cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2019-12950
2019-08-06T17:15:43.837
An issue was discovered in TeamPass 2.1.27.35. From the sources/items.queries.php "Import items" feature, it is possible to load a crafted CSV file with an XSS payload.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nilsteampassnet/TeamPass/issues/2638" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/nil...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:teampass:teampass:2.1.27.35:*:*:*:*:*:*:*", "matchCriteriaId": "89FC0190-8E89-4809-86A9-B251619DC27E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "79" ]
79
https://github.com/nilsteampassnet/TeamPass/issues/2638
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nilsteampassnet", "TeamPass" ]
### Steps to reproduce 1. Create a CSV file with the following data: ``` <img src=x onerror='alert(document.cookie+" "+document.getElementById("input_personal_saltkey").value);'>My_password.txt ```` 2. From Teampass, go select "Import items" feature 3. On the CSV tab, select the file previously created. 4. S...
Stored XSS
https://api.github.com/repos/nilsteampassnet/TeamPass/issues/2638/comments
0
2019-06-25T14:22:03Z
2022-10-31T04:40:37Z
https://github.com/nilsteampassnet/TeamPass/issues/2638
460,455,659
2,638
617
CVE-2019-14731
2019-08-07T00:15:10.907
An issue was discovered in ZenTao 11.5.1. There is an XSS (stored) vulnerability that leads to the capture of other people's cookies via the Rich Text Box.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/easysoft/zentaopms/issues/35" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cnezsoft:zentao:11.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D33981E2-2866-49B9-9EEC-590D4D74D588", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "79" ]
79
https://github.com/easysoft/zentaopms/issues/35
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "easysoft", "zentaopms" ]
There exists XSS(stored) vulnerability in Rich Text Box. The vulnerability replication process is as follows: 1. Capture packets when you add picture through Rich Text Box. 2. Then, change raw data into `<img src="a" onerror="alert(document.cookie)" />`. 3. After successful saving,users' cookies will pop up.
There is one XSS(stored) vulnerability that can get Cookies from other account
https://api.github.com/repos/easysoft/zentaopms/issues/35/comments
5
2019-08-05T14:59:11Z
2021-05-31T01:55:32Z
https://github.com/easysoft/zentaopms/issues/35
476,908,646
35
618
CVE-2019-14732
2019-08-07T01:15:10.680
AdPlug 2.3.1 has multiple heap-based buffer overflows in Ca2mLoader::load() in a2m.cpp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/adplug/adplug/issues/88" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40l...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adplug_project:adplug:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "F8E042B0-0F5C-4370-9F20-EE741349CAE2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "787" ]
787
https://github.com/adplug/adplug/issues/88
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "adplug", "adplug" ]
Hi, While fuzzing AdPlug with American Fuzzy Lop, I found multiple heap-based buffer overflows in Ca2mLoader::load(), in src/a2m.cpp L106 and L184. Attaching reproducers for both issues (gzipped so GitHub accepts them): - [test01.a2m.gz](https://github.com/adplug/adplug/files/3471840/test01.a2m.gz) - [test02.a2...
Multiple heap-based buffer overflows in Ca2mLoader::load()
https://api.github.com/repos/adplug/adplug/issues/88/comments
2
2019-08-06T11:11:24Z
2020-05-11T11:05:07Z
https://github.com/adplug/adplug/issues/88
477,318,379
88
619
CVE-2019-14733
2019-08-07T01:15:10.773
AdPlug 2.3.1 has multiple heap-based buffer overflows in CradLoader::load() in rad.cpp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/adplug/adplug/issues/89" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/m...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adplug_project:adplug:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "F8E042B0-0F5C-4370-9F20-EE741349CAE2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "787" ]
787
https://github.com/adplug/adplug/issues/89
[ "Exploit", "Third Party Advisory" ]
github.com
[ "adplug", "adplug" ]
Hi, While fuzzing AdPlug with American Fuzzy Lop, I found multiple heap-based buffer overflows in CradLoader::load(), in src/rad.cpp L74 and L85. Attaching reproducers for both issues (gzipped so GitHub accepts them): - [test01.rad.gz](https://github.com/adplug/adplug/files/3472052/test01.rad.gz) - [test02.rad....
Multiple heap-based buffer overflows in CradLoader::load()
https://api.github.com/repos/adplug/adplug/issues/89/comments
1
2019-08-06T11:58:03Z
2020-05-11T11:05:07Z
https://github.com/adplug/adplug/issues/89
477,337,678
89
620
CVE-2019-14734
2019-08-07T01:15:10.837
AdPlug 2.3.1 has multiple heap-based buffer overflows in CmtkLoader::load() in mtk.cpp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/adplug/adplug/issues/90" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/m...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adplug_project:adplug:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "F8E042B0-0F5C-4370-9F20-EE741349CAE2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "787" ]
787
https://github.com/adplug/adplug/issues/90
[ "Exploit", "Third Party Advisory" ]
github.com
[ "adplug", "adplug" ]
Hi, While fuzzing AdPlug with American Fuzzy Lop, I found multiple heap-based buffer overflows in CmtkLoader::load(), in src/mtk.cpp L95 and L103. Attaching reproducers for both issues (gzipped so GitHub accepts them): - [test01.mtk.gz](https://github.com/adplug/adplug/files/3472238/test01.mtk.gz) - [test02.mtk...
Multiple heap-based buffer overflows in CmtkLoader::load()
https://api.github.com/repos/adplug/adplug/issues/90/comments
1
2019-08-06T12:40:29Z
2020-05-11T11:05:07Z
https://github.com/adplug/adplug/issues/90
477,356,808
90
621
CVE-2019-14746
2019-08-07T16:15:12.363
A issue was discovered in KuaiFanCMS 5.0. It allows eval injection by placing PHP code in the install.php db_name parameter and then making a config.php request.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/poropro/kuaifan/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kuaifan:kuaifancms:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4ECFC35F-4E89-49AE-A8E5-D6A1E0B17E2E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "94" ]
94
https://github.com/poropro/kuaifan/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "poropro", "kuaifan" ]
./upload/install.php 136-176 ``` case 'installmodule': //执行SQL extract($_POST); $GLOBALS['dbcharset'] = $dbcharset; $PHP_SELF = isset($_SERVER['PHP_SELF']) ? $_SERVER['PHP_SELF'] : (isset($_SERVER['SCRIPT_NAME']) ? $_SERVER['SCRIPT_NAME'] : $_SERVER['ORIG_PATH_INFO']); $rootpath = str_replace('\\','/',di...
Insert malicious code in the installation process to get a web shell
https://api.github.com/repos/poropro/kuaifan/issues/2/comments
0
2019-07-24T08:40:24Z
2019-07-24T08:40:24Z
https://github.com/poropro/kuaifan/issues/2
472,153,114
2
622
CVE-2019-14747
2019-08-07T16:15:12.457
DWSurvey through 2019-07-22 has stored XSS via the design/my-survey-design!copySurvey.action surveyName parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/wkeyuan/DWSurvey/issues/47" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:diaowen:dwsurvey:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB919E79-6567-4002-A868-F6DB8227313D", "versionEndExcluding": null, "versionEndIncluding": "2019-07-22", "versionStartE...
[ "79" ]
79
https://github.com/wkeyuan/DWSurvey/issues/47
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "wkeyuan", "DWSurvey" ]
**There is a stored XSS vulnerability which allows remote attackers to inject arbitrary web script or stole admin's or other users cookies when copy the survey** **Vulnerability file:** `/design/my-survey-design!copySurvey.action` **PoC:** `/design/my-survey-design!copySurvey.action?surveyName=A%2520test%25EF...
[security vulnerability]stored xss when copy the survey
https://api.github.com/repos/wkeyuan/DWSurvey/issues/47/comments
0
2019-08-07T04:26:10Z
2019-08-07T04:26:10Z
https://github.com/wkeyuan/DWSurvey/issues/47
477,700,590
47
623
CVE-2018-20962
2019-08-08T20:15:11.723
The Backpack\CRUD Backpack component before 3.4.9 for Laravel allows XSS via the select field type.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/Laravel-Backpack/CRUD/blob/master/CHANGELOG.md" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:backpackforlaravel:backpack\\\\crud:*:*:*:*:*:*:*:*", "matchCriteriaId": "140B6BA5-EDEB-4C1C-82A0-7A0C1A0E577D", "versionEndExcluding": "3.4.9", "versionEndIncluding": null, ...
[ "79" ]
79
https://github.com/Laravel-Backpack/CRUD/issues/1297
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Laravel-Backpack", "CRUD" ]
# Bug report Relational columns (select) does not escape html which allows scripts to be executed! https://github.com/Laravel-Backpack/CRUD/blob/master/src/resources/views/columns/select.blade.php ### What I did: ```php $this->crud->setColumnDetails('team_id', [ 'label' => 'Team', 'type' => "select", ...
Cross-site scripting vulnerability
https://api.github.com/repos/Laravel-Backpack/CRUD/issues/1297/comments
9
2018-03-22T21:05:42Z
2018-07-31T07:07:50Z
https://github.com/Laravel-Backpack/CRUD/issues/1297
307,814,521
1,297
624
CVE-2019-14924
2019-08-10T19:15:10.920
An issue was discovered in GCDWebServer before 3.5.3. The method moveItem in the GCDWebUploader class checks the FileExtension of newAbsolutePath but not oldAbsolutePath. By leveraging this vulnerability, an adversary can make an inaccessible file be available (the credential of the app, for instance).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/swisspol/GCDWebServer/commit/02738433bf2e1b820ef48f04edd15df304081802" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gcdwebserver_project:gcdwebserver:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F2F760D-95AB-48E1-9F40-143CB1CCB104", "versionEndExcluding": "3.5.3", "versionEndIncluding": null, "v...
[ "863" ]
863
https://github.com/swisspol/GCDWebServer/issues/433
[ "Third Party Advisory" ]
github.com
[ "swisspol", "GCDWebServer" ]
The method moveItem in GCDWebUploader class checks the FileExtension of newAbsolutePath but not the oldAbsolutePath. By taking this error, adversary can make un-accessible file to be available, credential of the app for instance. I have found real app affected by this vulnerability.
Security issue of GCDWebUploader
https://api.github.com/repos/swisspol/GCDWebServer/issues/433/comments
1
2019-08-07T15:27:55Z
2019-08-09T13:27:18Z
https://github.com/swisspol/GCDWebServer/issues/433
477,997,902
433
625
CVE-2019-14933
2019-08-11T21:15:10.860
Bagisto 0.1.5 allows CSRF under /admin URIs.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://forums.bagisto.com/category/1/announcements" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bagisto/bag...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webkul:bagisto:0.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "400A4D3E-90DA-4ECB-8772-281F17FD862A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "352" ]
352
https://github.com/bagisto/bagisto/issues/750
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "bagisto", "bagisto" ]
**Vulnerable link:** https://demo.bagisto.com/bagisto-103-206-131-18/admin/ **What is CSRF ?** A CSRF attack forces a logged-on victims browser to send a forged HTTP request, including the victims session cookie and any other automatically included authentication information, to a vulnerable web application. **Vu...
Cross site request forgery
https://api.github.com/repos/bagisto/bagisto/issues/750/comments
1
2019-03-27T13:23:39Z
2019-04-12T09:41:24Z
https://github.com/bagisto/bagisto/issues/750
425,957,511
750
626
CVE-2019-12618
2019-08-12T17:15:10.983
HashiCorp Nomad 0.9.0 through 0.9.1 has Incorrect Access Control via the exec driver.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10, "confidentialityImpact": "COMPLETE"...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/hashicorp/nomad/issues/5783" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.hashicorp.com/blog/category/nomad" }, { "source": "cve@m...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hashicorp:nomad:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FC7FFA3-34AC-4996-97C1-C2C23CB8AC80", "versionEndExcluding": null, "versionEndIncluding": "0.9.1", "versionStartExcludi...
[ "269" ]
269
https://github.com/hashicorp/nomad/issues/5783
[ "Third Party Advisory" ]
github.com
[ "hashicorp", "nomad" ]
It was discovered that exec driver tasks run with full Linux capabilities such that processes can escalate to run as privileged root user, despite running as the Linux unprivileged user, nobody. This vulnerability affects versions 0.9.0 and 0.9.1 of Nomad, both OSS and Enterprise and was fixed in #5728. ## Backgrou...
CVE-2019-12618: Privilege Escalation in 0.9.0, 0.9.1
https://api.github.com/repos/hashicorp/nomad/issues/5783/comments
1
2019-06-05T17:50:45Z
2022-11-22T02:29:58Z
https://github.com/hashicorp/nomad/issues/5783
452,635,120
5,783
627
CVE-2019-14968
2019-08-12T18:15:12.427
An issue was discovered in imcat 4.9. There is SQL Injection via the index.php order parameter in a mod=faqs action.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/peacexie/imcat/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:txjia:imcat:4.9:*:*:*:*:*:*:*", "matchCriteriaId": "678F05BD-315E-4C1B-9FCE-9270F8C24F11", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "89" ]
89
https://github.com/peacexie/imcat/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "peacexie", "imcat" ]
**Exploit vulnerability :** Test parameter : order ![image](https://user-images.githubusercontent.com/30228026/62508661-0b14bb00-b83b-11e9-9bdc-d609fb129493.png) Use sqlmap(http://sqlmap.org/) and use sqlmap-tamper : unmagicquotes payload: `sqlmap -u 'http://imcat.txjia.com//index.php?sch_faqs=%E6%90%9C%...
the vulnerability report: sql injection vulnerability in index.php page .
https://api.github.com/repos/peacexie/imcat/issues/2/comments
1
2019-08-06T03:03:00Z
2019-08-12T03:54:49Z
https://github.com/peacexie/imcat/issues/2
477,144,774
2
628
CVE-2019-14980
2019-08-12T23:15:11.493
In ImageMagick 7.x before 7.0.8-42 and 6.x before 6.9.10-42, there is a use after free vulnerability in the UnmapBlob function that allows an attacker to cause a denial of service by sending a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "20ADD76D-50E8-4DCE-8572-28070BFE3835", "versionEndExcluding": "6.9.10-42", "versionEndIncluding": null, "version...
[ "416" ]
416
https://github.com/ImageMagick/ImageMagick6/issues/43
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick6" ]
In magick/blob.c line 702, the function UnmapBlob freed the object 'blob_info->data', but it did't set the point null. The code returned this dangling point in line 716, it will cause UAF in this code.
Use after free in magick/blob.c
https://api.github.com/repos/ImageMagick/ImageMagick6/issues/43/comments
2
2019-04-22T02:28:38Z
2019-08-18T16:31:32Z
https://github.com/ImageMagick/ImageMagick6/issues/43
435,576,558
43
629
CVE-2019-14981
2019-08-12T23:15:11.600
In ImageMagick 7.x before 7.0.8-41 and 6.x before 6.9.10-41, there is a divide-by-zero vulnerability in the MeanShiftImage function. It allows an attacker to cause a denial of service by sending a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "26AC6455-68F9-418E-B71A-3E9A35155603", "versionEndExcluding": "6.9.10-41", "versionEndIncluding": null, "version...
[ "369" ]
369
https://github.com/ImageMagick/ImageMagick/issues/1552
[ "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
MagickCore/feature.c In line 2259, it assgin 'count=0', the code make a loop as 'for (v=(-((ssize_t) height/2)); v <= (((ssize_t) height/2)); v++)' , the 'count++' in this loop and the 'gamma=1.0/count' in line 2291. But the count is 0 in some cases. It may happen DIVIDE_BY_ZERO bug if the code don't get in this l...
DIVIDE_BY_ZERO in feature.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1552/comments
2
2019-04-18T06:16:56Z
2019-08-18T16:30:47Z
https://github.com/ImageMagick/ImageMagick/issues/1552
434,607,141
1,552
630
CVE-2019-14982
2019-08-12T23:15:11.663
In Exiv2 before v0.27.2, there is an integer overflow vulnerability in the WebPImage::getHeaderOffset function in webpimage.cpp. It can lead to a buffer overflow vulnerability and a crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/compare/v0.27.2-RC2...v0.27.2" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://gi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A0D0423-EA55-4C2F-8CC8-25E5B9F875A6", "versionEndExcluding": "0.27.2", "versionEndIncluding": null, "versionStartExcluding"...
[ "190" ]
190
https://github.com/Exiv2/exiv2/issues/960
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "Exiv2", "exiv2" ]
**Describe the bug** I found a buffer overflow bugs in exiv2/src/webpimage.cpp:837 due to integer overflow. **To Reproduce** Steps to reproduce the behaviour: exiv2/build/bin/exiv2 exiv2_getHeaderOffset.poc **Expected behavior** In Exiv2::WebPImage::getHeaderOffset, integer overflow occurs when data_size is les...
buffer overflow in exiv2/src/webpimage.cpp
https://api.github.com/repos/Exiv2/exiv2/issues/960/comments
4
2019-07-15T02:53:48Z
2019-10-28T11:28:20Z
https://github.com/Exiv2/exiv2/issues/960
467,920,688
960
631
CVE-2019-14993
2019-08-13T18:15:13.117
Istio before 1.1.13 and 1.2.x before 1.2.4 mishandles regular expressions for long URIs, leading to a denial of service during use of the JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*", "matchCriteriaId": "20977A28-2513-4FD5-9673-AAA6D9EC8F9F", "versionEndExcluding": "1.1.13", "versionEndIncluding": null, "versionStartExcluding"...
[ "185" ]
185
https://github.com/envoyproxy/envoy/issues/7728
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "envoyproxy", "envoy" ]
*Description*: We've noticed that requests with a very long URI crashes our envoy service for routes defined using a regex matcher. We're not sure if it's due to some overflow bug in Envoy's regex parser, but ideally Envoy should not crash because of a long URI. *Repro steps*: Define a route with a match regex ...
route regex match fails for large URIs
https://api.github.com/repos/envoyproxy/envoy/issues/7728/comments
13
2019-07-26T00:42:53Z
2019-08-23T19:47:31Z
https://github.com/envoyproxy/envoy/issues/7728
473,126,532
7,728
632
CVE-2019-15047
2019-08-14T16:15:12.783
An issue was discovered in Bento4 1.5.1.0. There is a heap-based buffer over-read in the function AP4_BitReader::SkipBits at Core/Ap4Utils.cpp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/bento4/issues/408" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "125" ]
125
https://github.com/axiomatic-systems/bento4/issues/408
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "bento4" ]
# bento4 ## version bento4 1.5.1.0 ## description ```txt mp42acc 1.0 ``` ## download link https://www.bento4.com/ ## others please send email to teamseri0us360@gmail.com if you have any questions. --------------------- ## (1) AP4_BitReader::SkipBits@Ap4Utils.cpp-548___heap-...
2 Potential Buffer Overflow Vulnerabilities
https://api.github.com/repos/axiomatic-systems/Bento4/issues/408/comments
0
2019-07-19T06:39:22Z
2019-08-25T16:24:15Z
https://github.com/axiomatic-systems/Bento4/issues/408
470,163,532
408
633
CVE-2019-15048
2019-08-14T16:15:12.830
An issue was discovered in Bento4 1.5.1.0. There is a heap-based buffer overflow in the AP4_RtpAtom class at Core/Ap4RtpAtom.cpp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/bento4/issues/409" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "787" ]
787
https://github.com/axiomatic-systems/bento4/issues/409
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "bento4" ]
# bento4 ## version bento4 1.5.1.0 ## description ```txt None ``` ## download link https://www.bento4.com/ ## others please send email to teamseri0us360@gmail.com if you have any questions. --------------------- ## AP4_AvccAtom::Create@Ap4AvccAtom.cpp-88___heap-buffer-overf...
3 potential vulerabilities
https://api.github.com/repos/axiomatic-systems/Bento4/issues/409/comments
0
2019-07-31T05:24:56Z
2019-08-25T16:24:01Z
https://github.com/axiomatic-systems/Bento4/issues/409
474,942,702
409
634
CVE-2019-15052
2019-08-14T20:15:11.650
The HTTP client in Gradle before 5.6 sends authentication credentials originally destined for the configured host. If that host returns a 30x redirect, Gradle also sends those credentials to all subsequent hosts that the request redirects to. This is similar to CVE-2018-1000007.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gradle/gradle/issues/10278" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gradle:gradle:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B7A5A65-A668-4B9D-A69A-CA88776E1FBD", "versionEndExcluding": "5.6", "versionEndIncluding": null, "versionStartExcluding":...
[ "522" ]
522
https://github.com/gradle/gradle/issues/10278
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gradle", "gradle" ]
This issue is to discuss [CVE-2019-15052](https://nvd.nist.gov/vuln/detail/CVE-2019-15052) and answer any questions that people may have. Our official advisory can be found here: https://github.com/gradle/gradle/security/advisories/GHSA-4cwg-f7qc-6r95 ### CVSSv3 Score We believe that this vulnerability will re...
[DISCUSSION] CVE-2019-15052: Repository authentication sent to server of HTTP redirection response
https://api.github.com/repos/gradle/gradle/issues/10278/comments
9
2019-08-14T19:06:06Z
2023-03-20T17:06:00Z
https://github.com/gradle/gradle/issues/10278
480,840,504
10,278
635
CVE-2019-15058
2019-08-14T21:15:13.687
stb_image.h (aka the stb image loader) 2.23 has a heap-based buffer over-read in stbi__tga_load, leading to Information Disclosure or Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934973" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/790" }, { "source": "cve@mitr...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stb_project:stb:2.23:*:*:*:*:*:*:*", "matchCriteriaId": "FAC51233-5119-4F4E-B6DF-E29385B6E5D9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "125" ]
125
https://github.com/nothings/stb/issues/790
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
I find heap-buffer-overflow in stbi__tga_load with lastest version: 2.23 POC: ``` #define STBI_WINDOWS_UTF8 #define STB_IMAGE_WRITE_IMPLEMENTATION #include "stb_image_write.h" #define STB_IMAGE_IMPLEMENTATION #include "stb_image.h" #define STB_DEFINE #include "stb.h" #include<stdio.h> #include<stdlib.h> uns...
heap-buffer-overflow and denial-of-service in stbi__tga_load with version: 2.23
https://api.github.com/repos/nothings/stb/issues/790/comments
4
2019-08-13T08:52:36Z
2021-07-03T04:54:20Z
https://github.com/nothings/stb/issues/790
480,036,373
790
636
CVE-2019-15062
2019-08-14T23:15:10.437
An issue was discovered in Dolibarr 11.0.0-alpha. A user can store an IFRAME element (containing a user/card.php CSRF request) in his Linked Files settings page. When visited by the admin, this could completely take over the admin account. (The protection mechanism for CSRF is to check the Referer header; however, beca...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gauravnarwani.com/publications/CVE-2019-15062/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:11.0.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F32E1DB-94A3-4644-9CD8-849B630537D5", "versionEndExcluding": null, "versionEndIncluding": null, "v...
[ "352" ]
352
https://github.com/Dolibarr/dolibarr/issues/11671
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "Dolibarr", "dolibarr" ]
# Bug Hello Team, Dolibar 11.0.0-alpha suffers from a Stored XSS in the Label field of Link a new file/document in Linked Files of the User. An attacker could use this feature to introduce a CSRF which would completely takeover admin's account. The protection for CSRF is restricted to referrer header and so if a CSRF ...
Stored XSS -> CSRF -> Admin Account Takeover
https://api.github.com/repos/Dolibarr/dolibarr/issues/11671/comments
12
2019-08-09T10:21:02Z
2019-08-19T06:49:41Z
https://github.com/Dolibarr/dolibarr/issues/11671
478,913,566
11,671
637
CVE-2019-14518
2019-08-15T16:15:12.007
Evolution CMS 2.0.x allows XSS via a description and new category location in a template. NOTE: the vendor states that the behavior is consistent with the "access policy in the administration panel.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/evolution-cms/evolution/issues/1041" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/evolution-...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:modx:evolution_cms:2.0.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "278D24E3-94B9-47F3-B6B1-19B7E2ED1D19", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "79" ]
79
https://github.com/evolution-cms/evolution/issues/1041
[ "Exploit", "Third Party Advisory" ]
github.com
[ "evolution-cms", "evolution" ]
**Stored Cross Site Scripting Vulnerability** **Risk Description** Stored cross-site scripting vulnerabilities arise when user input is stored and later embedded into the application's responses in an unsafe way. An attacker can use the vulnerability to inject malicious JavaScript code into the application...
Stored Cross Site Scripting
https://api.github.com/repos/evolution-cms/evolution/issues/1041/comments
3
2019-03-22T14:11:43Z
2019-05-21T11:37:09Z
https://github.com/evolution-cms/evolution/issues/1041
424,228,726
1,041
638
CVE-2019-14518
2019-08-15T16:15:12.007
Evolution CMS 2.0.x allows XSS via a description and new category location in a template. NOTE: the vendor states that the behavior is consistent with the "access policy in the administration panel.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/evolution-cms/evolution/issues/1041" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/evolution-...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:modx:evolution_cms:2.0.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "278D24E3-94B9-47F3-B6B1-19B7E2ED1D19", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "79" ]
79
https://github.com/evolution-cms/evolution/issues/1042
[ "Exploit", "Third Party Advisory" ]
github.com
[ "evolution-cms", "evolution" ]
**I-Frame Injection Vulnerability** **Risk Description** Malware Attackers use this IFrame and include the malware websites. They are able to include the webpage one-pixel square (You won’t able to see it in webpage). Obfuscate the JavaScript that will run automatically from that included page so that it lo...
I-Frame Injection Vulnerability in Evolution CMS 2.0.x
https://api.github.com/repos/evolution-cms/evolution/issues/1042/comments
2
2019-03-22T14:41:23Z
2019-08-02T07:47:53Z
https://github.com/evolution-cms/evolution/issues/1042
424,243,076
1,042
639
CVE-2019-14518
2019-08-15T16:15:12.007
Evolution CMS 2.0.x allows XSS via a description and new category location in a template. NOTE: the vendor states that the behavior is consistent with the "access policy in the administration panel.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/evolution-cms/evolution/issues/1041" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/evolution-...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:modx:evolution_cms:2.0.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "278D24E3-94B9-47F3-B6B1-19B7E2ED1D19", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "79" ]
79
https://github.com/evolution-cms/evolution/issues/1043
[ "Exploit", "Third Party Advisory" ]
github.com
[ "evolution-cms", "evolution" ]
**Reflected Cross Site scripting Vulnerability** **Description:** The second and the most common type of XSS is Reflected XSS (Non-persistent XSS). In this case, the attacker’s payload has to be a part of the request that is sent to the web server. It is then reflected back in such a way that the HTTP response in...
Reflected Cross Site scripting Vulnerability in Evolution CMS 2.0.x
https://api.github.com/repos/evolution-cms/evolution/issues/1043/comments
2
2019-03-22T15:07:24Z
2025-05-26T03:38:00Z
https://github.com/evolution-cms/evolution/issues/1043
424,256,128
1,043
640
CVE-2018-12101
2019-08-15T17:15:11.613
CMS Clipper 1.3.3 has XSS in the Security tab search, User Groups, Resource Groups, and User/Resource Group Links fields.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ClipperCMS/ClipperCMS/issues/487" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ClipperCMS/Cl...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clippercms:clippercms:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "C72E4CBC-C990-42AE-86BC-3123A14E5426", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "79" ]
79
https://github.com/ClipperCMS/ClipperCMS/issues/487
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ClipperCMS", "ClipperCMS" ]
XSS is found in the "Security -->>Webusers" field in CMS Clipper_1.3.3 version. The Security name value is obtained from the webusers, having search parameter for user list. it is getting reflected and displayed without any sanitation. Affected URL: http://127.0.0.1:880/ClipperCMS-clipper_1.3.3/manager/ Steps to POC...
Reflected Cross Site Scripting in CMS Clipper_1.3.3
https://api.github.com/repos/ClipperCMS/ClipperCMS/issues/487/comments
1
2018-06-10T20:09:24Z
2019-08-02T07:41:51Z
https://github.com/ClipperCMS/ClipperCMS/issues/487
330,998,575
487
641
CVE-2018-12101
2019-08-15T17:15:11.613
CMS Clipper 1.3.3 has XSS in the Security tab search, User Groups, Resource Groups, and User/Resource Group Links fields.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ClipperCMS/ClipperCMS/issues/487" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ClipperCMS/Cl...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clippercms:clippercms:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "C72E4CBC-C990-42AE-86BC-3123A14E5426", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "79" ]
79
https://github.com/ClipperCMS/ClipperCMS/issues/488
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ClipperCMS", "ClipperCMS" ]
Stored XSS is found in the "Manager Permissions" field in CMS Clipper_1.3.3 version. The Manager Permissions value is obtained from the User Groups, Resource Groups and Users/resource group links. which having adding users list and groups list. it is getting stored and displayed without any sanitation. Affected URL: ...
Stored Cross Site Scripting in CMS Clipper_1.3.3
https://api.github.com/repos/ClipperCMS/ClipperCMS/issues/488/comments
1
2018-06-10T20:32:47Z
2019-08-02T07:41:27Z
https://github.com/ClipperCMS/ClipperCMS/issues/488
331,000,222
488
642
CVE-2018-12101
2019-08-15T17:15:11.613
CMS Clipper 1.3.3 has XSS in the Security tab search, User Groups, Resource Groups, and User/Resource Group Links fields.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ClipperCMS/ClipperCMS/issues/487" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ClipperCMS/Cl...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clippercms:clippercms:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "C72E4CBC-C990-42AE-86BC-3123A14E5426", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "79" ]
79
https://github.com/ClipperCMS/ClipperCMS/issues/496
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ClipperCMS", "ClipperCMS" ]
HTML injection found in the "User Groups" field in CMS Clipper_1.3.3 version.The module name value is obtained from the user,it is getting saved and displayed without any sanitation. **Affected URL:** http://<host>/ClipperCMS-clipper_1.3.3/manager/ **Steps to reproduce:** 1.Under Security >> Manager Permissions -...
HTML injection is found in CMS Clipper_1.3.3 version
https://api.github.com/repos/ClipperCMS/ClipperCMS/issues/496/comments
0
2019-08-05T20:58:58Z
2019-08-05T21:00:17Z
https://github.com/ClipperCMS/ClipperCMS/issues/496
477,055,716
496
643
CVE-2019-12791
2019-08-15T21:15:11.510
A directory traversal vulnerability in the v-list-user script in Vesta Control Panel 0.9.8-24 allows remote attackers to escalate from regular registered users to root via the password reset form.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cardaci.xyz/advisories/2019/08/12/vesta-control-panel-0.9.8-24-privilege-escalation-in-the-password-reset-form/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vestacp:control_panel:0.9.8-24:*:*:*:*:*:*:*", "matchCriteriaId": "6D8F31C9-C8AF-49D8-9D64-4C6ABCD8839D", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "22" ]
22
https://github.com/serghey-rodin/vesta/issues/1921
[ "Third Party Advisory" ]
github.com
[ "serghey-rodin", "vesta" ]
(Sorry for the *dramatic* subject.) Well, it's really disappointing and unprofessional to come to this... Two months ago (2019-05-28) I disclosed two privilege escalation vulnerabilities to info@vestacp.com (and eventually also to dev@vestacp.com and skid@vestacp.com), I obtained no useful replies or actions so I...
SECURITY: two privilege escalation from regular user to root
https://api.github.com/repos/outroll/vesta/issues/1921/comments
10
2019-07-29T17:28:57Z
2021-11-16T15:56:36Z
https://github.com/outroll/vesta/issues/1921
474,169,297
1,921
644
CVE-2019-15095
2019-08-16T01:15:09.767
DWSurvey through 2019-07-22 has reflected XSS via the design/qu-multi-fillblank!answers.action surveyId parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wkeyuan/DWSurvey/issues/48" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:diaowen:dwsurvey:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB919E79-6567-4002-A868-F6DB8227313D", "versionEndExcluding": null, "versionEndIncluding": "2019-07-22", "versionStartE...
[ "79" ]
79
https://github.com/wkeyuan/DWSurvey/issues/48
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wkeyuan", "DWSurvey" ]
There is a Reflective XSS vulnerability when user view the survey result. The failure of the XSS filter to work properly resulted in this vulnerability, which allows remote attackers to inject arbitrary web script or stole admin's or other users cookies. The impact of the problem is serious especially when combined wit...
[security vulnerability] Reflective XSS when view the survey result
https://api.github.com/repos/wkeyuan/DWSurvey/issues/48/comments
1
2019-08-13T11:38:03Z
2020-12-23T13:22:53Z
https://github.com/wkeyuan/DWSurvey/issues/48
480,108,159
48
645
CVE-2019-15119
2019-08-16T15:15:11.950
lib/install/install.go in cnlh nps through 0.23.2 uses 0777 permissions for /usr/local/bin/nps and/or /usr/bin/nps, leading to a file overwrite by a local user.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/cnlh/nps/commit/7178b3380720e910d283036a8d39879a94105515" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nps_project:nps:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3BC0BFD-CAE4-43CF-8930-6974E168502D", "versionEndExcluding": null, "versionEndIncluding": "0.23.2", "versionStartExclud...
[ "732" ]
732
https://github.com/cnlh/nps/issues/176
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cnlh", "nps" ]
Dear NPS, I would like to report a security vulnerability in NPS. There is a problem with file permission that allow regular access to write or access information that they are not supposed to. On the file install.go, the nps file is copied to /usr/local/bin/nps or /usr/bin/nps but then permission are changed ...
Permission problems on NPS Install
https://api.github.com/repos/ehang-io/nps/issues/176/comments
2
2019-08-14T16:03:43Z
2019-08-16T16:15:03Z
https://github.com/ehang-io/nps/issues/176
480,763,481
176
646
CVE-2019-5477
2019-08-16T16:15:10.637
A command injection vulnerability in Nokogiri v1.10.3 and earlier allows commands to be executed in a subprocess via Ruby's `Kernel.open` method. Processes are vulnerable only if the undocumented method `Nokogiri::CSS::Tokenizer#load_file` is being called with unsafe user input as the filename. This vulnerability appea...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "support@hackerone.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/sparklemotion/nokogiri/issues/1915" }, { "source": "support@hackerone.com", "tags": [ "Release Notes" ], "url": "https://github.com/tenderlove/rexical/bl...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nokogiri:nokogiri:*:*:*:*:*:*:*:*", "matchCriteriaId": "E018DCFD-3E4A-4D78-B63A-488052EF45E7", "versionEndExcluding": null, "versionEndIncluding": "1.10.3", "versionStartExcl...
[ "78" ]
78
https://github.com/sparklemotion/nokogiri/issues/1915
[ "Patch", "Third Party Advisory" ]
github.com
[ "sparklemotion", "nokogiri" ]
# CVE-2019-5477 - Nokogiri Command Injection Vulnerability This issue has been created for public disclosure of a Command Injection vulnerability that was responsibly reported by @kyoshidajp (Katsuhiko YOSHIDA). I'd like to thank [HackerOne](https://hackerone.com/loofah) for providing a secure, responsible mechan...
CVE-2019-5477 - Nokogiri Command Injection Vulnerability
https://api.github.com/repos/sparklemotion/nokogiri/issues/1915/comments
4
2019-07-20T19:40:01Z
2019-08-15T17:47:58Z
https://github.com/sparklemotion/nokogiri/issues/1915
470,707,803
1,915
647
CVE-2019-15136
2019-08-18T16:15:10.567
The Access Control plugin in eProsima Fast RTPS through 1.9.0 does not check partition permissions from remote participant connections, which can lead to policy bypass for a secure Data Distribution Service (DDS) partition.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://arxiv.org/abs/1908.05310" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/eProsima/Fast-RTPS/issues/443" }, { "source...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eprosima:fast-rtps:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D2ACC29-ADF4-4A74-B5AF-8F68C389FA18", "versionEndExcluding": null, "versionEndIncluding": "1.9.0", "versionStartExcl...
[ "862" ]
862
https://github.com/eProsima/Fast-RTPS/issues/443
[ "Patch", "Third Party Advisory" ]
github.com
[ "eProsima", "Fast-RTPS" ]
Partition permissions are presently only checked when creating local data readers/writers, and are consequently skipped when checking *remote* readers/writers within the current default Access Control plugin implementation. This effectively nullifies any permission restrictions mandated in the remote participant's perm...
Partition permission are not enforced for remote participants [5342]
https://api.github.com/repos/eProsima/Fast-DDS/issues/443/comments
1
2019-03-08T03:09:03Z
2020-10-28T06:59:31Z
https://github.com/eProsima/Fast-DDS/issues/443
418,611,926
443
648
CVE-2019-15139
2019-08-18T19:15:09.637
The XWD image (X Window System window dumping file) parsing component in ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (application crash resulting from an out-of-bounds Read) in ReadXWDImage in coders/xwd.c by crafting a corrupted XWD image file, a different vulnerability than CVE-2019-11472.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-41:q16:*:*:*:*:*:*", "matchCriteriaId": "34C2A939-19C7-4BC0-8DE5-E3D612C99B0E", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "125" ]
125
https://github.com/ImageMagick/ImageMagick/issues/1553
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
AddressSanitizer: Invalid read at xwd.c:573
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1553/comments
2
2019-04-20T13:04:54Z
2019-08-19T11:08:05Z
https://github.com/ImageMagick/ImageMagick/issues/1553
435,396,971
1,553
649
CVE-2019-15140
2019-08-18T19:15:09.700
coders/mat.c in ImageMagick 7.0.8-43 Q16 allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by crafting a Matlab image file that is mishandled in ReadImage in MagickCore/constitute.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-43:q16:*:*:*:*:*:*", "matchCriteriaId": "2EDF50C4-9FFE-4EBF-A5BE-44AF7E6988D9", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "416" ]
416
https://github.com/ImageMagick/ImageMagick/issues/1554
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
AddressSanitizer: heap-use-after-free at constitute.c:659
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1554/comments
2
2019-04-27T07:14:42Z
2019-08-19T11:07:29Z
https://github.com/ImageMagick/ImageMagick/issues/1554
437,915,586
1,554
650
CVE-2019-15141
2019-08-18T19:15:09.760
WriteTIFFImage in coders/tiff.c in ImageMagick 7.0.8-43 Q16 allows attackers to cause a denial-of-service (application crash resulting from a heap-based buffer over-read) via a crafted TIFF image file, related to TIFFRewriteDirectory, TIFFWriteDirectory, TIFFWriteDirectorySec, and TIFFWriteDirectoryTagColormap in tif_d...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Mailing List", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-43:q16:*:*:*:*:*:*", "matchCriteriaId": "2EDF50C4-9FFE-4EBF-A5BE-44AF7E6988D9", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "125" ]
125
https://github.com/ImageMagick/ImageMagick/issues/1560
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
AddressSanitizer: heap-buffer-overflow at coders/tiff.c:4324
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1560/comments
2
2019-04-28T11:01:35Z
2019-09-17T04:41:56Z
https://github.com/ImageMagick/ImageMagick/issues/1560
438,043,984
1,560
651
CVE-2019-15146
2019-08-18T19:15:10.450
GoPro GPMF-parser 1.2.2 has a heap-based buffer over-read (4 bytes) in GPMF_Next in GPMF_parser.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gopro/gpmf-parser/commit/341f12cd5b97ab419e53853ca00176457c9f1681" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Thi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gopro:gpmf-parser:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "BA83C3BC-F72D-453A-B3E4-DB1065FC99A6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "125" ]
125
https://github.com/gopro/gpmf-parser/issues/60
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gopro", "gpmf-parser" ]
As of e27b702, when running `./gpmf-parser $FILE`, it may report with crashes when building with AddressSanitizer. We basically applied some fuzzing to detect these issues, with the initial seeds from the `samples` directory. The POC files are wrapped with zip compression for upload. Please see below for details....
Multiple crashes when parsing MP4 files
https://api.github.com/repos/gopro/gpmf-parser/issues/60/comments
14
2019-05-17T09:21:41Z
2025-03-20T00:58:14Z
https://github.com/gopro/gpmf-parser/issues/60
445,346,728
60
652
CVE-2019-15151
2019-08-18T21:15:09.733
AdPlug 2.3.1 has a double free in the Cu6mPlayer class in u6m.h.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/adplug/adplug/issues/91" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedo...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adplug_project:adplug:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "F8E042B0-0F5C-4370-9F20-EE741349CAE2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "415" ]
415
https://github.com/adplug/adplug/issues/91
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "adplug", "adplug" ]
Hi, While fuzzing AdPlug with American Fuzzy Lop, I found a double free in in Cu6mPlayer::~Cu6mPlayer(), in src/u6m.h L42. Attaching a reproducer (gzipped so GitHub accepts it): [double-free.gz](https://github.com/adplug/adplug/files/3485266/double-free.gz) ``` ==============================================...
Double free in Cu6mPlayer::~Cu6mPlayer()
https://api.github.com/repos/adplug/adplug/issues/91/comments
10
2019-08-09T07:51:21Z
2020-05-11T11:05:08Z
https://github.com/adplug/adplug/issues/91
478,848,634
91
653
CVE-2019-15160
2019-08-19T06:15:10.673
The SweetXml (aka sweet_xml) package through 0.6.6 for Erlang and Elixir allows attackers to cause a denial of service (resource consumption) via an XML entity expansion attack with an inline DTD.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/kbrw/sweet_xml/issues/71" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://hex.pm/packages/sweet_xml" }, { "source":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kbrw:sweet_xml:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B71E24C-B2A8-41B4-B90E-62C95436322E", "versionEndExcluding": null, "versionEndIncluding": "0.6.6", "versionStartExcludin...
[ "776" ]
776
https://github.com/kbrw/sweet_xml/issues/71
[ "Exploit", "Third Party Advisory" ]
github.com
[ "kbrw", "sweet_xml" ]
This is Wiki page for the vulnerability, it is a very well known XML parser vulnerability: https://en.wikipedia.org/wiki/Billion_laughs_attack. To replicate this issue in SweetXml, you can do the following in an iex session and watch in the observer: ![xmerl_xml_bomb](https://user-images.githubusercontent.com/44...
Inline DTD allows XML bomb attack
https://api.github.com/repos/kbrw/sweet_xml/issues/71/comments
15
2019-03-30T16:30:34Z
2021-08-19T09:45:51Z
https://github.com/kbrw/sweet_xml/issues/71
427,300,615
71
654
CVE-2019-15224
2019-08-19T23:15:10.570
The rest-client gem 1.6.10 through 1.6.13 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. Versions <=1.6.9 and >=1.6.14 are unaffected.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rest-client/rest-client/issues/713" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://rubygems.org/gems/rest-client/versions/" },...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rest-client_project:rest-client:*:*:*:*:*:ruby:*:*", "matchCriteriaId": "183D93A3-8258-41C2-87CA-8F94BD77734B", "versionEndExcluding": null, "versionEndIncluding": "1.6.13", ...
[ "94" ]
94
https://github.com/rest-client/rest-client/issues/713
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rest-client", "rest-client" ]
# Summary On August 14, attackers published a series of rest-client versions from 1.6.10 to 1.6.13 using the credentials of a rest-client maintainer whose RubyGems.org account was compromised. The affected versions were downloaded a small number of times (~1000). On August 19, @juskoljo observed the malicious gem...
[CVE-2019-15224] Version 1.6.13 published with malicious backdoor.
https://api.github.com/repos/rest-client/rest-client/issues/713/comments
42
2019-08-19T10:45:06Z
2019-08-21T20:10:26Z
https://github.com/rest-client/rest-client/issues/713
482,238,151
713
655
CVE-2019-15228
2019-08-20T00:15:10.050
FUEL CMS 1.4.4 has XSS in the Create Blocks section of the Admin console. This could lead to cookie stealing and other malicious actions. This vulnerability can be exploited with an authenticated account but can also impact unauthenticated visitors.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/536" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.sevenlayers.com/in...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF0C1B1B-6CDB-4E57-9F75-DE409B61F69F", "versionEndExcluding": null, "versionEndIncluding": "1.4.4", "versionS...
[ "79" ]
79
https://github.com/daylightstudio/FUEL-CMS/issues/536
[ "Exploit", "Third Party Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
![image001](https://user-images.githubusercontent.com/54193091/63215529-d6c3b900-c0dc-11e9-841d-040f7b4923cb.jpg) ![image002](https://user-images.githubusercontent.com/54193091/63215531-dcb99a00-c0dc-11e9-8a6b-2ccdc4ff1ee1.jpg) ![image003](https://user-images.githubusercontent.com/54193091/63215533-e17e4e00-c0dc-...
XSS and CSRF in Blocks
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/536/comments
0
2019-08-17T17:52:01Z
2021-05-14T14:00:24Z
https://github.com/daylightstudio/FUEL-CMS/issues/536
481,910,543
536
656
CVE-2016-10893
2019-08-20T15:15:11.603
The crayon-syntax-highlighter plugin before 2.8.4 for WordPress has multiple XSS issues via AJAX requests.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/aramk/crayon-syntax-highlighter/commit/7fdb2e6b4c65178b4ed01ff08a8a38afe5a5151e" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/aram...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:crayon_syntax_highlighter_project:crayon_syntax_highlighter:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "B90E1DD9-7173-4103-A0FB-73D883A71DF4", "versionEndExcluding": "2.8.4", "versionE...
[ "79" ]
79
https://github.com/aramk/crayon-syntax-highlighter/issues/347
[ "Issue Tracking", "Patch" ]
github.com
[ "aramk", "crayon-syntax-highlighter" ]
Hi, new version 2.8.3 strip formatting of the bbPress threads and it displays in a plain text. Thanks.
bbPress formatting issue
https://api.github.com/repos/aramk/crayon-syntax-highlighter/issues/347/comments
25
2016-04-16T12:05:12Z
2016-05-12T03:02:43Z
https://github.com/aramk/crayon-syntax-highlighter/issues/347
148,846,445
347
657
CVE-2018-18572
2019-08-22T15:15:11.967
osCommerce 2.3.4.1 has an incomplete '.htaccess' for blacklist filtering in the "product" page. Because of this filter, script files with certain PHP-related extensions (such as .phtml and .php5) didn't execute in the application. But this filter didn't prevent the '.pht' extension. Thus, remote authenticated administr...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/osCommerce/oscommerce2/issues/631" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/osCommerce/oscommerce2/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oscommerce:oscommerce:2.3.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "3D8A496B-7F43-478C-8A75-C3CF3688067C", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "434" ]
434
https://github.com/osCommerce/oscommerce2/issues/631
[ "Third Party Advisory" ]
github.com
[ "osCommerce", "oscommerce2" ]
**Brief of this vulnerability** osCommerce use `.htaccess` file for preventing to execute php and html files. But it is not complete set to preventing all of malicious files. As the result, Adversary can upload several types of malicious file. This vulnerability needs the admin credentials, but this vulnerability...
osCommerce 2.3.4.1 allows to execute several file types.
https://api.github.com/repos/osCommerce/oscommerce2/issues/631/comments
4
2018-11-05T09:03:29Z
2025-01-06T03:34:44Z
https://github.com/osCommerce/oscommerce2/issues/631
377,305,890
631
658
CVE-2019-15499
2019-08-23T04:15:11.490
CodiMD 1.3.1, when Safari is used, allows XSS via an IFRAME element with allow-top-navigation in the sandbox attribute, in conjunction with a data: URL.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hackmdio/codimd/issues/1263" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hackmd:codimd:1.3.1:*:*:*:-:*:*:*", "matchCriteriaId": "608400C9-6538-4654-A97B-278009AD77FB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/hackmdio/codimd/issues/1263
[ "Exploit", "Third Party Advisory" ]
github.com
[ "hackmdio", "codimd" ]
## Summary This is similar issue to #959, but different cause. Due to `sandbox` attribute is allowed, attacker can redirect victim to something malicious if attacker embeds iframe with `allow-top-navigation` in `sandbox` attribute. #959 won't work in Chrome because of their security, but this will work due to `sand...
Open Redirect / XSS via iframe with sandbox.
https://api.github.com/repos/hackmdio/codimd/issues/1263/comments
5
2019-08-21T10:09:07Z
2021-07-07T02:59:27Z
https://github.com/hackmdio/codimd/issues/1263
483,327,896
1,263
659
CVE-2019-15480
2019-08-23T13:15:10.877
Domoticz 4.10717 has XSS via item.Name.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/domoticz/domoticz/issues/3367" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://githu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:domoticz:domoticz:4.10717:*:*:*:*:*:*:*", "matchCriteriaId": "EB5DEAD1-463F-4336-9DFE-F0C907CB3570", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "79" ]
79
https://github.com/domoticz/domoticz/issues/3367
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "domoticz", "domoticz" ]
## Description The ScenesController.js is vulnerable against XSS. By adding a scene with some scripts in the scene name will lead to a XSS. Obviously this is thankful for an attacker if he is privilege to adding or edit scenes. The attacker can execute arbitrary code. ## Affected Version Current release 4.10717 ...
XSS Vulnerability in ScenesController.js
https://api.github.com/repos/domoticz/domoticz/issues/3367/comments
23
2019-07-01T08:17:03Z
2019-07-14T06:32:56Z
https://github.com/domoticz/domoticz/issues/3367
462,576,636
3,367
662
CVE-2019-15535
2019-08-23T18:15:11.287
Tasking Manager before 3.4.0 allows SQL Injection via custom SQL.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/hotosm/tasking-manager/issues/1731" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "ht...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hostosm:tasking_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0094D31-2E8F-4D1A-A3A0-7156761AC7F3", "versionEndExcluding": "3.4.0", "versionEndIncluding": null, "versionStar...
[ "89" ]
89
https://github.com/hotosm/tasking-manager/issues/1731
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "hotosm", "tasking-manager" ]
When using simple Python string formatting methods input values are not escaped which opens up the possibility of SQL injection attacks. For example: https://github.com/hotosm/tasking-manager/blob/master/server/models/postgis/task.py#L653 SQLAlchemy provides a way to safely pass values to a custom SQL - https://docs...
Prevent SQL Injection when executing custom SQL
https://api.github.com/repos/hotosm/tasking-manager/issues/1731/comments
0
2019-06-28T14:40:19Z
2019-07-03T07:19:51Z
https://github.com/hotosm/tasking-manager/issues/1731
462,067,662
1,731
663
CVE-2019-15532
2019-08-26T12:15:11.657
CyberChef before 8.31.2 allows XSS in core/operations/TextEncodingBruteForce.mjs.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gchq/CyberChef/commit/01f0625d6a177f9c5df9281f12a27c814c2d8bcf" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gchq:cyberchef:*:*:*:*:*:*:*:*", "matchCriteriaId": "38BB6B00-CF07-49EE-BE74-4D22B1ADB7BA", "versionEndExcluding": "8.31.2", "versionEndIncluding": null, "versionStartExcludi...
[ "79" ]
79
https://github.com/gchq/CyberChef/issues/539
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gchq", "CyberChef" ]
### Summary While doing a CTF challenge, I was using cyber chef to encode a XSS javascript payload. When I put it through the text encoding brute force, alerts were displayed caused by the script. ### Example My input was <script>alert('XSS')</script> and when I added the brute force encoding multiple alerts poppe...
Bug report: XSS with Encoding Brute Force
https://api.github.com/repos/gchq/CyberChef/issues/539/comments
0
2019-04-12T15:01:39Z
2019-04-14T21:00:29Z
https://github.com/gchq/CyberChef/issues/539
432,610,649
539
664
CVE-2019-15532
2019-08-26T12:15:11.657
CyberChef before 8.31.2 allows XSS in core/operations/TextEncodingBruteForce.mjs.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gchq/CyberChef/commit/01f0625d6a177f9c5df9281f12a27c814c2d8bcf" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gchq:cyberchef:*:*:*:*:*:*:*:*", "matchCriteriaId": "38BB6B00-CF07-49EE-BE74-4D22B1ADB7BA", "versionEndExcluding": "8.31.2", "versionEndIncluding": null, "versionStartExcludi...
[ "79" ]
79
https://github.com/gchq/CyberChef/issues/544
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gchq", "CyberChef" ]
### Summary It looks like #539 has been fixed in https://github.com/gchq/CyberChef/commit/01f0625d6a177f9c5df9281f12a27c814c2d8bcf, but no release has been issued since the fix. Would it be possible to do a quick release (v8.31.2) to include the XSS fix? Thanks in advance for your consideration!
Bug report: Current release version (v8.31.1) does not include the recent XSS fix
https://api.github.com/repos/gchq/CyberChef/issues/544/comments
2
2019-04-23T17:01:56Z
2019-05-09T20:55:54Z
https://github.com/gchq/CyberChef/issues/544
436,294,419
544
665
CVE-2019-15541
2019-08-26T12:15:11.780
rustls-mio/examples/tlsserver.rs in the rustls crate before 0.16.0 for Rust allows attackers to cause a denial of service (loop of conn_event and ready) by arranging for a client to never be writable.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ctz/rustls/commit/a93ee1abd2ab19ebe4bf9d684d56637ee54a6074" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "ht...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rustls_project:rustls:*:*:*:*:*:*:*:*", "matchCriteriaId": "5ED2EB11-1C95-4336-B6C9-33F9D2117888", "versionEndExcluding": "0.16.0", "versionEndIncluding": null, "versionStart...
[ "88" ]
88
https://github.com/ctz/rustls/issues/285
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ctz", "rustls" ]
I have found the following situation: ``` number of connections is: 19 self closed: false self closing: true self tls_session.wants_write: false reregister number of connections is: 19 self closed: false self closing: true self tls_session.wants_write: false reregister number of connections is: 19 self clo...
bug in rustls-mio
https://api.github.com/repos/rustls/rustls/issues/285/comments
2
2019-08-08T09:07:49Z
2019-08-26T14:28:36Z
https://github.com/rustls/rustls/issues/285
478,342,906
285
666
CVE-2019-15562
2019-08-26T13:15:11.663
GORM before 1.9.10 allows SQL injection via incomplete parentheses. NOTE: Misusing Gorm by passing untrusted user input where Gorm expects trusted SQL fragments is a vulnerability in the application, not in Gorm
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://github.com/go-gorm/gorm/issues/2517#issuecomment-638145427" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/go-gorm/gorm/pull/2519" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gorm:gorm:*:*:*:*:*:*:*:*", "matchCriteriaId": "F52D0A5D-128F-4E0B-B4EE-E47DBDFADD09", "versionEndExcluding": "1.9.10", "versionEndIncluding": null, "versionStartExcluding": ...
[ "89" ]
89
https://github.com/go-gorm/gorm/issues/2517#issuecomment-638145427
[ "Vendor Advisory" ]
github.com
[ "go-gorm", "gorm" ]
### What version of Go are you using (`go version`)? latest ### Which database and its version are you using? postgress latest and gorm latest ### Blind Sql injection localhost:8000/user?id=id=1)) or 1=1-- ```go func GetUser(c *gin.Context) { var user []models.User dbms := db.GetDatabaseConnection() /* Open ...
SQL injection in Gorm With using first and find.
https://api.github.com/repos/go-gorm/gorm/issues/2517/comments
18
2019-06-21T08:54:24Z
2020-08-26T14:54:36Z
https://github.com/go-gorm/gorm/issues/2517
459,088,069
2,517
667
CVE-2018-20999
2019-08-26T15:15:11.453
An issue was discovered in the orion crate before 0.11.2 for Rust. reset() calls cause incorrect results.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/brycx/orion/issues/46" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://rustsec.org/advisories/RUSTSEC-2018-0012.html" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:orion_project:orion:*:*:*:*:*:*:*:*", "matchCriteriaId": "E3016A55-6684-4A4E-8DF2-C4E939D359CA", "versionEndExcluding": "0.11.2", "versionEndIncluding": null, "versionStartEx...
[ "682" ]
682
https://github.com/brycx/orion/issues/46
[ "Patch", "Third Party Advisory" ]
github.com
[ "brycx", "orion" ]
Currently `reset()` checks whether or not the state is already finalized. If it is not finalized, it will not reset the state. So if someone were to call `reset()` not having finalized the state before, incorrect results would be produced. Such streaming states include `hmac`, `poly1305`, `blake2b` and `cshake`.
reset() not working correctly
https://api.github.com/repos/orion-rs/orion/issues/46/comments
1
2018-12-20T17:00:06Z
2018-12-26T14:23:48Z
https://github.com/orion-rs/orion/issues/46
393,132,155
46
668
CVE-2019-15551
2019-08-26T15:15:12.000
An issue was discovered in the smallvec crate before 0.6.10 for Rust. There is a double free for certain grow attempts with the current capacity.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/servo/rust-smallvec/issues/148" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://rustsec.org/advisories/RUSTSEC-2019-0009.html...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:servo:smallvec:*:*:*:*:*:*:*:*", "matchCriteriaId": "1AF5BAAC-D8A6-4BBB-9C90-D8D2962B2A0B", "versionEndExcluding": "0.6.10", "versionEndIncluding": null, "versionStartExcludi...
[ "415" ]
415
https://github.com/servo/rust-smallvec/issues/148
[ "Patch", "Third Party Advisory" ]
github.com
[ "servo", "rust-smallvec" ]
Attempting to call `grow` on a spilled SmallVec with a value equal to the current capacity causes it to free the existing data. ```rust let mut v: SmallVec<[u8; 2]> = SmallVec::new(); v.push(0); v.push(1); // Cause it to spill. v.push(2); assert_eq!(v.capacity(), 4); // grow with the same capacity v.grow(4);...
use-after-free when growing to the same size
https://api.github.com/repos/servo/rust-smallvec/issues/148/comments
3
2019-06-06T15:13:23Z
2019-06-23T19:59:38Z
https://github.com/servo/rust-smallvec/issues/148
453,088,636
148
669
CVE-2019-15552
2019-08-26T15:15:12.063
An issue was discovered in the libflate crate before 0.1.25 for Rust. MultiDecoder::read has a use-after-free, leading to arbitrary code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/sile/libflate/issues/35" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://rustsec.org/advisories/RUSTSEC-2019-0010.html" }, { "source...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libflate_project:libflate:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4E38BCF-E0D2-4D32-983D-04840178F354", "versionEndExcluding": "0.1.25", "versionEndIncluding": null, "versionS...
[ "416" ]
416
https://github.com/sile/libflate/issues/35
[ "Third Party Advisory" ]
github.com
[ "sile", "libflate" ]
If the code that uses libflate panics, it may trigger a use-after-free in libflate code. Since use-after-free usually poses an arbitrary code execution vulnerability, I will relay further details privately to the maintainer. Code compiled with `panic=abort` is not affected. This can be used as a mitigation in the in...
Use-after-free on panic in client code
https://api.github.com/repos/sile/libflate/issues/35/comments
4
2019-06-26T01:28:22Z
2019-07-20T17:38:34Z
https://github.com/sile/libflate/issues/35
460,716,202
35
670
CVE-2019-15553
2019-08-26T15:15:12.127
An issue was discovered in the memoffset crate before 0.5.0 for Rust. offset_of and span_of can cause exposure of uninitialized memory.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Gilnaa/memoffset/issues/9#issuecomment-505461490" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://rustsec.org/advisories/RUSTSEC-2019-0011.h...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:memoffset_project:memoffset:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA23245D-F421-4AE8-B488-4681EF81973D", "versionEndExcluding": "0.5.0", "versionEndIncluding": null, "version...
[ "908" ]
908
https://github.com/Gilnaa/memoffset/issues/9#issuecomment-505461490
[ "Third Party Advisory" ]
github.com
[ "Gilnaa", "memoffset" ]
With the implementation in: ```rust macro_rules! offset_of { ($parent:ty, $($field:tt)+) => (unsafe { let x: &'static $parent = $crate::Transmuter::<$parent> { int: 0 }.ptr; $crate::Transmuter { ptr: &x.$($field)+ }.int }); } ``` you are constructing a `&'static T` at address `0`. T...
`offset_of` is unsound
https://api.github.com/repos/Gilnaa/memoffset/issues/9/comments
27
2019-06-21T20:04:16Z
2019-08-16T10:11:13Z
https://github.com/Gilnaa/memoffset/issues/9
459,353,053
9
671
CVE-2019-15554
2019-08-26T15:15:12.187
An issue was discovered in the smallvec crate before 0.6.10 for Rust. There is memory corruption for certain grow attempts with less than the current capacity.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/servo/rust-smallvec/issues/149" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://rustsec.org/advisories/RUSTSEC-2019-0012.html...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:servo:smallvec:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B20EC37-AD4B-44A9-835D-4B0BF45B116B", "versionEndExcluding": "0.6.10", "versionEndIncluding": null, "versionStartExcludi...
[ "787" ]
787
https://github.com/servo/rust-smallvec/issues/149
[ "Patch", "Third Party Advisory" ]
github.com
[ "servo", "rust-smallvec" ]
If `grow` is given a size that is within the inline size after a SmallVec has been spilled, the resulting value is corrupted. ```rust let mut v: SmallVec<[u8; 4]> = SmallVec::new(); v.push(1); v.push(2); v.push(3); v.push(4); // Cause it to spill. v.push(5); assert!(v.spilled()); v.clear(); // Shrink to in...
Using `grow` to shrink can cause corruption.
https://api.github.com/repos/servo/rust-smallvec/issues/149/comments
1
2019-06-06T17:18:23Z
2019-06-07T11:24:36Z
https://github.com/servo/rust-smallvec/issues/149
453,147,895
149
672
CVE-2019-15651
2019-08-26T22:15:11.153
wolfSSL 4.1.0 has a one-byte heap-based buffer over-read in DecodeCertExtensions in wolfcrypt/src/asn.c because reading the ASN_BOOLEAN byte is mishandled for a crafted DER certificate in GetLength_ex.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/wolfSSL/wolfssl/issues/2421" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/wolfSSL/wolfssl/issues/2421" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wolfssl:wolfssl:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A4F2C4AF-EE0C-4596-B4FC-1750783275A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "125" ]
125
https://github.com/wolfSSL/wolfssl/issues/2421
[ "Third Party Advisory" ]
github.com
[ "wolfSSL", "wolfssl" ]
tested on wolfSSL 4.1.0 / ubuntu 14.04/ clang / asan Hi, I've came upon an one-byte-heap-overread bug due to corner case mishandling in GetLength_ex(wolfcrypt/src/asn.c:189), you could trigger it by loading attached DER certificate using API wolfSSL_X509_d2i (or [example_cert_parsing_app](https://github.com/wolfSSL/...
one-byte-heap-overread (wolfcrypt/src/asn.c:7584)
https://api.github.com/repos/wolfSSL/wolfssl/issues/2421/comments
1
2019-08-21T09:02:59Z
2019-11-13T20:54:03Z
https://github.com/wolfSSL/wolfssl/issues/2421
483,292,160
2,421
673
CVE-2019-15701
2019-08-27T18:15:11.217
components/Modals/HelpModal.jsx in BloodHound 2.2.0 allows remote attackers to execute arbitrary OS commands (by spawning a child process as the current user on the victim's machine) when the search function's autocomplete feature is used. The victim must import data from an Active Directory with a GPO containing JavaS...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/BloodHoundAD/BloodHound/issues/267" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https:/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bloodhound_project:bloodhound:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "8B883763-6DDB-4C8D-8ABA-669F35FC0D05", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "78" ]
78
https://github.com/BloodHoundAD/BloodHound/issues/267
[ "Exploit", "Third Party Advisory" ]
github.com
[ "BloodHoundAD", "BloodHound" ]
Dear Bloodhound Team – I identified a way to achieve code execution in Bloodhound 2.2.0 by creating a GPO with a name containing JavaScript code that will trigger in Bloodhound's search-autocomplete function. The injected JavaScript is not only a valid xss but also allows the creation of a child process. The foll...
Code execution in Bloodhound via malicious AD Object
https://api.github.com/repos/SpecterOps/BloodHound-Legacy/issues/267/comments
5
2019-08-25T02:48:07Z
2019-08-28T20:07:35Z
https://github.com/SpecterOps/BloodHound-Legacy/issues/267
484,883,426
267
674
CVE-2019-15702
2019-08-27T18:15:11.280
In the TCP implementation (gnrc_tcp) in RIOT through 2019.07, the parser for TCP options does not terminate on all inputs, allowing a denial-of-service, because sys/net/gnrc/transport_layer/tcp/gnrc_tcp_option.c has an infinite loop for an unknown zero-length option.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/RIOT-OS/RIOT/issues/12086" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:riot-os:riot:*:*:*:*:*:*:*:*", "matchCriteriaId": "DEF02E81-8215-4557-81C3-8BF2B6B59DED", "versionEndExcluding": null, "versionEndIncluding": "2019.07", "versionStartExcludin...
[ "835" ]
835
https://github.com/RIOT-OS/RIOT/issues/12086
[ "Exploit", "Third Party Advisory" ]
github.com
[ "RIOT-OS", "RIOT" ]
#### Description The `gnrc_tcp` parser for TCP options (`_option_parse`) doesn't terminate on all inputs. When sending a packet with an unknown option and option length zero it doesn't advance the option pointer (i.e. advances it by zero) and therefore stays in the loop forever. https://github.com/RIOT-OS/RIOT/bl...
gnrc_tcp: option parsing doesn't terminate on all inputs, potential DOS
https://api.github.com/repos/RIOT-OS/RIOT/issues/12086/comments
1
2019-08-26T15:10:23Z
2019-09-16T11:01:02Z
https://github.com/RIOT-OS/RIOT/issues/12086
485,288,116
12,086
675
CVE-2019-15714
2019-08-28T12:15:12.873
cli/lib/main.js in Entropic before 2019-06-13 does not reject / and \ in command names, which might allow a directory traversal attack in unusual situations.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/entropic-dev/entropic/issues/251" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/entropic-dev/entropic/is...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:entropic_project:entropic:*:*:*:*:*:*:*:*", "matchCriteriaId": "081900C7-4224-4C6B-8B64-48B905F7E7EB", "versionEndExcluding": "2019-06-13", "versionEndIncluding": null, "vers...
[ "22" ]
22
https://github.com/entropic-dev/entropic/issues/251
[ "Third Party Advisory" ]
github.com
[ "entropic-dev", "entropic" ]
# Is this a feature request or a bug? bug Parent [path traversal](https://en.wikipedia.org/wiki/Directory_traversal_attack) is often considered a security problem. This is likely low impact if it is a security problem; the only vectors I can see is socially engineered copy/paste or postinstall hook abuse. If an...
possible parent path traversal in command argument
https://api.github.com/repos/entropic-dev/entropic/issues/251/comments
3
2019-06-11T13:00:16Z
2019-06-14T00:23:26Z
https://github.com/entropic-dev/entropic/issues/251
454,676,374
251
676
CVE-2019-15716
2019-08-28T15:15:10.927
WTF before 0.19.0 does not set the permissions of config.yml, which might make it easier for local attackers to read passwords or API keys if the permissions were misconfigured or were based on unsafe OS defaults.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wtfutil/wtf/blob/67658e172c9470e93e4122d6e2c90d01db12b0ac/cfg/config_files.go#L71-L72" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wtfutil:wtf:*:*:*:*:*:*:*:*", "matchCriteriaId": "E3C9F109-D4CF-47CD-AB25-B5018A16CD16", "versionEndExcluding": "0.19.0", "versionEndIncluding": null, "versionStartExcluding"...
[ "276" ]
276
https://github.com/wtfutil/wtf/issues/517
[ "Third Party Advisory" ]
github.com
[ "wtfutil", "wtf" ]
WTF's `config.yml` file is a plain text file stored in the user's home directory. Given the nature of many of the modules in WTF, that file could hold account information, passwords, URIs, and API keys for the user's critical systems. This issue is a place to discuss the security of that file. 1. Does it need to...
Security: open call for thoughts on securing WTF's config file
https://api.github.com/repos/wtfutil/wtf/issues/517/comments
35
2019-07-24T16:02:21Z
2022-01-18T06:40:18Z
https://github.com/wtfutil/wtf/issues/517
472,367,182
517
677
CVE-2017-18594
2019-08-29T00:15:10.467
nse_libssh2.cc in Nmap 7.70 is subject to a denial of service condition due to a double free when an SSH connection fails, as demonstrated by a leading \n character to ssh-brute.nse or ssh-auth-methods.nse.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00073.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00075.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nmap:nmap:7.70:*:*:*:*:*:*:*", "matchCriteriaId": "3F2B2815-27CD-4A22-9394-332073CF9970", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": n...
[ "415" ]
415
https://github.com/nmap/nmap/issues/1077
[ "Patch", "Third Party Advisory" ]
github.com
[ "nmap", "nmap" ]
When testing ssh-auth-methods.nse against non-standard ports, I forgot to specify ports and NMAP crashed. I have narrowed it down to running the script against port 139. I ran a debug and found the crash appears to be caused by a double free of session data. This appears to be due to a session pointer not being NULLed ...
NMAP crash with ssh-auth-methods.nse (patch included)
https://api.github.com/repos/nmap/nmap/issues/1077/comments
3
2017-12-04T20:18:13Z
2019-05-17T18:03:32Z
https://github.com/nmap/nmap/issues/1077
279,134,205
1,077
678
CVE-2017-18594
2019-08-29T00:15:10.467
nse_libssh2.cc in Nmap 7.70 is subject to a denial of service condition due to a double free when an SSH connection fails, as demonstrated by a leading \n character to ssh-brute.nse or ssh-auth-methods.nse.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00073.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00075.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nmap:nmap:7.70:*:*:*:*:*:*:*", "matchCriteriaId": "3F2B2815-27CD-4A22-9394-332073CF9970", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": n...
[ "415" ]
415
https://github.com/nmap/nmap/issues/1227
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nmap", "nmap" ]
Nmap 7.70 crashes when running either of the following two scripts against an open port 22 which is not recognised as SSH: `ssh-publickey-acceptance` and `ssh-auth-methods`. ``` $ nmap -V Nmap version 7.70 ( https://nmap.org ) Platform: x86_64-unknown-linux-gnu Compiled with: nmap-liblua-5.3.3 openssl-1.0.2g nm...
Crash in libssh when port 22 response is unexpected
https://api.github.com/repos/nmap/nmap/issues/1227/comments
3
2018-05-27T23:28:05Z
2018-12-02T05:53:47Z
https://github.com/nmap/nmap/issues/1227
326,860,670
1,227
679
CVE-2019-11247
2019-08-29T01:15:11.287
The Kubernetes kube-apiserver mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in this manner are enforced using roles and role bindings within the namespace, meaning that a user with access only to a resourc...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:2816" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:2824" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "A582FE75-D84B-4C8F-B836-95FB15F68EBA", "versionEndExcluding": null, "versionEndIncluding": "1.12.10", "versionStar...
[ "863" ]
863
https://github.com/kubernetes/kubernetes/issues/80983
[ "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
[CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L) The API server mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in th...
CVE-2019-11247: API server allows access to custom resources via wrong scope
https://api.github.com/repos/kubernetes/kubernetes/issues/80983/comments
10
2019-08-05T12:44:08Z
2022-05-16T21:58:20Z
https://github.com/kubernetes/kubernetes/issues/80983
476,838,684
80,983
680
CVE-2019-11248
2019-08-29T01:15:11.367
The debugging endpoint /debug/pprof is exposed over the unauthenticated Kubelet healthz port. The go pprof endpoint is exposed over the Kubelet's healthz port. This debugging endpoint can potentially leak sensitive information such as internal Kubelet memory addresses and configuration, or for limited denial of service...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL...
[ { "source": "jordan@liggitt.net", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/81023" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups.go...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF491B76-31AF-401F-BDCA-2B825BD00B18", "versionEndExcluding": "1.12.10", "versionEndIncluding": null, "versionStar...
[ "862" ]
862
https://github.com/kubernetes/kubernetes/issues/81023
[ "Patch", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
The debugging endpoint `/debug/pprof` is exposed over the unauthenticated Kubelet healthz port. Versions prior to 1.15.0, 1.14.4, 1.13.8, and 1.12.10 are affected. The issue is of medium severity, but not exposed by the default configuration. If you are exposed we recommend upgrading to at least one of the versions lis...
CVE-2019-11248: /debug/pprof exposed on kubelet's healthz port
https://api.github.com/repos/kubernetes/kubernetes/issues/81023/comments
3
2019-08-06T14:34:33Z
2022-05-16T21:58:38Z
https://github.com/kubernetes/kubernetes/issues/81023
477,418,481
81,023
681
CVE-2019-11249
2019-08-29T01:15:11.443
The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes runs tar inside the container to create a tar archive, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run a...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE...
[ { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:2794" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:2816" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABCFC052-EAAD-4964-8B50-1D8A04A73D75", "versionEndExcluding": null, "versionEndIncluding": "1.12.10", "versionStar...
[ "22" ]
22
https://github.com/kubernetes/kubernetes/issues/80984
[ "Patch", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
[CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N) A third issue was discovered with the Kubernetes `kubectl cp` command that could enable a directory traversal such that a malicious container could replace or create files on a user’...
CVE-2019-11249: Incomplete fixes for CVE-2019-1002101 and CVE-2019-11246, kubectl cp potential directory traversal
https://api.github.com/repos/kubernetes/kubernetes/issues/80984/comments
3
2019-08-05T12:44:23Z
2022-05-16T21:57:50Z
https://github.com/kubernetes/kubernetes/issues/80984
476,838,777
80,984
682
CVE-2019-11250
2019-08-29T01:15:11.523
The Kubernetes client-go library logs request headers at verbosity levels of 7 or higher. This can disclose credentials to unauthorized users via logs or command output. Kubernetes components (such as kube-apiserver) prior to v1.16.0, which make use of basic or bearer token authentication, and run at high verbosity lev...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL"...
[ { "source": "jordan@liggitt.net", "tags": null, "url": "http://www.openwall.com/lists/oss-security/2020/10/16/2" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4052" }, { "source": "jordan@ligg...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "470C9C75-4582-4D15-8B34-07889BF9C24F", "versionEndExcluding": "1.15.3", "versionEndIncluding": null, "versionStart...
[ "532" ]
532
https://github.com/kubernetes/kubernetes/issues/81114
[ "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
This issue was reported in the [Kubernetes Security Audit Report](https://github.com/kubernetes/community/blob/master/wg-security-audit/findings/Kubernetes%20Final%20Report.pdf) **Description** Kubernetes requires an authentication mechanism to enforce users’ privileges. One method of authentication, bearer tokens,...
CVE-2019-11250: TOB-K8S-001: Bearer tokens are revealed in logs
https://api.github.com/repos/kubernetes/kubernetes/issues/81114/comments
15
2019-08-08T02:03:04Z
2023-09-21T12:52:47Z
https://github.com/kubernetes/kubernetes/issues/81114
478,213,865
81,114
683
CVE-2019-15758
2019-08-29T02:15:10.553
An issue was discovered in Binaryen 1.38.32. Missing validation rules in asmjs/asmangle.cpp can lead to an Assertion Failure at wasm/wasm.cpp in wasm::asmangle. A crafted input can cause denial-of-service, as demonstrated by wasm2js.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/binaryen/issues/2288" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:binaryen:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1776B8E-3B03-42D6-BBFF-13332315B947", "versionEndExcluding": "89", "versionEndIncluding": null, "versionStartExclu...
[ "617" ]
617
https://github.com/WebAssembly/binaryen/issues/2288
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "WebAssembly", "binaryen" ]
Hi, I observed two crash and assertion failed in wasm2js (based on commit 777342684f5af51105be710c06591513433ed879). The poc files are attached. How to reproduce: ``` wasm2js poc ``` [poc.zip](https://github.com/WebAssembly/binaryen/files/3479031/poc.zip) Report of backtrace in `gdb` Assertaion failed...
Crash and Assertion failed in wasm2js
https://api.github.com/repos/WebAssembly/binaryen/issues/2288/comments
1
2019-08-07T21:48:28Z
2019-08-20T23:36:12Z
https://github.com/WebAssembly/binaryen/issues/2288
478,154,657
2,288
684
CVE-2019-15939
2019-09-05T16:15:11.963
An issue was discovered in OpenCV 4.1.0. There is a divide-by-zero error in cv::HOGDescriptor::getDescriptorSize in modules/objdetect/src/hog.cpp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00025.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OpenCV/opencv/issues/152...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opencv:opencv:*:*:*:*:*:*:*:*", "matchCriteriaId": "80A5909B-6FA8-4988-8311-FEEF7771A092", "versionEndExcluding": null, "versionEndIncluding": "4.1.0", "versionStartExcluding...
[ "369" ]
369
https://github.com/OpenCV/opencv/issues/15287
[ "Third Party Advisory" ]
github.com
[ "OpenCV", "opencv" ]
<!-- If you have a question rather than reporting a bug please go to http://answers.opencv.org where you get much faster responses. If you need further assistance please read [How To Contribute](https://github.com/opencv/opencv/wiki/How_to_contribute). Please: * Read the documentation to test with the latest de...
Floating Point Exception in cv::HOGDescriptor::getDescriptorSize()
https://api.github.com/repos/opencv/opencv/issues/15287/comments
1
2019-08-13T07:02:59Z
2019-09-09T11:14:50Z
https://github.com/opencv/opencv/issues/15287
479,992,052
15,287
687
CVE-2019-15947
2019-09-05T17:15:12.187
In Bitcoin Core 0.18.0, bitcoin-qt stores wallet.dat data unencrypted in memory. Upon a crash, it may dump a core file. If a user were to mishandle a core file, an attacker can reconstruct the user's wallet.dat file, including their private keys, via a grep "6231 0500" command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures#CVE-2019-15947" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/oxagast/50a121b2df321...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "A0FD6643-BDF8-4B9E-B3FF-27C69C6EA20A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "312" ]
312
https://github.com/bitcoin/bitcoin/issues/16824
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "bitcoin", "bitcoin" ]
On a crash, bitcoin-qt may dump a core file that contains what was in memory at the time of the crash, for debugging purposes. The problem here is that bitcoin-qt stores the user's wallet.dat unencrypted in memory. With this information it becomes rather trivial to reconstruct parts of a user's wallet.dat from a .cor...
Crash dumps from bitcoin-qt contain wallets
https://api.github.com/repos/bitcoin/bitcoin/issues/16824/comments
9
2019-09-07T17:24:59Z
2022-02-15T11:16:07Z
https://github.com/bitcoin/bitcoin/issues/16824
490,659,703
16,824
688
CVE-2016-10937
2019-09-08T16:15:11.663
IMAPFilter through 2.6.12 does not validate the hostname in an SSL certificate.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00042.html" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mailing List" ], "url": "http://list...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imapfilter_project:imapfilter:*:*:*:*:*:*:*:*", "matchCriteriaId": "33A897C1-381D-4487-9ED6-7E16373FBB56", "versionEndExcluding": null, "versionEndIncluding": "2.6.12", "vers...
[ "295" ]
295
https://github.com/lefcha/imapfilter/issues/142
[ "Issue Tracking" ]
github.com
[ "lefcha", "imapfilter" ]
Apparently imapfilter is not checking the certificate after connecting to the imap server, or I am missing something. If the DNS is compromised by some hacker and imapfilter is directed to a fake IP address, the certificate supplied by that IP address will be accepted as valid if it is properly signed. What I mean is t...
No certificate verification
https://api.github.com/repos/lefcha/imapfilter/issues/142/comments
9
2016-11-25T18:26:37Z
2019-09-16T21:54:08Z
https://github.com/lefcha/imapfilter/issues/142
191,751,342
142
690
CVE-2019-16113
2019-09-08T21:15:10.617
Bludit 3.9.2 allows remote code execution via bl-kernel/ajax/upload-images.php because PHP code can be entered with a .jpg file name, and then this PHP code can write other PHP code to a ../ pathname.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/155295/Bludit-Directory-Traversal-Image-File-Upload.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "10A81FA4-0E1B-4680-A04F-E4D2267A98E2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "22" ]
22
https://github.com/bludit/bludit/issues/1081
[ "Exploit", "Third Party Advisory" ]
github.com
[ "bludit", "bludit" ]
### A Code Execution Vulnerability in Bludit v3.9.2 Hi, For CVE ID,so I open a new issue,sorry about that.And I think you haven't completely fixed the bug. There is a new Code Execution Vulnerability which allow to get server permissions,the path is /bl-kernel/admin/ajax/upload-images.php #### 1, login wit...
Bludit v3.9.2 Code Execution Vulnerability in "Upload function"
https://api.github.com/repos/bludit/bludit/issues/1081/comments
6
2019-09-07T11:40:38Z
2023-10-24T07:42:28Z
https://github.com/bludit/bludit/issues/1081
490,625,895
1,081
691
CVE-2019-16130
2019-09-09T03:15:10.343
YII2-CMS v1.0 has XSS in protected\core\modules\home\models\Contact.php via a name field to /contact.html.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://www.iwantacve.cn/index.php/archives/277/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/weison-tech/yii2-...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hgw168cc:yii-cms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9DD6508-A3F9-482D-A7C2-CD7E45DA89D5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "79" ]
79
https://github.com/weison-tech/yii2-cms/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "weison-tech", "yii2-cms" ]
在前端的留言处未全部过滤输入内容或者限制输入长度 **有效负荷:** `<script>alert(1)</script>` **文件名** protected\core\modules\home\models\Contact.php **代码** ``` public function rules() { return [ [['name', 'company', 'mobile', 'email'], 'required'], [['demand'], 'string'], [['created_at', '...
yii2-cms存在存储型XSS
https://api.github.com/repos/weison-tech/yii2-cms/issues/2/comments
1
2019-08-31T14:28:50Z
2019-09-09T02:47:51Z
https://github.com/weison-tech/yii2-cms/issues/2
487,775,693
2
692
CVE-2019-16140
2019-09-09T12:15:10.820
An issue was discovered in the chttp crate before 0.1.3 for Rust. There is a use-after-free during buffer conversion.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/sagebind/isahc/issues/2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://rustsec.org/advisories/RUSTSEC-2019-0016.html" }, { "source": "af854a3a-2127-422b-91ae-364d...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:isahc_project:isahc:0.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "77F7CA39-6FCE-457C-A664-67EF550793C1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "416" ]
416
https://github.com/sagebind/isahc/issues/2
null
github.com
[ "sagebind", "isahc" ]
The returned vector is backed by freed memory, because `slice` is dropped at the end of the function.
impl From<Buffer> for Vec<u8> is unsound
https://api.github.com/repos/sagebind/isahc/issues/2/comments
3
2018-01-01T21:19:23Z
2019-09-01T18:19:33Z
https://github.com/sagebind/isahc/issues/2
285,329,870
2
694
CVE-2019-16141
2019-09-09T12:15:10.897
An issue was discovered in the once_cell crate before 1.0.1 for Rust. There is a panic during initialization of Lazy.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/matklad/once_cell/issues/46" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://rustsec.org/advisories/RUSTSEC-2019-0017.html" }, { "so...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:once_cell_project:once_cell:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FB490F9-D359-4426-8F28-21247F46EC06", "versionEndExcluding": "1.0.1", "versionEndIncluding": null, "version...
[ "20" ]
20
https://github.com/matklad/once_cell/issues/46
[ "Third Party Advisory" ]
github.com
[ "matklad", "once_cell" ]
The following program causes UB: ```rust use once_cell::sync::Lazy; static HI: Lazy<i32> = Lazy::new(|| { panic!(); }); fn main() { let _ = std::panic::catch_unwind(|| println!("{}", *HI)); println!("{}", *HI); } ``` This is because of incorrect use of `unreachable_unchecked` when `Lazy` ...
Lazy can cause UB when initialization fails, and program retries initialization
https://api.github.com/repos/matklad/once_cell/issues/46/comments
1
2019-09-01T16:23:01Z
2019-09-01T17:21:09Z
https://github.com/matklad/once_cell/issues/46
487,904,642
46
695
CVE-2019-16144
2019-09-09T12:15:11.100
An issue was discovered in the generator crate before 0.6.18 for Rust. Uninitialized memory is used by Scope, done, and yield_ during API calls.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Xudong-Huang/generator-rs/issues/9" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://rustsec.org/advisories/RUSTSEC-2019-0020.html" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:generator-rs_project:generator-rs:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E6F8A2E-72A3-4DAC-96DE-DCCE18AB1A71", "versionEndExcluding": "0.6.18", "versionEndIncluding": null, "...
[ "908" ]
908
https://github.com/Xudong-Huang/generator-rs/issues/9
[ "Third Party Advisory" ]
github.com
[ "Xudong-Huang", "generator-rs" ]
`Scope::new` takes 2 `*mut Option<_>` parameters, but the rest of the `Scope` API assumes that those raw pointers are valid. For example, the public `get_yield` method does the following: ``` let para = unsafe { &mut *self.para }; para.take() ``` Calling `Scope::new` with invalid (null, misaligned or dangling)...
`Scope` API is unsound
https://api.github.com/repos/Xudong-Huang/generator-rs/issues/9/comments
4
2019-01-11T21:34:45Z
2019-09-01T13:47:15Z
https://github.com/Xudong-Huang/generator-rs/issues/9
398,460,093
9
696
CVE-2019-16161
2019-09-09T17:15:13.173
Onigmo through 6.2.0 has a NULL pointer dereference in onig_error_code_to_str because of fetch_token in regparse.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/k-takata/Onigmo/commit/9827d5a0298ee766f6041db9c0080166ff6cdce8" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "htt...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:k-takata:onigmo:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3216461-E3C7-4842-B905-AF978F7B71BB", "versionEndExcluding": null, "versionEndIncluding": "6.2.0", "versionStartExcludi...
[ "476" ]
476
https://github.com/k-takata/Onigmo/issues/132
[ "Exploit", "Third Party Advisory" ]
github.com
[ "k-takata", "Onigmo" ]
When onig_new(ONIG_SYNTAX_PERL) fails with error code -215(ONIGERR_INVALID_GROUP_NAME), onig_error_code_to_str() crashes due to invalid memory access. Here is a POC code based on sample/syntax.c ```syntax.c /* * perl_syntax.c */ #include <stdio.h> #include <string.h> #include "onigmo.h" extern int exec(c...
Memory corruption in onig_error_code_to_str()
https://api.github.com/repos/k-takata/Onigmo/issues/132/comments
1
2019-07-27T23:59:01Z
2019-07-29T12:43:59Z
https://github.com/k-takata/Onigmo/issues/132
473,689,235
132
697
CVE-2019-16162
2019-09-09T17:15:13.253
Onigmo through 6.2.0 has an out-of-bounds read in parse_char_class because of missing codepoint validation in regenc.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/k-takata/Onigmo/issues/139" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:k-takata:onigmo:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3216461-E3C7-4842-B905-AF978F7B71BB", "versionEndExcluding": null, "versionEndIncluding": "6.2.0", "versionStartExcludi...
[ "125" ]
125
https://github.com/k-takata/Onigmo/issues/139
[ "Exploit", "Third Party Advisory" ]
github.com
[ "k-takata", "Onigmo" ]
When Onigmo try to parse a regular expression "[{\x{111111}x", it causes out of bounds read in parse_char_class(). Here is a POC code based on sample/syntax.c ```perl_syntax2.c /* * perl_syntax2.c */ #include <stdio.h> #include <string.h> #include "onigmo.h" extern int exec(const OnigSyntaxType* syntax, ...
Out-of-bounds read in parse_char_class()
https://api.github.com/repos/k-takata/Onigmo/issues/139/comments
1
2019-07-31T00:45:06Z
2019-08-01T12:53:41Z
https://github.com/k-takata/Onigmo/issues/139
474,882,990
139
698
CVE-2019-16163
2019-09-09T17:15:13.347
Oniguruma before 6.9.3 allows Stack Exhaustion in regcomp.c because of recursion in regparse.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/kkos/oniguruma/commit/4097828d7cc87589864fecf452f2cd46c5f37180" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Release Notes" ], "url": "https://github.com/kkos/oniguruma/compare/v...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oniguruma_project:oniguruma:*:*:*:*:*:*:*:*", "matchCriteriaId": "F46239D9-B0F5-4B47-9EE3-743D79F5CD66", "versionEndExcluding": "6.9.3", "versionEndIncluding": null, "version...
[ "674" ]
674
https://github.com/kkos/oniguruma/issues/147
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "kkos", "oniguruma" ]
If Oniguruma try to parse very deep regex nodes, it causes stack buffer overflow due to deep recursive calls to some parsing functions like optimize_nodes(), tree_min_len(). Here is a POC source code that simply executes onig_search() with very large regular expression "X+++++++++++++++++++++++++++++++ .... ". `...
Stack Exhaustion Problem caused by some parsing functions in regcomp.c making recursive calls to themselves.
https://api.github.com/repos/kkos/oniguruma/issues/147/comments
3
2019-07-29T02:45:52Z
2019-09-10T17:55:50Z
https://github.com/kkos/oniguruma/issues/147
473,824,113
147
699
CVE-2019-16164
2019-09-09T17:15:13.423
MyHTML through 4.0.5 has a NULL pointer dereference in myhtml_tree_node_remove in tree.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/lexborisov/myhtml/issues/175" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://githu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:myhtml_project:myhtml:*:*:*:*:*:*:*:*", "matchCriteriaId": "5ABE4735-9880-48A5-9DD9-D0D0303A62C8", "versionEndExcluding": null, "versionEndIncluding": "4.0.5", "versionStartE...
[ "476" ]
476
https://github.com/lexborisov/myhtml/issues/175
[ "Exploit", "Third Party Advisory" ]
github.com
[ "lexborisov", "myhtml" ]
POC HTML code is [here](https://gist.github.com/RKX1209/d2a1ac8baab7c4995ca5d140983fe810) ``` hexdump -C./nullderef_myhtml.html 00000000 3c 55 52 3e 3c 55 3e 3c 50 3e 3c 2f 55 20 |<UR><U><P></U | 0000000e ``` While parsing above HTML code, myhtml try to remove \<P\> tag because \<U\> tag is not closed...
NULL ptr dereference in tree node remove callback
https://api.github.com/repos/lexborisov/myhtml/issues/175/comments
4
2019-07-29T07:41:57Z
2019-09-06T06:31:38Z
https://github.com/lexborisov/myhtml/issues/175
473,899,258
175
700
CVE-2019-12105
2019-09-10T17:15:11.517
In Supervisor through 4.0.2, an unauthenticated user can read log files or restart a service. Note: The maintainer responded that the affected component, inet_http_server, is not enabled by default but if the user enables it and does not set a password, Supervisor logs a warning message. The maintainer indicated the ab...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://supervisord.org/configuration.html#inet-http-server-section-settings" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Supervisor/supervisor/commit/4e334d9cf2a...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:supervisord:supervisor:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BB007CD-542E-4152-82F7-0E2236F48BCA", "versionEndExcluding": null, "versionEndIncluding": "4.0.2", "versionStart...
[ "306" ]
306
https://github.com/Supervisor/supervisor/issues/1245
[ "Third Party Advisory" ]
github.com
[ "Supervisor", "supervisor" ]
Luan Souza (luansouza.jampa@gmail.com) wrote in email: > So, I was search for vulnerabites in my work company and I founded supervisord, it's a good service but the user don't need authetication for view logs ou restart a service, this is a called a misconfiguration, because some people put this online and anyone ca...
[CVE-2019-12105] Unauthenticated user can read log files or restart a service
https://api.github.com/repos/Supervisor/supervisor/issues/1245/comments
1
2019-05-29T14:01:52Z
2019-09-16T17:34:04Z
https://github.com/Supervisor/supervisor/issues/1245
449,827,551
1,245
702
CVE-2019-16249
2019-09-11T23:15:14.377
OpenCV 4.1.1 has an out-of-bounds read in hal_baseline::v_load in core/hal/intrin_sse.hpp when called from computeSSDMeanNorm in modules/video/src/dis_flow.cpp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/opencv/opencv/issues/15481" }, { "source": "nvd@nist.gov", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752702" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opencv:opencv:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6569E48A-FA41-46E8-9008-3C6B6A1BC38D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "125" ]
125
https://github.com/opencv/opencv/issues/15481
[ "Third Party Advisory" ]
github.com
[ "opencv", "opencv" ]
**Build type:** `Release` **OpenCV version:** `4.1.2-pre` **OS:** `Linux 4.15.0-62-generic #69-Ubuntu` **OpenCV VCS version:** `4.1.1-217-g4de115c08` I've complied opencv with clang enabling ASAN while fuzzing the opencv_test_video binary `crashes at cv::hal_baseline::v_load()` and `cv::computeSSDMeanNorm()` `...
OOB: cv::WorkerThread::WorkerThread()
https://api.github.com/repos/opencv/opencv/issues/15481/comments
2
2019-09-07T15:52:32Z
2019-09-17T22:07:03Z
https://github.com/opencv/opencv/issues/15481
490,650,392
15,481
703
CVE-2019-16303
2019-09-14T00:15:10.390
A class generated by the Generator in JHipster before 6.3.0 and JHipster Kotlin through 1.1.0 produces code that uses an insecure source of randomness (apache.commons.lang3 RandomStringUtils). This allows an attacker (if able to obtain their own password reset URL) to compute the value for all other password resets for...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/jhipster/generator-jhipster/commit/88448b85fd3e8e49df103f0061359037c2c68ea7" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jhipster:jhipster:*:*:*:*:*:*:*:*", "matchCriteriaId": "058DA509-FF19-4CB0-BD7B-C78E053740E3", "versionEndExcluding": "6.3.0", "versionEndIncluding": null, "versionStartExclu...
[ "338" ]
338
https://github.com/jhipster/generator-jhipster/issues/10401
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jhipster", "generator-jhipster" ]
This is for https://github.com/jhipster/generator-jhipster/security/advisories/GHSA-mwp6-j9wf-968c which isn't public at the time of this writing @JLLeitschuh thank you so much for reporting this issue!!! We would like to thank you by giving you a $500 bug bounty on the project, and this is why I'm creating this ...
Bug bounty for security advisory - thank you @JLLeitschuh
https://api.github.com/repos/jhipster/generator-jhipster/issues/10401/comments
48
2019-09-13T07:57:12Z
2020-07-14T08:58:13Z
https://github.com/jhipster/generator-jhipster/issues/10401
493,187,365
10,401
704
CVE-2019-16303
2019-09-14T00:15:10.390
A class generated by the Generator in JHipster before 6.3.0 and JHipster Kotlin through 1.1.0 produces code that uses an insecure source of randomness (apache.commons.lang3 RandomStringUtils). This allows an attacker (if able to obtain their own password reset URL) to compute the value for all other password resets for...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/jhipster/generator-jhipster/commit/88448b85fd3e8e49df103f0061359037c2c68ea7" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jhipster:jhipster:*:*:*:*:*:*:*:*", "matchCriteriaId": "058DA509-FF19-4CB0-BD7B-C78E053740E3", "versionEndExcluding": "6.3.0", "versionEndIncluding": null, "versionStartExclu...
[ "338" ]
338
https://github.com/jhipster/jhipster-kotlin/issues/183
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jhipster", "jhipster-kotlin" ]
Due to the uncontrolled nature of the previous full disclosure of this vulnerability in `jhipster-kotlin` this is an 0-Day vulnerability disclosure for jhipster-kotlin. See: https://github.com/jhipster/generator-jhipster/issues/10401 https://github.com/jhipster/generator-jhipster/security/advisories/GHSA-mwp6-j9wf-...
[SECURITY] CWE-338: Vulnerability in JHipster Kotlin
https://api.github.com/repos/jhipster/jhipster-kotlin/issues/183/comments
3
2019-09-13T22:27:51Z
2019-10-02T15:55:41Z
https://github.com/jhipster/jhipster-kotlin/issues/183
493,539,968
183
705
CVE-2019-14540
2019-09-15T22:15:10.277
A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3200" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0159" }, { "source"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD", "versionEndExcluding": "2.6.7.3", "versionEndIncluding": null, "versio...
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2410
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget (*) type report regarding `HikariConfig`, via `HikariDataSource` Mitre id: CVE-2019-14540 Reporter: iSafeBlue / blue at ixsec.org (*) See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for more on general problem type Fixed in: * 2.9.10...
Block one more gadget type (HikariCP, CVE-2019-14540)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2410/comments
8
2019-08-06T02:03:28Z
2020-02-10T22:11:47Z
https://github.com/FasterXML/jackson-databind/issues/2410
477,131,144
2,410
706
CVE-2019-14540
2019-09-15T22:15:10.277
A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3200" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0159" }, { "source"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD", "versionEndExcluding": "2.6.7.3", "versionEndIncluding": null, "versio...
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2449
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget (*) type report regarding `HikariConfig` (sub-class of `HikariDataSource`) Mitre id: CVE-2019-14439 Reporter: kingkk Fixed in: * 2.9.10 * 2.8.11.5 * 2.6.7.3 * does not affect 2.10.0 and later ----- (*) See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-nee...
Block one more gadget type (HikariCP, CVE-2019-14439 / CVE-2019-16335)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2449/comments
3
2019-09-10T17:06:52Z
2020-02-10T22:12:16Z
https://github.com/FasterXML/jackson-databind/issues/2449
491,794,946
2,449
707
CVE-2019-16333
2019-09-15T22:15:10.450
GetSimple CMS v3.3.15 has Persistent Cross-Site Scripting (XSS) in admin/theme-edit.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1313" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:get-simple:getsimple_cms:3.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "1175D384-DC48-4226-9609-725629E65605", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "79" ]
79
https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1313
[ "Exploit", "Third Party Advisory" ]
github.com
[ "GetSimpleCMS", "GetSimpleCMS" ]
Version impacted: 3.3.15 Payload: <svg/onload=alert(document.location)> ![image](https://user-images.githubusercontent.com/53895017/63857901-1771db00-c9d7-11e9-924d-c1edf3bd9fe8.png)
XSS in theme-edit.php
https://api.github.com/repos/GetSimpleCMS/GetSimpleCMS/issues/1313/comments
0
2019-08-28T13:02:41Z
2019-08-28T13:02:41Z
https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1313
486,369,075
1,313
708
CVE-2019-16334
2019-09-15T22:15:10.527
In Bludit v3.9.2, there is a persistent XSS vulnerability in the Categories -> Add New Category -> Name field. NOTE: this may overlap CVE-2017-16636.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/bludit/bludit/issues/1078" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "10A81FA4-0E1B-4680-A04F-E4D2267A98E2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/bludit/bludit/issues/1078
[ "Exploit", "Third Party Advisory" ]
github.com
[ "bludit", "bludit" ]
### Vulnerability Bludit v3.9.2 is vulnerable to a stored XSS vulnerability in Categories -> Add New Category -> Name Parameter ### Steps to reproduce the problem Go to Categories -> Add New Category and insert the following payload in [Name] Parameter: <svg onload=alert(document.location)> ![image](https:...
Stored XSS in bludit v3.9.2
https://api.github.com/repos/bludit/bludit/issues/1078/comments
2
2019-08-29T06:40:10Z
2023-10-20T17:37:48Z
https://github.com/bludit/bludit/issues/1078
486,767,363
1,078
709
CVE-2018-21015
2019-09-16T13:15:11.417
AVC_DuplicateConfig() at isomedia/avc_ext.c in GPAC 0.7.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file. There is "cfg_new->AVCLevelIndication = cfg->AVCLevelIndication;" but cfg could be NULL.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1179" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-an...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/1179
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Tested in Ubuntu 18.04, 64bit, gcc 7.3.0, gpac (master 94ad872) Compile cmd `$ ./configure --extra-cflags=-g"` `$ make` Triggered by `$ MP4Box -diso $POC` POC file: https://github.com/Marsman1996/pocs/blob/master/gpac/poc12-SEGV gdb info: ``` Program received signal SIGSEGV, Segmentation fault. A...
SEGV in AVC_DuplicateConfig() at avc_ext.c:847
https://api.github.com/repos/gpac/gpac/issues/1179/comments
2
2018-12-15T06:54:00Z
2019-09-21T12:25:09Z
https://github.com/gpac/gpac/issues/1179
391,351,147
1,179
710
CVE-2018-21016
2019-09-16T13:15:11.510
audio_sample_entry_AddBox() at isomedia/box_code_base.c in GPAC 0.7.1 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1180" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-an...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "125" ]
125
https://github.com/gpac/gpac/issues/1180
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Tested in Ubuntu 18.04, 64bit, gcc 7.3.0, gpac (master 94ad872) Compile cmd: `$ ./configure --extra-cflags="-fsanitize=address,undefined -g" --extra-ldflags="-fsanitize=address,undefined -ldl -g"` `$ make` Triggered by `$ MP4Box -diso $POC` POC file: https://github.com/Marsman1996/pocs/blob/master/gpac/p...
AddressSanitizer: heap-buffer-overflow in audio_sample_entry_AddBox() at box_code_base.c:3934
https://api.github.com/repos/gpac/gpac/issues/1180/comments
7
2018-12-15T07:16:20Z
2019-09-21T07:29:30Z
https://github.com/gpac/gpac/issues/1180
391,352,422
1,180
711
CVE-2018-21017
2019-09-16T13:15:11.573
GPAC 0.7.1 has a memory leak in dinf_Read in isomedia/box_code_base.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/d2371b4b204f0a3c0af51ad4e9b491144dd1225c" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "u...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "401" ]
401
https://github.com/gpac/gpac/issues/1183
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Tested in Ubuntu 18.04, 64bit, gcc 7.3.0, gpac (master d1c4bc3) Compile cmd: `$ ./configure --extra-cflags="-fsanitize=address,undefined -g" --extra-ldflags="-fsanitize=address,undefined -ldl -g"` `$ make` Triggered by `$ MP4Box -diso $POC` POC file: https://github.com/Marsman1996/pocs/blob/master/gpac/p...
AddressSanitizer: memory leaks of dref_New()
https://api.github.com/repos/gpac/gpac/issues/1183/comments
2
2018-12-17T15:51:57Z
2019-09-20T21:34:54Z
https://github.com/gpac/gpac/issues/1183
391,773,951
1,183
712
CVE-2019-16348
2019-09-16T13:15:11.963
marc-q libwav through 2017-04-20 has a NULL pointer dereference in gain_file() at wav_gain.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/marc-q/libwav/issues/24" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libwav_project:libwav:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B1ADCA2-142E-4BE6-997F-4549F987C0E1", "versionEndExcluding": null, "versionEndIncluding": "2017-04-20", "versionS...
[ "476" ]
476
https://github.com/marc-q/libwav/issues/24
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "marc-q", "libwav" ]
Tested in Ubuntu 14.04, 64bit, libwav (master 5cc8746) Triggered by `$ ./wav_gain $POC /dev/null` POC file: https://github.com/Marsman1996/pocs/blob/master/libwav/poc18-gain_file-SEGV ASAN info: ``` ASAN:SIGSEGV ================================================================= ==21704== ERROR: Addres...
NULL Pointer Dereference in gain_file() at wav_gain.c:33
https://api.github.com/repos/marc-q/libwav/issues/24/comments
0
2019-08-15T08:01:41Z
2019-08-15T08:05:55Z
https://github.com/marc-q/libwav/issues/24
481,039,670
24
715
CVE-2019-16349
2019-09-16T13:15:12.043
Bento4 1.5.1-628 has a NULL pointer dereference in AP4_ByteStream::ReadUI32 in Core/Ap4ByteStream.cpp when called from the AP4_TrunAtom class.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/422" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*", "matchCriteriaId": "27A2EAA1-1740-4A14-BFFC-BD4406E9BD87", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "476" ]
476
https://github.com/axiomatic-systems/Bento4/issues/422
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Tested in Ubuntu 14.04, 64bit, Bento4(master cbebcc9) Triggered by cmd: `$ ./mp4tag --list-symbols --list-keys --show-tags $POC` POC file: https://github.com/Marsman1996/pocs/blob/master/bento4/poc19-ReadUI32-SEGV ASAN info: ``` ==14819== WARNING: AddressSanitizer failed to allocate 0x000ff00000c0 ...
NULL Pointer Dereference in AP4_ByteStream::ReadUI32() at Ap4ByteStream.cpp:243
https://api.github.com/repos/axiomatic-systems/Bento4/issues/422/comments
0
2019-08-18T06:57:23Z
2019-08-25T16:20:06Z
https://github.com/axiomatic-systems/Bento4/issues/422
481,961,506
422
716
CVE-2019-16350
2019-09-16T13:15:12.107
ffjpeg before 2019-08-18 has a NULL pointer dereference in idct2d8x8() at dct.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B30E308-95EC-4B21-99B6-F731AF463030", "versionEndExcluding": "2019-08-18", "versionEndIncluding": null, "versionStartE...
[ "476" ]
476
https://github.com/rockcarry/ffjpeg/issues/10
[ "Exploit", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
## Test Environment Ubuntu 14.04, 64bit, ffjpeg(master 627c8a9) ## How to trigger 1. compile ffjpeg with cmake file from https://github.com/rockcarry/ffjpeg/issues/6 2. `$ ./ffjpeg -d $POC` ## POC file https://github.com/Marsman1996/pocs/blob/master/ffjpeg/poc20-idct2d8x8-SEGV ## Details ### Asan report ...
NULL Pointer Dereference in idct2d8x8() at dct.c:201
https://api.github.com/repos/rockcarry/ffjpeg/issues/10/comments
2
2019-08-18T08:03:41Z
2019-08-19T03:27:30Z
https://github.com/rockcarry/ffjpeg/issues/10
481,966,251
10
717
CVE-2019-16351
2019-09-16T13:15:12.183
ffjpeg before 2019-08-18 has a NULL pointer dereference in huffman_decode_step() at huffman.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B30E308-95EC-4B21-99B6-F731AF463030", "versionEndExcluding": "2019-08-18", "versionEndIncluding": null, "versionStartE...
[ "476" ]
476
https://github.com/rockcarry/ffjpeg/issues/11
[ "Exploit", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
## Test Environment Ubuntu 14.04, 64bit, ffjpeg(master 627c8a9) ## How to trigger 1. compile ffjpeg with cmake file from https://github.com/rockcarry/ffjpeg/issues/6 2. `$ ./ffjpeg -d $POC` ## POC file https://github.com/Marsman1996/pocs/blob/master/ffjpeg/poc21-huffman_decode_step-SEGV ## Details ### Asa...
SEGV in huffman_decode_step() at huffman.c:371
https://api.github.com/repos/rockcarry/ffjpeg/issues/11/comments
2
2019-08-18T08:04:59Z
2019-08-19T03:27:21Z
https://github.com/rockcarry/ffjpeg/issues/11
481,966,330
11
718
CVE-2019-16352
2019-09-16T13:15:12.247
ffjpeg before 2019-08-21 has a heap-based buffer overflow in jfif_load() at jfif.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B30E308-95EC-4B21-99B6-F731AF463030", "versionEndExcluding": "2019-08-18", "versionEndIncluding": null, "versionStartE...
[ "787" ]
787
https://github.com/rockcarry/ffjpeg/issues/12
[ "Exploit", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
## Test Environment Ubuntu 14.04, 64bit, ffjpeg(master 627c8a9) ## How to trigger 1. compile ffjpeg with cmake file from https://github.com/rockcarry/ffjpeg/issues/6 2. `$ ./ffjpeg -d $POC` ## POC file https://github.com/Marsman1996/pocs/blob/master/ffjpeg/poc22-jfif_load-heapoverflow ## Details ### Asan ...
AddressSanitizer: heap-buffer-overflow in jfif_load() at jfif.c:187
https://api.github.com/repos/rockcarry/ffjpeg/issues/12/comments
10
2019-08-18T08:07:01Z
2019-08-21T09:02:45Z
https://github.com/rockcarry/ffjpeg/issues/12
481,966,458
12
719
CVE-2019-16366
2019-09-16T17:15:14.293
In XS 9.0.0 in Moddable SDK OS180329, there is a heap-based buffer overflow in fxBeginHost in xsAPI.c when called from fxRunDefine in xsRun.c, as demonstrated by crafted JavaScript code to xst.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Moddable-OpenSource/moddable/issues/235" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:moddable:moddable:os180329:*:*:*:*:*:*:*", "matchCriteriaId": "34E757B1-02EE-4725-9610-056F3D11F904", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ "787" ]
787
https://github.com/Moddable-OpenSource/moddable/issues/235
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Moddable-OpenSource", "moddable" ]
Hello, We find a heap-buffer-overflow vulnerability in XS 9.0.0, which is reported by Address Sanitizer. We compile and run the xs in linux 64. The simplified js code: ``` function opt(arg1, arg2, arg3, arg4, arg5) { var sb = [arg2]; var test_bitor = function() { return 0; }; ...
XS: Heap-Buffer-Overflow
https://api.github.com/repos/Moddable-OpenSource/moddable/issues/235/comments
10
2019-07-25T07:08:13Z
2019-09-24T16:45:53Z
https://github.com/Moddable-OpenSource/moddable/issues/235
472,701,074
235
720
CVE-2019-16403
2019-09-18T12:15:11.067
In Webkul Bagisto before 0.1.5, the functionalities for customers to change their own values (such as address, review, orders, etc.) can also be manipulated by other customers.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/bagisto/bagisto/issues/749" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webkul:bagisto:*:*:*:*:*:*:*:*", "matchCriteriaId": "14941F78-5F05-4C36-8F39-C4CE5D545185", "versionEndExcluding": "0.1.5", "versionEndIncluding": null, "versionStartExcludin...
[ "639" ]
639
https://github.com/bagisto/bagisto/issues/749
[ "Exploit", "Third Party Advisory" ]
github.com
[ "bagisto", "bagisto" ]
**Threat:** sensitive data disclosure **Risk level:** HIGH **Complexity:** medium **Vulnerable functions:** Bagisto front end The list of functionality mentioned below are designed for customers to change their own values such as address, review etc can also be manipulated by other customers. **1) Address fie...
broken access control
https://api.github.com/repos/bagisto/bagisto/issues/749/comments
2
2019-03-27T12:52:24Z
2019-04-02T05:08:57Z
https://github.com/bagisto/bagisto/issues/749
425,942,250
749
721
CVE-2019-16510
2019-09-19T16:15:11.730
libIEC61850 through 1.3.3 has a use-after-free in MmsServer_waitReady in mms/iso_mms/server/mms_server.c, as demonstrated by server_example_goose.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mz-automation/libiec61850/issues/164" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mz-automation:libiec61850:*:*:*:*:*:*:*:*", "matchCriteriaId": "64D89754-FF85-462B-8253-C44E8DF11568", "versionEndExcluding": null, "versionEndIncluding": "1.3.3", "versionSt...
[ "416" ]
416
https://github.com/mz-automation/libiec61850/issues/164
[ "Exploit", "Third Party Advisory" ]
github.com
[ "mz-automation", "libiec61850" ]
Hello we found Heap user after free vulnerability in server_example_goose binary. **Below are steps followed to reproduce crash** Download latest source code from : https://github.com/mz-automation/libiec61850.git and compiled using ASAN (cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -fsanitize=leak -g -ggdb -fno-...
Heap-use-after-free in server_example_goose
https://api.github.com/repos/mz-automation/libiec61850/issues/164/comments
5
2019-09-09T18:14:27Z
2019-09-19T15:57:07Z
https://github.com/mz-automation/libiec61850/issues/164
491,247,971
164
722
CVE-2019-16511
2019-09-19T16:15:11.777
An issue was discovered in DTF in FireGiant WiX Toolset before 3.11.2. Microsoft.Deployment.Compression.Cab.dll and Microsoft.Deployment.Compression.Zip.dll allow directory traversal during CAB or ZIP archive extraction, because the full name of an archive file (even with a ../ sequence) is concatenated with the destin...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/GitHubAssessments/CVE_Assessments_09_2019" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/wixtoolset/issues/issues/6075" }, { "source": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:firegiant:wix_toolset:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED50D663-0FAF-46D1-827C-A1D32AEFC98B", "versionEndExcluding": "3.11.2", "versionEndIncluding": null, "versionStart...
[ "22" ]
22
https://github.com/wixtoolset/issues/issues/6075
[ "Patch", "Third Party Advisory" ]
github.com
[ "wixtoolset", "issues" ]
Please provide answers to the following questions to help us narrow down, reproduce, and fix the problem. Fill out one section and delete the others. * Which version of WiX are you building with? > WiX v3.11.1 * Which version of Visual Studio are you building with (if any)? > N/A * Which version of the W...
DTF vulnerable to "Zip Slip"
https://api.github.com/repos/wixtoolset/issues/issues/6075/comments
1
2019-09-12T18:10:14Z
2019-09-15T13:48:35Z
https://github.com/wixtoolset/issues/issues/6075
492,953,416
6,075
723
CVE-2019-16642
2019-09-20T15:15:14.017
App\Mobile\Controller\ZhuantiController.class.php in TuziCMS 2.0.6 has SQL injection via the index.php/Mobile/Zhuanti/group?id= substring.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yeyinshi/tuzicms/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yejiao:tuzicms:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "8998CDEF-98D4-46B2-B8AC-72E10F37CF85", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "89" ]
89
https://github.com/yeyinshi/tuzicms/issues/6
[ "Exploit", "Third Party Advisory" ]
github.com
[ "yeyinshi", "tuzicms" ]
**I can't insert image to github~** **0x01** App\Home\Controller\ZhuantiController.class.php `<?php /******************************************************************************* * [TuziCMS] 兔子CMS * @Copyright (C) 2014-2015 http://tuzicms.com All rights reserved. * @Team Yejiao.net * @Author: 秦大侠 QQ:17...
tuzicms SQLinjection
https://api.github.com/repos/yeyinshi/tuzicms/issues/6/comments
0
2019-09-17T04:45:42Z
2019-09-17T04:45:42Z
https://github.com/yeyinshi/tuzicms/issues/6
494,398,070
6
724
CVE-2019-16643
2019-09-20T16:15:13.680
An issue was discovered in ZrLog 2.1.1. There is a Stored XSS vulnerability in the article_edit area.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/94fzb/zrlog/issues/54" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zrlog:zrlog:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CDB89DE9-6695-48D7-9A0B-0207EAAAAD9C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "79" ]
79
https://github.com/94fzb/zrlog/issues/54
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "94fzb", "zrlog" ]
There is a stored XSS in the article_edit area
https://api.github.com/repos/94fzb/zrlog/issues/54/comments
2
2019-09-20T01:05:24Z
2019-10-13T11:37:41Z
https://github.com/94fzb/zrlog/issues/54
496,091,742
54
725