cve_id stringlengths 13 16 | cve_published stringdate 2019-01-01 16:29:00 2025-02-25 20:15:37 | cve_descriptions stringlengths 34 2.6k | cve_metrics dict | cve_references listlengths 1 281 | cve_configurations listlengths 1 70 | cve_cwe_list listlengths 1 1 | cve_primary_cwe stringclasses 164
values | url stringlengths 36 97 | cve_tags listlengths 1 5 ⌀ | domain stringclasses 1
value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 198k ⌀ | issue_title stringlengths 1 335 | issue_comments_url stringlengths 55 116 | issue_comments_count int64 0 338 | issue_created_at stringdate 2012-06-06 09:34:24 2025-04-02 09:37:20 | issue_updated_at stringdate 2014-04-01 20:16:21 2025-06-16 12:26:58 | issue_html_url stringlengths 36 97 | issue_github_id int64 4.93M 2.97B | issue_number int64 1 199k | __index_level_0__ int64 0 6.55k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2023-51252 | 2024-01-10T09:15:44.340 | PublicCMS 4.0 is vulnerable to Cross Site Scripting (XSS). Because files can be uploaded and online preview function is provided, pdf files and html files containing malicious code are uploaded, an XSS popup window is realized through online viewing. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/sanluan/PublicCMS/issues/79"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/sanluan... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:publiccms:publiccms:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DA4CCE59-6A71-4BC4-86D4-3110B04C1082",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"79"
] | 79 | https://github.com/sanluan/PublicCMS/issues/79 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"sanluan",
"PublicCMS"
] | 1.Vulnerability description
Because files can be uploaded and online preview function is provided, pdf files and html files containing malicious code are uploaded, and xss popup window is realized through online viewing
2.Vulnerability exploitation process
Function point:
Development - Website file management - U... | There is an xss vulnerability caused by file uploads in PublicCMS V4.0 | https://api.github.com/repos/sanluan/PublicCMS/issues/79/comments | 2 | 2023-12-15T07:30:41Z | 2023-12-15T08:52:18Z | https://github.com/sanluan/PublicCMS/issues/79 | 2,043,057,805 | 79 | 5,895 |
CVE-2023-52064 | 2024-01-10T21:15:09.180 | Wuzhicms v4.1.0 was discovered to contain a SQL injection vulnerability via the $keywords parameter at /core/admin/copyfrom.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/n0Sleeper/544b38c95715b13efadab329692c8aea"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/wuzhicms/wuzhicms/iss... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wuzhicms:wuzhi_cms:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4749403-9C42-40DF-A695-A9E31BD37D84",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"89"
] | 89 | https://github.com/wuzhicms/wuzhicms/issues/208 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"wuzhicms",
"wuzhicms"
] | ### Vulnerable file
`/coreframe/app/core/admin/copyfrom.php` `22-37`
```
public function listing() {
$siteid = get_cookie('siteid');
$page = isset($GLOBALS['page']) ? intval($GLOBALS['page']) : 1;
$page = max($page,1);
if(isset($GLOBALS['keywords'])) {
$keywords = $GL... | Wuzhicms v4.1.0/coreframe/app/core/admin/copyfrom.php hava a SQL Injection Vulnerability casused by listing() | https://api.github.com/repos/wuzhicms/wuzhicms/issues/208/comments | 0 | 2023-12-25T14:02:10Z | 2023-12-25T14:04:59Z | https://github.com/wuzhicms/wuzhicms/issues/208 | 2,055,704,891 | 208 | 5,896 |
CVE-2023-52274 | 2024-01-11T03:15:10.843 | member/index/register.html in YzmCMS 6.5 through 7.0 allows XSS via the Referer HTTP header. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/yzmcms/yzmcms/issues/65"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/yzmcms/yzmcms/tags"
},
{
"source": "af854a3a-2127-... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yzmcms:yzmcms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A6DD9CD8-B8DA-4454-81A7-91D18DA1E1BD",
"versionEndExcluding": null,
"versionEndIncluding": "7.0",
"versionStartExcluding":... | [
"79"
] | 79 | https://github.com/yzmcms/yzmcms/issues/65 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"yzmcms",
"yzmcms"
] | 1、利用前提:开启调试模式,APP_DEBUG为true
Usage prerequisite: Enable debugging mode and set APP_DEBUG to true
2、若管理员未开启会员注册,访问 member/index/register.html
if the administrator has not open membership registration, access to the member/index/register.html
 in spite of the error handling.
Here is the output of progra... | Heap-buffer-overflow when processing an png file in png_read_chunk() | https://api.github.com/repos/swftools/swftools/issues/202/comments | 1 | 2023-07-01T08:50:15Z | 2023-09-06T08:36:00Z | https://github.com/swftools/swftools/issues/202 | 1,783,702,020 | 202 | 5,898 |
CVE-2022-4958 | 2024-01-11T12:15:42.767 | A vulnerability classified as problematic has been found in qkmc-rk redbbs 1.0. Affected is an unknown function of the component Post Handler. The manipulation of the argument title leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/qkmc-rk/redbbs/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.250236"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:qkmc-rk:redbbs:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "32FA7E12-C02B-4209-B181-395F66D654D7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"79"
] | 79 | https://github.com/qkmc-rk/redbbs/issues/1 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"qkmc-rk",
"redbbs"
] | The foreground post function module modifies the existence of storage XSS at the post
Therefore, when Posting with a title that contains xss payload, only browsing is affected by xss
Register a new test user
; </script>
 {
char buff[128] =... | MemIOCallback::read has a integer overflow bug | https://api.github.com/repos/Matroska-Org/libebml/issues/147/comments | 1 | 2023-11-01T06:27:46Z | 2023-11-04T09:53:44Z | https://github.com/Matroska-Org/libebml/issues/147 | 1,971,784,738 | 147 | 5,901 |
CVE-2022-4960 | 2024-01-12T03:15:08.683 | A vulnerability, which was classified as problematic, has been found in cloudfavorites favorites-web 1.3.0. Affected by this issue is some unknown functionality of the component Nickname Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the p... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/cloudfavorites/favorites-web/issues/127"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.250238"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:favorites-web_project:favorites-web:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EA6820ED-A192-4723-8DEA-F30271C86F9C",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"79"
] | 79 | https://github.com/cloudfavorites/favorites-web/issues/127 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"cloudfavorites",
"favorites-web"
] | favorites-web has a stored-type XSS flaw that allows you to register user nicknames for XSSpayload, such as <script>alert('hello, SB! '); </script>, register a new user with the payload, and then comment,

| favorites- Stored XSS defect in web, | https://api.github.com/repos/cloudfavorites/favorites-web/issues/127/comments | 0 | 2022-12-22T10:59:06Z | 2022-12-22T10:59:06Z | https://github.com/cloudfavorites/favorites-web/issues/127 | 1,507,663,486 | 127 | 5,902 |
CVE-2022-48620 | 2024-01-12T04:15:08.123 | uev (aka libuev) before 2.4.1 has a buffer overflow in epoll_wait if maxevents is a large number. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/troglobit/libuev/commit/2d9f1c9ce655cc38511aeeb6e95ac30914f7aec9"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes"
],
"url": "https://github.com/troglobit/libuev/compare/v2.4.0...v2.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:troglobit:libeuv:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BFF2C023-36E0-4067-8541-A9B49FF7361B",
"versionEndExcluding": "2.4.1",
"versionEndIncluding": null,
"versionStartExclud... | [
"120"
] | 120 | https://github.com/troglobit/libuev/issues/27 | [
"Issue Tracking"
] | github.com | [
"troglobit",
"libuev"
] | In functions `uev_run`, the variable `ee` is declared to be an array of `struct epoll_event` with size `UEV_MAX_EVENTS`. This buffer is used in a call to `epoll_wait` with its `maxevent` parameter set to `ctx->maxevents`.
It may be that the intent is that ctx->maxevents can not be bigger than `UEV_MAX_EVENTS`, but ... | Possible event buffer overrun | https://api.github.com/repos/troglobit/libuev/issues/27/comments | 1 | 2022-12-17T11:44:21Z | 2022-12-17T14:04:43Z | https://github.com/troglobit/libuev/issues/27 | 1,501,352,045 | 27 | 5,903 |
CVE-2023-51790 | 2024-01-12T13:15:11.733 | Cross Site Scripting vulnerability in piwigo v.14.0.0 allows a remote attacker to obtain sensitive information via the lang parameter in the Admin Tools plug-in component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/Piwigo/AdminTools/issues/21"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:piwigo:piwigo:14.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DF997677-CC8C-40D2-BAA6-EF1374DC731F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"79"
] | 79 | https://github.com/Piwigo/AdminTools/issues/21 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"Piwigo",
"AdminTools"
] | ### **Summary**
A reflected cross-site scripting (XSS) vulnerability has been discovered in the "ato_lang" parameter. This vulnerability can be exploited by an attacker to inject malicious HTML and JS code into the HTML page, which could then be executed by webmaster or administrators when they visit the URL with the... | piwigo v14.0.0 has a reflected XSS vulnerability | https://api.github.com/repos/Piwigo/AdminTools/issues/21/comments | 0 | 2023-12-18T04:03:44Z | 2024-06-06T09:48:54Z | https://github.com/Piwigo/AdminTools/issues/21 | 2,054,769,328 | 21 | 5,904 |
CVE-2023-51790 | 2024-01-12T13:15:11.733 | Cross Site Scripting vulnerability in piwigo v.14.0.0 allows a remote attacker to obtain sensitive information via the lang parameter in the Admin Tools plug-in component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/Piwigo/AdminTools/issues/21"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:piwigo:piwigo:14.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DF997677-CC8C-40D2-BAA6-EF1374DC731F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"79"
] | 79 | https://github.com/Piwigo/Piwigo/issues/2069 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"Piwigo",
"Piwigo"
] | ### **Summary**
A reflected cross-site scripting (XSS) vulnerability has been discovered in the "ato_lang" parameter. This vulnerability can be exploited by an attacker to inject malicious HTML and JS code into the HTML page, which could then be executed by webmaster or administrators when they visit the URL with the... | piwigo v14.0.0 has a reflected XSS vulnerability | https://api.github.com/repos/Piwigo/AdminTools/issues/21/comments | 0 | 2023-12-18T04:03:44Z | 2024-06-06T09:48:54Z | https://github.com/Piwigo/AdminTools/issues/21 | 2,054,769,328 | 21 | 5,905 |
CVE-2022-4962 | 2024-01-12T22:15:44.877 | A vulnerability was found in Apollo 2.0.0/2.0.1 and classified as problematic. Affected by this issue is some unknown functionality of the file /users of the component Configuration Center. The manipulation leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed to the publi... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/apolloconfig/apollo/issues/4684"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apolloconfig:apollo:2.0.0:-:*:*:*:*:*:*",
"matchCriteriaId": "2FEAB0BE-294C-4E3F-9FFB-3E841F14B82B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"285"
] | 285 | https://github.com/apolloconfig/apollo/issues/4684 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"apolloconfig",
"apollo"
] | Apollo V2.0.0, V2.0.1 Unauthorized access vulnerability exists in the configuration center. This vulnerability is caused by the failure to perform proper permission verification on some interfaces in the administrator tool of the configuration center. As a result, common users with low permission can access these inter... | Apollo V2.0.0, V2.0.1 Unauthorized access vulnerability | https://api.github.com/repos/apolloconfig/apollo/issues/4684/comments | 4 | 2022-12-20T13:00:18Z | 2023-01-27T21:54:13Z | https://github.com/apolloconfig/apollo/issues/4684 | 1,504,523,089 | 4,684 | 5,906 |
CVE-2023-51804 | 2024-01-13T02:15:07.257 | An issue in rymcu forest v.0.02 allows a remote attacker to obtain sensitive information via manipulation of the HTTP body URL in the com.rymcu.forest.web.api.common.UploadController file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/rymcu/forest/issues/149"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"P... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rymcu:forest:0.02:*:*:*:*:*:*:*",
"matchCriteriaId": "D7E2A207-8139-4AD2-840D-80DC0532F40E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"918"
] | 918 | https://github.com/rymcu/forest/issues/149 | [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"rymcu",
"forest"
] | ## 1. Steps to reproduce (复现步骤)
### 1.1 Pull the latest code and set up a test environment(拉取最新代码,搭建测试环境)
Register a user using the system's registration function (使用系统的注册功能,注册一个用户)

### 1.2 Construct a request using the t... | Server-side-request-forgery (SSRF) vulnerability allow registered users to Vulnerability in com.rymcu.forest.web.api.common.UploadController(UploadControlle.java存在ssrf漏洞) | https://api.github.com/repos/rymcu/forest/issues/149/comments | 6 | 2023-12-18T09:14:50Z | 2024-01-17T01:43:40Z | https://github.com/rymcu/forest/issues/149 | 2,046,124,585 | 149 | 5,907 |
CVE-2023-51805 | 2024-01-13T02:15:07.303 | SQL Injection vulnerability in TDuckCLoud tduck-platform v.4.0 allows a remote attacker to obtain sensitive information via the getFormKey parameter in the search function of FormDataMysqlService.java file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/TDuckCloud/tduck-platform/issues/22"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Trackin... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tduckcloud:tduck-platform:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BB4EF1A5-DC74-4333-B8F8-92B85275839C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"89"
] | 89 | https://github.com/TDuckCloud/tduck-platform/issues/22 | [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"TDuckCloud",
"tduck-platform"
] | ## 1.Steps to reproduce (复现步骤)
### 1.Use the demo environment on the official website for authentication (`https://demo.tduckapp.com/project`) and register a user using the registration function (1b7pl_dp@linshiyouxiang.net/123456) (使用官网的demo环境进行验证(`https://demo.tduckapp.com/project`),使用注册功能注册一个用户(1b7pl_dp@linshiyouxi... | [vulnerability] Back-office management statistics function sql injection in FormDataMysqlService.java (FormDataMysqlService.java 存在后管SQL注入漏洞) | https://api.github.com/repos/TDuckCloud/tduck-platform/issues/22/comments | 0 | 2023-12-19T12:18:29Z | 2025-03-16T02:23:45Z | https://github.com/TDuckCloud/tduck-platform/issues/22 | 2,048,546,424 | 22 | 5,908 |
CVE-2023-43449 | 2024-01-16T02:15:28.420 | An issue in HummerRisk HummerRisk v.1.10 thru 1.4.1 allows an authenticated attacker to execute arbitrary code via a crafted request to the service/LicenseService component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/HummerRisk/HummerRisk/issues/446"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Hu... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hummerrisk:hummerrisk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0086E3E1-F2CB-4CDA-9D18-D658B50E70E0",
"versionEndExcluding": null,
"versionEndIncluding": "1.4.1",
"versionStartE... | [
"94"
] | 94 | https://github.com/HummerRisk/HummerRisk/issues/446 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"HummerRisk",
"HummerRisk"
] | **漏洞影响范围**
v1.1.0-最新版(v1.4.1)
**运行方式(安装包运行 or 源码运行 ?)**
安装包
**严重程度(高、中、低)**
高
**漏洞详情**
漏洞主要位于
`HummerRisk/HummerRisk/hummer-modules/hummer-system/src/main/java/com/hummer/system/service/LicenseService#validateLicense`方法将用户上传的文件内容拼接至验证许可证的命令中。
: x.x.x
* OS: osx/linux/win
* Python Version (output of `python --version`):
### What's your issue about?
tracking issue for https://github.com/vyperlang/vyper/security/advisories/GHSA-2q8v-3gqq-4f8p
### How can it be fixed?
Fill this... | concat builtin can overrun memory | https://api.github.com/repos/vyperlang/vyper/issues/3737/comments | 0 | 2024-01-18T16:14:44Z | 2024-01-18T18:08:04Z | https://github.com/vyperlang/vyper/issues/3737 | 2,088,619,961 | 3,737 | 5,912 |
CVE-2024-22424 | 2024-01-19T01:15:09.317 | Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. The Argo CD API prior to versions 2.10-rc2, 2.9.4, 2.8.8, and 2.7.15 are vulnerable to a cross-server request forgery (CSRF) attack when the attacker has the ability to write HTML to a page on the same parent domain as Argo CD. A CSRF attack work... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integ... | [
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/argoproj/argo-cd/issues/2496"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://gi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8CED13D7-50A9-4645-9D05-29C9F0DE1968",
"versionEndExcluding": "2.8.8",
"versionEndIncluding": null,
"versionStartExclud... | [
"352"
] | 352 | https://github.com/argoproj/argo-cd/issues/2496 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"argoproj",
"argo-cd"
] | **Describe the bug**
Currently, argocd does not provide CSRF protection. When users log in the UI, a malicious script could be executed on behalf of user
**To Reproduce**
1. Expose argocd through load-balancer
2. Create an application
3. Paste the following in html file
```
<HTML>
<HEAD>
... | ArgoCD does not provide CSRF protection | https://api.github.com/repos/argoproj/argo-cd/issues/2496/comments | 7 | 2019-10-14T11:13:14Z | 2024-01-16T18:54:15Z | https://github.com/argoproj/argo-cd/issues/2496 | 506,588,108 | 2,496 | 5,913 |
CVE-2024-22562 | 2024-01-19T15:15:09.463 | swftools 0.9.2 was discovered to contain a Stack Buffer Underflow via the function dict_foreach_keyvalue at swftools/lib/q.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/210"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"T... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"787"
] | 787 | https://github.com/matthiaskramm/swftools/issues/210 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | # project
https://github.com/matthiaskramm/swftools
version:0.9.2
# os info
Ubuntu18.04 TLS
# poc
[poc.zip](https://github.com/matthiaskramm/swftools/files/13785772/poc.zip)
# build
git clone https://github.com/matthiaskramm/swftools.git
cd swftools
./configure --disable-shared && make
/swftools/src/swfc ./p... | stack-buffer-underflow exists in the function dict_foreach_keyvalue in swftools/lib/q.c | https://api.github.com/repos/swftools/swftools/issues/210/comments | 0 | 2023-12-28T11:52:17Z | 2024-01-10T03:23:59Z | https://github.com/swftools/swftools/issues/210 | 2,058,345,861 | 210 | 5,914 |
CVE-2024-22563 | 2024-01-19T15:15:09.513 | openvswitch 2.17.8 was discovered to contain a memory leak via the function xmalloc__ in openvswitch-2.17.8/lib/util.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/openvswitch/ovs-issues/issues/315"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/openvswitch/ovs-issues/issues/315"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openvswitch:openvswitch:2.17.8:*:*:*:*:*:*:*",
"matchCriteriaId": "67FDBB4C-C2FE-47C6-A0A1-CDCAE3CA8846",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"401"
] | 401 | https://github.com/openvswitch/ovs-issues/issues/315 | [
"Issue Tracking"
] | github.com | [
"openvswitch",
"ovs-issues"
] | # project
https://www.openvswitch.org/download/
version:2.17.8
# os info
Ubuntu18.04 TLS
# poc
[poc.zip](https://github.com/openvswitch/ovs-issues/files/13786555/poc.zip)
# build
wget https://www.openvswitch.org/releases/openvswitch-2.17.8.tar.gz
./configure CFLAGS="-g -O2 -fno-omit-frame-pointer -fno-common"
... | memory leak exists in the function ovs_pcap_open | https://api.github.com/repos/openvswitch/ovs-issues/issues/315/comments | 6 | 2023-12-28T12:45:15Z | 2024-01-29T13:13:42Z | https://github.com/openvswitch/ovs-issues/issues/315 | 2,058,395,797 | 315 | 5,915 |
CVE-2024-22920 | 2024-01-19T15:15:09.560 | swftools 0.9.2 was discovered to contain a heap-use-after-free via the function bufferWriteData in swftools/lib/action/compile.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/211"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"T... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"416"
] | 416 | https://github.com/matthiaskramm/swftools/issues/211 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | # project
https://github.com/matthiaskramm/swftools
version 0.9.2
# os info
Ubuntu18.04 TLS
# poc
[poc.zip](https://github.com/matthiaskramm/swftools/files/13786202/poc.zip)
# build
git clone https://github.com/matthiaskramm/swftools.git
cd swftools
./configure --disable-shared && make
./swftools/src/swfc ./... | heap-use-after-free exists in the function bufferWriteData in swftools/lib/action/compile.c:223 | https://api.github.com/repos/swftools/swftools/issues/211/comments | 1 | 2023-12-28T12:06:28Z | 2024-12-02T11:46:34Z | https://github.com/swftools/swftools/issues/211 | 2,058,359,151 | 211 | 5,916 |
CVE-2024-22911 | 2024-01-19T18:15:08.680 | A stack-buffer-underflow vulnerability was found in SWFTools v0.9.2, in the function parseExpression at src/swfc.c:2602. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/216"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"787"
] | 787 | https://github.com/matthiaskramm/swftools/issues/216 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | # Summary
A stack-buffer-overflow caused when using swfc.
# Version
```
$ ./swfc -V
swfc - part of swftools 0.9.2
$ git log --oneline -1
772e55a2 (HEAD, origin/master, origin/HEAD, master)
```
# Platform
```
$ uname -a
Linux 1cc373898f58 5.4.0-150-generic #167~18.04.1-Ubuntu SMP Wed May 24 00:51:42 UTC 2023... | stack-buffer-overflow exit in parseExpression at src/swfc.c:2602 | https://api.github.com/repos/swftools/swftools/issues/216/comments | 0 | 2024-01-10T13:04:05Z | 2024-01-11T06:44:59Z | https://github.com/swftools/swftools/issues/216 | 2,074,336,039 | 216 | 5,917 |
CVE-2024-22912 | 2024-01-19T18:15:08.723 | A global-buffer-overflow was found in SWFTools v0.9.2, in the function countline at swf5compiler.flex:327. It allows an attacker to cause code execution. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/212"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"120"
] | 120 | https://github.com/matthiaskramm/swftools/issues/212 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | # Summary
A global-buffer-overflow caused when using swfc.
# Version
```
$ ./swfc -V
swfc - part of swftools 0.9.2
$ git log --oneline -1
772e55a2 (HEAD, origin/master, origin/HEAD, master)
```
# Platform
```
$ uname -a
Linux 1cc373898f58 5.4.0-150-generic #167~18.04.1-Ubuntu SMP Wed May 24 00:51:42 UTC 202... | global-buffer-overflow exists in countline() at lib/swf5compiler.flex:327 | https://api.github.com/repos/swftools/swftools/issues/212/comments | 0 | 2024-01-10T12:20:57Z | 2024-01-11T06:47:20Z | https://github.com/swftools/swftools/issues/212 | 2,074,257,410 | 212 | 5,918 |
CVE-2024-22913 | 2024-01-19T18:15:08.767 | A heap-buffer-overflow was found in SWFTools v0.9.2, in the function swf5lex at lex.swf5.c:1321. It allows an attacker to cause code execution. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/213"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"787"
] | 787 | https://github.com/matthiaskramm/swftools/issues/213 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | # Summary
A heap-buffer-overflow caused when using swfc, which results in out-of-bounds write.
# Version
```
$ ./swfc -V
swfc - part of swftools 0.9.2
$ git log --oneline -1
772e55a2 (HEAD, origin/master, origin/HEAD, master)
```
# Platform
```
$ uname -a
Linux 1cc373898f58 5.4.0-150-generic #167~18.04.1-Ub... | heap-buffer-overflow exit in swf5lex() at lib/lex.swf5.c:1321 | https://api.github.com/repos/swftools/swftools/issues/213/comments | 1 | 2024-01-10T12:41:19Z | 2024-10-11T15:06:09Z | https://github.com/swftools/swftools/issues/213 | 2,074,294,602 | 213 | 5,919 |
CVE-2024-22914 | 2024-01-19T18:15:08.807 | A heap-use-after-free was found in SWFTools v0.9.2, in the function input at lex.swf5.c:2620. It allows an attacker to cause denial of service. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/214"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"416"
] | 416 | https://github.com/matthiaskramm/swftools/issues/214 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | # Summary
A heap-use-after-free caused when using swfc.
# Version
```
$ ./swfc -V
swfc - part of swftools 0.9.2
$ git log --oneline -1
772e55a2 (HEAD, origin/master, origin/HEAD, master)
```
# Platform
```
$ uname -a
Linux 1cc373898f58 5.4.0-150-generic #167~18.04.1-Ubuntu SMP Wed May 24 00:51:42 UTC 2023 x... | heap-use-after-free exit in input() at lib/lex.swf5.c:2620 | https://api.github.com/repos/swftools/swftools/issues/214/comments | 0 | 2024-01-10T12:47:45Z | 2024-01-11T06:46:39Z | https://github.com/swftools/swftools/issues/214 | 2,074,305,829 | 214 | 5,920 |
CVE-2024-22915 | 2024-01-19T18:15:08.847 | A heap-use-after-free was found in SWFTools v0.9.2, in the function swf_DeleteTag at rfxswf.c:1193. It allows an attacker to cause code execution. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/215"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"416"
] | 416 | https://github.com/matthiaskramm/swftools/issues/215 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | # Summary
A heap-use-after-free caused when using swfc, which results in out-of-bounds write.
# Version
```
$ ./swfc -V
swfc - part of swftools 0.9.2
$ git log --oneline -1
772e55a2 (HEAD, origin/master, origin/HEAD, master)
```
# Platform
```
$ uname -a
Linux 1cc373898f58 5.4.0-150-generic #167~18.04.1-Ubu... | heap-use-after-free exit in swf_DeleteTag() at lib/rfxswf.c:1193 | https://api.github.com/repos/swftools/swftools/issues/215/comments | 0 | 2024-01-10T12:59:20Z | 2024-01-11T06:45:39Z | https://github.com/swftools/swftools/issues/215 | 2,074,326,548 | 215 | 5,921 |
CVE-2024-22919 | 2024-01-19T18:15:08.950 | swftools0.9.2 was discovered to contain a global-buffer-overflow vulnerability via the function parseExpression at swftools/src/swfc.c:2587. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/209"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"120"
] | 120 | https://github.com/matthiaskramm/swftools/issues/209 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | # project
https://github.com/matthiaskramm/swftools
version:0.9.2
# os info
Ubuntu20.04 TLS
# poc
[poc.zip](https://github.com/matthiaskramm/swftools/files/13783540/poc.zip)
# build
git clone https://github.com/matthiaskramm/swftools.git
cd swftools
./configure --disable-shared && make
./swftools/src... | global-buffer-overflow exists in the function parseExpression in swftools/src/swfc.c:2587 | https://api.github.com/repos/swftools/swftools/issues/209/comments | 0 | 2023-12-28T05:21:08Z | 2024-01-11T01:14:11Z | https://github.com/swftools/swftools/issues/209 | 2,058,003,911 | 209 | 5,922 |
CVE-2024-22955 | 2024-01-19T18:15:09.003 | swftools 0.9.2 was discovered to contain a stack-buffer-underflow vulnerability via the function parseExpression at swftools/src/swfc.c:2576. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/207"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"787"
] | 787 | https://github.com/matthiaskramm/swftools/issues/207 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | # project
https://github.com/matthiaskramm/swftools
version:0.9.2
# os info
Ubuntu20.04 TLS
# poc
[gbo_poc.zip](https://github.com/matthiaskramm/swftools/files/13783442/gbo_poc.zip)
# build
git clone https://github.com/matthiaskramm/swftools.git
cd swftools
./configure --disable-shared && make
./swftools/s... | stack-buffer-underflow exists in the function parseExpression in swftools/src/swfc.c:2576 | https://api.github.com/repos/swftools/swftools/issues/207/comments | 1 | 2023-12-28T05:05:17Z | 2024-12-02T11:45:06Z | https://github.com/swftools/swftools/issues/207 | 2,057,993,750 | 207 | 5,923 |
CVE-2024-22956 | 2024-01-19T18:15:09.050 | swftools 0.9.2 was discovered to contain a heap-use-after-free vulnerability via the function removeFromTo at swftools/src/swfc.c:838 | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/208"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"416"
] | 416 | https://github.com/matthiaskramm/swftools/issues/208 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | # project
https://github.com/matthiaskramm/swftools
version:0.9.2
# os info
Ubuntu18.04 TLS
# poc
[poc.zip](https://github.com/matthiaskramm/swftools/files/13783478/poc.zip)
# build
git clone https://github.com/matthiaskramm/swftools.git
cd swftools
./configure --disable-shared && make
./swftools/src/s... | heap-use-after-free exists in the function removeFromTo in swftools/src/swfc.c:838 | https://api.github.com/repos/swftools/swftools/issues/208/comments | 1 | 2023-12-28T05:12:39Z | 2024-12-02T11:45:49Z | https://github.com/swftools/swftools/issues/208 | 2,057,998,005 | 208 | 5,924 |
CVE-2024-22957 | 2024-01-19T18:15:09.093 | swftools 0.9.2 was discovered to contain an Out-of-bounds Read vulnerability via the function dict_do_lookup in swftools/lib/q.c:1190. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/206"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"125"
] | 125 | https://github.com/matthiaskramm/swftools/issues/206 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | # project
https://github.com/matthiaskramm/swftools
version:0.9.2
# os info
Ubuntu18.04 TLS
# poc
[swfc_crash.zip](https://github.com/matthiaskramm/swftools/files/13815139/swfc_crash.zip)
# build
git clone https://github.com/matthiaskramm/swftools.git
cd swftools
./configure --disable-shared && make
./sw... | Out-of-bounds Read swftools/lib/q.c:1190 in dict_do_lookup | https://api.github.com/repos/swftools/swftools/issues/206/comments | 1 | 2023-12-28T04:25:13Z | 2024-12-02T11:42:15Z | https://github.com/swftools/swftools/issues/206 | 2,057,972,921 | 206 | 5,925 |
CVE-2024-23679 | 2024-01-19T21:15:10.073 | Enonic XP versions less than 7.7.4 are vulnerable to a session fixation issue. An remote and unauthenticated attacker can use prior sessions due to the lack of invalidating session attributes.
| {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "disclosure@vulncheck.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/advisories/GHSA-4m5p-5w5w-3jcf"
},
{
"source": "disclosure@vulncheck.com",
"tags": [
"Patch"
],
"url": "https://github.com/enonic/xp/commit/0189975691e9e6407a9fee870... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:enonic:xp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3FC6521F-C0B8-4FE8-BE06-FAB57CFFE61A",
"versionEndExcluding": "7.7.4",
"versionEndIncluding": null,
"versionStartExcluding": n... | [
"384"
] | 384 | https://github.com/enonic/xp/issues/9253 | [
"Issue Tracking"
] | github.com | [
"enonic",
"xp"
] | lib-auth should invalidate old session after login and replicate session attributes in a new one. | Invalidate old session after login | https://api.github.com/repos/enonic/xp/issues/9253/comments | 0 | 2021-12-06T12:54:41Z | 2021-12-14T12:48:55Z | https://github.com/enonic/xp/issues/9253 | 1,072,117,958 | 9,253 | 5,926 |
CVE-2024-23689 | 2024-01-19T21:15:10.520 | Exposure of sensitive information in exceptions in ClichHouse's clickhouse-r2dbc, com.clickhouse:clickhouse-jdbc, and com.clickhouse:clickhouse-client versions less than 0.4.6 allows unauthorized users to gain access to client certificate passwords via client exception logs. This occurs when 'sslkey' is specified and a... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "disclosure@vulncheck.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ClickHouse/clickhouse-java/issues/1331"
},
{
"source": "disclosure@vulncheck.com",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:clickhouse:java_libraries:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F7EFEC79-6EFB-4FCD-A772-C6A600512D6A",
"versionEndExcluding": "0.4.6",
"versionEndIncluding": null,
"versionSt... | [
"209"
] | 209 | https://github.com/ClickHouse/clickhouse-java/issues/1331 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ClickHouse",
"clickhouse-java"
] | <!-- delete unnecessary items -->
### Describe the bug
The following exception or similar exceptions have ClickHouseNode information converted to string and inserted into Exception message. This also is done for SSL key - exposing it, which is giant vulnerability.
org.springframework.jdbc.CannotGetJdbcConnectionEx... | SSL key is exposed in SQLException "No client available, ..." | https://api.github.com/repos/ClickHouse/clickhouse-java/issues/1331/comments | 1 | 2023-04-25T11:21:17Z | 2023-04-26T12:07:06Z | https://github.com/ClickHouse/clickhouse-java/issues/1331 | 1,682,970,719 | 1,331 | 5,928 |
CVE-2023-52353 | 2024-01-21T23:15:44.220 | An issue was discovered in Mbed TLS through 3.5.1. In mbedtls_ssl_session_reset, the maximum negotiable TLS version is mishandled. For example, if the last connection negotiated TLS 1.2, then 1.2 becomes the new maximum. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/Mbed-TLS/mbedtls/issues/8654"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"ur... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*",
"matchCriteriaId": "251B083F-CA00-4956-8244-5CF8A610094F",
"versionEndExcluding": "3.5.2",
"versionEndIncluding": null,
"versionStartExcluding"... | [
"384"
] | 384 | https://github.com/Mbed-TLS/mbedtls/issues/8654 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"Mbed-TLS",
"mbedtls"
] | ### Summary
programs/ssl/ssl_server2 refuses following tls1.3 connections from a peer if that peer used to establish tls1.2 connections with the server previously.
### System information
Mbed TLS version (number or commit id): 3.4.0 f1c032adb
Operating system and version: Ubuntu 22.04.2 LTS
Configuration (if n... | programs/ssl/ssl_server2 bug | https://api.github.com/repos/Mbed-TLS/mbedtls/issues/8654/comments | 3 | 2023-12-22T13:31:22Z | 2024-04-08T09:35:12Z | https://github.com/Mbed-TLS/mbedtls/issues/8654 | 2,053,928,933 | 8,654 | 5,929 |
CVE-2024-23744 | 2024-01-21T23:15:44.833 | An issue was discovered in Mbed TLS 3.5.1. There is persistent handshake denial if a client sends a TLS 1.3 ClientHello without extensions. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/Mbed-TLS/mbedtls/issues/8694"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"ur... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F77B65FC-D81F-4AB6-A4EA-2E48AD58FFEA",
"versionEndExcluding": null,
"versionEndIncluding": "3.5.1",
"versionStartExcluding"... | [
"400"
] | 400 | https://github.com/Mbed-TLS/mbedtls/issues/8694 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"Mbed-TLS",
"mbedtls"
] | ### Summary
Send a TLS 1.3 ClientHello without extensions cause programs/ssl/ssl_server and ssl_server2 DoS.
### System information
Mbed TLS version (number or commit id): 3.4.0 f1c032a
Operating system and version: Ubuntu 22.04.2 LTS
Configuration (if not default, please attach mbedtls_config.h): #define MB... | programs/ssl/ssl_server DoS | https://api.github.com/repos/Mbed-TLS/mbedtls/issues/8694/comments | 9 | 2024-01-10T12:27:30Z | 2024-01-15T11:55:42Z | https://github.com/Mbed-TLS/mbedtls/issues/8694 | 2,074,269,016 | 8,694 | 5,930 |
CVE-2024-23750 | 2024-01-22T01:15:08.507 | MetaGPT through 0.6.4 allows the QaEngineer role to execute arbitrary code because RunCode.run_script() passes shell metacharacters to subprocess.Popen. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/geekan/MetaGPT/issues/731"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisor... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:deepwisdom:metagpt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D05F5DEF-ACD0-4B99-AA6D-A6F59B31026D",
"versionEndExcluding": null,
"versionEndIncluding": "0.6.4",
"versionStartExcl... | [
"94"
] | 94 | https://github.com/geekan/MetaGPT/issues/731 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"geekan",
"MetaGPT"
] | **Vulnerability description**
When we use QaEngineer role, arbitrary code execution could happen because QaEngineer adopt a dangerous action `RunCode` to test codes generated by Engineer. `RunCode.run_script()` method invokes `subprocess.Popen` without any check. Evil guys can manipulate prompts to execute some sensit... | [Vulnerability] Arbitrary code execution when use QaEngineer role | https://api.github.com/repos/FoundationAgents/MetaGPT/issues/731/comments | 5 | 2024-01-10T02:21:24Z | 2025-03-12T00:31:49Z | https://github.com/FoundationAgents/MetaGPT/issues/731 | 2,073,465,949 | 731 | 5,931 |
CVE-2024-23751 | 2024-01-22T01:15:08.557 | LlamaIndex (aka llama_index) through 0.9.34 allows SQL injection via the Text-to-SQL feature in NLSQLTableQueryEngine, SQLTableRetrieverQueryEngine, NLSQLRetriever, RetrieverQueryEngine, and PGVectorSQLQueryEngine. For example, an attacker might be able to delete this year's student records via "Drop the Students table... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/run-llama/llama_index/issues/9957"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:llamaindex:llamaindex:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A85457FA-3A68-45F3-9AB7-7E367D18EC67",
"versionEndExcluding": null,
"versionEndIncluding": "0.9.34",
"versionStart... | [
"89"
] | 89 | https://github.com/run-llama/llama_index/issues/9957 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"run-llama",
"llama_index"
] | ### Bug Description
`NLSQLTableQueryEngine`, `SQLTableRetrieverQueryEngine`, `NLSQLRetriever`, `RetrieverQueryEngine`, and `PGVectorSQLQueryEngine` have Text-to-SQL ability. However, by prompt injection, we could let them execute arbitary SQL statement such as dropping tables, which leads to serious security issue whe... | [Bug]: Text-to-SQL have serious SQL injection issue which can execute arbitary SQL statement | https://api.github.com/repos/run-llama/llama_index/issues/9957/comments | 19 | 2024-01-10T10:02:54Z | 2024-11-18T17:18:28Z | https://github.com/run-llama/llama_index/issues/9957 | 2,074,014,169 | 9,957 | 5,932 |
CVE-2024-23752 | 2024-01-22T01:15:08.607 | GenerateSDFPipeline in synthetic_dataframe in PandasAI (aka pandas-ai) through 1.5.17 allows attackers to trigger the generation of arbitrary Python code that is executed by SDFCodeExecutor. An attacker can create a dataframe that provides an English language specification of this Python code. NOTE: the vendor previous... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Vendor Advisory"
],
"url": "https://github.com/gventuri/pandas-ai/issues/868"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Vendor Advisor... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gabrieleventuri:pandasai:*:*:*:*:*:python:*:*",
"matchCriteriaId": "14CBB3DD-8C76-4489-9ED7-97DF5E46B561",
"versionEndExcluding": null,
"versionEndIncluding": "1.5.17",
"vers... | [
"862"
] | 862 | https://github.com/gventuri/pandas-ai/issues/868 | [
"Exploit",
"Mailing List",
"Vendor Advisory"
] | github.com | [
"gventuri",
"pandas-ai"
] | ### System Info
OS version: WSL 2 of Ubuntu 20.04.6
Python version: 3.11.7
pandasai version: 1.5.13
### 🐛 Describe the bug
When I use `GenerateSDFPipeline`, if dataframe content is maliciously crafted, prompt injection would happen. This will cause arbitary command execution which could lead to serious security r... | [Vulnerability] synthetic_dataframe has serious prompt injection issue which could lead to arbitary command execution | https://api.github.com/repos/sinaptik-ai/pandas-ai/issues/868/comments | 1 | 2024-01-11T08:40:34Z | 2024-05-28T14:10:33Z | https://github.com/sinaptik-ai/pandas-ai/issues/868 | 2,076,057,059 | 868 | 5,933 |
CVE-2024-21484 | 2024-01-22T05:15:08.720 | Versions of the package jsrsasign before 11.0.0 are vulnerable to Observable Discrepancy via the RSA PKCS1.5 or RSAOAEP decryption process. An attacker can decrypt ciphertexts by exploiting the Marvin security flaw. Exploiting this vulnerability requires the attacker to have access to a large number of ciphertexts encr... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/kjur/jsrsasign/issues/598"
},
{
"source": "report@snyk.io",
"tags": [
"Patch",
"Release Notes"
],
"url": "https://github.com/kjur/jsr... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsrsasign_project:jsrsasign:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "4651F559-5FE3-40F1-94FD-355954307381",
"versionEndExcluding": "11.0.0",
"versionEndIncluding": null,
"... | [
"203"
] | 203 | https://github.com/kjur/jsrsasign/issues/598 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"kjur",
"jsrsasign"
] | _(Since I haven't found a security policy that would ask for filing security issues over email, I'm making a regular bug report)_
I've tested jsrsasign 10.8.6 on nodejs 21.1.0 and I have found it vulnerable to the [Marvin Attack](https://people.redhat.com/~hkario/marvin/).
Looking at the results, both the bit siz... | jsrsasign vulnerable to the Marvin Attack | https://api.github.com/repos/kjur/jsrsasign/issues/598/comments | 3 | 2023-11-21T10:02:42Z | 2024-01-17T08:05:39Z | https://github.com/kjur/jsrsasign/issues/598 | 2,003,900,052 | 598 | 5,934 |
CVE-2021-42141 | 2024-01-22T23:15:08.120 | An issue was discovered in Contiki-NG tinyDTLS through 2018-08-30. One incorrect handshake could complete with different epoch numbers in the packets Client_Hello, Client_key_exchange, and Change_cipher_spec, which may cause denial of service. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/176625/Contiki-NG-tinyDTLS-Denial-Of-Service.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/contiki-... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:contiki-ng:tinydtls:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E938DF84-2663-4516-87E3-B7E46789F6A1",
"versionEndExcluding": null,
"versionEndIncluding": "2018-08-30",
"versionSta... | [
"755"
] | 755 | https://github.com/contiki-ng/tinydtls/issues/27 | [
"Patch"
] | github.com | [
"contiki-ng",
"tinydtls"
] | Until the master branch 53a0d97, one incorrect handshake is completed with different epoch numbers in the packets Client_Hello, Client_key_exchange and Change_cipher_spec.
Here are captured packets with Wireshark,
 before 2.4.0 allows attackers to run arbitrary code via the name element when filtering for a log. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/NagiosEnterprises/ncpa/issues/830"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"T... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nagios:nagios_cross_platform_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E69DEC17-2E27-4E85-9728-A0E837ECA3F3",
"versionEndExcluding": "2.4.0",
"versionEndIncluding": null,
"... | [
"79"
] | 79 | https://github.com/NagiosEnterprises/ncpa/issues/830 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"NagiosEnterprises",
"ncpa"
] | ### Vulnerability Description
[CENSUS](https://census-labs.com/) identified that the 'Tail Event Logs' functionality of the Nagios Cross-Platform Agent (NCPA) is susceptible to a self-inflicted DOM-based Cross-Site Scripting (XSS) vulnerability via the `name` element.
DOM-based Cross-Site Scripting is a vulnerabi... | CVE-2021-43584 - DOM-based XSS via 'name' element of 'Tail Event Logs' functionality | https://api.github.com/repos/NagiosEnterprises/ncpa/issues/830/comments | 4 | 2021-11-29T17:55:16Z | 2022-11-18T16:40:30Z | https://github.com/NagiosEnterprises/ncpa/issues/830 | 1,066,330,637 | 830 | 5,937 |
CVE-2024-22749 | 2024-01-25T16:15:09.010 | GPAC v2.3 was detected to contain a buffer overflow via the function gf_isom_new_generic_sample_description function in the isomedia/isom_write.c:4577 | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/gpac/gpac/issues/2713"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/hanxuer/crashes... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "58C43523-0CB3-474F-B88B-6ACA538645FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": nu... | [
"120"
] | 120 | https://github.com/gpac/gpac/issues/2713 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at https://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough inf... | buffer-overflow in gf_isom_new_generic_sample_description function at isomedia/isom_write.c:4577 | https://api.github.com/repos/gpac/gpac/issues/2713/comments | 1 | 2024-01-06T06:07:11Z | 2024-01-08T10:22:24Z | https://github.com/gpac/gpac/issues/2713 | 2,068,418,306 | 2,713 | 5,938 |
CVE-2024-23656 | 2024-01-25T20:15:41.107 | Dex is an identity service that uses OpenID Connect to drive authentication for other apps. Dex 2.37.0 serves HTTPS with insecure TLS 1.0 and TLS 1.1. `cmd/dex/serve.go` line 425 seemingly sets TLS 1.2 as minimum version, but the whole `tlsConfig` is ignored after `TLS cert reloader` was introduced in v2.37.0. Configur... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "security-advisories@github.com",
"tags": [
"Product"
],
"url": "https://github.com/dexidp/dex/blob/70d7a2c7c1bb2646b1a540e49616cbc39622fb83/cmd/dex/serve.go#L425"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:linuxfoundation:dex:2.37.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CFFADC7B-A8BE-437B-B1A8-868ECD4ED5E9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | [
"326"
] | 326 | https://github.com/dexidp/dex/issues/2848 | [
"Issue Tracking"
] | github.com | [
"dexidp",
"dex"
] | ### Preflight Checklist
- [X] I agree to follow the [Code of Conduct](https://github.com/dexidp/dex/blob/master/.github/CODE_OF_CONDUCT.md) that this project adheres to.
- [X] I have searched the [issue tracker](https://www.github.com/dexidp/dex/issues) for an issue that matches the one I want to file, without success... | Support configuration of TLS min and max versions | https://api.github.com/repos/dexidp/dex/issues/2848/comments | 2 | 2023-03-07T13:26:00Z | 2024-01-25T17:18:38Z | https://github.com/dexidp/dex/issues/2848 | 1,613,446,688 | 2,848 | 5,939 |
CVE-2023-52389 | 2024-01-27T03:15:07.883 | UTF32Encoding.cpp in POCO has a Poco::UTF32Encoding integer overflow and resultant stack buffer overflow because Poco::UTF32Encoding::convert() and Poco::UTF32::queryConvert() may return a negative integer if a UTF-32 byte sequence evaluates to a value of 0x80000000 or higher. This is fixed in 1.11.8p2, 1.12.5p2, and 1... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/pocoproject/poco/compare/poco-1.12.5p2-release...poco-1.13.0-release"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/pocoproject/poco/issues/4320"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pocoproject:poco:*:*:*:*:*:*:*:*",
"matchCriteriaId": "62FA172D-0501-4F88-A7FC-39ECF76B75FA",
"versionEndExcluding": "1.11.8",
"versionEndIncluding": null,
"versionStartExclu... | [
"190"
] | 190 | https://github.com/pocoproject/poco/issues/4320 | [
"Patch"
] | github.com | [
"pocoproject",
"poco"
] | `Poco::UTF32Encoding::convert()` and `Poco::UTF32::queryConvert()` may return a negative integer of the UTF-32 byte sequence evaluates to a value >= 0x80000000. | Integer overflow in Poco::UTF32Encoding | https://api.github.com/repos/pocoproject/poco/issues/4320/comments | 0 | 2023-12-04T14:16:54Z | 2023-12-26T11:58:02Z | https://github.com/pocoproject/poco/issues/4320 | 2,023,962,150 | 4,320 | 5,940 |
CVE-2024-0962 | 2024-01-27T13:15:07.973 | A vulnerability was found in obgm libcoap 4.3.4. It has been rated as critical. Affected by this issue is the function get_split_entry of the file src/coap_oscore.c of the component Configuration File Handler. The manipulation leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has be... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Patch"
],
"url": "https://github.com/obgm/libcoap/issues/1310"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/obgm/libcoap/issues/1310#issue-2099860835"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libcoap:libcoap:4.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6015782B-1A2E-4F55-BA3F-D40FDAFAD2CE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"787"
] | 787 | https://github.com/obgm/libcoap/issues/1310 | [
"Exploit",
"Patch"
] | github.com | [
"obgm",
"libcoap"
] | ## Environment
- Build System: [Make]
- Operating System: [Linux]
- Operating System Version: [Ubuntu 20.04]
- Hosted Environment: [None]
## Report
- **[1] Vulnerabilities:**
Stack-buffer-overflow in libcoap.
- **[2] Affected Versions:**
Unspecified version (additiona... | Stack-buffer-overflow in libcoap | https://api.github.com/repos/obgm/libcoap/issues/1310/comments | 9 | 2024-01-25T08:41:58Z | 2024-09-29T07:24:58Z | https://github.com/obgm/libcoap/issues/1310 | 2,099,860,835 | 1,310 | 5,941 |
CVE-2024-0962 | 2024-01-27T13:15:07.973 | A vulnerability was found in obgm libcoap 4.3.4. It has been rated as critical. Affected by this issue is the function get_split_entry of the file src/coap_oscore.c of the component Configuration File Handler. The manipulation leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has be... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Patch"
],
"url": "https://github.com/obgm/libcoap/issues/1310"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/obgm/libcoap/issues/1310#issue-2099860835"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libcoap:libcoap:4.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6015782B-1A2E-4F55-BA3F-D40FDAFAD2CE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"787"
] | 787 | https://github.com/obgm/libcoap/issues/1310#issue-2099860835 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"obgm",
"libcoap"
] | ## Environment
- Build System: [Make]
- Operating System: [Linux]
- Operating System Version: [Ubuntu 20.04]
- Hosted Environment: [None]
## Report
- **[1] Vulnerabilities:**
Stack-buffer-overflow in libcoap.
- **[2] Affected Versions:**
Unspecified version (additiona... | Stack-buffer-overflow in libcoap | https://api.github.com/repos/obgm/libcoap/issues/1310/comments | 9 | 2024-01-25T08:41:58Z | 2024-09-29T07:24:58Z | https://github.com/obgm/libcoap/issues/1310 | 2,099,860,835 | 1,310 | 5,942 |
CVE-2024-22559 | 2024-01-29T14:15:09.940 | LightCMS v2.0 is vulnerable to Cross Site Scripting (XSS) in the Content Management - Articles field. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/eddy8/LightCMS/issues/34"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:lightcms_project:lightcms:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "188FCA72-D81E-48AA-8C49-58CB4BCD877F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"79"
] | 79 | https://github.com/eddy8/LightCMS/issues/34 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"eddy8",
"LightCMS"
] | The lightcms content management system uses an outdated ueditor component, therefore there is a domxss vulnerability that allows users to upload an XML file containing a malicious payload which could trigger the vulnerability and lead to an XSS attack.
# 00x1
Log into the admin backend, click on Content Management ... | A stored cross-site scripting (XSS) vulnerability exists in LightCMS "Content Management - Articles" field | https://api.github.com/repos/eddy8/LightCMS/issues/34/comments | 0 | 2023-12-29T03:01:49Z | 2024-07-23T15:02:11Z | https://github.com/eddy8/LightCMS/issues/34 | 2,059,018,555 | 34 | 5,943 |
CVE-2023-51839 | 2024-01-29T20:15:15.047 | DeviceFarmer stf v3.6.6 suffers from Use of a Broken or Risky Cryptographic Algorithm. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/DeviceFarmer/stf"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/DeviceFarmer/stf/issues/736"
},
{
"source": "cve@... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:devicefarmer:smartphone_test_farm:3.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7E2F07D0-CA08-40E2-B7FE-3353CD83B6D1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"327"
] | 327 | https://github.com/DeviceFarmer/stf/issues/736 | [
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"DeviceFarmer",
"stf"
] | Please check if there is any problem with using DES-ECB to encrypt.
1. lib/util/vncauth.js, line 35
This algorithm is known to have significant vulnerabilities that can be exploited by attackers, compromising the confidentiality and integrity of sensitive data. DES-ECB uses a fixed encryption key and does not in... | Use of Outdated and Insecure Algorithm DES-ECB to encrypt | https://api.github.com/repos/DeviceFarmer/stf/issues/736/comments | 0 | 2023-12-08T13:59:31Z | 2023-12-08T13:59:31Z | https://github.com/DeviceFarmer/stf/issues/736 | 2,032,704,832 | 736 | 5,944 |
CVE-2023-51840 | 2024-01-29T20:15:15.100 | DoraCMS 2.1.8 is vulnerable to Use of Hard-coded Cryptographic Key. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/doramart/DoraCMS"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/doramart/DoraCMS/issues/262"
},
{
"source": "cve@... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:html-js:doracms:2.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1FFA2258-7C76-482B-8076-AAD87B371A21",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"798"
] | 798 | https://github.com/doramart/DoraCMS/issues/262 | [
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"doramart",
"DoraCMS"
] | Please check if there is any problem with the hard-coded key.
1. backstage/adminGroup/src/utils/crypto.js, line12
Using fixed keys may reduce encryption security because an attacker can guess or predict them. To enhance security, it is recommended to use randomly generated keys and ensure secure storage and trans... | Usage of Fixed Key | https://api.github.com/repos/doramart/DoraCMS/issues/262/comments | 0 | 2023-12-14T08:08:20Z | 2023-12-14T08:08:20Z | https://github.com/doramart/DoraCMS/issues/262 | 2,041,163,539 | 262 | 5,945 |
CVE-2024-22570 | 2024-01-29T20:15:15.420 | A stored cross-site scripting (XSS) vulnerability in /install.php?m=install&c=index&a=step3 of GreenCMS v2.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/Num-Nine/CVE/issues/11"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/Num-Nine/CVE/issues/11"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:njtech:greencms:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7271D633-9BD0-4E2B-BA69-E732E3E19D43",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/Num-Nine/CVE/issues/11 | [
"Issue Tracking"
] | github.com | [
"Num-Nine",
"CVE"
] | 1.Download address: https://codeload.github.com/GreenCMS/GreenCMS/zip/refs/heads/beta
2.Hole location: http://greencms.com/install.php?m=install&c=index&a=step3
3.Fill in the payload at the site name
`<script>alert(/xss/)</script>`
4.After the installation is complete, xss can be triggered by visiting the fol... | GreenCMS v2.3 exists storage xss | https://api.github.com/repos/QianGeG/CVE/issues/11/comments | 0 | 2023-12-30T08:57:42Z | 2023-12-30T08:57:42Z | https://github.com/QianGeG/CVE/issues/11 | 2,060,685,426 | 11 | 5,946 |
CVE-2023-51843 | 2024-01-30T01:15:58.967 | react-dashboard 1.4.0 is vulnerable to Cross Site Scripting (XSS) as httpOnly is not set. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/flatlogic/react-dashboard"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/flatlogic/react-dashboard/issues/65"
},
{
"source": "cve@mitre.or... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:flatlogic:react_dashboard:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD546A44-7F1A-4D13-9AF4-2D04C0BA7F7F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"79"
] | 79 | https://github.com/flatlogic/react-dashboard/issues/65 | [
"Issue Tracking"
] | github.com | [
"flatlogic",
"react-dashboard"
] | Please check if there is a security issue.
1. server/server.js, line 40.
Setting "httpOnly" to false may be due to specific design needs or use cases. In some cases, applications may need to access cookie data via JavaScript to implement specific functionality or to interact with other components. However, to be ... | JWT Should be Stored in an HttpOnly Cookie | https://api.github.com/repos/flatlogic/react-dashboard/issues/65/comments | 0 | 2023-12-17T12:40:24Z | 2024-11-29T05:26:24Z | https://github.com/flatlogic/react-dashboard/issues/65 | 2,045,203,378 | 65 | 5,947 |
CVE-2023-51982 | 2024-01-30T01:15:59.013 | CrateDB 5.5.1 is contains an authentication bypass vulnerability in the Admin UI component. After configuring password authentication and_ Local_ In the case of an address, identity authentication can be bypassed by setting the X-Real IP request header to a specific value and accessing the Admin UI directly using the d... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/crate/crate/issues/15231"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/crate/crat... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cratedb:cratedb:5.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DCA795AD-7B75-41DA-B82D-3A032DBAE7BF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"287"
] | 287 | https://github.com/crate/crate/issues/15231 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"crate",
"crate"
] | ### CrateDB version
5.5.1
### CrateDB setup information
number of nodes: 1.
Docker Installed.
Install startup command:
docker pull crate:latest
docker run -d --publish 4200:4200 --publish 5432:5432 crate -Cdiscovery.type=single-node -Cauth.host_based.enabled=true -Cauth.host_based.config.0.method=trust -Cauth.ho... | There is an HTTP authentication bypass vulnerability in the CrateDB database | https://api.github.com/repos/crate/crate/issues/15231/comments | 3 | 2023-12-21T09:47:10Z | 2023-12-21T22:43:09Z | https://github.com/crate/crate/issues/15231 | 2,052,082,909 | 15,231 | 5,948 |
CVE-2024-22938 | 2024-01-30T01:16:00.077 | Insecure Permissions vulnerability in BossCMS v.1.3.0 allows a local attacker to execute arbitrary code and escalate privileges via the init function in admin.class.php component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/n0Sleeper/bosscmsVuln"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/n0Sleeper/bosscmsVuln/issues/1"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bosscms:bosscms:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "700607F2-A251-4B79-B171-EA976C32A8B9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"863"
] | 863 | https://github.com/n0Sleeper/bosscmsVuln/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"n0Sleeper",
"bosscmsVuln"
] | ### Vulnerable file
`BossCMS-V2/system/basic/class/admin.class.php`
```php
public function init()
{
global $G;
$manager = session::get('manager');
if(empty($manager)){
if(!defined('IS_LOGIN')){
header('Location: '.url::mpf('login','login','init'));
}
}else{
$mgr = explode(P,$manag... | Bosscms v1.3.0 has an unauthorized operation vulnerability due to admin.class.php | https://api.github.com/repos/n0Sleeper/bosscmsVuln/issues/1/comments | 0 | 2024-01-06T14:31:28Z | 2024-01-06T14:31:28Z | https://github.com/n0Sleeper/bosscmsVuln/issues/1 | 2,068,661,015 | 1 | 5,949 |
CVE-2024-22569 | 2024-01-31T02:15:54.467 | Stored Cross-Site Scripting (XSS) vulnerability in POSCMS v4.6.2, allows attackers to execute arbitrary code via a crafted payload to /index.php?c=install&m=index&step=2&is_install_db=0. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Num-Nine/CVE/issues/12"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:poscms:poscms:4.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A62614D0-0876-4DEA-BADB-2ADDA028B7FA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/Num-Nine/CVE/issues/12 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Num-Nine",
"CVE"
] | 1.Download address: http://www.poscms.net/xiazai/
2.Hole location: http://127.0.0.1/index.php? c=install&m=index&step=2&is_install_db=0
3.Fill in the payload at the project name
`<script>alert(/xss/)</script>`
4.xss is triggered when you return to the home page after installation
... | Leak the Secret Key of BBS Short Signature in Relic via Rowhammer | https://api.github.com/repos/relic-toolkit/relic/issues/284/comments | 4 | 2023-12-18T06:13:16Z | 2024-01-14T04:26:09Z | https://github.com/relic-toolkit/relic/issues/284 | 2,045,814,886 | 284 | 5,951 |
CVE-2024-24561 | 2024-02-01T17:15:11.180 | Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. In versions 0.3.10 and earlier, the bounds check for slices does not account for the ability for start + length to overflow when the values aren't literals. If a slice() function uses a non-literal argument for the start or length variable, t... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "security-advisories@github.com",
"tags": [
"Product"
],
"url": "https://github.com/vyperlang/vyper/blob/b01cd686aa567b32498fefd76bd96b0597c6f099/vyper/builtins/functions.py#L404-L457"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*",
"matchCriteriaId": "832C489D-4288-46B4-A29E-0E7168748042",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.10",
"versionStartE... | [
"787"
] | 787 | https://github.com/vyperlang/vyper/issues/3756 | [
"Issue Tracking"
] | github.com | [
"vyperlang",
"vyper"
] | tracking issue for https://github.com/vyperlang/vyper/security/advisories/GHSA-9x7f-gwxq-6f2c | invalid bounds check for `slice()` | https://api.github.com/repos/vyperlang/vyper/issues/3756/comments | 0 | 2024-01-31T23:09:36Z | 2024-03-21T21:21:55Z | https://github.com/vyperlang/vyper/issues/3756 | 2,111,140,861 | 3,756 | 5,952 |
CVE-2024-22927 | 2024-02-01T23:15:10.960 | Cross Site Scripting (XSS) vulnerability in the func parameter in eyoucms v.1.6.5 allows a remote attacker to run arbitrary code via crafted URL. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/57"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C5AE12B9-F8D6-4F10-9B49-50E0263ECA55",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"79"
] | 79 | https://github.com/weng-xianhu/eyoucms/issues/57 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | ### **Summary**
EyouCMS-V1.6.5 When uploading images locally, the program will use the info parameter to set the parameters carried by the upload form.
Multiple reflective XSS vulnerabilities can be created by modifying the JWT encrypted HEADER of the accepted JSON data and setting the parameter it contains to a mali... | EyouCMS-V1.6.5 has multiple reflective XSS vulnerabilities | https://api.github.com/repos/weng-xianhu/eyoucms/issues/57/comments | 1 | 2024-01-05T08:05:47Z | 2024-03-22T01:36:04Z | https://github.com/weng-xianhu/eyoucms/issues/57 | 2,066,903,491 | 57 | 5,953 |
CVE-2024-21485 | 2024-02-02T05:15:09.510 | Versions of the package dash-core-components before 2.13.0; versions of the package dash-core-components before 2.0.0; versions of the package dash before 2.15.0; versions of the package dash-html-components before 2.0.0; versions of the package dash-html-components before 2.0.16 are vulnerable to Cross-site Scripting ... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"int... | [
{
"source": "report@snyk.io",
"tags": [
"Patch"
],
"url": "https://github.com/plotly/dash/commit/9920073c9a8619ae8f90fcec1924f2f3a4332a8c"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/plotly/dash/issues/272... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:plotly:dash:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1177AB58-0C85-4FE7-A4EB-449B3CD34606",
"versionEndExcluding": "2.13.0",
"versionEndIncluding": null,
"versionStartExcluding"... | [
"79"
] | 79 | https://github.com/plotly/dash/issues/2729 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"plotly",
"dash"
] | I've identified a Cross-Site Scripting (XSS) vulnerability in 'dash-core-components'
**Vulnerability Details:**
- **Severity**: High/Critical
- **Description**: There's a risk of malicious script execution when the href of the a tag is controlled by an adversary.
**Steps to Reproduce:**
In a React.js project:
... | Validate url to prevent XSS attacks | https://api.github.com/repos/plotly/dash/issues/2729/comments | 4 | 2024-01-21T05:10:29Z | 2024-01-30T20:48:40Z | https://github.com/plotly/dash/issues/2729 | 2,092,425,191 | 2,729 | 5,954 |
CVE-2024-24160 | 2024-02-02T16:15:55.833 | MRCMS 3.0 contains a Cross-Site Scripting (XSS) vulnerability via /admin/system/saveinfo.do. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/wy876/cve/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/wy876/cve/issues... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mrcms:mrcms:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CC8B6F2A-C4B3-487F-B391-ECA5F1A2DDD9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"79"
] | 79 | https://github.com/wy876/cve/issues/1 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"wy876",
"cve"
] | Build the source code locally by downloading https://gitee.com/marker/MRCMS
The vulnerability exists: http://127.0.0.1:8080/admin/index.do

Insert xss cross-site scripting attack code
```
"><img src=1 onerror=alert(/x... | MRCMS 3.0 There is an xss cross-site scripting vulnerability /admin/system/saveinfo.do | https://api.github.com/repos/wy876/cve/issues/1/comments | 0 | 2024-01-13T07:13:34Z | 2024-01-13T07:13:34Z | https://github.com/wy876/cve/issues/1 | 2,080,145,026 | 1 | 5,955 |
CVE-2024-24161 | 2024-02-02T16:15:55.880 | MRCMS 3.0 contains an Arbitrary File Read vulnerability in /admin/file/edit.do as the incoming path parameter is not filtered. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/wy876/cve/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mrcms:mrcms:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CC8B6F2A-C4B3-487F-B391-ECA5F1A2DDD9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"552"
] | 552 | https://github.com/wy876/cve/issues/2 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"wy876",
"cve"
] | Build the source code locally by downloading https://gitee.com/marker/MRCMS
The vulnerability exists: http://127.0.0.1:8080/admin/index.do
Click Content Management-->File Management
Click the Edit File button 1.txt
... | MRCMS 3.0 Arbitrary file reading vulnerability exists /admin/file/edit.do | https://api.github.com/repos/wy876/cve/issues/2/comments | 0 | 2024-01-18T09:11:17Z | 2024-01-18T09:11:17Z | https://github.com/wy876/cve/issues/2 | 2,087,839,484 | 2 | 5,956 |
CVE-2024-24267 | 2024-02-05T18:15:52.427 | gpac v2.2.1 was discovered to contain a memory leak via the gfio_blob variable in the gf_fileio_from_blob function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/gpac/gpac/commit/d28d9ba45cf4f628a7b2c351849a895e6fcf2234"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/gpac/gpac/issues/2571"
},
{
"source": "cve@mitre.org",
"tags": [
"Ex... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "81FBED81-2989-4E6D-83CF-BF8E4989F5ED",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"401"
] | 401 | https://github.com/gpac/gpac/issues/2571 | null | github.com | [
"gpac",
"gpac"
] | Memory leak in function [gf_fileio_from_mem](https://github.com/gpac/gpac/blob/941a0891b989f5ad86b739cfb12c84b7e62e8ee4/src/utils/os_file.c#L1447)
The memory leak is reported by a static analyzer tool developed at CAST (https://www.linkedin.com/company/cast-center).
Dynamic memory is allocated [here](https://github... | Memory leak in function gf_fileio_from_mem | https://api.github.com/repos/gpac/gpac/issues/2571/comments | 0 | 2023-08-29T11:13:38Z | 2023-08-29T13:47:19Z | https://github.com/gpac/gpac/issues/2571 | 1,871,446,973 | 2,571 | 5,957 |
CVE-2024-23049 | 2024-02-05T23:15:08.463 | An issue in symphony v.3.6.3 and before allows a remote attacker to execute arbitrary code via the log4j component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/88250/symphony/issues/82"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/88250/symp... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:b3log:symphony:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB80FFE7-5262-4C69-A9E7-53C5895E126F",
"versionEndExcluding": null,
"versionEndIncluding": "3.6.3",
"versionStartExcludin... | [
"77"
] | 77 | https://github.com/88250/symphony/issues/82 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"88250",
"symphony"
] | In symphony 3.6.3 and earlier, the use of an insecure log4j version resulted in a remote command execution risk. In the course of actual testing, a vulnerability trigger was found:

![d4627af0ccf... | Find a trigger for log4j2 remote command execution in symphony 3.6.3 | https://api.github.com/repos/88250/symphony/issues/82/comments | 1 | 2024-01-04T01:19:19Z | 2024-01-04T02:21:41Z | https://github.com/88250/symphony/issues/82 | 2,064,851,327 | 82 | 5,958 |
CVE-2024-24112 | 2024-02-06T01:15:09.700 | xmall v1.1 was discovered to contain a SQL injection vulnerability via the orderDir parameter. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Product"
],
"url": "https://github.com/Exrick/xmall/issues/78"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Product"
],
"url"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:exrick:xmall:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E46154B1-2E17-432C-839B-1F13469BCA05",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding":... | [
"89"
] | 89 | https://github.com/Exrick/xmall/issues/78 | [
"Exploit",
"Issue Tracking",
"Product"
] | github.com | [
"Exrick",
"xmall"
] | [Suggested description]
Xmall was discovered to contain a SQL injection vulnerability via the orderDir parameter.
[Vulnerability Type]
SQLi
[Vendor of Product]
https://github.com/Exrick/xmall
[Affected Product Code Base]
all version
[Affected Component]
- /item/list
- /item/listSearch
- /sys/log
- /... | SQL Injection Vulnerability exists in multiple interfaces of xmall | https://api.github.com/repos/Exrick/xmall/issues/78/comments | 1 | 2023-03-17T12:06:40Z | 2023-03-17T12:07:15Z | https://github.com/Exrick/xmall/issues/78 | 1,629,201,964 | 78 | 5,959 |
CVE-2024-24001 | 2024-02-07T00:15:56.443 | jshERP v3.3 is vulnerable to SQL Injection. via the com.jsh.erp.controller.DepotHeadController: com.jsh.erp.utils.BaseResponseInfo findallocationDetail() function of jshERP which allows an attacker to construct malicious payload to bypass jshERP's protection mechanism. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/24001.txt"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jishenghua:jsherp:3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A549663F-7809-4723-9F1F-251DB15E31CA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"89"
] | 89 | https://github.com/jishenghua/jshERP/issues/99 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"jishenghua",
"jshERP"
] | public static String safeSqlParse(String originStr){
return originStr.replaceAll("(?i)" + regex, "");
}
public final static String regex = "'|#|%|;|--| and | and|and | or | or|or | not | not|not " +
"| use | use|use | insert | insert|insert | delete | delete|delete | update | update|update... | There are 4 sql injection vulnerabilities and 1 file upload vulnerability in jshERP v3.3 | https://api.github.com/repos/jishenghua/jshERP/issues/99/comments | 0 | 2024-01-12T08:40:39Z | 2024-01-12T08:40:39Z | https://github.com/jishenghua/jshERP/issues/99 | 2,078,342,610 | 99 | 5,960 |
CVE-2024-24130 | 2024-02-07T14:15:52.720 | Mail2World v12 Business Control Center was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the Usr parameter at resellercenter/login.asp. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Hebing123/cve/issues/13"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Hebing123/c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mail2world:mail2world:12:*:*:*:*:*:*:*",
"matchCriteriaId": "814F8AA9-4951-4025-A7F3-A434BE630122",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"79"
] | 79 | https://github.com/Hebing123/cve/issues/13 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"Hebing123",
"cve"
] | ### **Summary**
Mail2World V12 Business Control Center has a reflective cross-site vulnerability.
### **Details**
A reflective XSS vulnerability exists in the resellercenter/login.asp path of Mail2World v12 Business Control Center.
The cause of this XSS vulnerability is that Usr parameters are displayed to the fron... | Mail2World v12 Business Control Center has a reflective XSS vulnerability | https://api.github.com/repos/Hebing123/cve/issues/13/comments | 1 | 2024-01-12T17:37:39Z | 2024-03-11T06:20:40Z | https://github.com/Hebing123/cve/issues/13 | 2,079,360,954 | 13 | 5,961 |
CVE-2024-24131 | 2024-02-07T14:15:52.770 | SuperWebMailer v9.31.0.01799 was discovered to contain a reflected cross-site scripting (XSS) vulenrability via the component api.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Hebing123/cve/issues/14"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Hebing123/c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:superwebmailer:superwebmailer:9.31.0.01799:*:*:*:*:*:*:*",
"matchCriteriaId": "E69A9B02-9E6A-421A-8E38-9A315640DD73",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"79"
] | 79 | https://github.com/Hebing123/cve/issues/14 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"Hebing123",
"cve"
] | ### **Summary**
SuperWebMailer 9.31.0.01799 has a reflective cross-site vulnerability.
### **Details**
SuperWebMailer in version 9.31.0.01799 has a reflection cross-site attack vulnerability caused by api.php directly referencing urls without filtering.
### **Proof of Concept (POC)**
http://ip:port/api/api.php/%3... | SuperWebMailer 9.31.0.01799 has a reflective XSS vulnerability | https://api.github.com/repos/Hebing123/cve/issues/14/comments | 1 | 2024-01-12T18:45:40Z | 2024-03-11T06:20:34Z | https://github.com/Hebing123/cve/issues/14 | 2,079,480,963 | 14 | 5,962 |
CVE-2024-24133 | 2024-02-07T14:15:52.820 | Atmail v6.6.0 was discovered to contain a SQL injection vulnerability via the username parameter on the login page. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/16"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/16"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:atmail:atmail:6.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F9DFF09-D9A8-46F7-A466-6C538C591651",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"89"
] | 89 | https://github.com/Hebing123/cve/issues/16 | [
"Third Party Advisory"
] | github.com | [
"Hebing123",
"cve"
] | ### **Summary**
On January 12, we discovered that atmail 6.6.0 and atmail 6.3.0 weretested for SQL injection vulnerabilities that could be larger than 6.6.0.
The username parameter during admin login is at risk of SQL injection.
### **Details**
We can prove this with delayed SQL injection, which we have tes... | SQL Injection Vulnerability in Atmail 6.6.0 | https://api.github.com/repos/Hebing123/cve/issues/16/comments | 2 | 2024-01-16T06:20:56Z | 2024-03-11T06:17:35Z | https://github.com/Hebing123/cve/issues/16 | 2,083,096,416 | 16 | 5,963 |
CVE-2024-24186 | 2024-02-07T14:15:52.870 | Jsish v3.5.0 (commit 42c694c) was discovered to contain a stack-overflow via the component IterGetKeysCallback at /jsish/src/jsiValue.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/98"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/pcmacdon... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"787"
] | 787 | https://github.com/pcmacdon/jsish/issues/98 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: https://github.com/pcmacdon/jsish/commit/42c694c152f7f4fbee34d5e14be37d6e0d09673f
Version: v3.5.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
export JSI__SANITIZE=1
make
```
###### Test case
<details><summary>testcase<... | stack-overflow ./jsish/src/jsiValue.c:1451 in IterGetKeysCallback | https://api.github.com/repos/pcmacdon/jsish/issues/98/comments | 0 | 2024-01-14T11:31:14Z | 2024-01-14T11:31:14Z | https://github.com/pcmacdon/jsish/issues/98 | 2,080,689,779 | 98 | 5,964 |
CVE-2024-24188 | 2024-02-07T14:15:52.917 | Jsish v3.5.0 was discovered to contain a heap-buffer-overflow in ./src/jsiUtils.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/100"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisor... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"787"
] | 787 | https://github.com/pcmacdon/jsish/issues/100 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: https://github.com/pcmacdon/jsish/commit/42c694c152f7f4fbee34d5e14be37d6e0d09673f
Version: v3.5.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
export JSI__SANITIZE=1
make
```
###### Test case
<details><summary>testcase<... | heap-buffer-overflow in ./jsish/src/jsiUtils.c | https://api.github.com/repos/pcmacdon/jsish/issues/100/comments | 0 | 2024-01-20T05:53:20Z | 2024-01-20T05:53:20Z | https://github.com/pcmacdon/jsish/issues/100 | 2,091,916,967 | 100 | 5,965 |
CVE-2024-24189 | 2024-02-07T14:15:52.967 | Jsish v3.5.0 (commit 42c694c) was discovered to contain a use-after-free via the SplitChar at ./src/jsiUtils.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/101"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/101"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"416"
] | 416 | https://github.com/pcmacdon/jsish/issues/101 | [
"Vendor Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: https://github.com/pcmacdon/jsish/commit/42c694c152f7f4fbee34d5e14be37d6e0d09673f
Version: v3.5.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
export JSI__SANITIZE=1
make
```
###### Test case
<details><summary>testcase<... | heap-use-after-free ./jsish/src/jsiUtils.c:2060:17 in SplitChar | https://api.github.com/repos/pcmacdon/jsish/issues/101/comments | 0 | 2024-01-20T05:58:02Z | 2024-01-20T05:58:02Z | https://github.com/pcmacdon/jsish/issues/101 | 2,091,919,351 | 101 | 5,966 |
CVE-2024-25200 | 2024-02-07T14:15:53.013 | Espruino 2v20 (commit fcc9ba4) was discovered to contain a Stack Overflow via the jspeFactorFunctionCall at src/jsparse.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/espruino/Espruino/issues/2457"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Adv... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:espruino:espruino:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "3EEF8D93-5F22-4DB9-B15D-EA860BD3F688",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"787"
] | 787 | https://github.com/espruino/Espruino/issues/2457 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"espruino",
"Espruino"
] | ###### Espruino revision
Commit: https://github.com/espruino/Espruino/commit/fcc9ba4f12d79710f93d47ea37987cde0efce410
Version: 2v20
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
export CCFLAGS='-g -fsanitize=address -fno-omit-frame-pointer'
export LDFLAGS... | stack-overflow in jspeFactorFunctionCall | https://api.github.com/repos/espruino/Espruino/issues/2457/comments | 0 | 2024-01-26T13:15:59Z | 2024-01-31T16:08:07Z | https://github.com/espruino/Espruino/issues/2457 | 2,102,199,332 | 2,457 | 5,967 |
CVE-2024-25201 | 2024-02-07T14:15:53.060 | Espruino 2v20 (commit fcc9ba4) was discovered to contain an Out-of-bounds Read via jsvStringIteratorPrintfCallback at src/jsvar.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/espruino/Espruino/issues/2456"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:espruino:espruino:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "3EEF8D93-5F22-4DB9-B15D-EA860BD3F688",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"125"
] | 125 | https://github.com/espruino/Espruino/issues/2456 | [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"espruino",
"Espruino"
] | ###### Espruino revision
Commit: https://github.com/espruino/Espruino/commit/fcc9ba4f12d79710f93d47ea37987cde0efce410
Version: 2v20
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
export CCFLAGS='-g -fsanitize=address -fno-omit-frame-pointer'
export LDFLAGS... | SEGV on unknown address in jsvStringIteratorPrintfCallback | https://api.github.com/repos/espruino/Espruino/issues/2456/comments | 3 | 2024-01-26T13:07:20Z | 2024-01-30T12:25:14Z | https://github.com/espruino/Espruino/issues/2456 | 2,102,188,118 | 2,456 | 5,968 |
CVE-2024-24216 | 2024-02-08T06:15:51.750 | Zentao v18.0 to v18.10 was discovered to contain a remote code execution (RCE) vulnerability via the checkConnection method of /app/zentao/module/repo/model.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/easysoft/zentaopms/issues/133"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/l3s10n/ZenTaoPMS_RCE"
},
{
"sou... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:easycorp:zentao:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2055C49E-D7BA-42D6-9F98-BDEF06A38F29",
"versionEndExcluding": null,
"versionEndIncluding": "18.10",
"versionStartExcludi... | [
"77"
] | 77 | https://github.com/easysoft/zentaopms/issues/133 | [
"Issue Tracking"
] | github.com | [
"easysoft",
"zentaopms"
] | ### 描述 (Description)
详情见:“https://github.com/l3s10n/ZenTaoPMS_RCE”
### 期望 (Expectation)
修复漏洞
### 结果 (Result)
后台命令执行
### 软件版本 (Software version)
18.0 - 18.10 | There is a remote command execution vulnerability after login(存在后台远程命令执行漏洞) | https://api.github.com/repos/easysoft/zentaopms/issues/133/comments | 1 | 2024-01-15T08:40:11Z | 2024-05-31T10:54:25Z | https://github.com/easysoft/zentaopms/issues/133 | 2,081,518,929 | 133 | 5,969 |
CVE-2024-24113 | 2024-02-08T13:15:09.807 | xxl-job =< 2.4.1 has a Server-Side Request Forgery (SSRF) vulnerability, which causes low-privileged users to control executor to RCE. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/xuxueli/xxl-job/issues/3375"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third P... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xuxueli:xxl-job:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1C421D48-E483-44C2-A4A9-F0FBC31E17C7",
"versionEndExcluding": null,
"versionEndIncluding": "2.4.1",
"versionStartExcludi... | [
"918"
] | 918 | https://github.com/xuxueli/xxl-job/issues/3375 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"xuxueli",
"xxl-job"
] | ### Which version of XXL-JOB do you using?
2.4.1(latest)
### vulnerability description
XXL-JOB is a distributed task scheduling platform based on java language in the XXL (XXL-JOB) community.
There is an SSRF vulnerability in xxl-job-2.4.1/xxl-job-admin/src/main/java/com/xxl/job/admin/controller/JobInfoController... | xxl-job =< 2.4.1 version has SSRF vulnerability, which causes low-privileged users to control executor to RCE | https://api.github.com/repos/xuxueli/xxl-job/issues/3375/comments | 2 | 2024-01-11T12:24:35Z | 2024-10-12T06:24:51Z | https://github.com/xuxueli/xxl-job/issues/3375 | 2,076,500,051 | 3,375 | 5,970 |
CVE-2024-24393 | 2024-02-08T22:15:09.130 | File Upload vulnerability index.php in Pichome v.1.1.01 allows a remote attacker to execute arbitrary code via crafted POST request. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/zyx0814/Pichome/issues/24"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisor... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oaooa:pichome:1.1.01:*:*:*:*:*:*:*",
"matchCriteriaId": "D8DCF0D4-601E-4D83-B57A-2C925B6FFA20",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"434"
] | 434 | https://github.com/zyx0814/Pichome/issues/24 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"zyx0814",
"Pichome"
] | An arbitrary file upload vulnerability in /index.php?mod=pichome&op=user&do=uploadimg.The corresponding file is \dzz\pichome\user.php.It just verified MIME,allows attackers to getshell.

 vulnerability in EasyEmail v.4.12.2 and before allows a local attacker to execute arbitrary code via the user input parameter(s). NOTE: Researcher claims issue is present in all versions prior and later than tested version. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/zalify/easy-email/issues/321"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/zalify/easy-email/issues/373"
},
{
"source": "cve@mitre... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zalify:easy_email:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "3AE6DE32-FDD9-417D-BF21-2B1D1E711406",
"versionEndExcluding": null,
"versionEndIncluding": "4.12.2",
"versionSta... | [
"79"
] | 79 | https://github.com/zalify/easy-email/issues/321 | [
"Issue Tracking"
] | github.com | [
"zalify",
"easy-email"
] | Hello 👋
I run a security community that finds and fixes vulnerabilities in OSS. A researcher (@chuayupeng) has found a potential issue, which I would be eager to share with you.
Could you add a `SECURITY.md` file with an e-mail address for me to send further details to? GitHub [recommends](https://docs.github.com/en... | Responsible disclosure policy | https://api.github.com/repos/zalify/easy-email-editor/issues/321/comments | 2 | 2023-06-01T10:05:13Z | 2023-09-21T12:52:46Z | https://github.com/zalify/easy-email-editor/issues/321 | 1,735,946,206 | 321 | 5,972 |
CVE-2023-39683 | 2024-02-09T07:15:59.960 | Cross Site Scripting (XSS) vulnerability in EasyEmail v.4.12.2 and before allows a local attacker to execute arbitrary code via the user input parameter(s). NOTE: Researcher claims issue is present in all versions prior and later than tested version. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/zalify/easy-email/issues/321"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/zalify/easy-email/issues/373"
},
{
"source": "cve@mitre... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zalify:easy_email:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "3AE6DE32-FDD9-417D-BF21-2B1D1E711406",
"versionEndExcluding": null,
"versionEndIncluding": "4.12.2",
"versionSta... | [
"79"
] | 79 | https://github.com/zalify/easy-email/issues/373 | [
"Issue Tracking"
] | github.com | [
"zalify",
"easy-email"
] | Hello @m-Ryan, as per the previous issue raised, I have gone ahead to file for a CVE for the issue found here: https://github.com/zalify/easy-email/issues/321
Creating this current issue to highlight the XSS vulnerability in your source code, and to responsibly disclose it. Given that more than half a year has passe... | CVE-2023-39683 DOM XSS on JSON Source Code Panel | https://api.github.com/repos/zalify/easy-email-editor/issues/373/comments | 6 | 2023-12-22T05:11:10Z | 2024-01-13T02:32:20Z | https://github.com/zalify/easy-email-editor/issues/373 | 2,053,392,559 | 373 | 5,973 |
CVE-2024-25447 | 2024-02-09T15:15:08.967 | An issue in the imlib_load_image_with_error_return function of imlib2 v1.9.1 allows attackers to cause a heap buffer overflow via parsing a crafted image. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://git.enlightenment.org/old/legacy-imlib2/issues/20"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisor... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:enlightenment:imlib2:1.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "56900F1D-B2C3-42AE-A2A8-FE0EFBCA5B17",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | [
"787"
] | 787 | https://github.com/derf/feh/issues/709 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"derf",
"feh"
] | Hi there
We want to share that the latest version (3.10) of feh causes heap-buffer-overflow when executed with a crafted input via argument -l.
We assume that the invalid memory access happens due to the improper processing malformed input in imlib_load_image_with_error_return() in spite of the error handling.
... | Heap-buffer-overflow when loading an image in imlib_load_image_with_error_return() | https://api.github.com/repos/derf/feh/issues/709/comments | 5 | 2023-06-12T04:30:15Z | 2023-07-30T08:47:24Z | https://github.com/derf/feh/issues/709 | 1,751,868,382 | 709 | 5,974 |
CVE-2024-25448 | 2024-02-09T15:15:09.027 | An issue in the imlib_free_image_and_decache function of imlib2 v1.9.1 allows attackers to cause a heap buffer overflow via parsing a crafted image. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://git.enlightenment.org/old/legacy-imlib2/issues/20"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisor... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:enlightenment:imlib2:1.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "56900F1D-B2C3-42AE-A2A8-FE0EFBCA5B17",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | [
"787"
] | 787 | https://github.com/derf/feh/issues/711 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"derf",
"feh"
] | Hi there.
The latest version (3.10) of feh causes memory free of invalid size when executed with a crafted input via argument -l.
We suspect that there is no proper size check of the size to be freed or reallocated in the functions of the Imlib2 library called by gib_imlib_free_image_and_decache().
Here is the... | Free with invalid size in the function imlib_free_image_and_decache() | https://api.github.com/repos/derf/feh/issues/711/comments | 2 | 2023-06-12T07:58:18Z | 2023-06-21T16:27:52Z | https://github.com/derf/feh/issues/711 | 1,752,141,466 | 711 | 5,975 |
CVE-2024-25451 | 2024-02-09T15:15:09.143 | Bento4 v1.6.0-640 was discovered to contain an out-of-memory bug via the AP4_DataBuffer::ReallocateBuffer() function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/872"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*",
"matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"400"
] | 400 | https://github.com/axiomatic-systems/Bento4/issues/872 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | Hi,
Thanks for fixing the issue #741, but still there is out-of-memory bug in the latest version (1.6.0-640) of multiple programs because of the function AP4_DataBuffer::ReallocateBuffer() at Ap4DataBuffer.cpp:210.
We observed the same bug in mp4info, mp42aac, mp42avc, mp4decrypt, and mp4dump with the same root c... | Out-of-memory bug from AP4_DataBuffer::ReallocateBuffer() in multiple programs (v1.6.0-640) | https://api.github.com/repos/axiomatic-systems/Bento4/issues/872/comments | 2 | 2023-06-12T09:44:14Z | 2024-02-17T17:35:35Z | https://github.com/axiomatic-systems/Bento4/issues/872 | 1,752,341,840 | 872 | 5,976 |
CVE-2024-25452 | 2024-02-09T15:15:09.193 | Bento4 v1.6.0-640 was discovered to contain an out-of-memory bug via the AP4_UrlAtom::AP4_UrlAtom() function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/873"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*",
"matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"400"
] | 400 | https://github.com/axiomatic-systems/Bento4/issues/873 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | Hi,
There is another out-of-memory bug in the latest version (1.6.0-640) of mp4info because of the function AP4_UrlAtom::AP4_UrlAtom() at Ap4UrlAtom.cpp:71.
Unlike the issue #771, this vunerability happened in the different function AP4_UrlAtom::AP4_UrlAtom().
Here is the output of program with address saniti... | Out-of-memory bug from AP4_UrlAtom::AP4_UrlAtom() in v1.6.0-640 | https://api.github.com/repos/axiomatic-systems/Bento4/issues/873/comments | 1 | 2023-06-12T10:03:27Z | 2024-02-20T02:41:04Z | https://github.com/axiomatic-systems/Bento4/issues/873 | 1,752,379,751 | 873 | 5,977 |
CVE-2024-25453 | 2024-02-09T15:15:09.240 | Bento4 v1.6.0-640 was discovered to contain a NULL pointer dereference via the AP4_StszAtom::GetSampleSize() function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/204"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/axiomatic-systems/Bent... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*",
"matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"476"
] | 476 | https://github.com/axiomatic-systems/Bento4/issues/204 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | On master compiled on 2017-09-10 (but please confirm if this affects current stable):
```
# mp4compact $FILE out.mp4
ASAN:DEADLYSIGNAL
=================================================================
==156195==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000060a4b3 bp 0x7ffed6dd9e30 s... | NULL pointer dereference in AP4_StszAtom::GetSampleSize (Ap4StszAtom.cpp) | https://api.github.com/repos/axiomatic-systems/Bento4/issues/204/comments | 0 | 2017-09-15T07:10:24Z | 2017-12-17T00:59:26Z | https://github.com/axiomatic-systems/Bento4/issues/204 | 257,947,117 | 204 | 5,978 |
CVE-2024-25453 | 2024-02-09T15:15:09.240 | Bento4 v1.6.0-640 was discovered to contain a NULL pointer dereference via the AP4_StszAtom::GetSampleSize() function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/204"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/axiomatic-systems/Bent... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*",
"matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"476"
] | 476 | https://github.com/axiomatic-systems/Bento4/issues/874 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | Hi,
There still exists the null pointer reference bug in the latest version (1.6.0-640) of mp4info by the function AP4_StszAtom::GetSampleSize().
Here is the output of program with address sanitizer attached.
### Bug Report
File:
major brand: isom
minor version: 200
compatible brand: isom
... | NULL pointer reference from AP4_StszAtom::GetSampleSize() in v1.6.0-640 | https://api.github.com/repos/axiomatic-systems/Bento4/issues/874/comments | 1 | 2023-06-12T10:08:57Z | 2024-02-17T17:33:31Z | https://github.com/axiomatic-systems/Bento4/issues/874 | 1,752,392,145 | 874 | 5,979 |
CVE-2024-25454 | 2024-02-09T15:15:09.293 | Bento4 v1.6.0-640 was discovered to contain a NULL pointer dereference via the AP4_DescriptorFinder::Test() function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/875"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*",
"matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"476"
] | 476 | https://github.com/axiomatic-systems/Bento4/issues/875 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | Hi,
There still exists the null pointer reference bug in the latest version (1.6.0-640) of mp4info by the function AP4_DescriptorFinder::Test().
Here is the output of program with address sanitizer attached.
### Bug Report
File:
major brand: isom
minor version: 200
compatible brand: isom
c... | NULL pointer reference from AP4_DescriptorFinder::Test() in v1.6.0-640 | https://api.github.com/repos/axiomatic-systems/Bento4/issues/875/comments | 1 | 2023-06-12T10:12:34Z | 2024-02-17T17:30:47Z | https://github.com/axiomatic-systems/Bento4/issues/875 | 1,752,398,555 | 875 | 5,980 |
CVE-2023-52427 | 2024-02-11T04:15:08.100 | In OpenDDS through 3.27, there is a segmentation fault for a DataWriter with a large value of resource_limits.max_samples. NOTE: the vendor's position is that the product is not designed to handle a max_samples value that is too large for the amount of memory on the system. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/OpenDDS/OpenDDS/issues/4388"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/OpenDDS... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:objectcomputing:opendds:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1DE845EB-4121-4281-9997-6B7AD6555F62",
"versionEndExcluding": null,
"versionEndIncluding": "3.27",
"versionStart... | [
"770"
] | 770 | https://github.com/OpenDDS/OpenDDS/issues/4388 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"OpenDDS",
"OpenDDS"
] | ### Expected behavior
Process will exit with 0.
### Current behavior
Process exited with signal SIGSEGV, Segmentation fault.
### Steps to Reproduce
1. Create Participant, Topic, Publisher with default qos like [this example](https://opendds.readthedocs.io/en/latest-release/devguide/getting_started.html#ge... | Segmentation fault while create_datawriter | https://api.github.com/repos/OpenDDS/OpenDDS/issues/4388/comments | 3 | 2023-12-12T01:43:08Z | 2024-01-02T20:55:51Z | https://github.com/OpenDDS/OpenDDS/issues/4388 | 2,036,823,315 | 4,388 | 5,981 |
CVE-2023-52430 | 2024-02-12T23:15:08.353 | The caddy-security plugin 1.1.20 for Caddy allows reflected XSS via a GET request to a URL that contains an XSS payload and begins with either a /admin or /settings/mfa/delete/ substring. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:authcrunch:caddy-security:1.1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "0DA78C41-C188-45AD-9102-E019F39AC33F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | [
"79"
] | 79 | https://github.com/greenpau/caddy-security/issues/264 | [
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"greenpau",
"caddy-security"
] | _Severity: High_
Reflected XSS occurs when an application includes untrusted data in the HTML response sent to the user’s browser. In this case, the provided` /admin%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E/admin/login` or `/settings/mfa/delete/<img%20src=x%20onerror=alert(document.domain)>` API calls tr... | Reflected Cross-Site Scripting | https://api.github.com/repos/greenpau/caddy-security/issues/264/comments | 0 | 2023-09-19T09:29:44Z | 2023-12-02T14:49:00Z | https://github.com/greenpau/caddy-security/issues/264 | 1,902,573,548 | 264 | 5,982 |
CVE-2024-25407 | 2024-02-13T01:15:08.470 | SteVe v3.6.0 was discovered to use predictable transaction ID's when receiving a StartTransaction request. This vulnerability can allow attackers to cause a Denial of Service (DoS) by using the predicted transaction ID's to terminate other transactions. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/steve-community/steve/issues/1296"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "http... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:steve_project:steve:3.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "52995AEA-4A65-44AB-B065-FB388B746B2B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"331"
] | 331 | https://github.com/steve-community/steve/issues/1296 | [
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"steve-community",
"steve"
] | #### Checklist
- [x] I checked other issues already, but found no answer/solution
- [ ] I checked the documentation and wiki, but found no answer/solution
- [ ] I am running the latest version and the issue still occurs
- [x] I am sure that this issue is about SteVe (and not about the charging station software or... | Predictable Transaction ID Possible Vulnerability Allows Unauthorized Termination of OCPP Sessions | https://api.github.com/repos/steve-community/steve/issues/1296/comments | 4 | 2023-11-09T18:52:38Z | 2023-12-02T22:41:17Z | https://github.com/steve-community/steve/issues/1296 | 1,986,217,837 | 1,296 | 5,983 |
CVE-2022-48623 | 2024-02-13T05:15:08.530 | The Cpanel::JSON::XS package before 4.33 for Perl performs out-of-bounds accesses in a way that allows attackers to obtain sensitive information or cause a denial of service. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/briandfoy/cpan-security-advisory/blob/9374f98bef51e1ae887f293234050551c079776f/cpansa/CPANSA-Cpanel-JSON-XS.yml#L25-L36"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https:/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rurban:cpanel\\:\\:json\\:\\:xs:*:*:*:*:*:perl:*:*",
"matchCriteriaId": "58166818-0306-488E-A452-FAE305E4FD88",
"versionEndExcluding": "4.33",
"versionEndIncluding": null,
"v... | [
"125"
] | 125 | https://github.com/rurban/Cpanel-JSON-XS/issues/208 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"rurban",
"Cpanel-JSON-XS"
] | Cpanel::JSON::XS Version 4.32 (I do not know if this is new behaviour, haven't tested older versions):
If passed invalid JSON of the form "[{sometext}]" in relaxed mode, the module will only sometimes give the correct character offset, sometimes throw UTF-8 errors, sometimes segfault and sometimes let the process ha... | Bug: Wrong error messages/sometimes crashes or endless loops with invalid JSON in relaxed mode | https://api.github.com/repos/rurban/Cpanel-JSON-XS/issues/208/comments | 2 | 2022-11-16T13:43:13Z | 2024-02-13T18:12:00Z | https://github.com/rurban/Cpanel-JSON-XS/issues/208 | 1,451,633,191 | 208 | 5,984 |
CVE-2023-51931 | 2024-02-16T09:15:08.247 | An issue in alanclarke URLite v.3.1.0 allows an attacker to cause a denial of service (DoS) via a crafted payload to the parsing function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gist.github.com/6en6ar/c792d8337b63f095cbda907e834cb4ba"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/alancla... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:alanclarke:urlite:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "3A1B3287-113D-4D8D-A7F6-F37973DF3600",
"versionEndExcluding": null,
"versionEndIncluding": "3.1.0",
"versionStar... | [
"1333"
] | 1333 | https://github.com/alanclarke/urlite/issues/61 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"alanclarke",
"urlite"
] | The regex inside lib/pattern.js file seems to be vulnerable to Regex denial of service. I used this payload to cause a 17 second delay when a URL is processed by the parse() function. Maybe it can be even longer, probably depends on the length.
**'//:' + '\t:\t'.repeat(90000)+ '\t'** | Security issue in regex | https://api.github.com/repos/alanclarke/urlite/issues/61/comments | 0 | 2024-01-22T21:32:48Z | 2024-01-22T21:32:48Z | https://github.com/alanclarke/urlite/issues/61 | 2,094,790,591 | 61 | 5,985 |
CVE-2024-21493 | 2024-02-17T05:15:08.747 | All versions of the package github.com/greenpau/caddy-security are vulnerable to Improper Validation of Array Index when parsing a Caddyfile. Multiple parsing functions in the affected library do not validate whether their input values are nil before attempting to access elements, which can lead to a panic (index out o... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integ... | [
{
"source": "report@snyk.io",
"tags": [
"Third Party Advisory"
],
"url": "https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/"
},
{
"source": "report@snyk.io",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/greenpau/caddy-secur... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:greenpau:caddy-security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC59AC36-173D-4F24-9F39-50F992A248B8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"129"
] | 129 | https://github.com/greenpau/caddy-security/issues/263 | [
"Issue Tracking"
] | github.com | [
"greenpau",
"caddy-security"
] | _Severity: Low_
Multiple parsing functions do not validate whether their input values are nil before attempting to access elements, which can lead to a panic (index out of range). Panics during the parsing of a Caddyfile may introduce ambiguity and vulnerabilities, hindering the correct interpretation and configurat... | Multiple Panics when Parsing Caddyfile | https://api.github.com/repos/greenpau/caddy-security/issues/263/comments | 0 | 2023-09-19T09:24:59Z | 2023-12-02T14:48:50Z | https://github.com/greenpau/caddy-security/issues/263 | 1,902,565,722 | 263 | 5,986 |
CVE-2024-21494 | 2024-02-17T05:15:09.077 | All versions of the package github.com/greenpau/caddy-security are vulnerable to Authentication Bypass by Spoofing via the X-Forwarded-For header due to improper input sanitization. An attacker can spoof an IP address used in the user identity module (/whoami API endpoint). This could lead to unauthorized access if the... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "report@snyk.io",
"tags": [
"Third Party Advisory"
],
"url": "https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/"
},
{
"source": "report@snyk.io",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/greenpau/caddy-secur... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:greenpau:caddy-security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC59AC36-173D-4F24-9F39-50F992A248B8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"290"
] | 290 | https://github.com/greenpau/caddy-security/issues/266 | [
"Issue Tracking"
] | github.com | [
"greenpau",
"caddy-security"
] | _Severity: Medium_
By manipulating the X-Forwarded-For header, an attacker can spoof an IP address used in the user identity module (/whoami API endpoint). This could lead to unauthorized access if the system trusts this spoofed IP address.
HTTP request-response cycle with the injected `X-Forwarded-For` header:
... | IP Spoofing via X-Forwarded-For Header | https://api.github.com/repos/greenpau/caddy-security/issues/266/comments | 0 | 2023-09-19T09:37:14Z | 2023-12-02T14:29:45Z | https://github.com/greenpau/caddy-security/issues/266 | 1,902,586,609 | 266 | 5,987 |
CVE-2024-21495 | 2024-02-17T05:15:09.343 | Versions of the package github.com/greenpau/caddy-security before 1.0.42 are vulnerable to Insecure Randomness due to using an insecure random number generation library which could possibly be predicted via a brute-force search. Attackers could use the potentially predictable nonce value used for authentication purpose... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "report@snyk.io",
"tags": [
"Third Party Advisory"
],
"url": "https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/"
},
{
"source": "report@snyk.io",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/greenpau/caddy-secur... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:greenpau:caddy-security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9E38C1D1-8679-4D77-858C-E2DCDAC2440C",
"versionEndExcluding": "1.0.42",
"versionEndIncluding": null,
"versionSta... | [
"330"
] | 330 | https://github.com/greenpau/caddy-security/issues/265 | [
"Issue Tracking"
] | github.com | [
"greenpau",
"caddy-security"
] | _Severity: High_
The caddy-security plugin uses the math/rand Golang library with a seed based on the Unix timestamp to generate strings for three security-critical contexts in the application, which could possibly be predicted via a brute-force search. Attackers could use the potentially predictable nonce value use... | Insecure Randomness | https://api.github.com/repos/greenpau/caddy-security/issues/265/comments | 6 | 2023-09-19T09:34:06Z | 2023-12-09T14:47:04Z | https://github.com/greenpau/caddy-security/issues/265 | 1,902,581,538 | 265 | 5,988 |
CVE-2024-21497 | 2024-02-17T05:15:09.863 | All versions of the package github.com/greenpau/caddy-security are vulnerable to Open Redirect via the redirect_url parameter. An attacker could perform a phishing attack and trick users into visiting a malicious website by crafting a convincing URL with this parameter. To exploit this vulnerability, the user must take... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "report@snyk.io",
"tags": [
"Mitigation",
"Third Party Advisory"
],
"url": "https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/"
},
{
"source": "report@snyk.io",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:greenpau:caddy-security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC59AC36-173D-4F24-9F39-50F992A248B8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"601"
] | 601 | https://github.com/greenpau/caddy-security/issues/268 | [
"Issue Tracking"
] | github.com | [
"greenpau",
"caddy-security"
] | When a logged-in user clicks on a specially crafted link with a `redirect_url` parameter, the user can be redirected to an external website. The user must take an action, such as clicking on a portal button or using the browser’s back button, to trigger the redirection. This could lead to phishing attacks, where an att... | Open Redirection Vulnerability | https://api.github.com/repos/greenpau/caddy-security/issues/268/comments | 3 | 2023-09-19T09:53:46Z | 2024-07-24T10:23:04Z | https://github.com/greenpau/caddy-security/issues/268 | 1,902,619,338 | 268 | 5,989 |
CVE-2024-21499 | 2024-02-17T05:15:10.400 | All versions of the package github.com/greenpau/caddy-security are vulnerable to HTTP Header Injection via the X-Forwarded-Proto header due to redirecting to the injected protocol.Exploiting this vulnerability could lead to bypass of security mechanisms or confusion in handling TLS. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "report@snyk.io",
"tags": [
"Third Party Advisory"
],
"url": "https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/"
},
{
"source": "report@snyk.io",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/greenpau/caddy-secur... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:greenpau:caddy-security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC59AC36-173D-4F24-9F39-50F992A248B8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"116"
] | 116 | https://github.com/greenpau/caddy-security/issues/270 | [
"Issue Tracking"
] | github.com | [
"greenpau",
"caddy-security"
] | _Severity: Low_
The processing of the X-Forwarded-Proto header results in redirection to the injected protocol. While this scenario may have limited impact, improper handling of such headers could result in unpredictable security risks, such as bypass of security mechanisms or confusion in handling TLS.
```http
... | X-Forwarded-Proto Header Manipulation | https://api.github.com/repos/greenpau/caddy-security/issues/270/comments | 0 | 2023-09-19T10:04:09Z | 2023-12-02T14:28:13Z | https://github.com/greenpau/caddy-security/issues/270 | 1,902,637,888 | 270 | 5,990 |
CVE-2024-25898 | 2024-02-21T18:15:51.820 | A XSS vulnerability was found in the ChurchCRM v.5.5.0 functionality, edit your event, where malicious JS or HTML code can be inserted in the Event Sermon field in EventEditor.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ChurchCRM/CRM/issues/6851"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ChurchCRM... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:churchcrm:churchcrm:5.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1FEB8DD0-3ADC-4C06-84DF-9296533BFBD7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"79"
] | 79 | https://github.com/ChurchCRM/CRM/issues/6851 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ChurchCRM",
"CRM"
] | If you have the ChurchCRM software running, please file an issue using the Report an issue in the help menu.
On what page in the application did you find this issue?
EventEditor.php
On what type of server is this running? Dedicated / Shared hosting? Linux / Windows?
Linux
What browser (and version) are you r... | Security Bug: SELF XSS - Event Editor | https://api.github.com/repos/ChurchCRM/CRM/issues/6851/comments | 2 | 2024-02-10T14:07:57Z | 2024-06-12T13:16:53Z | https://github.com/ChurchCRM/CRM/issues/6851 | 2,128,477,169 | 6,851 | 5,991 |
CVE-2024-26151 | 2024-02-22T19:15:09.300 | The `mjml` PyPI package, found at the `FelixSchwarz/mjml-python` GitHub repo, is an unofficial Python port of MJML, a markup language created by Mailjet. All users of `FelixSchwarz/mjml-python` who insert untrusted data into mjml templates unless that data is checked in a very strict manner. User input like `<script... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrit... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/FelixSchwarz/mjml-python/commit/84c495da20a91640a1ca551ace17df7f3be644aa"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/Fel... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:felixschwarz:mjml-python:0.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0C7B3A43-C31C-4105-8FC7-6220776CE487",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"79"
] | 79 | https://github.com/FelixSchwarz/mjml-python/issues/52 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"FelixSchwarz",
"mjml-python"
] | Consider:
```python
from mjml import mjml_to_html
result = mjml_to_html("""
<mjml>
<mj-body>
<mj-text>
Pretty unsafe: <script>
</mj-text>
</mj-body>
</mjml>""")
print(result["html"])
```
In the resulting HTML output, the formerly HTML-escaped `<` (`<`) and `>` (`>`) are... | Escaped HTML tags are "un-escaped" when rendering HTML | https://api.github.com/repos/FelixSchwarz/mjml-python/issues/52/comments | 8 | 2024-02-19T13:58:40Z | 2024-02-22T16:46:22Z | https://github.com/FelixSchwarz/mjml-python/issues/52 | 2,142,438,119 | 52 | 5,992 |
CVE-2024-22201 | 2024-02-26T16:27:56.343 | Jetty is a Java based web server and servlet engine. An HTTP/2 SSL connection that is established and TCP congested will be leaked when it times out. An attacker can cause many connections to end up in this state, and the server may run out of file descriptors, eventually causing the server to stop accepting new connec... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "security-advisories@github.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2024/03/20/2"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
"matchCriteriaId": "81569DC0-AF55-4626-9C18-E28CE3C59946",
"versionEndExcluding": "9.4.54",
"versionEndIncluding": null,
"versionStartExcludin... | [
"770"
] | 770 | https://github.com/jetty/jetty.project/issues/11256 | [
"Issue Tracking"
] | github.com | [
"jetty",
"jetty.project"
] | **Jetty version(s)**
Jetty 9.4.48.v20220622
**Jetty Environment**
<!-- Applicable for jetty-12 only, choose: core, ee8, ee9, ee10 -->
**Java version/vendor** `(use: java -version)`
JDK8
**OS type/version**
suse 12.5
**Description**
4.252.83.81 is client
11.19.120.119 is server
when the server send the ... | the ssl connection can not be closed when the status is NEED_UNWRAP | https://api.github.com/repos/jetty/jetty.project/issues/11256/comments | 12 | 2024-01-09T09:27:26Z | 2024-01-11T15:52:34Z | https://github.com/jetty/jetty.project/issues/11256 | 2,071,964,666 | 11,256 | 5,993 |
CVE-2024-27088 | 2024-02-26T17:15:11.000 | es5-ext contains ECMAScript 5 extensions. Passing functions with very long names or complex default argument names into `function#copy` or `function#toStringTokens` may cause the script to stall. The vulnerability is patched in v0.10.63. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 0,
"baseSeverity": "NONE",
"confidentialityImpact": "NONE",
"integrityI... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/medikoo/es5-ext/commit/3551cdd7b2db08b1632841f819d008757d28e8e2"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/medikoo/es5-... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:medikoo:es5-ext:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "B05B11A7-0D8E-4AA2-8332-266A0C3483F1",
"versionEndExcluding": "0.10.63",
"versionEndIncluding": null,
"versionStar... | [
"1333"
] | 1333 | https://github.com/medikoo/es5-ext/issues/201 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"medikoo",
"es5-ext"
] | Test Environment:
Apple M1 macbook air, 2020 (ventura 13.3.1)
node module
name : es5-ext
node js
version : v18.16.0
2023_09_26
이동하 ( Lee Dong Ha of ZeroPointer Lab )
강성현 ( kang seonghyeun )
박성진 ( sungjin park )
김찬호 ( Chanho Kim )
이수영 ( Lee Su Young )
김민욱 ( MinUk Kim )
... | redos in es5-ext | https://api.github.com/repos/medikoo/es5-ext/issues/201/comments | 24 | 2023-09-26T01:10:19Z | 2024-02-26T09:04:36Z | https://github.com/medikoo/es5-ext/issues/201 | 1,912,511,313 | 201 | 5,994 |
CVE-2024-23052 | 2024-02-29T01:44:07.820 | An issue in WuKongOpenSource WukongCRM v.72crm_9.0.1_20191202 allows a remote attacker to execute arbitrary code via the parseObject() function in the fastjson component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/By-Yexing/Vulnerability_JAVA/blob/main/2024/WukongCRM_9.0.md#1remote-code-execution-vulnerability"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Trackin... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:5kcrm:wukongcrm:9.0.1_20191202:*:*:*:*:*:*:*",
"matchCriteriaId": "41B29C6B-E591-4FC4-8D6C-C1C455EFF800",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"502"
] | 502 | https://github.com/WuKongOpenSource/WukongCRM-9.0-JAVA/issues/28 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"WuKongOpenSource",
"WukongCRM-9.0-JAVA"
] | In version 72crm_9.0.1_20191202, insecure components are used, which causes potential remote command execution. Attackers can directly attack the system without authorization.
An insecure version of the fastjson component was used
![1704856112485](https://github.com/WuKongOpenSource/WukongCRM-9.0-JAVA/assets/10780652... | Remote command execution vulnerability | https://api.github.com/repos/WuKongOpenSource/WukongCRM-9.0-JAVA/issues/28/comments | 1 | 2024-01-10T03:58:43Z | 2024-01-10T04:01:11Z | https://github.com/WuKongOpenSource/WukongCRM-9.0-JAVA/issues/28 | 2,073,540,232 | 28 | 5,995 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.