodes: 1. Docker Installed. Install startup command: docker pull crate:latest docker run -d --publish 4200:4200 --publish 5432:5432 crate -Cdiscovery.type=single-node -Cauth.host_based.enabled=true -Cauth.host_based.config.0.method=trust -Cauth.ho...
There is an HTTP authentication bypass vulnerability in the CrateDB database
https://api.github.com/repos/crate/crate/issues/15231/comments
3
2023-12-21T09:47:10Z
2023-12-21T22:43:09Z
https://github.com/crate/crate/issues/15231
2,052,082,909
15,231
5,948
CVE-2024-22938
2024-01-30T01:16:00.077
Insecure Permissions vulnerability in BossCMS v.1.3.0 allows a local attacker to execute arbitrary code and escalate privileges via the init function in admin.class.php component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/n0Sleeper/bosscmsVuln" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/n0Sleeper/bosscmsVuln/issues/1" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bosscms:bosscms:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "700607F2-A251-4B79-B171-EA976C32A8B9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "863" ]
863
https://github.com/n0Sleeper/bosscmsVuln/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "n0Sleeper", "bosscmsVuln" ]
### Vulnerable file `BossCMS-V2/system/basic/class/admin.class.php` ```php public function init() { global $G; $manager = session::get('manager'); if(empty($manager)){ if(!defined('IS_LOGIN')){ header('Location: '.url::mpf('login','login','init')); } }else{ $mgr = explode(P,$manag...
Bosscms v1.3.0 has an unauthorized operation vulnerability due to admin.class.php
https://api.github.com/repos/n0Sleeper/bosscmsVuln/issues/1/comments
0
2024-01-06T14:31:28Z
2024-01-06T14:31:28Z
https://github.com/n0Sleeper/bosscmsVuln/issues/1
2,068,661,015
1
5,949
CVE-2024-22569
2024-01-31T02:15:54.467
Stored Cross-Site Scripting (XSS) vulnerability in POSCMS v4.6.2, allows attackers to execute arbitrary code via a crafted payload to /index.php?c=install&m=index&step=2&is_install_db=0.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Num-Nine/CVE/issues/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:poscms:poscms:4.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "A62614D0-0876-4DEA-BADB-2ADDA028B7FA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/Num-Nine/CVE/issues/12
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Num-Nine", "CVE" ]
1.Download address: http://www.poscms.net/xiazai/ 2.Hole location: http://127.0.0.1/index.php? c=install&m=index&step=2&is_install_db=0 3.Fill in the payload at the project name `<script>alert(/xss/)</script>` 4.xss is triggered when you return to the home page after installation ![image](https://github.co...
poscms 4.6.2 Storage xss Exists
https://api.github.com/repos/QianGeG/CVE/issues/12/comments
0
2023-12-30T09:06:40Z
2023-12-30T09:08:11Z
https://github.com/QianGeG/CVE/issues/12
2,060,687,596
12
5,950
CVE-2023-51939
2024-02-01T07:15:08.450
An issue in the cp_bbs_sig function in relic/src/cp/relic_cp_bbs.c of Relic relic-toolkit 0.6.0 allows a remote attacker to obtain sensitive information and escalate privileges via the cp_bbs_sig function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/liang-junkai/1b59487c0f7002fa5da98035b53e409f" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Mitigation", "Patch", "Third Party Advisory" ], "url...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:relic_project:relic:0.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E51401A1-E232-4848-8A65-FF9057152978", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "74" ]
74
https://github.com/relic-toolkit/relic/issues/284
[ "Issue Tracking", "Vendor Advisory" ]
github.com
[ "relic-toolkit", "relic" ]
Hi Team, We are writing to report a potential security issue about the implementation of bbs short signature in the relic library while providing countermeasures. Specifically, we cloned the relic repo from github on December 10, 2023 and have analyzed the source code of the Boneh Boyen short signature (or bbs)...
Leak the Secret Key of BBS Short Signature in Relic via Rowhammer
https://api.github.com/repos/relic-toolkit/relic/issues/284/comments
4
2023-12-18T06:13:16Z
2024-01-14T04:26:09Z
https://github.com/relic-toolkit/relic/issues/284
2,045,814,886
284
5,951
CVE-2024-24561
2024-02-01T17:15:11.180
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. In versions 0.3.10 and earlier, the bounds check for slices does not account for the ability for start + length to overflow when the values aren't literals. If a slice() function uses a non-literal argument for the start or length variable, t...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "security-advisories@github.com", "tags": [ "Product" ], "url": "https://github.com/vyperlang/vyper/blob/b01cd686aa567b32498fefd76bd96b0597c6f099/vyper/builtins/functions.py#L404-L457" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*", "matchCriteriaId": "832C489D-4288-46B4-A29E-0E7168748042", "versionEndExcluding": null, "versionEndIncluding": "0.3.10", "versionStartE...
[ "787" ]
787
https://github.com/vyperlang/vyper/issues/3756
[ "Issue Tracking" ]
github.com
[ "vyperlang", "vyper" ]
tracking issue for https://github.com/vyperlang/vyper/security/advisories/GHSA-9x7f-gwxq-6f2c
invalid bounds check for `slice()`
https://api.github.com/repos/vyperlang/vyper/issues/3756/comments
0
2024-01-31T23:09:36Z
2024-03-21T21:21:55Z
https://github.com/vyperlang/vyper/issues/3756
2,111,140,861
3,756
5,952
CVE-2024-22927
2024-02-01T23:15:10.960
Cross Site Scripting (XSS) vulnerability in the func parameter in eyoucms v.1.6.5 allows a remote attacker to run arbitrary code via crafted URL.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/57" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "C5AE12B9-F8D6-4F10-9B49-50E0263ECA55", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "79" ]
79
https://github.com/weng-xianhu/eyoucms/issues/57
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
### **Summary** EyouCMS-V1.6.5 When uploading images locally, the program will use the info parameter to set the parameters carried by the upload form. Multiple reflective XSS vulnerabilities can be created by modifying the JWT encrypted HEADER of the accepted JSON data and setting the parameter it contains to a mali...
EyouCMS-V1.6.5 has multiple reflective XSS vulnerabilities
https://api.github.com/repos/weng-xianhu/eyoucms/issues/57/comments
1
2024-01-05T08:05:47Z
2024-03-22T01:36:04Z
https://github.com/weng-xianhu/eyoucms/issues/57
2,066,903,491
57
5,953
CVE-2024-21485
2024-02-02T05:15:09.510
Versions of the package dash-core-components before 2.13.0; versions of the package dash-core-components before 2.0.0; versions of the package dash before 2.15.0; versions of the package dash-html-components before 2.0.0; versions of the package dash-html-components before 2.0.16 are vulnerable to Cross-site Scripting ...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "int...
[ { "source": "report@snyk.io", "tags": [ "Patch" ], "url": "https://github.com/plotly/dash/commit/9920073c9a8619ae8f90fcec1924f2f3a4332a8c" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/plotly/dash/issues/272...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:plotly:dash:*:*:*:*:*:*:*:*", "matchCriteriaId": "1177AB58-0C85-4FE7-A4EB-449B3CD34606", "versionEndExcluding": "2.13.0", "versionEndIncluding": null, "versionStartExcluding"...
[ "79" ]
79
https://github.com/plotly/dash/issues/2729
[ "Exploit", "Issue Tracking" ]
github.com
[ "plotly", "dash" ]
I've identified a Cross-Site Scripting (XSS) vulnerability in 'dash-core-components' **Vulnerability Details:** - **Severity**: High/Critical - **Description**: There's a risk of malicious script execution when the href of the a tag is controlled by an adversary. **Steps to Reproduce:** In a React.js project: ...
Validate url to prevent XSS attacks
https://api.github.com/repos/plotly/dash/issues/2729/comments
4
2024-01-21T05:10:29Z
2024-01-30T20:48:40Z
https://github.com/plotly/dash/issues/2729
2,092,425,191
2,729
5,954
CVE-2024-24160
2024-02-02T16:15:55.833
MRCMS 3.0 contains a Cross-Site Scripting (XSS) vulnerability via /admin/system/saveinfo.do.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/wy876/cve/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/wy876/cve/issues...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mrcms:mrcms:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "CC8B6F2A-C4B3-487F-B391-ECA5F1A2DDD9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "79" ]
79
https://github.com/wy876/cve/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "wy876", "cve" ]
Build the source code locally by downloading https://gitee.com/marker/MRCMS The vulnerability exists: http://127.0.0.1:8080/admin/index.do ![image](https://github.com/wy876/cve/assets/139549762/3e074600-d06c-422c-af60-81527c2016c1) Insert xss cross-site scripting attack code ``` "><img src=1 onerror=alert(/x...
MRCMS 3.0 There is an xss cross-site scripting vulnerability /admin/system/saveinfo.do
https://api.github.com/repos/wy876/cve/issues/1/comments
0
2024-01-13T07:13:34Z
2024-01-13T07:13:34Z
https://github.com/wy876/cve/issues/1
2,080,145,026
1
5,955
CVE-2024-24161
2024-02-02T16:15:55.880
MRCMS 3.0 contains an Arbitrary File Read vulnerability in /admin/file/edit.do as the incoming path parameter is not filtered.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/wy876/cve/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mrcms:mrcms:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "CC8B6F2A-C4B3-487F-B391-ECA5F1A2DDD9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "552" ]
552
https://github.com/wy876/cve/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "wy876", "cve" ]
Build the source code locally by downloading https://gitee.com/marker/MRCMS The vulnerability exists: http://127.0.0.1:8080/admin/index.do Click Content Management-->File Management Click the Edit File button 1.txt ![image](https://github.com/wy876/cve/assets/139549762/e62ed8bf-01fe-4b31-914c-981aa8ffba5b)...
MRCMS 3.0 Arbitrary file reading vulnerability exists /admin/file/edit.do
https://api.github.com/repos/wy876/cve/issues/2/comments
0
2024-01-18T09:11:17Z
2024-01-18T09:11:17Z
https://github.com/wy876/cve/issues/2
2,087,839,484
2
5,956
CVE-2024-24267
2024-02-05T18:15:52.427
gpac v2.2.1 was discovered to contain a memory leak via the gfio_blob variable in the gf_fileio_from_blob function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/gpac/gpac/commit/d28d9ba45cf4f628a7b2c351849a895e6fcf2234" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/gpac/gpac/issues/2571" }, { "source": "cve@mitre.org", "tags": [ "Ex...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "81FBED81-2989-4E6D-83CF-BF8E4989F5ED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "401" ]
401
https://github.com/gpac/gpac/issues/2571
null
github.com
[ "gpac", "gpac" ]
Memory leak in function [gf_fileio_from_mem](https://github.com/gpac/gpac/blob/941a0891b989f5ad86b739cfb12c84b7e62e8ee4/src/utils/os_file.c#L1447) The memory leak is reported by a static analyzer tool developed at CAST (https://www.linkedin.com/company/cast-center). Dynamic memory is allocated [here](https://github...
Memory leak in function gf_fileio_from_mem
https://api.github.com/repos/gpac/gpac/issues/2571/comments
0
2023-08-29T11:13:38Z
2023-08-29T13:47:19Z
https://github.com/gpac/gpac/issues/2571
1,871,446,973
2,571
5,957
CVE-2024-23049
2024-02-05T23:15:08.463
An issue in symphony v.3.6.3 and before allows a remote attacker to execute arbitrary code via the log4j component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/88250/symphony/issues/82" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/88250/symp...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:b3log:symphony:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB80FFE7-5262-4C69-A9E7-53C5895E126F", "versionEndExcluding": null, "versionEndIncluding": "3.6.3", "versionStartExcludin...
[ "77" ]
77
https://github.com/88250/symphony/issues/82
[ "Exploit", "Issue Tracking" ]
github.com
[ "88250", "symphony" ]
In symphony 3.6.3 and earlier, the use of an insecure log4j version resulted in a remote command execution risk. In the course of actual testing, a vulnerability trigger was found: ![b62f304d7843a47d9c9236beb71c448](https://github.com/88250/symphony/assets/107806521/9e58e85b-2dad-41cc-a48e-ca30bcadb5ac) ![d4627af0ccf...
Find a trigger for log4j2 remote command execution in symphony 3.6.3
https://api.github.com/repos/88250/symphony/issues/82/comments
1
2024-01-04T01:19:19Z
2024-01-04T02:21:41Z
https://github.com/88250/symphony/issues/82
2,064,851,327
82
5,958
CVE-2024-24112
2024-02-06T01:15:09.700
xmall v1.1 was discovered to contain a SQL injection vulnerability via the orderDir parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Product" ], "url": "https://github.com/Exrick/xmall/issues/78" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Product" ], "url"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exrick:xmall:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E46154B1-2E17-432C-839B-1F13469BCA05", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding":...
[ "89" ]
89
https://github.com/Exrick/xmall/issues/78
[ "Exploit", "Issue Tracking", "Product" ]
github.com
[ "Exrick", "xmall" ]
[Suggested description] Xmall was discovered to contain a SQL injection vulnerability via the orderDir parameter. [Vulnerability Type] SQLi [Vendor of Product] https://github.com/Exrick/xmall [Affected Product Code Base] all version [Affected Component] - /item/list - /item/listSearch - /sys/log - /...
SQL Injection Vulnerability exists in multiple interfaces of xmall
https://api.github.com/repos/Exrick/xmall/issues/78/comments
1
2023-03-17T12:06:40Z
2023-03-17T12:07:15Z
https://github.com/Exrick/xmall/issues/78
1,629,201,964
78
5,959
CVE-2024-24001
2024-02-07T00:15:56.443
jshERP v3.3 is vulnerable to SQL Injection. via the com.jsh.erp.controller.DepotHeadController: com.jsh.erp.utils.BaseResponseInfo findallocationDetail() function of jshERP which allows an attacker to construct malicious payload to bypass jshERP's protection mechanism.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/24001.txt" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jishenghua:jsherp:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A549663F-7809-4723-9F1F-251DB15E31CA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "89" ]
89
https://github.com/jishenghua/jshERP/issues/99
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "jishenghua", "jshERP" ]
public static String safeSqlParse(String originStr){ return originStr.replaceAll("(?i)" + regex, ""); } public final static String regex = "'|#|%|;|--| and | and|and | or | or|or | not | not|not " + "| use | use|use | insert | insert|insert | delete | delete|delete | update | update|update...
There are 4 sql injection vulnerabilities and 1 file upload vulnerability in jshERP v3.3
https://api.github.com/repos/jishenghua/jshERP/issues/99/comments
0
2024-01-12T08:40:39Z
2024-01-12T08:40:39Z
https://github.com/jishenghua/jshERP/issues/99
2,078,342,610
99
5,960
CVE-2024-24130
2024-02-07T14:15:52.720
Mail2World v12 Business Control Center was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the Usr parameter at resellercenter/login.asp.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Hebing123/cve/issues/13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Hebing123/c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mail2world:mail2world:12:*:*:*:*:*:*:*", "matchCriteriaId": "814F8AA9-4951-4025-A7F3-A434BE630122", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "79" ]
79
https://github.com/Hebing123/cve/issues/13
[ "Exploit", "Issue Tracking" ]
github.com
[ "Hebing123", "cve" ]
### **Summary** Mail2World V12 Business Control Center has a reflective cross-site vulnerability. ### **Details** A reflective XSS vulnerability exists in the resellercenter/login.asp path of Mail2World v12 Business Control Center. The cause of this XSS vulnerability is that Usr parameters are displayed to the fron...
Mail2World v12 Business Control Center has a reflective XSS vulnerability
https://api.github.com/repos/Hebing123/cve/issues/13/comments
1
2024-01-12T17:37:39Z
2024-03-11T06:20:40Z
https://github.com/Hebing123/cve/issues/13
2,079,360,954
13
5,961
CVE-2024-24131
2024-02-07T14:15:52.770
SuperWebMailer v9.31.0.01799 was discovered to contain a reflected cross-site scripting (XSS) vulenrability via the component api.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Hebing123/cve/issues/14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Hebing123/c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:superwebmailer:superwebmailer:9.31.0.01799:*:*:*:*:*:*:*", "matchCriteriaId": "E69A9B02-9E6A-421A-8E38-9A315640DD73", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "79" ]
79
https://github.com/Hebing123/cve/issues/14
[ "Exploit", "Issue Tracking" ]
github.com
[ "Hebing123", "cve" ]
### **Summary** SuperWebMailer 9.31.0.01799 has a reflective cross-site vulnerability. ### **Details** SuperWebMailer in version 9.31.0.01799 has a reflection cross-site attack vulnerability caused by api.php directly referencing urls without filtering. ### **Proof of Concept (POC)** http://ip:port/api/api.php/%3...
SuperWebMailer 9.31.0.01799 has a reflective XSS vulnerability
https://api.github.com/repos/Hebing123/cve/issues/14/comments
1
2024-01-12T18:45:40Z
2024-03-11T06:20:34Z
https://github.com/Hebing123/cve/issues/14
2,079,480,963
14
5,962
CVE-2024-24133
2024-02-07T14:15:52.820
Atmail v6.6.0 was discovered to contain a SQL injection vulnerability via the username parameter on the login page.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Hebing123/cve/issues/16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Hebing123/cve/issues/16" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atmail:atmail:6.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F9DFF09-D9A8-46F7-A466-6C538C591651", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "89" ]
89
https://github.com/Hebing123/cve/issues/16
[ "Third Party Advisory" ]
github.com
[ "Hebing123", "cve" ]
### **Summary** On January 12, we discovered that atmail 6.6.0 and atmail 6.3.0 weretested for SQL injection vulnerabilities that could be larger than 6.6.0. The username parameter during admin login is at risk of SQL injection. ### **Details** We can prove this with delayed SQL injection, which we have tes...
SQL Injection Vulnerability in Atmail 6.6.0
https://api.github.com/repos/Hebing123/cve/issues/16/comments
2
2024-01-16T06:20:56Z
2024-03-11T06:17:35Z
https://github.com/Hebing123/cve/issues/16
2,083,096,416
16
5,963
CVE-2024-24186
2024-02-07T14:15:52.870
Jsish v3.5.0 (commit 42c694c) was discovered to contain a stack-overflow via the component IterGetKeysCallback at /jsish/src/jsiValue.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/98" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/pcmacdon...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "787" ]
787
https://github.com/pcmacdon/jsish/issues/98
[ "Exploit", "Vendor Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: https://github.com/pcmacdon/jsish/commit/42c694c152f7f4fbee34d5e14be37d6e0d09673f Version: v3.5.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh export JSI__SANITIZE=1 make ``` ###### Test case <details><summary>testcase<...
stack-overflow ./jsish/src/jsiValue.c:1451 in IterGetKeysCallback
https://api.github.com/repos/pcmacdon/jsish/issues/98/comments
0
2024-01-14T11:31:14Z
2024-01-14T11:31:14Z
https://github.com/pcmacdon/jsish/issues/98
2,080,689,779
98
5,964
CVE-2024-24188
2024-02-07T14:15:52.917
Jsish v3.5.0 was discovered to contain a heap-buffer-overflow in ./src/jsiUtils.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/100" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisor...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "787" ]
787
https://github.com/pcmacdon/jsish/issues/100
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: https://github.com/pcmacdon/jsish/commit/42c694c152f7f4fbee34d5e14be37d6e0d09673f Version: v3.5.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh export JSI__SANITIZE=1 make ``` ###### Test case <details><summary>testcase<...
heap-buffer-overflow in ./jsish/src/jsiUtils.c
https://api.github.com/repos/pcmacdon/jsish/issues/100/comments
0
2024-01-20T05:53:20Z
2024-01-20T05:53:20Z
https://github.com/pcmacdon/jsish/issues/100
2,091,916,967
100
5,965
CVE-2024-24189
2024-02-07T14:15:52.967
Jsish v3.5.0 (commit 42c694c) was discovered to contain a use-after-free via the SplitChar at ./src/jsiUtils.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/101" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "416" ]
416
https://github.com/pcmacdon/jsish/issues/101
[ "Vendor Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: https://github.com/pcmacdon/jsish/commit/42c694c152f7f4fbee34d5e14be37d6e0d09673f Version: v3.5.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh export JSI__SANITIZE=1 make ``` ###### Test case <details><summary>testcase<...
heap-use-after-free ./jsish/src/jsiUtils.c:2060:17 in SplitChar
https://api.github.com/repos/pcmacdon/jsish/issues/101/comments
0
2024-01-20T05:58:02Z
2024-01-20T05:58:02Z
https://github.com/pcmacdon/jsish/issues/101
2,091,919,351
101
5,966
CVE-2024-25200
2024-02-07T14:15:53.013
Espruino 2v20 (commit fcc9ba4) was discovered to contain a Stack Overflow via the jspeFactorFunctionCall at src/jsparse.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/espruino/Espruino/issues/2457" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Adv...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:espruino:espruino:2.20:*:*:*:*:*:*:*", "matchCriteriaId": "3EEF8D93-5F22-4DB9-B15D-EA860BD3F688", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "787" ]
787
https://github.com/espruino/Espruino/issues/2457
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "espruino", "Espruino" ]
###### Espruino revision Commit: https://github.com/espruino/Espruino/commit/fcc9ba4f12d79710f93d47ea37987cde0efce410 Version: 2v20 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh export CCFLAGS='-g -fsanitize=address -fno-omit-frame-pointer' export LDFLAGS...
stack-overflow in jspeFactorFunctionCall
https://api.github.com/repos/espruino/Espruino/issues/2457/comments
0
2024-01-26T13:15:59Z
2024-01-31T16:08:07Z
https://github.com/espruino/Espruino/issues/2457
2,102,199,332
2,457
5,967
CVE-2024-25201
2024-02-07T14:15:53.060
Espruino 2v20 (commit fcc9ba4) was discovered to contain an Out-of-bounds Read via jsvStringIteratorPrintfCallback at src/jsvar.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/espruino/Espruino/issues/2456" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:espruino:espruino:2.20:*:*:*:*:*:*:*", "matchCriteriaId": "3EEF8D93-5F22-4DB9-B15D-EA860BD3F688", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "125" ]
125
https://github.com/espruino/Espruino/issues/2456
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "espruino", "Espruino" ]
###### Espruino revision Commit: https://github.com/espruino/Espruino/commit/fcc9ba4f12d79710f93d47ea37987cde0efce410 Version: 2v20 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh export CCFLAGS='-g -fsanitize=address -fno-omit-frame-pointer' export LDFLAGS...
SEGV on unknown address in jsvStringIteratorPrintfCallback
https://api.github.com/repos/espruino/Espruino/issues/2456/comments
3
2024-01-26T13:07:20Z
2024-01-30T12:25:14Z
https://github.com/espruino/Espruino/issues/2456
2,102,188,118
2,456
5,968
CVE-2024-24216
2024-02-08T06:15:51.750
Zentao v18.0 to v18.10 was discovered to contain a remote code execution (RCE) vulnerability via the checkConnection method of /app/zentao/module/repo/model.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/easysoft/zentaopms/issues/133" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/l3s10n/ZenTaoPMS_RCE" }, { "sou...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:easycorp:zentao:*:*:*:*:*:*:*:*", "matchCriteriaId": "2055C49E-D7BA-42D6-9F98-BDEF06A38F29", "versionEndExcluding": null, "versionEndIncluding": "18.10", "versionStartExcludi...
[ "77" ]
77
https://github.com/easysoft/zentaopms/issues/133
[ "Issue Tracking" ]
github.com
[ "easysoft", "zentaopms" ]
### 描述 (Description) 详情见:“https://github.com/l3s10n/ZenTaoPMS_RCE” ### 期望 (Expectation) 修复漏洞 ### 结果 (Result) 后台命令执行 ### 软件版本 (Software version) 18.0 - 18.10
There is a remote command execution vulnerability after login(存在后台远程命令执行漏洞)
https://api.github.com/repos/easysoft/zentaopms/issues/133/comments
1
2024-01-15T08:40:11Z
2024-05-31T10:54:25Z
https://github.com/easysoft/zentaopms/issues/133
2,081,518,929
133
5,969
CVE-2024-24113
2024-02-08T13:15:09.807
xxl-job =< 2.4.1 has a Server-Side Request Forgery (SSRF) vulnerability, which causes low-privileged users to control executor to RCE.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xuxueli/xxl-job/issues/3375" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xuxueli:xxl-job:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C421D48-E483-44C2-A4A9-F0FBC31E17C7", "versionEndExcluding": null, "versionEndIncluding": "2.4.1", "versionStartExcludi...
[ "918" ]
918
https://github.com/xuxueli/xxl-job/issues/3375
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "xuxueli", "xxl-job" ]
### Which version of XXL-JOB do you using? 2.4.1(latest) ### vulnerability description XXL-JOB is a distributed task scheduling platform based on java language in the XXL (XXL-JOB) community. There is an SSRF vulnerability in xxl-job-2.4.1/xxl-job-admin/src/main/java/com/xxl/job/admin/controller/JobInfoController...
xxl-job =< 2.4.1 version has SSRF vulnerability, which causes low-privileged users to control executor to RCE
https://api.github.com/repos/xuxueli/xxl-job/issues/3375/comments
2
2024-01-11T12:24:35Z
2024-10-12T06:24:51Z
https://github.com/xuxueli/xxl-job/issues/3375
2,076,500,051
3,375
5,970
CVE-2024-24393
2024-02-08T22:15:09.130
File Upload vulnerability index.php in Pichome v.1.1.01 allows a remote attacker to execute arbitrary code via crafted POST request.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/zyx0814/Pichome/issues/24" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisor...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oaooa:pichome:1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "D8DCF0D4-601E-4D83-B57A-2C925B6FFA20", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "434" ]
434
https://github.com/zyx0814/Pichome/issues/24
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "zyx0814", "Pichome" ]
An arbitrary file upload vulnerability in /index.php?mod=pichome&op=user&do=uploadimg.The corresponding file is \dzz\pichome\user.php.It just verified MIME,allows attackers to getshell. ![image](https://github.com/zyx0814/Pichome/assets/42214776/d4d6ea01-93aa-447b-9917-6ede9d0aa467) ![image](https://github.com/zyx081...
Arbitrary File Upload Vulnerability in the version 1.1.01 of Pichome
https://api.github.com/repos/zyx0814/Pichome/issues/24/comments
0
2024-01-19T07:29:28Z
2024-01-19T07:50:14Z
https://github.com/zyx0814/Pichome/issues/24
2,089,824,993
24
5,971
CVE-2023-39683
2024-02-09T07:15:59.960
Cross Site Scripting (XSS) vulnerability in EasyEmail v.4.12.2 and before allows a local attacker to execute arbitrary code via the user input parameter(s). NOTE: Researcher claims issue is present in all versions prior and later than tested version.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/zalify/easy-email/issues/321" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/zalify/easy-email/issues/373" }, { "source": "cve@mitre...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zalify:easy_email:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "3AE6DE32-FDD9-417D-BF21-2B1D1E711406", "versionEndExcluding": null, "versionEndIncluding": "4.12.2", "versionSta...
[ "79" ]
79
https://github.com/zalify/easy-email/issues/321
[ "Issue Tracking" ]
github.com
[ "zalify", "easy-email" ]
Hello 👋 I run a security community that finds and fixes vulnerabilities in OSS. A researcher (@chuayupeng) has found a potential issue, which I would be eager to share with you. Could you add a `SECURITY.md` file with an e-mail address for me to send further details to? GitHub [recommends](https://docs.github.com/en...
Responsible disclosure policy
https://api.github.com/repos/zalify/easy-email-editor/issues/321/comments
2
2023-06-01T10:05:13Z
2023-09-21T12:52:46Z
https://github.com/zalify/easy-email-editor/issues/321
1,735,946,206
321
5,972
CVE-2023-39683
2024-02-09T07:15:59.960
Cross Site Scripting (XSS) vulnerability in EasyEmail v.4.12.2 and before allows a local attacker to execute arbitrary code via the user input parameter(s). NOTE: Researcher claims issue is present in all versions prior and later than tested version.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/zalify/easy-email/issues/321" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/zalify/easy-email/issues/373" }, { "source": "cve@mitre...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zalify:easy_email:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "3AE6DE32-FDD9-417D-BF21-2B1D1E711406", "versionEndExcluding": null, "versionEndIncluding": "4.12.2", "versionSta...
[ "79" ]
79
https://github.com/zalify/easy-email/issues/373
[ "Issue Tracking" ]
github.com
[ "zalify", "easy-email" ]
Hello @m-Ryan, as per the previous issue raised, I have gone ahead to file for a CVE for the issue found here: https://github.com/zalify/easy-email/issues/321 Creating this current issue to highlight the XSS vulnerability in your source code, and to responsibly disclose it. Given that more than half a year has passe...
CVE-2023-39683 DOM XSS on JSON Source Code Panel
https://api.github.com/repos/zalify/easy-email-editor/issues/373/comments
6
2023-12-22T05:11:10Z
2024-01-13T02:32:20Z
https://github.com/zalify/easy-email-editor/issues/373
2,053,392,559
373
5,973
CVE-2024-25447
2024-02-09T15:15:08.967
An issue in the imlib_load_image_with_error_return function of imlib2 v1.9.1 allows attackers to cause a heap buffer overflow via parsing a crafted image.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://git.enlightenment.org/old/legacy-imlib2/issues/20" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisor...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enlightenment:imlib2:1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "56900F1D-B2C3-42AE-A2A8-FE0EFBCA5B17", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ "787" ]
787
https://github.com/derf/feh/issues/709
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "derf", "feh" ]
Hi there We want to share that the latest version (3.10) of feh causes heap-buffer-overflow when executed with a crafted input via argument -l. We assume that the invalid memory access happens due to the improper processing malformed input in imlib_load_image_with_error_return() in spite of the error handling. ...
Heap-buffer-overflow when loading an image in imlib_load_image_with_error_return()
https://api.github.com/repos/derf/feh/issues/709/comments
5
2023-06-12T04:30:15Z
2023-07-30T08:47:24Z
https://github.com/derf/feh/issues/709
1,751,868,382
709
5,974
CVE-2024-25448
2024-02-09T15:15:09.027
An issue in the imlib_free_image_and_decache function of imlib2 v1.9.1 allows attackers to cause a heap buffer overflow via parsing a crafted image.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://git.enlightenment.org/old/legacy-imlib2/issues/20" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisor...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enlightenment:imlib2:1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "56900F1D-B2C3-42AE-A2A8-FE0EFBCA5B17", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ "787" ]
787
https://github.com/derf/feh/issues/711
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "derf", "feh" ]
Hi there. The latest version (3.10) of feh causes memory free of invalid size when executed with a crafted input via argument -l. We suspect that there is no proper size check of the size to be freed or reallocated in the functions of the Imlib2 library called by gib_imlib_free_image_and_decache(). Here is the...
Free with invalid size in the function imlib_free_image_and_decache()
https://api.github.com/repos/derf/feh/issues/711/comments
2
2023-06-12T07:58:18Z
2023-06-21T16:27:52Z
https://github.com/derf/feh/issues/711
1,752,141,466
711
5,975
CVE-2024-25451
2024-02-09T15:15:09.143
Bento4 v1.6.0-640 was discovered to contain an out-of-memory bug via the AP4_DataBuffer::ReallocateBuffer() function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/872" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*", "matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "400" ]
400
https://github.com/axiomatic-systems/Bento4/issues/872
[ "Exploit", "Issue Tracking" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, Thanks for fixing the issue #741, but still there is out-of-memory bug in the latest version (1.6.0-640) of multiple programs because of the function AP4_DataBuffer::ReallocateBuffer() at Ap4DataBuffer.cpp:210. We observed the same bug in mp4info, mp42aac, mp42avc, mp4decrypt, and mp4dump with the same root c...
Out-of-memory bug from AP4_DataBuffer::ReallocateBuffer() in multiple programs (v1.6.0-640)
https://api.github.com/repos/axiomatic-systems/Bento4/issues/872/comments
2
2023-06-12T09:44:14Z
2024-02-17T17:35:35Z
https://github.com/axiomatic-systems/Bento4/issues/872
1,752,341,840
872
5,976
CVE-2024-25452
2024-02-09T15:15:09.193
Bento4 v1.6.0-640 was discovered to contain an out-of-memory bug via the AP4_UrlAtom::AP4_UrlAtom() function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/873" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*", "matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "400" ]
400
https://github.com/axiomatic-systems/Bento4/issues/873
[ "Exploit", "Issue Tracking" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, There is another out-of-memory bug in the latest version (1.6.0-640) of mp4info because of the function AP4_UrlAtom::AP4_UrlAtom() at Ap4UrlAtom.cpp:71. Unlike the issue #771, this vunerability happened in the different function AP4_UrlAtom::AP4_UrlAtom(). Here is the output of program with address saniti...
Out-of-memory bug from AP4_UrlAtom::AP4_UrlAtom() in v1.6.0-640
https://api.github.com/repos/axiomatic-systems/Bento4/issues/873/comments
1
2023-06-12T10:03:27Z
2024-02-20T02:41:04Z
https://github.com/axiomatic-systems/Bento4/issues/873
1,752,379,751
873
5,977
CVE-2024-25453
2024-02-09T15:15:09.240
Bento4 v1.6.0-640 was discovered to contain a NULL pointer dereference via the AP4_StszAtom::GetSampleSize() function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/204" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bent...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*", "matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "476" ]
476
https://github.com/axiomatic-systems/Bento4/issues/204
[ "Exploit", "Issue Tracking" ]
github.com
[ "axiomatic-systems", "Bento4" ]
On master compiled on 2017-09-10 (but please confirm if this affects current stable): ``` # mp4compact $FILE out.mp4 ASAN:DEADLYSIGNAL ================================================================= ==156195==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000060a4b3 bp 0x7ffed6dd9e30 s...
NULL pointer dereference in AP4_StszAtom::GetSampleSize (Ap4StszAtom.cpp)
https://api.github.com/repos/axiomatic-systems/Bento4/issues/204/comments
0
2017-09-15T07:10:24Z
2017-12-17T00:59:26Z
https://github.com/axiomatic-systems/Bento4/issues/204
257,947,117
204
5,978
CVE-2024-25453
2024-02-09T15:15:09.240
Bento4 v1.6.0-640 was discovered to contain a NULL pointer dereference via the AP4_StszAtom::GetSampleSize() function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/204" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bent...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*", "matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "476" ]
476
https://github.com/axiomatic-systems/Bento4/issues/874
[ "Exploit", "Issue Tracking" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, There still exists the null pointer reference bug in the latest version (1.6.0-640) of mp4info by the function AP4_StszAtom::GetSampleSize(). Here is the output of program with address sanitizer attached. ### Bug Report File: major brand: isom minor version: 200 compatible brand: isom ...
NULL pointer reference from AP4_StszAtom::GetSampleSize() in v1.6.0-640
https://api.github.com/repos/axiomatic-systems/Bento4/issues/874/comments
1
2023-06-12T10:08:57Z
2024-02-17T17:33:31Z
https://github.com/axiomatic-systems/Bento4/issues/874
1,752,392,145
874
5,979
CVE-2024-25454
2024-02-09T15:15:09.293
Bento4 v1.6.0-640 was discovered to contain a NULL pointer dereference via the AP4_DescriptorFinder::Test() function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/875" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*", "matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "476" ]
476
https://github.com/axiomatic-systems/Bento4/issues/875
[ "Exploit", "Issue Tracking" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, There still exists the null pointer reference bug in the latest version (1.6.0-640) of mp4info by the function AP4_DescriptorFinder::Test(). Here is the output of program with address sanitizer attached. ### Bug Report File: major brand: isom minor version: 200 compatible brand: isom c...
NULL pointer reference from AP4_DescriptorFinder::Test() in v1.6.0-640
https://api.github.com/repos/axiomatic-systems/Bento4/issues/875/comments
1
2023-06-12T10:12:34Z
2024-02-17T17:30:47Z
https://github.com/axiomatic-systems/Bento4/issues/875
1,752,398,555
875
5,980
CVE-2023-52427
2024-02-11T04:15:08.100
In OpenDDS through 3.27, there is a segmentation fault for a DataWriter with a large value of resource_limits.max_samples. NOTE: the vendor's position is that the product is not designed to handle a max_samples value that is too large for the amount of memory on the system.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/OpenDDS/OpenDDS/issues/4388" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/OpenDDS...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:objectcomputing:opendds:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DE845EB-4121-4281-9997-6B7AD6555F62", "versionEndExcluding": null, "versionEndIncluding": "3.27", "versionStart...
[ "770" ]
770
https://github.com/OpenDDS/OpenDDS/issues/4388
[ "Exploit", "Issue Tracking" ]
github.com
[ "OpenDDS", "OpenDDS" ]
### Expected behavior Process will exit with 0. ### Current behavior Process exited with signal SIGSEGV, Segmentation fault. ### Steps to Reproduce 1. Create Participant, Topic, Publisher with default qos like [this example](https://opendds.readthedocs.io/en/latest-release/devguide/getting_started.html#ge...
Segmentation fault while create_datawriter
https://api.github.com/repos/OpenDDS/OpenDDS/issues/4388/comments
3
2023-12-12T01:43:08Z
2024-01-02T20:55:51Z
https://github.com/OpenDDS/OpenDDS/issues/4388
2,036,823,315
4,388
5,981
CVE-2023-52430
2024-02-12T23:15:08.353
The caddy-security plugin 1.1.20 for Caddy allows reflected XSS via a GET request to a URL that contains an XSS payload and begins with either a /admin or /settings/mfa/delete/ substring.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://github.c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:authcrunch:caddy-security:1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "0DA78C41-C188-45AD-9102-E019F39AC33F", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "79" ]
79
https://github.com/greenpau/caddy-security/issues/264
[ "Issue Tracking", "Vendor Advisory" ]
github.com
[ "greenpau", "caddy-security" ]
_Severity: High_ Reflected XSS occurs when an application includes untrusted data in the HTML response sent to the user’s browser. In this case, the provided` /admin%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E/admin/login` or `/settings/mfa/delete/<img%20src=x%20onerror=alert(document.domain)>` API calls tr...
Reflected Cross-Site Scripting
https://api.github.com/repos/greenpau/caddy-security/issues/264/comments
0
2023-09-19T09:29:44Z
2023-12-02T14:49:00Z
https://github.com/greenpau/caddy-security/issues/264
1,902,573,548
264
5,982
CVE-2024-25407
2024-02-13T01:15:08.470
SteVe v3.6.0 was discovered to use predictable transaction ID's when receiving a StartTransaction request. This vulnerability can allow attackers to cause a Denial of Service (DoS) by using the predicted transaction ID's to terminate other transactions.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/steve-community/steve/issues/1296" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "http...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:steve_project:steve:3.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "52995AEA-4A65-44AB-B065-FB388B746B2B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "331" ]
331
https://github.com/steve-community/steve/issues/1296
[ "Issue Tracking", "Vendor Advisory" ]
github.com
[ "steve-community", "steve" ]
#### Checklist - [x] I checked other issues already, but found no answer/solution - [ ] I checked the documentation and wiki, but found no answer/solution - [ ] I am running the latest version and the issue still occurs - [x] I am sure that this issue is about SteVe (and not about the charging station software or...
Predictable Transaction ID Possible Vulnerability Allows Unauthorized Termination of OCPP Sessions
https://api.github.com/repos/steve-community/steve/issues/1296/comments
4
2023-11-09T18:52:38Z
2023-12-02T22:41:17Z
https://github.com/steve-community/steve/issues/1296
1,986,217,837
1,296
5,983
CVE-2022-48623
2024-02-13T05:15:08.530
The Cpanel::JSON::XS package before 4.33 for Perl performs out-of-bounds accesses in a way that allows attackers to obtain sensitive information or cause a denial of service.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/briandfoy/cpan-security-advisory/blob/9374f98bef51e1ae887f293234050551c079776f/cpansa/CPANSA-Cpanel-JSON-XS.yml#L25-L36" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https:/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rurban:cpanel\\:\\:json\\:\\:xs:*:*:*:*:*:perl:*:*", "matchCriteriaId": "58166818-0306-488E-A452-FAE305E4FD88", "versionEndExcluding": "4.33", "versionEndIncluding": null, "v...
[ "125" ]
125
https://github.com/rurban/Cpanel-JSON-XS/issues/208
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rurban", "Cpanel-JSON-XS" ]
Cpanel::JSON::XS Version 4.32 (I do not know if this is new behaviour, haven't tested older versions): If passed invalid JSON of the form "[{sometext}]" in relaxed mode, the module will only sometimes give the correct character offset, sometimes throw UTF-8 errors, sometimes segfault and sometimes let the process ha...
Bug: Wrong error messages/sometimes crashes or endless loops with invalid JSON in relaxed mode
https://api.github.com/repos/rurban/Cpanel-JSON-XS/issues/208/comments
2
2022-11-16T13:43:13Z
2024-02-13T18:12:00Z
https://github.com/rurban/Cpanel-JSON-XS/issues/208
1,451,633,191
208
5,984
CVE-2023-51931
2024-02-16T09:15:08.247
An issue in alanclarke URLite v.3.1.0 allows an attacker to cause a denial of service (DoS) via a crafted payload to the parsing function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/6en6ar/c792d8337b63f095cbda907e834cb4ba" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/alancla...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alanclarke:urlite:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "3A1B3287-113D-4D8D-A7F6-F37973DF3600", "versionEndExcluding": null, "versionEndIncluding": "3.1.0", "versionStar...
[ "1333" ]
1333
https://github.com/alanclarke/urlite/issues/61
[ "Exploit", "Issue Tracking" ]
github.com
[ "alanclarke", "urlite" ]
The regex inside lib/pattern.js file seems to be vulnerable to Regex denial of service. I used this payload to cause a 17 second delay when a URL is processed by the parse() function. Maybe it can be even longer, probably depends on the length. **'//:' + '\t:\t'.repeat(90000)+ '\t'**
Security issue in regex
https://api.github.com/repos/alanclarke/urlite/issues/61/comments
0
2024-01-22T21:32:48Z
2024-01-22T21:32:48Z
https://github.com/alanclarke/urlite/issues/61
2,094,790,591
61
5,985
CVE-2024-21493
2024-02-17T05:15:08.747
All versions of the package github.com/greenpau/caddy-security are vulnerable to Improper Validation of Array Index when parsing a Caddyfile. Multiple parsing functions in the affected library do not validate whether their input values are nil before attempting to access elements, which can lead to a panic (index out o...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integ...
[ { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/" }, { "source": "report@snyk.io", "tags": [ "Issue Tracking" ], "url": "https://github.com/greenpau/caddy-secur...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:greenpau:caddy-security:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC59AC36-173D-4F24-9F39-50F992A248B8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "129" ]
129
https://github.com/greenpau/caddy-security/issues/263
[ "Issue Tracking" ]
github.com
[ "greenpau", "caddy-security" ]
_Severity: Low_ Multiple parsing functions do not validate whether their input values are nil before attempting to access elements, which can lead to a panic (index out of range). Panics during the parsing of a Caddyfile may introduce ambiguity and vulnerabilities, hindering the correct interpretation and configurat...
Multiple Panics when Parsing Caddyfile
https://api.github.com/repos/greenpau/caddy-security/issues/263/comments
0
2023-09-19T09:24:59Z
2023-12-02T14:48:50Z
https://github.com/greenpau/caddy-security/issues/263
1,902,565,722
263
5,986
CVE-2024-21494
2024-02-17T05:15:09.077
All versions of the package github.com/greenpau/caddy-security are vulnerable to Authentication Bypass by Spoofing via the X-Forwarded-For header due to improper input sanitization. An attacker can spoof an IP address used in the user identity module (/whoami API endpoint). This could lead to unauthorized access if the...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/" }, { "source": "report@snyk.io", "tags": [ "Issue Tracking" ], "url": "https://github.com/greenpau/caddy-secur...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:greenpau:caddy-security:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC59AC36-173D-4F24-9F39-50F992A248B8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "290" ]
290
https://github.com/greenpau/caddy-security/issues/266
[ "Issue Tracking" ]
github.com
[ "greenpau", "caddy-security" ]
_Severity: Medium_ By manipulating the X-Forwarded-For header, an attacker can spoof an IP address used in the user identity module (/whoami API endpoint). This could lead to unauthorized access if the system trusts this spoofed IP address. HTTP request-response cycle with the injected `X-Forwarded-For` header: ...
IP Spoofing via X-Forwarded-For Header
https://api.github.com/repos/greenpau/caddy-security/issues/266/comments
0
2023-09-19T09:37:14Z
2023-12-02T14:29:45Z
https://github.com/greenpau/caddy-security/issues/266
1,902,586,609
266
5,987
CVE-2024-21495
2024-02-17T05:15:09.343
Versions of the package github.com/greenpau/caddy-security before 1.0.42 are vulnerable to Insecure Randomness due to using an insecure random number generation library which could possibly be predicted via a brute-force search. Attackers could use the potentially predictable nonce value used for authentication purpose...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/" }, { "source": "report@snyk.io", "tags": [ "Issue Tracking" ], "url": "https://github.com/greenpau/caddy-secur...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:greenpau:caddy-security:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E38C1D1-8679-4D77-858C-E2DCDAC2440C", "versionEndExcluding": "1.0.42", "versionEndIncluding": null, "versionSta...
[ "330" ]
330
https://github.com/greenpau/caddy-security/issues/265
[ "Issue Tracking" ]
github.com
[ "greenpau", "caddy-security" ]
_Severity: High_ The caddy-security plugin uses the math/rand Golang library with a seed based on the Unix timestamp to generate strings for three security-critical contexts in the application, which could possibly be predicted via a brute-force search. Attackers could use the potentially predictable nonce value use...
Insecure Randomness
https://api.github.com/repos/greenpau/caddy-security/issues/265/comments
6
2023-09-19T09:34:06Z
2023-12-09T14:47:04Z
https://github.com/greenpau/caddy-security/issues/265
1,902,581,538
265
5,988
CVE-2024-21497
2024-02-17T05:15:09.863
All versions of the package github.com/greenpau/caddy-security are vulnerable to Open Redirect via the redirect_url parameter. An attacker could perform a phishing attack and trick users into visiting a malicious website by crafting a convincing URL with this parameter. To exploit this vulnerability, the user must take...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "report@snyk.io", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/" }, { "source": "report@snyk.io", "tags": [ "Issue Tracking" ], "url": "https://github.com/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:greenpau:caddy-security:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC59AC36-173D-4F24-9F39-50F992A248B8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "601" ]
601
https://github.com/greenpau/caddy-security/issues/268
[ "Issue Tracking" ]
github.com
[ "greenpau", "caddy-security" ]
When a logged-in user clicks on a specially crafted link with a `redirect_url` parameter, the user can be redirected to an external website. The user must take an action, such as clicking on a portal button or using the browser’s back button, to trigger the redirection. This could lead to phishing attacks, where an att...
Open Redirection Vulnerability
https://api.github.com/repos/greenpau/caddy-security/issues/268/comments
3
2023-09-19T09:53:46Z
2024-07-24T10:23:04Z
https://github.com/greenpau/caddy-security/issues/268
1,902,619,338
268
5,989
CVE-2024-21499
2024-02-17T05:15:10.400
All versions of the package github.com/greenpau/caddy-security are vulnerable to HTTP Header Injection via the X-Forwarded-Proto header due to redirecting to the injected protocol.Exploiting this vulnerability could lead to bypass of security mechanisms or confusion in handling TLS.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/" }, { "source": "report@snyk.io", "tags": [ "Issue Tracking" ], "url": "https://github.com/greenpau/caddy-secur...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:greenpau:caddy-security:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC59AC36-173D-4F24-9F39-50F992A248B8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "116" ]
116
https://github.com/greenpau/caddy-security/issues/270
[ "Issue Tracking" ]
github.com
[ "greenpau", "caddy-security" ]
_Severity: Low_ The processing of the X-Forwarded-Proto header results in redirection to the injected protocol. While this scenario may have limited impact, improper handling of such headers could result in unpredictable security risks, such as bypass of security mechanisms or confusion in handling TLS. ```http ...
X-Forwarded-Proto Header Manipulation
https://api.github.com/repos/greenpau/caddy-security/issues/270/comments
0
2023-09-19T10:04:09Z
2023-12-02T14:28:13Z
https://github.com/greenpau/caddy-security/issues/270
1,902,637,888
270
5,990
CVE-2024-25898
2024-02-21T18:15:51.820
A XSS vulnerability was found in the ChurchCRM v.5.5.0 functionality, edit your event, where malicious JS or HTML code can be inserted in the Event Sermon field in EventEditor.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ChurchCRM/CRM/issues/6851" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ChurchCRM...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:churchcrm:churchcrm:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "1FEB8DD0-3ADC-4C06-84DF-9296533BFBD7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "79" ]
79
https://github.com/ChurchCRM/CRM/issues/6851
[ "Exploit", "Issue Tracking" ]
github.com
[ "ChurchCRM", "CRM" ]
If you have the ChurchCRM software running, please file an issue using the Report an issue in the help menu. On what page in the application did you find this issue? EventEditor.php On what type of server is this running? Dedicated / Shared hosting? Linux / Windows? Linux What browser (and version) are you r...
Security Bug: SELF XSS - Event Editor
https://api.github.com/repos/ChurchCRM/CRM/issues/6851/comments
2
2024-02-10T14:07:57Z
2024-06-12T13:16:53Z
https://github.com/ChurchCRM/CRM/issues/6851
2,128,477,169
6,851
5,991
CVE-2024-26151
2024-02-22T19:15:09.300
The `mjml` PyPI package, found at the `FelixSchwarz/mjml-python` GitHub repo, is an unofficial Python port of MJML, a markup language created by Mailjet. All users of `FelixSchwarz/mjml-python` who insert untrusted data into mjml templates unless that data is checked in a very strict manner. User input like `&lt;script...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrit...
[ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/FelixSchwarz/mjml-python/commit/84c495da20a91640a1ca551ace17df7f3be644aa" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/Fel...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:felixschwarz:mjml-python:0.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "0C7B3A43-C31C-4105-8FC7-6220776CE487", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "79" ]
79
https://github.com/FelixSchwarz/mjml-python/issues/52
[ "Exploit", "Issue Tracking" ]
github.com
[ "FelixSchwarz", "mjml-python" ]
Consider: ```python from mjml import mjml_to_html result = mjml_to_html(""" <mjml> <mj-body> <mj-text> Pretty unsafe: &lt;script&gt; </mj-text> </mj-body> </mjml>""") print(result["html"]) ``` In the resulting HTML output, the formerly HTML-escaped `<` (`&lt;`) and `>` (`&gt`) are...
Escaped HTML tags are "un-escaped" when rendering HTML
https://api.github.com/repos/FelixSchwarz/mjml-python/issues/52/comments
8
2024-02-19T13:58:40Z
2024-02-22T16:46:22Z
https://github.com/FelixSchwarz/mjml-python/issues/52
2,142,438,119
52
5,992
CVE-2024-22201
2024-02-26T16:27:56.343
Jetty is a Java based web server and servlet engine. An HTTP/2 SSL connection that is established and TCP congested will be leaked when it times out. An attacker can cause many connections to end up in this state, and the server may run out of file descriptors, eventually causing the server to stop accepting new connec...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "security-advisories@github.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2024/03/20/2" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*", "matchCriteriaId": "81569DC0-AF55-4626-9C18-E28CE3C59946", "versionEndExcluding": "9.4.54", "versionEndIncluding": null, "versionStartExcludin...
[ "770" ]
770
https://github.com/jetty/jetty.project/issues/11256
[ "Issue Tracking" ]
github.com
[ "jetty", "jetty.project" ]
**Jetty version(s)** Jetty 9.4.48.v20220622 **Jetty Environment** <!-- Applicable for jetty-12 only, choose: core, ee8, ee9, ee10 --> **Java version/vendor** `(use: java -version)` JDK8 **OS type/version** suse 12.5 **Description** 4.252.83.81 is client 11.19.120.119 is server when the server send the ...
the ssl connection can not be closed when the status is NEED_UNWRAP
https://api.github.com/repos/jetty/jetty.project/issues/11256/comments
12
2024-01-09T09:27:26Z
2024-01-11T15:52:34Z
https://github.com/jetty/jetty.project/issues/11256
2,071,964,666
11,256
5,993
CVE-2024-27088
2024-02-26T17:15:11.000
es5-ext contains ECMAScript 5 extensions. Passing functions with very long names or complex default argument names into `function#copy` or `function#toStringTokens` may cause the script to stall. The vulnerability is patched in v0.10.63.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 0, "baseSeverity": "NONE", "confidentialityImpact": "NONE", "integrityI...
[ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/medikoo/es5-ext/commit/3551cdd7b2db08b1632841f819d008757d28e8e2" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/medikoo/es5-...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:medikoo:es5-ext:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "B05B11A7-0D8E-4AA2-8332-266A0C3483F1", "versionEndExcluding": "0.10.63", "versionEndIncluding": null, "versionStar...
[ "1333" ]
1333
https://github.com/medikoo/es5-ext/issues/201
[ "Exploit", "Issue Tracking" ]
github.com
[ "medikoo", "es5-ext" ]
Test Environment: Apple M1 macbook air, 2020 (ventura 13.3.1) node module name : es5-ext node js version : v18.16.0 2023_09_26 이동하 ( Lee Dong Ha of ZeroPointer Lab ) 강성현    ( kang seonghyeun ) 박성진    ( sungjin park ) 김찬호    ( Chanho Kim ) 이수영    ( Lee Su Young ) 김민욱    ( MinUk Kim ) ...
redos in es5-ext
https://api.github.com/repos/medikoo/es5-ext/issues/201/comments
24
2023-09-26T01:10:19Z
2024-02-26T09:04:36Z
https://github.com/medikoo/es5-ext/issues/201
1,912,511,313
201
5,994
CVE-2024-23052
2024-02-29T01:44:07.820
An issue in WuKongOpenSource WukongCRM v.72crm_9.0.1_20191202 allows a remote attacker to execute arbitrary code via the parseObject() function in the fastjson component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/By-Yexing/Vulnerability_JAVA/blob/main/2024/WukongCRM_9.0.md#1remote-code-execution-vulnerability" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Trackin...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:5kcrm:wukongcrm:9.0.1_20191202:*:*:*:*:*:*:*", "matchCriteriaId": "41B29C6B-E591-4FC4-8D6C-C1C455EFF800", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "502" ]
502
https://github.com/WuKongOpenSource/WukongCRM-9.0-JAVA/issues/28
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "WuKongOpenSource", "WukongCRM-9.0-JAVA" ]
In version 72crm_9.0.1_20191202, insecure components are used, which causes potential remote command execution. Attackers can directly attack the system without authorization. An insecure version of the fastjson component was used ![1704856112485](https://github.com/WuKongOpenSource/WukongCRM-9.0-JAVA/assets/10780652...
Remote command execution vulnerability
https://api.github.com/repos/WuKongOpenSource/WukongCRM-9.0-JAVA/issues/28/comments
1
2024-01-10T03:58:43Z
2024-01-10T04:01:11Z
https://github.com/WuKongOpenSource/WukongCRM-9.0-JAVA/issues/28
2,073,540,232
28
5,995