cve_id stringlengths 13 16 | cve_published stringdate 2019-01-01 16:29:00 2025-02-25 20:15:37 | cve_descriptions stringlengths 34 2.6k | cve_metrics dict | cve_references listlengths 1 281 | cve_configurations listlengths 1 70 | cve_cwe_list listlengths 1 1 | cve_primary_cwe stringclasses 164
values | url stringlengths 36 97 | cve_tags listlengths 1 5 ⌀ | domain stringclasses 1
value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 198k ⌀ | issue_title stringlengths 1 335 | issue_comments_url stringlengths 55 116 | issue_comments_count int64 0 338 | issue_created_at stringdate 2012-06-06 09:34:24 2025-04-02 09:37:20 | issue_updated_at stringdate 2014-04-01 20:16:21 2025-06-16 12:26:58 | issue_html_url stringlengths 36 97 | issue_github_id int64 4.93M 2.97B | issue_number int64 1 199k | __index_level_0__ int64 0 6.55k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2019-12950 | 2019-08-06T17:15:43.837 | An issue was discovered in TeamPass 2.1.27.35. From the sources/items.queries.php "Import items" feature, it is possible to load a crafted CSV file with an XSS payload. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nilsteampassnet/TeamPass/issues/2638"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/nil... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:teampass:teampass:2.1.27.35:*:*:*:*:*:*:*",
"matchCriteriaId": "89FC0190-8E89-4809-86A9-B251619DC27E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"79"
] | 79 | https://github.com/nilsteampassnet/TeamPass/issues/2638 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"nilsteampassnet",
"TeamPass"
] | ### Steps to reproduce
1. Create a CSV file with the following data:
```
<img src=x onerror='alert(document.cookie+" "+document.getElementById("input_personal_saltkey").value);'>My_password.txt
````
2. From Teampass, go select "Import items" feature
3. On the CSV tab, select the file previously created.
4. S... | Stored XSS | https://api.github.com/repos/nilsteampassnet/TeamPass/issues/2638/comments | 0 | 2019-06-25T14:22:03Z | 2022-10-31T04:40:37Z | https://github.com/nilsteampassnet/TeamPass/issues/2638 | 460,455,659 | 2,638 | 617 |
CVE-2019-14731 | 2019-08-07T00:15:10.907 | An issue was discovered in ZenTao 11.5.1. There is an XSS (stored) vulnerability that leads to the capture of other people's cookies via the Rich Text Box. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/easysoft/zentaopms/issues/35"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cnezsoft:zentao:11.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D33981E2-2866-49B9-9EEC-590D4D74D588",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"79"
] | 79 | https://github.com/easysoft/zentaopms/issues/35 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"easysoft",
"zentaopms"
] | There exists XSS(stored) vulnerability in Rich Text Box.
The vulnerability replication process is as follows:
1. Capture packets when you add picture through Rich Text Box.
2. Then, change raw data into `<img src="a" onerror="alert(document.cookie)" />`.
3. After successful saving,users' cookies will pop up. | There is one XSS(stored) vulnerability that can get Cookies from other account | https://api.github.com/repos/easysoft/zentaopms/issues/35/comments | 5 | 2019-08-05T14:59:11Z | 2021-05-31T01:55:32Z | https://github.com/easysoft/zentaopms/issues/35 | 476,908,646 | 35 | 618 |
CVE-2019-14732 | 2019-08-07T01:15:10.680 | AdPlug 2.3.1 has multiple heap-based buffer overflows in Ca2mLoader::load() in a2m.cpp. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/adplug/adplug/issues/88"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40l... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adplug_project:adplug:2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F8E042B0-0F5C-4370-9F20-EE741349CAE2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"787"
] | 787 | https://github.com/adplug/adplug/issues/88 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"adplug",
"adplug"
] | Hi,
While fuzzing AdPlug with American Fuzzy Lop, I found multiple heap-based buffer overflows in Ca2mLoader::load(), in src/a2m.cpp L106 and L184.
Attaching reproducers for both issues (gzipped so GitHub accepts them):
- [test01.a2m.gz](https://github.com/adplug/adplug/files/3471840/test01.a2m.gz)
- [test02.a2... | Multiple heap-based buffer overflows in Ca2mLoader::load() | https://api.github.com/repos/adplug/adplug/issues/88/comments | 2 | 2019-08-06T11:11:24Z | 2020-05-11T11:05:07Z | https://github.com/adplug/adplug/issues/88 | 477,318,379 | 88 | 619 |
CVE-2019-14733 | 2019-08-07T01:15:10.773 | AdPlug 2.3.1 has multiple heap-based buffer overflows in CradLoader::load() in rad.cpp. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/adplug/adplug/issues/89"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/m... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adplug_project:adplug:2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F8E042B0-0F5C-4370-9F20-EE741349CAE2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"787"
] | 787 | https://github.com/adplug/adplug/issues/89 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"adplug",
"adplug"
] | Hi,
While fuzzing AdPlug with American Fuzzy Lop, I found multiple heap-based buffer overflows in CradLoader::load(), in src/rad.cpp L74 and L85.
Attaching reproducers for both issues (gzipped so GitHub accepts them):
- [test01.rad.gz](https://github.com/adplug/adplug/files/3472052/test01.rad.gz)
- [test02.rad.... | Multiple heap-based buffer overflows in CradLoader::load() | https://api.github.com/repos/adplug/adplug/issues/89/comments | 1 | 2019-08-06T11:58:03Z | 2020-05-11T11:05:07Z | https://github.com/adplug/adplug/issues/89 | 477,337,678 | 89 | 620 |
CVE-2019-14734 | 2019-08-07T01:15:10.837 | AdPlug 2.3.1 has multiple heap-based buffer overflows in CmtkLoader::load() in mtk.cpp. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/adplug/adplug/issues/90"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/m... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adplug_project:adplug:2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F8E042B0-0F5C-4370-9F20-EE741349CAE2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"787"
] | 787 | https://github.com/adplug/adplug/issues/90 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"adplug",
"adplug"
] | Hi,
While fuzzing AdPlug with American Fuzzy Lop, I found multiple heap-based buffer overflows in CmtkLoader::load(), in src/mtk.cpp L95 and L103.
Attaching reproducers for both issues (gzipped so GitHub accepts them):
- [test01.mtk.gz](https://github.com/adplug/adplug/files/3472238/test01.mtk.gz)
- [test02.mtk... | Multiple heap-based buffer overflows in CmtkLoader::load() | https://api.github.com/repos/adplug/adplug/issues/90/comments | 1 | 2019-08-06T12:40:29Z | 2020-05-11T11:05:07Z | https://github.com/adplug/adplug/issues/90 | 477,356,808 | 90 | 621 |
CVE-2019-14746 | 2019-08-07T16:15:12.363 | A issue was discovered in KuaiFanCMS 5.0. It allows eval injection by placing PHP code in the install.php db_name parameter and then making a config.php request. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/poropro/kuaifan/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kuaifan:kuaifancms:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4ECFC35F-4E89-49AE-A8E5-D6A1E0B17E2E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"94"
] | 94 | https://github.com/poropro/kuaifan/issues/2 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"poropro",
"kuaifan"
] | ./upload/install.php 136-176
```
case 'installmodule': //执行SQL
extract($_POST);
$GLOBALS['dbcharset'] = $dbcharset;
$PHP_SELF = isset($_SERVER['PHP_SELF']) ? $_SERVER['PHP_SELF'] : (isset($_SERVER['SCRIPT_NAME']) ? $_SERVER['SCRIPT_NAME'] : $_SERVER['ORIG_PATH_INFO']);
$rootpath = str_replace('\\','/',di... | Insert malicious code in the installation process to get a web shell | https://api.github.com/repos/poropro/kuaifan/issues/2/comments | 0 | 2019-07-24T08:40:24Z | 2019-07-24T08:40:24Z | https://github.com/poropro/kuaifan/issues/2 | 472,153,114 | 2 | 622 |
CVE-2019-14747 | 2019-08-07T16:15:12.457 | DWSurvey through 2019-07-22 has stored XSS via the design/my-survey-design!copySurvey.action surveyName parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/wkeyuan/DWSurvey/issues/47"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:diaowen:dwsurvey:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FB919E79-6567-4002-A868-F6DB8227313D",
"versionEndExcluding": null,
"versionEndIncluding": "2019-07-22",
"versionStartE... | [
"79"
] | 79 | https://github.com/wkeyuan/DWSurvey/issues/47 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"wkeyuan",
"DWSurvey"
] | **There is a stored XSS vulnerability which allows remote attackers to inject arbitrary web script or stole admin's or other users cookies when copy the survey**
**Vulnerability file:**
`/design/my-survey-design!copySurvey.action`
**PoC:**
`/design/my-survey-design!copySurvey.action?surveyName=A%2520test%25EF... | [security vulnerability]stored xss when copy the survey | https://api.github.com/repos/wkeyuan/DWSurvey/issues/47/comments | 0 | 2019-08-07T04:26:10Z | 2019-08-07T04:26:10Z | https://github.com/wkeyuan/DWSurvey/issues/47 | 477,700,590 | 47 | 623 |
CVE-2018-20962 | 2019-08-08T20:15:11.723 | The Backpack\CRUD Backpack component before 3.4.9 for Laravel allows XSS via the select field type. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/Laravel-Backpack/CRUD/blob/master/CHANGELOG.md"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:backpackforlaravel:backpack\\\\crud:*:*:*:*:*:*:*:*",
"matchCriteriaId": "140B6BA5-EDEB-4C1C-82A0-7A0C1A0E577D",
"versionEndExcluding": "3.4.9",
"versionEndIncluding": null,
... | [
"79"
] | 79 | https://github.com/Laravel-Backpack/CRUD/issues/1297 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Laravel-Backpack",
"CRUD"
] | # Bug report
Relational columns (select) does not escape html which allows scripts to be executed!
https://github.com/Laravel-Backpack/CRUD/blob/master/src/resources/views/columns/select.blade.php
### What I did:
```php
$this->crud->setColumnDetails('team_id', [
'label' => 'Team',
'type' => "select",
... | Cross-site scripting vulnerability | https://api.github.com/repos/Laravel-Backpack/CRUD/issues/1297/comments | 9 | 2018-03-22T21:05:42Z | 2018-07-31T07:07:50Z | https://github.com/Laravel-Backpack/CRUD/issues/1297 | 307,814,521 | 1,297 | 624 |
CVE-2019-14924 | 2019-08-10T19:15:10.920 | An issue was discovered in GCDWebServer before 3.5.3. The method moveItem in the GCDWebUploader class checks the FileExtension of newAbsolutePath but not oldAbsolutePath. By leveraging this vulnerability, an adversary can make an inaccessible file be available (the credential of the app, for instance). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/swisspol/GCDWebServer/commit/02738433bf2e1b820ef48f04edd15df304081802"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gcdwebserver_project:gcdwebserver:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4F2F760D-95AB-48E1-9F40-143CB1CCB104",
"versionEndExcluding": "3.5.3",
"versionEndIncluding": null,
"v... | [
"863"
] | 863 | https://github.com/swisspol/GCDWebServer/issues/433 | [
"Third Party Advisory"
] | github.com | [
"swisspol",
"GCDWebServer"
] | The method moveItem in GCDWebUploader class checks the FileExtension of newAbsolutePath but not the oldAbsolutePath. By taking this error, adversary can make un-accessible file to be available, credential of the app for instance. I have found real app affected by this vulnerability. | Security issue of GCDWebUploader | https://api.github.com/repos/swisspol/GCDWebServer/issues/433/comments | 1 | 2019-08-07T15:27:55Z | 2019-08-09T13:27:18Z | https://github.com/swisspol/GCDWebServer/issues/433 | 477,997,902 | 433 | 625 |
CVE-2019-14933 | 2019-08-11T21:15:10.860 | Bagisto 0.1.5 allows CSRF under /admin URIs. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://forums.bagisto.com/category/1/announcements"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/bagisto/bag... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:webkul:bagisto:0.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "400A4D3E-90DA-4ECB-8772-281F17FD862A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"352"
] | 352 | https://github.com/bagisto/bagisto/issues/750 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"bagisto",
"bagisto"
] | **Vulnerable link:** https://demo.bagisto.com/bagisto-103-206-131-18/admin/
**What is CSRF ?**
A CSRF attack forces a logged-on victims browser to send a forged HTTP request, including the victims session cookie and any other automatically included authentication information, to a vulnerable web application.
**Vu... | Cross site request forgery | https://api.github.com/repos/bagisto/bagisto/issues/750/comments | 1 | 2019-03-27T13:23:39Z | 2019-04-12T09:41:24Z | https://github.com/bagisto/bagisto/issues/750 | 425,957,511 | 750 | 626 |
CVE-2019-12618 | 2019-08-12T17:15:10.983 | HashiCorp Nomad 0.9.0 through 0.9.1 has Incorrect Access Control via the exec driver. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10,
"confidentialityImpact": "COMPLETE"... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/hashicorp/nomad/issues/5783"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.hashicorp.com/blog/category/nomad"
},
{
"source": "cve@m... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hashicorp:nomad:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1FC7FFA3-34AC-4996-97C1-C2C23CB8AC80",
"versionEndExcluding": null,
"versionEndIncluding": "0.9.1",
"versionStartExcludi... | [
"269"
] | 269 | https://github.com/hashicorp/nomad/issues/5783 | [
"Third Party Advisory"
] | github.com | [
"hashicorp",
"nomad"
] | It was discovered that exec driver tasks run with full Linux capabilities such that processes can escalate to run as privileged root user, despite running as the Linux unprivileged user, nobody. This vulnerability affects versions 0.9.0 and 0.9.1 of Nomad, both OSS and Enterprise and was fixed in #5728.
## Backgrou... | CVE-2019-12618: Privilege Escalation in 0.9.0, 0.9.1 | https://api.github.com/repos/hashicorp/nomad/issues/5783/comments | 1 | 2019-06-05T17:50:45Z | 2022-11-22T02:29:58Z | https://github.com/hashicorp/nomad/issues/5783 | 452,635,120 | 5,783 | 627 |
CVE-2019-14968 | 2019-08-12T18:15:12.427 | An issue was discovered in imcat 4.9. There is SQL Injection via the index.php order parameter in a mod=faqs action. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/peacexie/imcat/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:txjia:imcat:4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "678F05BD-315E-4C1B-9FCE-9270F8C24F11",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"89"
] | 89 | https://github.com/peacexie/imcat/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"peacexie",
"imcat"
] | **Exploit vulnerability :**
Test parameter : order

Use sqlmap(http://sqlmap.org/) and use sqlmap-tamper : unmagicquotes
payload:
`sqlmap -u 'http://imcat.txjia.com//index.php?sch_faqs=%E6%90%9C%... | the vulnerability report: sql injection vulnerability in index.php page . | https://api.github.com/repos/peacexie/imcat/issues/2/comments | 1 | 2019-08-06T03:03:00Z | 2019-08-12T03:54:49Z | https://github.com/peacexie/imcat/issues/2 | 477,144,774 | 2 | 628 |
CVE-2019-14980 | 2019-08-12T23:15:11.493 | In ImageMagick 7.x before 7.0.8-42 and 6.x before 6.9.10-42, there is a use after free vulnerability in the UnmapBlob function that allows an attacker to cause a denial of service by sending a crafted file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "20ADD76D-50E8-4DCE-8572-28070BFE3835",
"versionEndExcluding": "6.9.10-42",
"versionEndIncluding": null,
"version... | [
"416"
] | 416 | https://github.com/ImageMagick/ImageMagick6/issues/43 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick6"
] | In magick/blob.c line 702, the function UnmapBlob freed the object 'blob_info->data', but it did't set the point null. The code returned this dangling point in line 716, it will cause UAF in this code. | Use after free in magick/blob.c | https://api.github.com/repos/ImageMagick/ImageMagick6/issues/43/comments | 2 | 2019-04-22T02:28:38Z | 2019-08-18T16:31:32Z | https://github.com/ImageMagick/ImageMagick6/issues/43 | 435,576,558 | 43 | 629 |
CVE-2019-14981 | 2019-08-12T23:15:11.600 | In ImageMagick 7.x before 7.0.8-41 and 6.x before 6.9.10-41, there is a divide-by-zero vulnerability in the MeanShiftImage function. It allows an attacker to cause a denial of service by sending a crafted file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "26AC6455-68F9-418E-B71A-3E9A35155603",
"versionEndExcluding": "6.9.10-41",
"versionEndIncluding": null,
"version... | [
"369"
] | 369 | https://github.com/ImageMagick/ImageMagick/issues/1552 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | MagickCore/feature.c
In line 2259, it assgin 'count=0', the code make a loop as 'for (v=(-((ssize_t) height/2)); v <= (((ssize_t) height/2)); v++)' , the 'count++' in this loop and the 'gamma=1.0/count' in line 2291. But the count is 0 in some cases. It may happen DIVIDE_BY_ZERO bug if the code don't get in this l... | DIVIDE_BY_ZERO in feature.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1552/comments | 2 | 2019-04-18T06:16:56Z | 2019-08-18T16:30:47Z | https://github.com/ImageMagick/ImageMagick/issues/1552 | 434,607,141 | 1,552 | 630 |
CVE-2019-14982 | 2019-08-12T23:15:11.663 | In Exiv2 before v0.27.2, there is an integer overflow vulnerability in the WebPImage::getHeaderOffset function in webpimage.cpp. It can lead to a buffer overflow vulnerability and a crash. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Exiv2/exiv2/compare/v0.27.2-RC2...v0.27.2"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://gi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4A0D0423-EA55-4C2F-8CC8-25E5B9F875A6",
"versionEndExcluding": "0.27.2",
"versionEndIncluding": null,
"versionStartExcluding"... | [
"190"
] | 190 | https://github.com/Exiv2/exiv2/issues/960 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"Exiv2",
"exiv2"
] | **Describe the bug**
I found a buffer overflow bugs in exiv2/src/webpimage.cpp:837 due to integer overflow.
**To Reproduce**
Steps to reproduce the behaviour:
exiv2/build/bin/exiv2 exiv2_getHeaderOffset.poc
**Expected behavior**
In Exiv2::WebPImage::getHeaderOffset, integer overflow occurs when data_size is les... | buffer overflow in exiv2/src/webpimage.cpp | https://api.github.com/repos/Exiv2/exiv2/issues/960/comments | 4 | 2019-07-15T02:53:48Z | 2019-10-28T11:28:20Z | https://github.com/Exiv2/exiv2/issues/960 | 467,920,688 | 960 | 631 |
CVE-2019-14993 | 2019-08-13T18:15:13.117 | Istio before 1.1.13 and 1.2.x before 1.2.4 mishandles regular expressions for long URIs, leading to a denial of service during use of the JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url":... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*",
"matchCriteriaId": "20977A28-2513-4FD5-9673-AAA6D9EC8F9F",
"versionEndExcluding": "1.1.13",
"versionEndIncluding": null,
"versionStartExcluding"... | [
"185"
] | 185 | https://github.com/envoyproxy/envoy/issues/7728 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"envoyproxy",
"envoy"
] | *Description*:
We've noticed that requests with a very long URI crashes our envoy service for routes defined using a regex matcher.
We're not sure if it's due to some overflow bug in Envoy's regex parser, but ideally Envoy should not crash because of a long URI.
*Repro steps*:
Define a route with a match regex ... | route regex match fails for large URIs | https://api.github.com/repos/envoyproxy/envoy/issues/7728/comments | 13 | 2019-07-26T00:42:53Z | 2019-08-23T19:47:31Z | https://github.com/envoyproxy/envoy/issues/7728 | 473,126,532 | 7,728 | 632 |
CVE-2019-15047 | 2019-08-14T16:15:12.783 | An issue was discovered in Bento4 1.5.1.0. There is a heap-based buffer over-read in the function AP4_BitReader::SkipBits at Core/Ap4Utils.cpp. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/bento4/issues/408"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https:... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"125"
] | 125 | https://github.com/axiomatic-systems/bento4/issues/408 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"bento4"
] | # bento4
## version
bento4 1.5.1.0
## description
```txt
mp42acc 1.0
```
## download link
https://www.bento4.com/
## others
please send email to teamseri0us360@gmail.com if you have any questions.
---------------------
## (1) AP4_BitReader::SkipBits@Ap4Utils.cpp-548___heap-... | 2 Potential Buffer Overflow Vulnerabilities | https://api.github.com/repos/axiomatic-systems/Bento4/issues/408/comments | 0 | 2019-07-19T06:39:22Z | 2019-08-25T16:24:15Z | https://github.com/axiomatic-systems/Bento4/issues/408 | 470,163,532 | 408 | 633 |
CVE-2019-15048 | 2019-08-14T16:15:12.830 | An issue was discovered in Bento4 1.5.1.0. There is a heap-based buffer overflow in the AP4_RtpAtom class at Core/Ap4RtpAtom.cpp. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/bento4/issues/409"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https:... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"787"
] | 787 | https://github.com/axiomatic-systems/bento4/issues/409 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"bento4"
] | # bento4
## version
bento4 1.5.1.0
## description
```txt
None
```
## download link
https://www.bento4.com/
## others
please send email to teamseri0us360@gmail.com if you have any questions.
---------------------
## AP4_AvccAtom::Create@Ap4AvccAtom.cpp-88___heap-buffer-overf... | 3 potential vulerabilities | https://api.github.com/repos/axiomatic-systems/Bento4/issues/409/comments | 0 | 2019-07-31T05:24:56Z | 2019-08-25T16:24:01Z | https://github.com/axiomatic-systems/Bento4/issues/409 | 474,942,702 | 409 | 634 |
CVE-2019-15052 | 2019-08-14T20:15:11.650 | The HTTP client in Gradle before 5.6 sends authentication credentials originally destined for the configured host. If that host returns a 30x redirect, Gradle also sends those credentials to all subsequent hosts that the request redirects to. This is similar to CVE-2018-1000007. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gradle/gradle/issues/10278"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gradle:gradle:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8B7A5A65-A668-4B9D-A69A-CA88776E1FBD",
"versionEndExcluding": "5.6",
"versionEndIncluding": null,
"versionStartExcluding":... | [
"522"
] | 522 | https://github.com/gradle/gradle/issues/10278 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gradle",
"gradle"
] | This issue is to discuss [CVE-2019-15052](https://nvd.nist.gov/vuln/detail/CVE-2019-15052) and answer any questions that people may have.
Our official advisory can be found here: https://github.com/gradle/gradle/security/advisories/GHSA-4cwg-f7qc-6r95
### CVSSv3 Score
We believe that this vulnerability will re... | [DISCUSSION] CVE-2019-15052: Repository authentication sent to server of HTTP redirection response | https://api.github.com/repos/gradle/gradle/issues/10278/comments | 9 | 2019-08-14T19:06:06Z | 2023-03-20T17:06:00Z | https://github.com/gradle/gradle/issues/10278 | 480,840,504 | 10,278 | 635 |
CVE-2019-15058 | 2019-08-14T21:15:13.687 | stb_image.h (aka the stb image loader) 2.23 has a heap-based buffer over-read in stbi__tga_load, leading to Information Disclosure or Denial of Service. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934973"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nothings/stb/issues/790"
},
{
"source": "cve@mitr... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:stb_project:stb:2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "FAC51233-5119-4F4E-B6DF-E29385B6E5D9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"125"
] | 125 | https://github.com/nothings/stb/issues/790 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"nothings",
"stb"
] | I find heap-buffer-overflow in stbi__tga_load with lastest version: 2.23
POC:
```
#define STBI_WINDOWS_UTF8
#define STB_IMAGE_WRITE_IMPLEMENTATION
#include "stb_image_write.h"
#define STB_IMAGE_IMPLEMENTATION
#include "stb_image.h"
#define STB_DEFINE
#include "stb.h"
#include<stdio.h>
#include<stdlib.h>
uns... | heap-buffer-overflow and denial-of-service in stbi__tga_load with version: 2.23 | https://api.github.com/repos/nothings/stb/issues/790/comments | 4 | 2019-08-13T08:52:36Z | 2021-07-03T04:54:20Z | https://github.com/nothings/stb/issues/790 | 480,036,373 | 790 | 636 |
CVE-2019-15062 | 2019-08-14T23:15:10.437 | An issue was discovered in Dolibarr 11.0.0-alpha. A user can store an IFRAME element (containing a user/card.php CSRF request) in his Linked Files settings page. When visited by the admin, this could completely take over the admin account. (The protection mechanism for CSRF is to check the Referer header; however, beca... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gauravnarwani.com/publications/CVE-2019-15062/"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:11.0.0:alpha:*:*:*:*:*:*",
"matchCriteriaId": "0F32E1DB-94A3-4644-9CD8-849B630537D5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"v... | [
"352"
] | 352 | https://github.com/Dolibarr/dolibarr/issues/11671 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"Dolibarr",
"dolibarr"
] | # Bug
Hello Team, Dolibar 11.0.0-alpha suffers from a Stored XSS in the Label field of Link a new file/document in Linked Files of the User. An attacker could use this feature to introduce a CSRF which would completely takeover admin's account. The protection for CSRF is restricted to referrer header and so if a CSRF ... | Stored XSS -> CSRF -> Admin Account Takeover | https://api.github.com/repos/Dolibarr/dolibarr/issues/11671/comments | 12 | 2019-08-09T10:21:02Z | 2019-08-19T06:49:41Z | https://github.com/Dolibarr/dolibarr/issues/11671 | 478,913,566 | 11,671 | 637 |
CVE-2019-14518 | 2019-08-15T16:15:12.007 | Evolution CMS 2.0.x allows XSS via a description and new category location in a template. NOTE: the vendor states that the behavior is consistent with the "access policy in the administration panel. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/evolution-cms/evolution/issues/1041"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/evolution-... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:modx:evolution_cms:2.0.0:alpha:*:*:*:*:*:*",
"matchCriteriaId": "278D24E3-94B9-47F3-B6B1-19B7E2ED1D19",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"79"
] | 79 | https://github.com/evolution-cms/evolution/issues/1041 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"evolution-cms",
"evolution"
] | **Stored Cross Site Scripting Vulnerability**
**Risk Description**
Stored cross-site scripting vulnerabilities arise when user input is stored and later embedded into the application's responses in an unsafe way. An attacker can use the vulnerability to inject malicious JavaScript code into the application... | Stored Cross Site Scripting | https://api.github.com/repos/evolution-cms/evolution/issues/1041/comments | 3 | 2019-03-22T14:11:43Z | 2019-05-21T11:37:09Z | https://github.com/evolution-cms/evolution/issues/1041 | 424,228,726 | 1,041 | 638 |
CVE-2019-14518 | 2019-08-15T16:15:12.007 | Evolution CMS 2.0.x allows XSS via a description and new category location in a template. NOTE: the vendor states that the behavior is consistent with the "access policy in the administration panel. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/evolution-cms/evolution/issues/1041"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/evolution-... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:modx:evolution_cms:2.0.0:alpha:*:*:*:*:*:*",
"matchCriteriaId": "278D24E3-94B9-47F3-B6B1-19B7E2ED1D19",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"79"
] | 79 | https://github.com/evolution-cms/evolution/issues/1042 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"evolution-cms",
"evolution"
] |
**I-Frame Injection Vulnerability**
**Risk Description**
Malware Attackers use this IFrame and include the malware websites. They are able to include the webpage one-pixel square (You won’t able to see it in webpage). Obfuscate the JavaScript that will run automatically from that included page so that it lo... | I-Frame Injection Vulnerability in Evolution CMS 2.0.x | https://api.github.com/repos/evolution-cms/evolution/issues/1042/comments | 2 | 2019-03-22T14:41:23Z | 2019-08-02T07:47:53Z | https://github.com/evolution-cms/evolution/issues/1042 | 424,243,076 | 1,042 | 639 |
CVE-2019-14518 | 2019-08-15T16:15:12.007 | Evolution CMS 2.0.x allows XSS via a description and new category location in a template. NOTE: the vendor states that the behavior is consistent with the "access policy in the administration panel. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/evolution-cms/evolution/issues/1041"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/evolution-... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:modx:evolution_cms:2.0.0:alpha:*:*:*:*:*:*",
"matchCriteriaId": "278D24E3-94B9-47F3-B6B1-19B7E2ED1D19",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"79"
] | 79 | https://github.com/evolution-cms/evolution/issues/1043 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"evolution-cms",
"evolution"
] | **Reflected Cross Site scripting Vulnerability**
**Description:**
The second and the most common type of XSS is Reflected XSS (Non-persistent XSS). In this case, the attacker’s payload has to be a part of the request that is sent to the web server. It is then reflected back in such a way that the HTTP response in... | Reflected Cross Site scripting Vulnerability in Evolution CMS 2.0.x | https://api.github.com/repos/evolution-cms/evolution/issues/1043/comments | 2 | 2019-03-22T15:07:24Z | 2025-05-26T03:38:00Z | https://github.com/evolution-cms/evolution/issues/1043 | 424,256,128 | 1,043 | 640 |
CVE-2018-12101 | 2019-08-15T17:15:11.613 | CMS Clipper 1.3.3 has XSS in the Security tab search, User Groups, Resource Groups, and User/Resource Group Links fields. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ClipperCMS/ClipperCMS/issues/487"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ClipperCMS/Cl... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:clippercms:clippercms:1.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C72E4CBC-C990-42AE-86BC-3123A14E5426",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"79"
] | 79 | https://github.com/ClipperCMS/ClipperCMS/issues/487 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ClipperCMS",
"ClipperCMS"
] | XSS is found in the "Security -->>Webusers" field in CMS Clipper_1.3.3 version. The Security name value is obtained from the webusers, having search parameter for user list. it is getting reflected and displayed without any sanitation.
Affected URL:
http://127.0.0.1:880/ClipperCMS-clipper_1.3.3/manager/
Steps to POC... | Reflected Cross Site Scripting in CMS Clipper_1.3.3 | https://api.github.com/repos/ClipperCMS/ClipperCMS/issues/487/comments | 1 | 2018-06-10T20:09:24Z | 2019-08-02T07:41:51Z | https://github.com/ClipperCMS/ClipperCMS/issues/487 | 330,998,575 | 487 | 641 |
CVE-2018-12101 | 2019-08-15T17:15:11.613 | CMS Clipper 1.3.3 has XSS in the Security tab search, User Groups, Resource Groups, and User/Resource Group Links fields. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ClipperCMS/ClipperCMS/issues/487"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ClipperCMS/Cl... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:clippercms:clippercms:1.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C72E4CBC-C990-42AE-86BC-3123A14E5426",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"79"
] | 79 | https://github.com/ClipperCMS/ClipperCMS/issues/488 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ClipperCMS",
"ClipperCMS"
] | Stored XSS is found in the "Manager Permissions" field in CMS Clipper_1.3.3 version. The Manager Permissions value is obtained from the User Groups, Resource Groups and Users/resource group links. which having adding users list and groups list. it is getting stored and displayed without any sanitation.
Affected URL:
... | Stored Cross Site Scripting in CMS Clipper_1.3.3 | https://api.github.com/repos/ClipperCMS/ClipperCMS/issues/488/comments | 1 | 2018-06-10T20:32:47Z | 2019-08-02T07:41:27Z | https://github.com/ClipperCMS/ClipperCMS/issues/488 | 331,000,222 | 488 | 642 |
CVE-2018-12101 | 2019-08-15T17:15:11.613 | CMS Clipper 1.3.3 has XSS in the Security tab search, User Groups, Resource Groups, and User/Resource Group Links fields. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ClipperCMS/ClipperCMS/issues/487"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ClipperCMS/Cl... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:clippercms:clippercms:1.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C72E4CBC-C990-42AE-86BC-3123A14E5426",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"79"
] | 79 | https://github.com/ClipperCMS/ClipperCMS/issues/496 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ClipperCMS",
"ClipperCMS"
] | HTML injection found in the "User Groups" field in CMS Clipper_1.3.3 version.The module name value is obtained from the user,it is getting saved and displayed without any sanitation.
**Affected URL:**
http://<host>/ClipperCMS-clipper_1.3.3/manager/
**Steps to reproduce:**
1.Under Security >> Manager Permissions -... | HTML injection is found in CMS Clipper_1.3.3 version | https://api.github.com/repos/ClipperCMS/ClipperCMS/issues/496/comments | 0 | 2019-08-05T20:58:58Z | 2019-08-05T21:00:17Z | https://github.com/ClipperCMS/ClipperCMS/issues/496 | 477,055,716 | 496 | 643 |
CVE-2019-12791 | 2019-08-15T21:15:11.510 | A directory traversal vulnerability in the v-list-user script in Vesta Control Panel 0.9.8-24 allows remote attackers to escalate from regular registered users to root via the password reset form. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9,
"confidentialityImpact": "COMPLETE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://cardaci.xyz/advisories/2019/08/12/vesta-control-panel-0.9.8-24-privilege-escalation-in-the-password-reset-form/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vestacp:control_panel:0.9.8-24:*:*:*:*:*:*:*",
"matchCriteriaId": "6D8F31C9-C8AF-49D8-9D64-4C6ABCD8839D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"22"
] | 22 | https://github.com/serghey-rodin/vesta/issues/1921 | [
"Third Party Advisory"
] | github.com | [
"serghey-rodin",
"vesta"
] | (Sorry for the *dramatic* subject.)
Well, it's really disappointing and unprofessional to come to this...
Two months ago (2019-05-28) I disclosed two privilege escalation vulnerabilities to info@vestacp.com (and eventually also to dev@vestacp.com and skid@vestacp.com), I obtained no useful replies or actions so I... | SECURITY: two privilege escalation from regular user to root | https://api.github.com/repos/outroll/vesta/issues/1921/comments | 10 | 2019-07-29T17:28:57Z | 2021-11-16T15:56:36Z | https://github.com/outroll/vesta/issues/1921 | 474,169,297 | 1,921 | 644 |
CVE-2019-15095 | 2019-08-16T01:15:09.767 | DWSurvey through 2019-07-22 has reflected XSS via the design/qu-multi-fillblank!answers.action surveyId parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wkeyuan/DWSurvey/issues/48"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:diaowen:dwsurvey:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FB919E79-6567-4002-A868-F6DB8227313D",
"versionEndExcluding": null,
"versionEndIncluding": "2019-07-22",
"versionStartE... | [
"79"
] | 79 | https://github.com/wkeyuan/DWSurvey/issues/48 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"wkeyuan",
"DWSurvey"
] | There is a Reflective XSS vulnerability when user view the survey result. The failure of the XSS filter to work properly resulted in this vulnerability, which allows remote attackers to inject arbitrary web script or stole admin's or other users cookies. The impact of the problem is serious especially when combined wit... | [security vulnerability] Reflective XSS when view the survey result | https://api.github.com/repos/wkeyuan/DWSurvey/issues/48/comments | 1 | 2019-08-13T11:38:03Z | 2020-12-23T13:22:53Z | https://github.com/wkeyuan/DWSurvey/issues/48 | 480,108,159 | 48 | 645 |
CVE-2019-15119 | 2019-08-16T15:15:11.950 | lib/install/install.go in cnlh nps through 0.23.2 uses 0777 permissions for /usr/local/bin/nps and/or /usr/bin/nps, leading to a file overwrite by a local user. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cnlh/nps/commit/7178b3380720e910d283036a8d39879a94105515"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nps_project:nps:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D3BC0BFD-CAE4-43CF-8930-6974E168502D",
"versionEndExcluding": null,
"versionEndIncluding": "0.23.2",
"versionStartExclud... | [
"732"
] | 732 | https://github.com/cnlh/nps/issues/176 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"cnlh",
"nps"
] | Dear NPS,
I would like to report a security vulnerability in NPS.
There is a problem with file permission that allow regular access to write or access information that they are not supposed to.
On the file install.go, the nps file is copied to /usr/local/bin/nps or /usr/bin/nps but then permission are changed ... | Permission problems on NPS Install | https://api.github.com/repos/ehang-io/nps/issues/176/comments | 2 | 2019-08-14T16:03:43Z | 2019-08-16T16:15:03Z | https://github.com/ehang-io/nps/issues/176 | 480,763,481 | 176 | 646 |
CVE-2019-5477 | 2019-08-16T16:15:10.637 | A command injection vulnerability in Nokogiri v1.10.3 and earlier allows commands to be executed in a subprocess via Ruby's `Kernel.open` method. Processes are vulnerable only if the undocumented method `Nokogiri::CSS::Tokenizer#load_file` is being called with unsafe user input as the filename. This vulnerability appea... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "support@hackerone.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/sparklemotion/nokogiri/issues/1915"
},
{
"source": "support@hackerone.com",
"tags": [
"Release Notes"
],
"url": "https://github.com/tenderlove/rexical/bl... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nokogiri:nokogiri:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E018DCFD-3E4A-4D78-B63A-488052EF45E7",
"versionEndExcluding": null,
"versionEndIncluding": "1.10.3",
"versionStartExcl... | [
"78"
] | 78 | https://github.com/sparklemotion/nokogiri/issues/1915 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"sparklemotion",
"nokogiri"
] | # CVE-2019-5477 - Nokogiri Command Injection Vulnerability
This issue has been created for public disclosure of a Command Injection vulnerability that was responsibly reported by @kyoshidajp (Katsuhiko YOSHIDA).
I'd like to thank [HackerOne](https://hackerone.com/loofah) for providing a secure, responsible mechan... | CVE-2019-5477 - Nokogiri Command Injection Vulnerability | https://api.github.com/repos/sparklemotion/nokogiri/issues/1915/comments | 4 | 2019-07-20T19:40:01Z | 2019-08-15T17:47:58Z | https://github.com/sparklemotion/nokogiri/issues/1915 | 470,707,803 | 1,915 | 647 |
CVE-2019-15136 | 2019-08-18T16:15:10.567 | The Access Control plugin in eProsima Fast RTPS through 1.9.0 does not check partition permissions from remote participant connections, which can lead to policy bypass for a secure Data Distribution Service (DDS) partition. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://arxiv.org/abs/1908.05310"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/eProsima/Fast-RTPS/issues/443"
},
{
"source... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eprosima:fast-rtps:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4D2ACC29-ADF4-4A74-B5AF-8F68C389FA18",
"versionEndExcluding": null,
"versionEndIncluding": "1.9.0",
"versionStartExcl... | [
"862"
] | 862 | https://github.com/eProsima/Fast-RTPS/issues/443 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"eProsima",
"Fast-RTPS"
] | Partition permissions are presently only checked when creating local data readers/writers, and are consequently skipped when checking *remote* readers/writers within the current default Access Control plugin implementation. This effectively nullifies any permission restrictions mandated in the remote participant's perm... | Partition permission are not enforced for remote participants [5342] | https://api.github.com/repos/eProsima/Fast-DDS/issues/443/comments | 1 | 2019-03-08T03:09:03Z | 2020-10-28T06:59:31Z | https://github.com/eProsima/Fast-DDS/issues/443 | 418,611,926 | 443 | 648 |
CVE-2019-15139 | 2019-08-18T19:15:09.637 | The XWD image (X Window System window dumping file) parsing component in ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (application crash resulting from an out-of-bounds Read) in ReadXWDImage in coders/xwd.c by crafting a corrupted XWD image file, a different vulnerability than CVE-2019-11472. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html"
},
{
"source": "cve@mit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-41:q16:*:*:*:*:*:*",
"matchCriteriaId": "34C2A939-19C7-4BC0-8DE5-E3D612C99B0E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | [
"125"
] | 125 | https://github.com/ImageMagick/ImageMagick/issues/1553 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | AddressSanitizer: Invalid read at xwd.c:573 | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1553/comments | 2 | 2019-04-20T13:04:54Z | 2019-08-19T11:08:05Z | https://github.com/ImageMagick/ImageMagick/issues/1553 | 435,396,971 | 1,553 | 649 |
CVE-2019-15140 | 2019-08-18T19:15:09.700 | coders/mat.c in ImageMagick 7.0.8-43 Q16 allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by crafting a Matlab image file that is mishandled in ReadImage in MagickCore/constitute.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html"
},
{
"source": "cve@mit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-43:q16:*:*:*:*:*:*",
"matchCriteriaId": "2EDF50C4-9FFE-4EBF-A5BE-44AF7E6988D9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | [
"416"
] | 416 | https://github.com/ImageMagick/ImageMagick/issues/1554 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | AddressSanitizer: heap-use-after-free at constitute.c:659 | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1554/comments | 2 | 2019-04-27T07:14:42Z | 2019-08-19T11:07:29Z | https://github.com/ImageMagick/ImageMagick/issues/1554 | 437,915,586 | 1,554 | 650 |
CVE-2019-15141 | 2019-08-18T19:15:09.760 | WriteTIFFImage in coders/tiff.c in ImageMagick 7.0.8-43 Q16 allows attackers to cause a denial-of-service (application crash resulting from a heap-based buffer over-read) via a crafted TIFF image file, related to TIFFRewriteDirectory, TIFFWriteDirectory, TIFFWriteDirectorySec, and TIFFWriteDirectoryTagColormap in tif_d... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Mailing List",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-43:q16:*:*:*:*:*:*",
"matchCriteriaId": "2EDF50C4-9FFE-4EBF-A5BE-44AF7E6988D9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | [
"125"
] | 125 | https://github.com/ImageMagick/ImageMagick/issues/1560 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | AddressSanitizer: heap-buffer-overflow at coders/tiff.c:4324 | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1560/comments | 2 | 2019-04-28T11:01:35Z | 2019-09-17T04:41:56Z | https://github.com/ImageMagick/ImageMagick/issues/1560 | 438,043,984 | 1,560 | 651 |
CVE-2019-15146 | 2019-08-18T19:15:10.450 | GoPro GPMF-parser 1.2.2 has a heap-based buffer over-read (4 bytes) in GPMF_Next in GPMF_parser.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gopro/gpmf-parser/commit/341f12cd5b97ab419e53853ca00176457c9f1681"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Thi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gopro:gpmf-parser:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BA83C3BC-F72D-453A-B3E4-DB1065FC99A6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"125"
] | 125 | https://github.com/gopro/gpmf-parser/issues/60 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gopro",
"gpmf-parser"
] | As of e27b702, when running `./gpmf-parser $FILE`, it may report with crashes when building with AddressSanitizer.
We basically applied some fuzzing to detect these issues, with the initial seeds from the `samples` directory. The POC files are wrapped with zip compression for upload.
Please see below for details.... | Multiple crashes when parsing MP4 files | https://api.github.com/repos/gopro/gpmf-parser/issues/60/comments | 14 | 2019-05-17T09:21:41Z | 2025-03-20T00:58:14Z | https://github.com/gopro/gpmf-parser/issues/60 | 445,346,728 | 60 | 652 |
CVE-2019-15151 | 2019-08-18T21:15:09.733 | AdPlug 2.3.1 has a double free in the Cu6mPlayer class in u6m.h. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/adplug/adplug/issues/91"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedo... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adplug_project:adplug:2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F8E042B0-0F5C-4370-9F20-EE741349CAE2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"415"
] | 415 | https://github.com/adplug/adplug/issues/91 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"adplug",
"adplug"
] | Hi,
While fuzzing AdPlug with American Fuzzy Lop, I found a double free in in Cu6mPlayer::~Cu6mPlayer(), in src/u6m.h L42.
Attaching a reproducer (gzipped so GitHub accepts it): [double-free.gz](https://github.com/adplug/adplug/files/3485266/double-free.gz)
```
==============================================... | Double free in Cu6mPlayer::~Cu6mPlayer() | https://api.github.com/repos/adplug/adplug/issues/91/comments | 10 | 2019-08-09T07:51:21Z | 2020-05-11T11:05:08Z | https://github.com/adplug/adplug/issues/91 | 478,848,634 | 91 | 653 |
CVE-2019-15160 | 2019-08-19T06:15:10.673 | The SweetXml (aka sweet_xml) package through 0.6.6 for Erlang and Elixir allows attackers to cause a denial of service (resource consumption) via an XML entity expansion attack with an inline DTD. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/kbrw/sweet_xml/issues/71"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://hex.pm/packages/sweet_xml"
},
{
"source":... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kbrw:sweet_xml:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B71E24C-B2A8-41B4-B90E-62C95436322E",
"versionEndExcluding": null,
"versionEndIncluding": "0.6.6",
"versionStartExcludin... | [
"776"
] | 776 | https://github.com/kbrw/sweet_xml/issues/71 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"kbrw",
"sweet_xml"
] | This is Wiki page for the vulnerability, it is a very well known XML parser vulnerability: https://en.wikipedia.org/wiki/Billion_laughs_attack.
To replicate this issue in SweetXml, you can do the following in an iex session and watch in the observer:
.
On August 19, @juskoljo observed the malicious gem... | [CVE-2019-15224] Version 1.6.13 published with malicious backdoor. | https://api.github.com/repos/rest-client/rest-client/issues/713/comments | 42 | 2019-08-19T10:45:06Z | 2019-08-21T20:10:26Z | https://github.com/rest-client/rest-client/issues/713 | 482,238,151 | 713 | 655 |
CVE-2019-15228 | 2019-08-20T00:15:10.050 | FUEL CMS 1.4.4 has XSS in the Create Blocks section of the Admin console. This could lead to cookie stealing and other malicious actions. This vulnerability can be exploited with an authenticated account but can also impact unauthenticated visitors. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/536"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.sevenlayers.com/in... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AF0C1B1B-6CDB-4E57-9F75-DE409B61F69F",
"versionEndExcluding": null,
"versionEndIncluding": "1.4.4",
"versionS... | [
"79"
] | 79 | https://github.com/daylightstudio/FUEL-CMS/issues/536 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"daylightstudio",
"FUEL-CMS"
] | 

 didn't execute in the application. But this filter didn't prevent the '.pht' extension. Thus, remote authenticated administr... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/osCommerce/oscommerce2/issues/631"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/osCommerce/oscommerce2/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oscommerce:oscommerce:2.3.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3D8A496B-7F43-478C-8A75-C3CF3688067C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"434"
] | 434 | https://github.com/osCommerce/oscommerce2/issues/631 | [
"Third Party Advisory"
] | github.com | [
"osCommerce",
"oscommerce2"
] | **Brief of this vulnerability**
osCommerce use `.htaccess` file for preventing to execute php and html files.
But it is not complete set to preventing all of malicious files.
As the result, Adversary can upload several types of malicious file.
This vulnerability needs the admin credentials, but this vulnerability... | osCommerce 2.3.4.1 allows to execute several file types. | https://api.github.com/repos/osCommerce/oscommerce2/issues/631/comments | 4 | 2018-11-05T09:03:29Z | 2025-01-06T03:34:44Z | https://github.com/osCommerce/oscommerce2/issues/631 | 377,305,890 | 631 | 658 |
CVE-2019-15499 | 2019-08-23T04:15:11.490 | CodiMD 1.3.1, when Safari is used, allows XSS via an IFRAME element with allow-top-navigation in the sandbox attribute, in conjunction with a data: URL. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/hackmdio/codimd/issues/1263"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hackmd:codimd:1.3.1:*:*:*:-:*:*:*",
"matchCriteriaId": "608400C9-6538-4654-A97B-278009AD77FB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/hackmdio/codimd/issues/1263 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"hackmdio",
"codimd"
] | ## Summary
This is similar issue to #959, but different cause.
Due to `sandbox` attribute is allowed, attacker can redirect victim to something malicious if attacker embeds iframe with `allow-top-navigation` in `sandbox` attribute.
#959 won't work in Chrome because of their security, but this will work due to `sand... | Open Redirect / XSS via iframe with sandbox. | https://api.github.com/repos/hackmdio/codimd/issues/1263/comments | 5 | 2019-08-21T10:09:07Z | 2021-07-07T02:59:27Z | https://github.com/hackmdio/codimd/issues/1263 | 483,327,896 | 1,263 | 659 |
CVE-2019-15480 | 2019-08-23T13:15:10.877 | Domoticz 4.10717 has XSS via item.Name. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/domoticz/domoticz/issues/3367"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://githu... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:domoticz:domoticz:4.10717:*:*:*:*:*:*:*",
"matchCriteriaId": "EB5DEAD1-463F-4336-9DFE-F0C907CB3570",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"79"
] | 79 | https://github.com/domoticz/domoticz/issues/3367 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"domoticz",
"domoticz"
] | ## Description
The ScenesController.js is vulnerable against XSS. By adding a scene with some scripts in the scene name will lead to a XSS.
Obviously this is thankful for an attacker if he is privilege to adding or edit scenes. The attacker can execute arbitrary code.
## Affected Version
Current release 4.10717
... | XSS Vulnerability in ScenesController.js | https://api.github.com/repos/domoticz/domoticz/issues/3367/comments | 23 | 2019-07-01T08:17:03Z | 2019-07-14T06:32:56Z | https://github.com/domoticz/domoticz/issues/3367 | 462,576,636 | 3,367 | 662 |
CVE-2019-15535 | 2019-08-23T18:15:11.287 | Tasking Manager before 3.4.0 allows SQL Injection via custom SQL. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/hotosm/tasking-manager/issues/1731"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "ht... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hostosm:tasking_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F0094D31-2E8F-4D1A-A3A0-7156761AC7F3",
"versionEndExcluding": "3.4.0",
"versionEndIncluding": null,
"versionStar... | [
"89"
] | 89 | https://github.com/hotosm/tasking-manager/issues/1731 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"hotosm",
"tasking-manager"
] | When using simple Python string formatting methods input values are not escaped which opens up the possibility of SQL injection attacks. For example: https://github.com/hotosm/tasking-manager/blob/master/server/models/postgis/task.py#L653
SQLAlchemy provides a way to safely pass values to a custom SQL - https://docs... | Prevent SQL Injection when executing custom SQL | https://api.github.com/repos/hotosm/tasking-manager/issues/1731/comments | 0 | 2019-06-28T14:40:19Z | 2019-07-03T07:19:51Z | https://github.com/hotosm/tasking-manager/issues/1731 | 462,067,662 | 1,731 | 663 |
CVE-2019-15532 | 2019-08-26T12:15:11.657 | CyberChef before 8.31.2 allows XSS in core/operations/TextEncodingBruteForce.mjs. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gchq/CyberChef/commit/01f0625d6a177f9c5df9281f12a27c814c2d8bcf"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https:... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gchq:cyberchef:*:*:*:*:*:*:*:*",
"matchCriteriaId": "38BB6B00-CF07-49EE-BE74-4D22B1ADB7BA",
"versionEndExcluding": "8.31.2",
"versionEndIncluding": null,
"versionStartExcludi... | [
"79"
] | 79 | https://github.com/gchq/CyberChef/issues/539 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gchq",
"CyberChef"
] | ### Summary
While doing a CTF challenge, I was using cyber chef to encode a XSS javascript payload. When I put it through the text encoding brute force, alerts were displayed caused by the script.
### Example
My input was <script>alert('XSS')</script> and when I added the brute force encoding multiple alerts poppe... | Bug report: XSS with Encoding Brute Force | https://api.github.com/repos/gchq/CyberChef/issues/539/comments | 0 | 2019-04-12T15:01:39Z | 2019-04-14T21:00:29Z | https://github.com/gchq/CyberChef/issues/539 | 432,610,649 | 539 | 664 |
CVE-2019-15532 | 2019-08-26T12:15:11.657 | CyberChef before 8.31.2 allows XSS in core/operations/TextEncodingBruteForce.mjs. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gchq/CyberChef/commit/01f0625d6a177f9c5df9281f12a27c814c2d8bcf"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https:... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gchq:cyberchef:*:*:*:*:*:*:*:*",
"matchCriteriaId": "38BB6B00-CF07-49EE-BE74-4D22B1ADB7BA",
"versionEndExcluding": "8.31.2",
"versionEndIncluding": null,
"versionStartExcludi... | [
"79"
] | 79 | https://github.com/gchq/CyberChef/issues/544 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gchq",
"CyberChef"
] | ### Summary
It looks like #539 has been fixed in https://github.com/gchq/CyberChef/commit/01f0625d6a177f9c5df9281f12a27c814c2d8bcf, but no release has been issued since the fix. Would it be possible to do a quick release (v8.31.2) to include the XSS fix? Thanks in advance for your consideration!
| Bug report: Current release version (v8.31.1) does not include the recent XSS fix | https://api.github.com/repos/gchq/CyberChef/issues/544/comments | 2 | 2019-04-23T17:01:56Z | 2019-05-09T20:55:54Z | https://github.com/gchq/CyberChef/issues/544 | 436,294,419 | 544 | 665 |
CVE-2019-15541 | 2019-08-26T12:15:11.780 | rustls-mio/examples/tlsserver.rs in the rustls crate before 0.16.0 for Rust allows attackers to cause a denial of service (loop of conn_event and ready) by arranging for a client to never be writable. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ctz/rustls/commit/a93ee1abd2ab19ebe4bf9d684d56637ee54a6074"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "ht... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rustls_project:rustls:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5ED2EB11-1C95-4336-B6C9-33F9D2117888",
"versionEndExcluding": "0.16.0",
"versionEndIncluding": null,
"versionStart... | [
"88"
] | 88 | https://github.com/ctz/rustls/issues/285 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ctz",
"rustls"
] | I have found the following situation:
```
number of connections is: 19
self closed: false
self closing: true
self tls_session.wants_write: false
reregister
number of connections is: 19
self closed: false
self closing: true
self tls_session.wants_write: false
reregister
number of connections is: 19
self clo... | bug in rustls-mio | https://api.github.com/repos/rustls/rustls/issues/285/comments | 2 | 2019-08-08T09:07:49Z | 2019-08-26T14:28:36Z | https://github.com/rustls/rustls/issues/285 | 478,342,906 | 285 | 666 |
CVE-2019-15562 | 2019-08-26T13:15:11.663 | GORM before 1.9.10 allows SQL injection via incomplete parentheses. NOTE: Misusing Gorm by passing untrusted user input where Gorm expects trusted SQL fragments is a vulnerability in the application, not in Gorm | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/go-gorm/gorm/issues/2517#issuecomment-638145427"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/go-gorm/gorm/pull/2519"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gorm:gorm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F52D0A5D-128F-4E0B-B4EE-E47DBDFADD09",
"versionEndExcluding": "1.9.10",
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"89"
] | 89 | https://github.com/go-gorm/gorm/issues/2517#issuecomment-638145427 | [
"Vendor Advisory"
] | github.com | [
"go-gorm",
"gorm"
] | ### What version of Go are you using (`go version`)?
latest
### Which database and its version are you using?
postgress latest and gorm latest
### Blind Sql injection localhost:8000/user?id=id=1)) or 1=1--
```go
func GetUser(c *gin.Context) {
var user []models.User
dbms := db.GetDatabaseConnection() /* Open ... | SQL injection in Gorm With using first and find. | https://api.github.com/repos/go-gorm/gorm/issues/2517/comments | 18 | 2019-06-21T08:54:24Z | 2020-08-26T14:54:36Z | https://github.com/go-gorm/gorm/issues/2517 | 459,088,069 | 2,517 | 667 |
CVE-2018-20999 | 2019-08-26T15:15:11.453 | An issue was discovered in the orion crate before 0.11.2 for Rust. reset() calls cause incorrect results. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/brycx/orion/issues/46"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://rustsec.org/advisories/RUSTSEC-2018-0012.html"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:orion_project:orion:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E3016A55-6684-4A4E-8DF2-C4E939D359CA",
"versionEndExcluding": "0.11.2",
"versionEndIncluding": null,
"versionStartEx... | [
"682"
] | 682 | https://github.com/brycx/orion/issues/46 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"brycx",
"orion"
] | Currently `reset()` checks whether or not the state is already finalized. If it is not finalized, it will not reset the state. So if someone were to call `reset()` not having finalized the state before, incorrect results would be produced. Such streaming states include `hmac`, `poly1305`, `blake2b` and `cshake`. | reset() not working correctly | https://api.github.com/repos/orion-rs/orion/issues/46/comments | 1 | 2018-12-20T17:00:06Z | 2018-12-26T14:23:48Z | https://github.com/orion-rs/orion/issues/46 | 393,132,155 | 46 | 668 |
CVE-2019-15551 | 2019-08-26T15:15:12.000 | An issue was discovered in the smallvec crate before 0.6.10 for Rust. There is a double free for certain grow attempts with the current capacity. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/servo/rust-smallvec/issues/148"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://rustsec.org/advisories/RUSTSEC-2019-0009.html... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:servo:smallvec:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1AF5BAAC-D8A6-4BBB-9C90-D8D2962B2A0B",
"versionEndExcluding": "0.6.10",
"versionEndIncluding": null,
"versionStartExcludi... | [
"415"
] | 415 | https://github.com/servo/rust-smallvec/issues/148 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"servo",
"rust-smallvec"
] | Attempting to call `grow` on a spilled SmallVec with a value equal to the current capacity causes it to free the existing data.
```rust
let mut v: SmallVec<[u8; 2]> = SmallVec::new();
v.push(0);
v.push(1);
// Cause it to spill.
v.push(2);
assert_eq!(v.capacity(), 4);
// grow with the same capacity
v.grow(4);... | use-after-free when growing to the same size | https://api.github.com/repos/servo/rust-smallvec/issues/148/comments | 3 | 2019-06-06T15:13:23Z | 2019-06-23T19:59:38Z | https://github.com/servo/rust-smallvec/issues/148 | 453,088,636 | 148 | 669 |
CVE-2019-15552 | 2019-08-26T15:15:12.063 | An issue was discovered in the libflate crate before 0.1.25 for Rust. MultiDecoder::read has a use-after-free, leading to arbitrary code execution. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/sile/libflate/issues/35"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://rustsec.org/advisories/RUSTSEC-2019-0010.html"
},
{
"source... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libflate_project:libflate:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C4E38BCF-E0D2-4D32-983D-04840178F354",
"versionEndExcluding": "0.1.25",
"versionEndIncluding": null,
"versionS... | [
"416"
] | 416 | https://github.com/sile/libflate/issues/35 | [
"Third Party Advisory"
] | github.com | [
"sile",
"libflate"
] | If the code that uses libflate panics, it may trigger a use-after-free in libflate code. Since use-after-free usually poses an arbitrary code execution vulnerability, I will relay further details privately to the maintainer.
Code compiled with `panic=abort` is not affected. This can be used as a mitigation in the in... | Use-after-free on panic in client code | https://api.github.com/repos/sile/libflate/issues/35/comments | 4 | 2019-06-26T01:28:22Z | 2019-07-20T17:38:34Z | https://github.com/sile/libflate/issues/35 | 460,716,202 | 35 | 670 |
CVE-2019-15553 | 2019-08-26T15:15:12.127 | An issue was discovered in the memoffset crate before 0.5.0 for Rust. offset_of and span_of can cause exposure of uninitialized memory. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Gilnaa/memoffset/issues/9#issuecomment-505461490"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://rustsec.org/advisories/RUSTSEC-2019-0011.h... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:memoffset_project:memoffset:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CA23245D-F421-4AE8-B488-4681EF81973D",
"versionEndExcluding": "0.5.0",
"versionEndIncluding": null,
"version... | [
"908"
] | 908 | https://github.com/Gilnaa/memoffset/issues/9#issuecomment-505461490 | [
"Third Party Advisory"
] | github.com | [
"Gilnaa",
"memoffset"
] | With the implementation in:
```rust
macro_rules! offset_of {
($parent:ty, $($field:tt)+) => (unsafe {
let x: &'static $parent = $crate::Transmuter::<$parent> { int: 0 }.ptr;
$crate::Transmuter { ptr: &x.$($field)+ }.int
});
}
```
you are constructing a `&'static T` at address `0`. T... | `offset_of` is unsound | https://api.github.com/repos/Gilnaa/memoffset/issues/9/comments | 27 | 2019-06-21T20:04:16Z | 2019-08-16T10:11:13Z | https://github.com/Gilnaa/memoffset/issues/9 | 459,353,053 | 9 | 671 |
CVE-2019-15554 | 2019-08-26T15:15:12.187 | An issue was discovered in the smallvec crate before 0.6.10 for Rust. There is memory corruption for certain grow attempts with less than the current capacity. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/servo/rust-smallvec/issues/149"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://rustsec.org/advisories/RUSTSEC-2019-0012.html... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:servo:smallvec:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B20EC37-AD4B-44A9-835D-4B0BF45B116B",
"versionEndExcluding": "0.6.10",
"versionEndIncluding": null,
"versionStartExcludi... | [
"787"
] | 787 | https://github.com/servo/rust-smallvec/issues/149 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"servo",
"rust-smallvec"
] | If `grow` is given a size that is within the inline size after a SmallVec has been spilled, the resulting value is corrupted.
```rust
let mut v: SmallVec<[u8; 4]> = SmallVec::new();
v.push(1);
v.push(2);
v.push(3);
v.push(4);
// Cause it to spill.
v.push(5);
assert!(v.spilled());
v.clear();
// Shrink to in... | Using `grow` to shrink can cause corruption. | https://api.github.com/repos/servo/rust-smallvec/issues/149/comments | 1 | 2019-06-06T17:18:23Z | 2019-06-07T11:24:36Z | https://github.com/servo/rust-smallvec/issues/149 | 453,147,895 | 149 | 672 |
CVE-2019-15651 | 2019-08-26T22:15:11.153 | wolfSSL 4.1.0 has a one-byte heap-based buffer over-read in DecodeCertExtensions in wolfcrypt/src/asn.c because reading the ASN_BOOLEAN byte is mishandled for a crafted DER certificate in GetLength_ex. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/wolfSSL/wolfssl/issues/2421"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/wolfSSL/wolfssl/issues/2421"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wolfssl:wolfssl:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A4F2C4AF-EE0C-4596-B4FC-1750783275A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"125"
] | 125 | https://github.com/wolfSSL/wolfssl/issues/2421 | [
"Third Party Advisory"
] | github.com | [
"wolfSSL",
"wolfssl"
] | tested on wolfSSL 4.1.0 / ubuntu 14.04/ clang / asan
Hi, I've came upon an one-byte-heap-overread bug
due to corner case mishandling in GetLength_ex(wolfcrypt/src/asn.c:189), you could trigger it by loading attached DER certificate using API wolfSSL_X509_d2i (or [example_cert_parsing_app](https://github.com/wolfSSL/... | one-byte-heap-overread (wolfcrypt/src/asn.c:7584) | https://api.github.com/repos/wolfSSL/wolfssl/issues/2421/comments | 1 | 2019-08-21T09:02:59Z | 2019-11-13T20:54:03Z | https://github.com/wolfSSL/wolfssl/issues/2421 | 483,292,160 | 2,421 | 673 |
CVE-2019-15701 | 2019-08-27T18:15:11.217 | components/Modals/HelpModal.jsx in BloodHound 2.2.0 allows remote attackers to execute arbitrary OS commands (by spawning a child process as the current user on the victim's machine) when the search function's autocomplete feature is used. The victim must import data from an Active Directory with a GPO containing JavaS... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/BloodHoundAD/BloodHound/issues/267"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https:/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bloodhound_project:bloodhound:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8B883763-6DDB-4C8D-8ABA-669F35FC0D05",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"78"
] | 78 | https://github.com/BloodHoundAD/BloodHound/issues/267 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"BloodHoundAD",
"BloodHound"
] | Dear Bloodhound Team –
I identified a way to achieve code execution in Bloodhound 2.2.0 by creating a GPO with a name containing JavaScript code that will trigger in Bloodhound's search-autocomplete function. The injected JavaScript is not only a valid xss but also allows the creation of a child process.
The foll... | Code execution in Bloodhound via malicious AD Object | https://api.github.com/repos/SpecterOps/BloodHound-Legacy/issues/267/comments | 5 | 2019-08-25T02:48:07Z | 2019-08-28T20:07:35Z | https://github.com/SpecterOps/BloodHound-Legacy/issues/267 | 484,883,426 | 267 | 674 |
CVE-2019-15702 | 2019-08-27T18:15:11.280 | In the TCP implementation (gnrc_tcp) in RIOT through 2019.07, the parser for TCP options does not terminate on all inputs, allowing a denial-of-service, because sys/net/gnrc/transport_layer/tcp/gnrc_tcp_option.c has an infinite loop for an unknown zero-length option. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/RIOT-OS/RIOT/issues/12086"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:riot-os:riot:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DEF02E81-8215-4557-81C3-8BF2B6B59DED",
"versionEndExcluding": null,
"versionEndIncluding": "2019.07",
"versionStartExcludin... | [
"835"
] | 835 | https://github.com/RIOT-OS/RIOT/issues/12086 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"RIOT-OS",
"RIOT"
] | #### Description
The `gnrc_tcp` parser for TCP options (`_option_parse`) doesn't terminate on all inputs. When sending a packet with an unknown option and option length zero it doesn't advance the option pointer (i.e. advances it by zero) and therefore stays in the loop forever.
https://github.com/RIOT-OS/RIOT/bl... | gnrc_tcp: option parsing doesn't terminate on all inputs, potential DOS | https://api.github.com/repos/RIOT-OS/RIOT/issues/12086/comments | 1 | 2019-08-26T15:10:23Z | 2019-09-16T11:01:02Z | https://github.com/RIOT-OS/RIOT/issues/12086 | 485,288,116 | 12,086 | 675 |
CVE-2019-15714 | 2019-08-28T12:15:12.873 | cli/lib/main.js in Entropic before 2019-06-13 does not reject / and \ in command names, which might allow a directory traversal attack in unusual situations. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/entropic-dev/entropic/issues/251"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/entropic-dev/entropic/is... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:entropic_project:entropic:*:*:*:*:*:*:*:*",
"matchCriteriaId": "081900C7-4224-4C6B-8B64-48B905F7E7EB",
"versionEndExcluding": "2019-06-13",
"versionEndIncluding": null,
"vers... | [
"22"
] | 22 | https://github.com/entropic-dev/entropic/issues/251 | [
"Third Party Advisory"
] | github.com | [
"entropic-dev",
"entropic"
] | # Is this a feature request or a bug?
bug
Parent [path traversal](https://en.wikipedia.org/wiki/Directory_traversal_attack) is often considered a security problem.
This is likely low impact if it is a security problem; the only vectors I can see is socially engineered copy/paste or postinstall hook abuse.
If an... | possible parent path traversal in command argument | https://api.github.com/repos/entropic-dev/entropic/issues/251/comments | 3 | 2019-06-11T13:00:16Z | 2019-06-14T00:23:26Z | https://github.com/entropic-dev/entropic/issues/251 | 454,676,374 | 251 | 676 |
CVE-2019-15716 | 2019-08-28T15:15:10.927 | WTF before 0.19.0 does not set the permissions of config.yml, which might make it easier for local attackers to read passwords or API keys if the permissions were misconfigured or were based on unsafe OS defaults. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wtfutil/wtf/blob/67658e172c9470e93e4122d6e2c90d01db12b0ac/cfg/config_files.go#L71-L72"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wtfutil:wtf:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E3C9F109-D4CF-47CD-AB25-B5018A16CD16",
"versionEndExcluding": "0.19.0",
"versionEndIncluding": null,
"versionStartExcluding"... | [
"276"
] | 276 | https://github.com/wtfutil/wtf/issues/517 | [
"Third Party Advisory"
] | github.com | [
"wtfutil",
"wtf"
] | WTF's `config.yml` file is a plain text file stored in the user's home directory. Given the nature of many of the modules in WTF, that file could hold account information, passwords, URIs, and API keys for the user's critical systems.
This issue is a place to discuss the security of that file.
1. Does it need to... | Security: open call for thoughts on securing WTF's config file | https://api.github.com/repos/wtfutil/wtf/issues/517/comments | 35 | 2019-07-24T16:02:21Z | 2022-01-18T06:40:18Z | https://github.com/wtfutil/wtf/issues/517 | 472,367,182 | 517 | 677 |
CVE-2017-18594 | 2019-08-29T00:15:10.467 | nse_libssh2.cc in Nmap 7.70 is subject to a denial of service condition due to a double free when an SSH connection fails, as demonstrated by a leading \n character to ssh-brute.nse or ssh-auth-methods.nse. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00073.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00075.html"
},
{
"source": "cve@mit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nmap:nmap:7.70:*:*:*:*:*:*:*",
"matchCriteriaId": "3F2B2815-27CD-4A22-9394-332073CF9970",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": n... | [
"415"
] | 415 | https://github.com/nmap/nmap/issues/1077 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"nmap",
"nmap"
] | When testing ssh-auth-methods.nse against non-standard ports, I forgot to specify ports and NMAP crashed. I have narrowed it down to running the script against port 139. I ran a debug and found the crash appears to be caused by a double free of session data. This appears to be due to a session pointer not being NULLed ... | NMAP crash with ssh-auth-methods.nse (patch included) | https://api.github.com/repos/nmap/nmap/issues/1077/comments | 3 | 2017-12-04T20:18:13Z | 2019-05-17T18:03:32Z | https://github.com/nmap/nmap/issues/1077 | 279,134,205 | 1,077 | 678 |
CVE-2017-18594 | 2019-08-29T00:15:10.467 | nse_libssh2.cc in Nmap 7.70 is subject to a denial of service condition due to a double free when an SSH connection fails, as demonstrated by a leading \n character to ssh-brute.nse or ssh-auth-methods.nse. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00073.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00075.html"
},
{
"source": "cve@mit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nmap:nmap:7.70:*:*:*:*:*:*:*",
"matchCriteriaId": "3F2B2815-27CD-4A22-9394-332073CF9970",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": n... | [
"415"
] | 415 | https://github.com/nmap/nmap/issues/1227 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"nmap",
"nmap"
] | Nmap 7.70 crashes when running either of the following two scripts against an open port 22 which is not recognised as SSH: `ssh-publickey-acceptance` and `ssh-auth-methods`.
```
$ nmap -V
Nmap version 7.70 ( https://nmap.org )
Platform: x86_64-unknown-linux-gnu
Compiled with: nmap-liblua-5.3.3 openssl-1.0.2g nm... | Crash in libssh when port 22 response is unexpected | https://api.github.com/repos/nmap/nmap/issues/1227/comments | 3 | 2018-05-27T23:28:05Z | 2018-12-02T05:53:47Z | https://github.com/nmap/nmap/issues/1227 | 326,860,670 | 1,227 | 679 |
CVE-2019-11247 | 2019-08-29T01:15:11.287 | The Kubernetes kube-apiserver mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in this manner are enforced using roles and role bindings within the namespace, meaning that a user with access only to a resourc... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHBA-2019:2816"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHBA-2019:2824"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A582FE75-D84B-4C8F-B836-95FB15F68EBA",
"versionEndExcluding": null,
"versionEndIncluding": "1.12.10",
"versionStar... | [
"863"
] | 863 | https://github.com/kubernetes/kubernetes/issues/80983 | [
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | [CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L)
The API server mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in th... | CVE-2019-11247: API server allows access to custom resources via wrong scope | https://api.github.com/repos/kubernetes/kubernetes/issues/80983/comments | 10 | 2019-08-05T12:44:08Z | 2022-05-16T21:58:20Z | https://github.com/kubernetes/kubernetes/issues/80983 | 476,838,684 | 80,983 | 680 |
CVE-2019-11248 | 2019-08-29T01:15:11.367 | The debugging endpoint /debug/pprof is exposed over the unauthenticated Kubelet healthz port. The go pprof endpoint is exposed over the Kubelet's healthz port. This debugging endpoint can potentially leak sensitive information such as internal Kubelet memory addresses and configuration, or for limited denial of service... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/81023"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://groups.go... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EF491B76-31AF-401F-BDCA-2B825BD00B18",
"versionEndExcluding": "1.12.10",
"versionEndIncluding": null,
"versionStar... | [
"862"
] | 862 | https://github.com/kubernetes/kubernetes/issues/81023 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | The debugging endpoint `/debug/pprof` is exposed over the unauthenticated Kubelet healthz port. Versions prior to 1.15.0, 1.14.4, 1.13.8, and 1.12.10 are affected. The issue is of medium severity, but not exposed by the default configuration. If you are exposed we recommend upgrading to at least one of the versions lis... | CVE-2019-11248: /debug/pprof exposed on kubelet's healthz port | https://api.github.com/repos/kubernetes/kubernetes/issues/81023/comments | 3 | 2019-08-06T14:34:33Z | 2022-05-16T21:58:38Z | https://github.com/kubernetes/kubernetes/issues/81023 | 477,418,481 | 81,023 | 681 |
CVE-2019-11249 | 2019-08-29T01:15:11.443 | The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes runs tar inside the container to create a tar archive, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run a... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "NONE... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHBA-2019:2794"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHBA-2019:2816"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ABCFC052-EAAD-4964-8B50-1D8A04A73D75",
"versionEndExcluding": null,
"versionEndIncluding": "1.12.10",
"versionStar... | [
"22"
] | 22 | https://github.com/kubernetes/kubernetes/issues/80984 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | [CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N)
A third issue was discovered with the Kubernetes `kubectl cp` command that could enable a directory traversal such that a malicious container could replace or create files on a user’... | CVE-2019-11249: Incomplete fixes for CVE-2019-1002101 and CVE-2019-11246, kubectl cp potential directory traversal | https://api.github.com/repos/kubernetes/kubernetes/issues/80984/comments | 3 | 2019-08-05T12:44:23Z | 2022-05-16T21:57:50Z | https://github.com/kubernetes/kubernetes/issues/80984 | 476,838,777 | 80,984 | 682 |
CVE-2019-11250 | 2019-08-29T01:15:11.523 | The Kubernetes client-go library logs request headers at verbosity levels of 7 or higher. This can disclose credentials to unauthorized users via logs or command output. Kubernetes components (such as kube-apiserver) prior to v1.16.0, which make use of basic or bearer token authentication, and run at high verbosity lev... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "PARTIAL"... | [
{
"source": "jordan@liggitt.net",
"tags": null,
"url": "http://www.openwall.com/lists/oss-security/2020/10/16/2"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:4052"
},
{
"source": "jordan@ligg... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "470C9C75-4582-4D15-8B34-07889BF9C24F",
"versionEndExcluding": "1.15.3",
"versionEndIncluding": null,
"versionStart... | [
"532"
] | 532 | https://github.com/kubernetes/kubernetes/issues/81114 | [
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | This issue was reported in the [Kubernetes Security Audit Report](https://github.com/kubernetes/community/blob/master/wg-security-audit/findings/Kubernetes%20Final%20Report.pdf)
**Description**
Kubernetes requires an authentication mechanism to enforce users’ privileges. One method of authentication, bearer tokens,... | CVE-2019-11250: TOB-K8S-001: Bearer tokens are revealed in logs | https://api.github.com/repos/kubernetes/kubernetes/issues/81114/comments | 15 | 2019-08-08T02:03:04Z | 2023-09-21T12:52:47Z | https://github.com/kubernetes/kubernetes/issues/81114 | 478,213,865 | 81,114 | 683 |
CVE-2019-15758 | 2019-08-29T02:15:10.553 | An issue was discovered in Binaryen 1.38.32. Missing validation rules in asmjs/asmangle.cpp can lead to an Assertion Failure at wasm/wasm.cpp in wasm::asmangle. A crafted input can cause denial-of-service, as demonstrated by wasm2js. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/WebAssembly/binaryen/issues/2288"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:webassembly:binaryen:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E1776B8E-3B03-42D6-BBFF-13332315B947",
"versionEndExcluding": "89",
"versionEndIncluding": null,
"versionStartExclu... | [
"617"
] | 617 | https://github.com/WebAssembly/binaryen/issues/2288 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"WebAssembly",
"binaryen"
] | Hi,
I observed two crash and assertion failed in wasm2js (based on commit 777342684f5af51105be710c06591513433ed879). The poc files are attached.
How to reproduce:
```
wasm2js poc
```
[poc.zip](https://github.com/WebAssembly/binaryen/files/3479031/poc.zip)
Report of backtrace in `gdb`
Assertaion failed... | Crash and Assertion failed in wasm2js | https://api.github.com/repos/WebAssembly/binaryen/issues/2288/comments | 1 | 2019-08-07T21:48:28Z | 2019-08-20T23:36:12Z | https://github.com/WebAssembly/binaryen/issues/2288 | 478,154,657 | 2,288 | 684 |
CVE-2019-15939 | 2019-09-05T16:15:11.963 | An issue was discovered in OpenCV 4.1.0. There is a divide-by-zero error in cv::HOGDescriptor::getDescriptorSize in modules/objdetect/src/hog.cpp. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00025.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/OpenCV/opencv/issues/152... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:opencv:opencv:*:*:*:*:*:*:*:*",
"matchCriteriaId": "80A5909B-6FA8-4988-8311-FEEF7771A092",
"versionEndExcluding": null,
"versionEndIncluding": "4.1.0",
"versionStartExcluding... | [
"369"
] | 369 | https://github.com/OpenCV/opencv/issues/15287 | [
"Third Party Advisory"
] | github.com | [
"OpenCV",
"opencv"
] | <!--
If you have a question rather than reporting a bug please go to http://answers.opencv.org where you get much faster responses.
If you need further assistance please read [How To Contribute](https://github.com/opencv/opencv/wiki/How_to_contribute).
Please:
* Read the documentation to test with the latest de... | Floating Point Exception in cv::HOGDescriptor::getDescriptorSize() | https://api.github.com/repos/opencv/opencv/issues/15287/comments | 1 | 2019-08-13T07:02:59Z | 2019-09-09T11:14:50Z | https://github.com/opencv/opencv/issues/15287 | 479,992,052 | 15,287 | 687 |
CVE-2019-15947 | 2019-09-05T17:15:12.187 | In Bitcoin Core 0.18.0, bitcoin-qt stores wallet.dat data unencrypted in memory. Upon a crash, it may dump a core file. If a user were to mishandle a core file, an attacker can reconstruct the user's wallet.dat file, including their private keys, via a grep "6231 0500" command. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
],
"url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures#CVE-2019-15947"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/oxagast/50a121b2df321... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.18.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A0FD6643-BDF8-4B9E-B3FF-27C69C6EA20A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"312"
] | 312 | https://github.com/bitcoin/bitcoin/issues/16824 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"bitcoin",
"bitcoin"
] | On a crash, bitcoin-qt may dump a core file that contains what was in memory at the time of the crash, for debugging purposes. The problem here is that bitcoin-qt stores the user's wallet.dat unencrypted in memory. With this information it becomes rather trivial to reconstruct parts of a user's wallet.dat from a .cor... | Crash dumps from bitcoin-qt contain wallets | https://api.github.com/repos/bitcoin/bitcoin/issues/16824/comments | 9 | 2019-09-07T17:24:59Z | 2022-02-15T11:16:07Z | https://github.com/bitcoin/bitcoin/issues/16824 | 490,659,703 | 16,824 | 688 |
CVE-2016-10937 | 2019-09-08T16:15:11.663 | IMAPFilter through 2.6.12 does not validate the hostname in an SSL certificate. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mailing List"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00042.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mailing List"
],
"url": "http://list... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imapfilter_project:imapfilter:*:*:*:*:*:*:*:*",
"matchCriteriaId": "33A897C1-381D-4487-9ED6-7E16373FBB56",
"versionEndExcluding": null,
"versionEndIncluding": "2.6.12",
"vers... | [
"295"
] | 295 | https://github.com/lefcha/imapfilter/issues/142 | [
"Issue Tracking"
] | github.com | [
"lefcha",
"imapfilter"
] | Apparently imapfilter is not checking the certificate after connecting to the imap server, or I am missing something. If the DNS is compromised by some hacker and imapfilter is directed to a fake IP address, the certificate supplied by that IP address will be accepted as valid if it is properly signed. What I mean is t... | No certificate verification | https://api.github.com/repos/lefcha/imapfilter/issues/142/comments | 9 | 2016-11-25T18:26:37Z | 2019-09-16T21:54:08Z | https://github.com/lefcha/imapfilter/issues/142 | 191,751,342 | 142 | 690 |
CVE-2019-16113 | 2019-09-08T21:15:10.617 | Bludit 3.9.2 allows remote code execution via bl-kernel/ajax/upload-images.php because PHP code can be entered with a .jpg file name, and then this PHP code can write other PHP code to a ../ pathname. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/155295/Bludit-Directory-Traversal-Image-File-Upload.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bludit:bludit:3.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "10A81FA4-0E1B-4680-A04F-E4D2267A98E2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"22"
] | 22 | https://github.com/bludit/bludit/issues/1081 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"bludit",
"bludit"
] | ### A Code Execution Vulnerability in Bludit v3.9.2
Hi,
For CVE ID,so I open a new issue,sorry about that.And I think you haven't completely fixed the bug.
There is a new Code Execution Vulnerability which allow to get server permissions,the path is /bl-kernel/admin/ajax/upload-images.php
#### 1, login wit... | Bludit v3.9.2 Code Execution Vulnerability in "Upload function" | https://api.github.com/repos/bludit/bludit/issues/1081/comments | 6 | 2019-09-07T11:40:38Z | 2023-10-24T07:42:28Z | https://github.com/bludit/bludit/issues/1081 | 490,625,895 | 1,081 | 691 |
CVE-2019-16130 | 2019-09-09T03:15:10.343 | YII2-CMS v1.0 has XSS in protected\core\modules\home\models\Contact.php via a name field to /contact.html. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http://www.iwantacve.cn/index.php/archives/277/"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/weison-tech/yii2-... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hgw168cc:yii-cms:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A9DD6508-A3F9-482D-A7C2-CD7E45DA89D5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"79"
] | 79 | https://github.com/weison-tech/yii2-cms/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"weison-tech",
"yii2-cms"
] | 在前端的留言处未全部过滤输入内容或者限制输入长度
**有效负荷:**
`<script>alert(1)</script>`
**文件名** protected\core\modules\home\models\Contact.php
**代码**
```
public function rules()
{
return [
[['name', 'company', 'mobile', 'email'], 'required'],
[['demand'], 'string'],
[['created_at', '... | yii2-cms存在存储型XSS | https://api.github.com/repos/weison-tech/yii2-cms/issues/2/comments | 1 | 2019-08-31T14:28:50Z | 2019-09-09T02:47:51Z | https://github.com/weison-tech/yii2-cms/issues/2 | 487,775,693 | 2 | 692 |
CVE-2019-16140 | 2019-09-09T12:15:10.820 | An issue was discovered in the chttp crate before 0.1.3 for Rust. There is a use-after-free during buffer conversion. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/sagebind/isahc/issues/2"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://rustsec.org/advisories/RUSTSEC-2019-0016.html"
},
{
"source": "af854a3a-2127-422b-91ae-364d... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:isahc_project:isahc:0.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "77F7CA39-6FCE-457C-A664-67EF550793C1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"416"
] | 416 | https://github.com/sagebind/isahc/issues/2 | null | github.com | [
"sagebind",
"isahc"
] | The returned vector is backed by freed memory, because `slice` is dropped at the end of the function. | impl From<Buffer> for Vec<u8> is unsound | https://api.github.com/repos/sagebind/isahc/issues/2/comments | 3 | 2018-01-01T21:19:23Z | 2019-09-01T18:19:33Z | https://github.com/sagebind/isahc/issues/2 | 285,329,870 | 2 | 694 |
CVE-2019-16141 | 2019-09-09T12:15:10.897 | An issue was discovered in the once_cell crate before 1.0.1 for Rust. There is a panic during initialization of Lazy. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/matklad/once_cell/issues/46"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://rustsec.org/advisories/RUSTSEC-2019-0017.html"
},
{
"so... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:once_cell_project:once_cell:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6FB490F9-D359-4426-8F28-21247F46EC06",
"versionEndExcluding": "1.0.1",
"versionEndIncluding": null,
"version... | [
"20"
] | 20 | https://github.com/matklad/once_cell/issues/46 | [
"Third Party Advisory"
] | github.com | [
"matklad",
"once_cell"
] | The following program causes UB:
```rust
use once_cell::sync::Lazy;
static HI: Lazy<i32> = Lazy::new(|| {
panic!();
});
fn main() {
let _ = std::panic::catch_unwind(|| println!("{}", *HI));
println!("{}", *HI);
}
```
This is because of incorrect use of `unreachable_unchecked` when `Lazy` ... | Lazy can cause UB when initialization fails, and program retries initialization | https://api.github.com/repos/matklad/once_cell/issues/46/comments | 1 | 2019-09-01T16:23:01Z | 2019-09-01T17:21:09Z | https://github.com/matklad/once_cell/issues/46 | 487,904,642 | 46 | 695 |
CVE-2019-16144 | 2019-09-09T12:15:11.100 | An issue was discovered in the generator crate before 0.6.18 for Rust. Uninitialized memory is used by Scope, done, and yield_ during API calls. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Xudong-Huang/generator-rs/issues/9"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://rustsec.org/advisories/RUSTSEC-2019-0020.html"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:generator-rs_project:generator-rs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3E6F8A2E-72A3-4DAC-96DE-DCCE18AB1A71",
"versionEndExcluding": "0.6.18",
"versionEndIncluding": null,
"... | [
"908"
] | 908 | https://github.com/Xudong-Huang/generator-rs/issues/9 | [
"Third Party Advisory"
] | github.com | [
"Xudong-Huang",
"generator-rs"
] | `Scope::new` takes 2 `*mut Option<_>` parameters, but the rest of the `Scope` API assumes that those raw pointers are valid. For example, the public `get_yield` method does the following:
```
let para = unsafe { &mut *self.para };
para.take()
```
Calling `Scope::new` with invalid (null, misaligned or dangling)... | `Scope` API is unsound | https://api.github.com/repos/Xudong-Huang/generator-rs/issues/9/comments | 4 | 2019-01-11T21:34:45Z | 2019-09-01T13:47:15Z | https://github.com/Xudong-Huang/generator-rs/issues/9 | 398,460,093 | 9 | 696 |
CVE-2019-16161 | 2019-09-09T17:15:13.173 | Onigmo through 6.2.0 has a NULL pointer dereference in onig_error_code_to_str because of fetch_token in regparse.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/k-takata/Onigmo/commit/9827d5a0298ee766f6041db9c0080166ff6cdce8"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "htt... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:k-takata:onigmo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B3216461-E3C7-4842-B905-AF978F7B71BB",
"versionEndExcluding": null,
"versionEndIncluding": "6.2.0",
"versionStartExcludi... | [
"476"
] | 476 | https://github.com/k-takata/Onigmo/issues/132 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"k-takata",
"Onigmo"
] | When onig_new(ONIG_SYNTAX_PERL) fails with error code -215(ONIGERR_INVALID_GROUP_NAME), onig_error_code_to_str() crashes due to invalid memory access.
Here is a POC code based on sample/syntax.c
```syntax.c
/*
* perl_syntax.c
*/
#include <stdio.h>
#include <string.h>
#include "onigmo.h"
extern int exec(c... | Memory corruption in onig_error_code_to_str() | https://api.github.com/repos/k-takata/Onigmo/issues/132/comments | 1 | 2019-07-27T23:59:01Z | 2019-07-29T12:43:59Z | https://github.com/k-takata/Onigmo/issues/132 | 473,689,235 | 132 | 697 |
CVE-2019-16162 | 2019-09-09T17:15:13.253 | Onigmo through 6.2.0 has an out-of-bounds read in parse_char_class because of missing codepoint validation in regenc.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/k-takata/Onigmo/issues/139"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:k-takata:onigmo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B3216461-E3C7-4842-B905-AF978F7B71BB",
"versionEndExcluding": null,
"versionEndIncluding": "6.2.0",
"versionStartExcludi... | [
"125"
] | 125 | https://github.com/k-takata/Onigmo/issues/139 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"k-takata",
"Onigmo"
] | When Onigmo try to parse a regular expression "[{\x{111111}x", it causes out of bounds read in parse_char_class().
Here is a POC code based on sample/syntax.c
```perl_syntax2.c
/*
* perl_syntax2.c
*/
#include <stdio.h>
#include <string.h>
#include "onigmo.h"
extern int exec(const OnigSyntaxType* syntax,
... | Out-of-bounds read in parse_char_class() | https://api.github.com/repos/k-takata/Onigmo/issues/139/comments | 1 | 2019-07-31T00:45:06Z | 2019-08-01T12:53:41Z | https://github.com/k-takata/Onigmo/issues/139 | 474,882,990 | 139 | 698 |
CVE-2019-16163 | 2019-09-09T17:15:13.347 | Oniguruma before 6.9.3 allows Stack Exhaustion in regcomp.c because of recursion in regparse.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/kkos/oniguruma/commit/4097828d7cc87589864fecf452f2cd46c5f37180"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Release Notes"
],
"url": "https://github.com/kkos/oniguruma/compare/v... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oniguruma_project:oniguruma:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F46239D9-B0F5-4B47-9EE3-743D79F5CD66",
"versionEndExcluding": "6.9.3",
"versionEndIncluding": null,
"version... | [
"674"
] | 674 | https://github.com/kkos/oniguruma/issues/147 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"kkos",
"oniguruma"
] | If Oniguruma try to parse very deep regex nodes, it causes stack buffer overflow due to deep recursive calls to some parsing functions like optimize_nodes(), tree_min_len().
Here is a POC source code that simply executes onig_search() with very large regular expression "X+++++++++++++++++++++++++++++++ .... ".
`... | Stack Exhaustion Problem caused by some parsing functions in regcomp.c making recursive calls to themselves. | https://api.github.com/repos/kkos/oniguruma/issues/147/comments | 3 | 2019-07-29T02:45:52Z | 2019-09-10T17:55:50Z | https://github.com/kkos/oniguruma/issues/147 | 473,824,113 | 147 | 699 |
CVE-2019-16164 | 2019-09-09T17:15:13.423 | MyHTML through 4.0.5 has a NULL pointer dereference in myhtml_tree_node_remove in tree.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/lexborisov/myhtml/issues/175"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://githu... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:myhtml_project:myhtml:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5ABE4735-9880-48A5-9DD9-D0D0303A62C8",
"versionEndExcluding": null,
"versionEndIncluding": "4.0.5",
"versionStartE... | [
"476"
] | 476 | https://github.com/lexborisov/myhtml/issues/175 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"lexborisov",
"myhtml"
] | POC HTML code is [here](https://gist.github.com/RKX1209/d2a1ac8baab7c4995ca5d140983fe810)
```
hexdump -C./nullderef_myhtml.html
00000000 3c 55 52 3e 3c 55 3e 3c 50 3e 3c 2f 55 20 |<UR><U><P></U |
0000000e
```
While parsing above HTML code, myhtml try to remove \<P\> tag because \<U\> tag is not closed... | NULL ptr dereference in tree node remove callback | https://api.github.com/repos/lexborisov/myhtml/issues/175/comments | 4 | 2019-07-29T07:41:57Z | 2019-09-06T06:31:38Z | https://github.com/lexborisov/myhtml/issues/175 | 473,899,258 | 175 | 700 |
CVE-2019-12105 | 2019-09-10T17:15:11.517 | In Supervisor through 4.0.2, an unauthenticated user can read log files or restart a service. Note: The maintainer responded that the affected component, inet_http_server, is not enabled by default but if the user enables it and does not set a password, Supervisor logs a warning message. The maintainer indicated the ab... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://supervisord.org/configuration.html#inet-http-server-section-settings"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Supervisor/supervisor/commit/4e334d9cf2a... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:supervisord:supervisor:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BB007CD-542E-4152-82F7-0E2236F48BCA",
"versionEndExcluding": null,
"versionEndIncluding": "4.0.2",
"versionStart... | [
"306"
] | 306 | https://github.com/Supervisor/supervisor/issues/1245 | [
"Third Party Advisory"
] | github.com | [
"Supervisor",
"supervisor"
] | Luan Souza (luansouza.jampa@gmail.com) wrote in email:
> So, I was search for vulnerabites in my work company and I founded supervisord, it's a good service but the user don't need authetication for view logs ou restart a service, this is a called a misconfiguration, because some people put this online and anyone ca... | [CVE-2019-12105] Unauthenticated user can read log files or restart a service | https://api.github.com/repos/Supervisor/supervisor/issues/1245/comments | 1 | 2019-05-29T14:01:52Z | 2019-09-16T17:34:04Z | https://github.com/Supervisor/supervisor/issues/1245 | 449,827,551 | 1,245 | 702 |
CVE-2019-16249 | 2019-09-11T23:15:14.377 | OpenCV 4.1.1 has an out-of-bounds read in hal_baseline::v_load in core/hal/intrin_sse.hpp when called from computeSSDMeanNorm in modules/video/src/dis_flow.cpp. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/opencv/opencv/issues/15481"
},
{
"source": "nvd@nist.gov",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752702"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:opencv:opencv:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6569E48A-FA41-46E8-9008-3C6B6A1BC38D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"125"
] | 125 | https://github.com/opencv/opencv/issues/15481 | [
"Third Party Advisory"
] | github.com | [
"opencv",
"opencv"
] | **Build type:** `Release`
**OpenCV version:** `4.1.2-pre`
**OS:** `Linux 4.15.0-62-generic #69-Ubuntu`
**OpenCV VCS version:** `4.1.1-217-g4de115c08`
I've complied opencv with clang enabling ASAN while fuzzing the opencv_test_video binary `crashes at cv::hal_baseline::v_load()` and `cv::computeSSDMeanNorm()`
`... | OOB: cv::WorkerThread::WorkerThread() | https://api.github.com/repos/opencv/opencv/issues/15481/comments | 2 | 2019-09-07T15:52:32Z | 2019-09-17T22:07:03Z | https://github.com/opencv/opencv/issues/15481 | 490,650,392 | 15,481 | 703 |
CVE-2019-16303 | 2019-09-14T00:15:10.390 | A class generated by the Generator in JHipster before 6.3.0 and JHipster Kotlin through 1.1.0 produces code that uses an insecure source of randomness (apache.commons.lang3 RandomStringUtils). This allows an attacker (if able to obtain their own password reset URL) to compute the value for all other password resets for... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jhipster/generator-jhipster/commit/88448b85fd3e8e49df103f0061359037c2c68ea7"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jhipster:jhipster:*:*:*:*:*:*:*:*",
"matchCriteriaId": "058DA509-FF19-4CB0-BD7B-C78E053740E3",
"versionEndExcluding": "6.3.0",
"versionEndIncluding": null,
"versionStartExclu... | [
"338"
] | 338 | https://github.com/jhipster/generator-jhipster/issues/10401 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jhipster",
"generator-jhipster"
] | This is for https://github.com/jhipster/generator-jhipster/security/advisories/GHSA-mwp6-j9wf-968c which isn't public at the time of this writing
@JLLeitschuh thank you so much for reporting this issue!!!
We would like to thank you by giving you a $500 bug bounty on the project, and this is why I'm creating this ... | Bug bounty for security advisory - thank you @JLLeitschuh | https://api.github.com/repos/jhipster/generator-jhipster/issues/10401/comments | 48 | 2019-09-13T07:57:12Z | 2020-07-14T08:58:13Z | https://github.com/jhipster/generator-jhipster/issues/10401 | 493,187,365 | 10,401 | 704 |
CVE-2019-16303 | 2019-09-14T00:15:10.390 | A class generated by the Generator in JHipster before 6.3.0 and JHipster Kotlin through 1.1.0 produces code that uses an insecure source of randomness (apache.commons.lang3 RandomStringUtils). This allows an attacker (if able to obtain their own password reset URL) to compute the value for all other password resets for... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jhipster/generator-jhipster/commit/88448b85fd3e8e49df103f0061359037c2c68ea7"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jhipster:jhipster:*:*:*:*:*:*:*:*",
"matchCriteriaId": "058DA509-FF19-4CB0-BD7B-C78E053740E3",
"versionEndExcluding": "6.3.0",
"versionEndIncluding": null,
"versionStartExclu... | [
"338"
] | 338 | https://github.com/jhipster/jhipster-kotlin/issues/183 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jhipster",
"jhipster-kotlin"
] | Due to the uncontrolled nature of the previous full disclosure of this vulnerability in `jhipster-kotlin` this is an 0-Day vulnerability disclosure for jhipster-kotlin.
See: https://github.com/jhipster/generator-jhipster/issues/10401
https://github.com/jhipster/generator-jhipster/security/advisories/GHSA-mwp6-j9wf-... | [SECURITY] CWE-338: Vulnerability in JHipster Kotlin | https://api.github.com/repos/jhipster/jhipster-kotlin/issues/183/comments | 3 | 2019-09-13T22:27:51Z | 2019-10-02T15:55:41Z | https://github.com/jhipster/jhipster-kotlin/issues/183 | 493,539,968 | 183 | 705 |
CVE-2019-14540 | 2019-09-15T22:15:10.277 | A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3200"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0159"
},
{
"source"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD",
"versionEndExcluding": "2.6.7.3",
"versionEndIncluding": null,
"versio... | [
"502"
] | 502 | https://github.com/FasterXML/jackson-databind/issues/2410 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"FasterXML",
"jackson-databind"
] | Another gadget (*) type report regarding `HikariConfig`, via `HikariDataSource`
Mitre id: CVE-2019-14540
Reporter: iSafeBlue / blue at ixsec.org
(*) See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for more on general problem type
Fixed in:
* 2.9.10... | Block one more gadget type (HikariCP, CVE-2019-14540) | https://api.github.com/repos/FasterXML/jackson-databind/issues/2410/comments | 8 | 2019-08-06T02:03:28Z | 2020-02-10T22:11:47Z | https://github.com/FasterXML/jackson-databind/issues/2410 | 477,131,144 | 2,410 | 706 |
CVE-2019-14540 | 2019-09-15T22:15:10.277 | A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3200"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0159"
},
{
"source"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD",
"versionEndExcluding": "2.6.7.3",
"versionEndIncluding": null,
"versio... | [
"502"
] | 502 | https://github.com/FasterXML/jackson-databind/issues/2449 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"FasterXML",
"jackson-databind"
] | Another gadget (*) type report regarding `HikariConfig` (sub-class of `HikariDataSource`)
Mitre id: CVE-2019-14439
Reporter: kingkk
Fixed in:
* 2.9.10
* 2.8.11.5
* 2.6.7.3
* does not affect 2.10.0 and later
-----
(*) See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-nee... | Block one more gadget type (HikariCP, CVE-2019-14439 / CVE-2019-16335) | https://api.github.com/repos/FasterXML/jackson-databind/issues/2449/comments | 3 | 2019-09-10T17:06:52Z | 2020-02-10T22:12:16Z | https://github.com/FasterXML/jackson-databind/issues/2449 | 491,794,946 | 2,449 | 707 |
CVE-2019-16333 | 2019-09-15T22:15:10.450 | GetSimple CMS v3.3.15 has Persistent Cross-Site Scripting (XSS) in admin/theme-edit.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1313"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:get-simple:getsimple_cms:3.3.15:*:*:*:*:*:*:*",
"matchCriteriaId": "1175D384-DC48-4226-9609-725629E65605",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"79"
] | 79 | https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1313 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"GetSimpleCMS",
"GetSimpleCMS"
] | Version impacted: 3.3.15
Payload: <svg/onload=alert(document.location)>

| XSS in theme-edit.php | https://api.github.com/repos/GetSimpleCMS/GetSimpleCMS/issues/1313/comments | 0 | 2019-08-28T13:02:41Z | 2019-08-28T13:02:41Z | https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1313 | 486,369,075 | 1,313 | 708 |
CVE-2019-16334 | 2019-09-15T22:15:10.527 | In Bludit v3.9.2, there is a persistent XSS vulnerability in the Categories -> Add New Category -> Name field. NOTE: this may overlap CVE-2017-16636. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/bludit/bludit/issues/1078"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bludit:bludit:3.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "10A81FA4-0E1B-4680-A04F-E4D2267A98E2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/bludit/bludit/issues/1078 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"bludit",
"bludit"
] | ### Vulnerability
Bludit v3.9.2 is vulnerable to a stored XSS vulnerability in Categories -> Add New Category -> Name Parameter
### Steps to reproduce the problem
Go to Categories -> Add New Category and insert the following payload in [Name] Parameter:
<svg onload=alert(document.location)>
 at isomedia/avc_ext.c in GPAC 0.7.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file. There is "cfg_new->AVCLevelIndication = cfg->AVCLevelIndication;" but cfg could be NULL. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1179"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-an... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"476"
] | 476 | https://github.com/gpac/gpac/issues/1179 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Tested in Ubuntu 18.04, 64bit, gcc 7.3.0, gpac (master 94ad872)
Compile cmd
`$ ./configure --extra-cflags=-g"`
`$ make`
Triggered by
`$ MP4Box -diso $POC`
POC file:
https://github.com/Marsman1996/pocs/blob/master/gpac/poc12-SEGV
gdb info:
```
Program received signal SIGSEGV, Segmentation fault.
A... | SEGV in AVC_DuplicateConfig() at avc_ext.c:847 | https://api.github.com/repos/gpac/gpac/issues/1179/comments | 2 | 2018-12-15T06:54:00Z | 2019-09-21T12:25:09Z | https://github.com/gpac/gpac/issues/1179 | 391,351,147 | 1,179 | 710 |
CVE-2018-21016 | 2019-09-16T13:15:11.510 | audio_sample_entry_AddBox() at isomedia/box_code_base.c in GPAC 0.7.1 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1180"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-an... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"125"
] | 125 | https://github.com/gpac/gpac/issues/1180 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Tested in Ubuntu 18.04, 64bit, gcc 7.3.0, gpac (master 94ad872)
Compile cmd:
`$ ./configure --extra-cflags="-fsanitize=address,undefined -g" --extra-ldflags="-fsanitize=address,undefined -ldl -g"`
`$ make`
Triggered by
`$ MP4Box -diso $POC`
POC file:
https://github.com/Marsman1996/pocs/blob/master/gpac/p... | AddressSanitizer: heap-buffer-overflow in audio_sample_entry_AddBox() at box_code_base.c:3934 | https://api.github.com/repos/gpac/gpac/issues/1180/comments | 7 | 2018-12-15T07:16:20Z | 2019-09-21T07:29:30Z | https://github.com/gpac/gpac/issues/1180 | 391,352,422 | 1,180 | 711 |
CVE-2018-21017 | 2019-09-16T13:15:11.573 | GPAC 0.7.1 has a memory leak in dinf_Read in isomedia/box_code_base.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/commit/d2371b4b204f0a3c0af51ad4e9b491144dd1225c"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"u... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"401"
] | 401 | https://github.com/gpac/gpac/issues/1183 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Tested in Ubuntu 18.04, 64bit, gcc 7.3.0, gpac (master d1c4bc3)
Compile cmd:
`$ ./configure --extra-cflags="-fsanitize=address,undefined -g" --extra-ldflags="-fsanitize=address,undefined -ldl -g"`
`$ make`
Triggered by
`$ MP4Box -diso $POC`
POC file:
https://github.com/Marsman1996/pocs/blob/master/gpac/p... | AddressSanitizer: memory leaks of dref_New() | https://api.github.com/repos/gpac/gpac/issues/1183/comments | 2 | 2018-12-17T15:51:57Z | 2019-09-20T21:34:54Z | https://github.com/gpac/gpac/issues/1183 | 391,773,951 | 1,183 | 712 |
CVE-2019-16348 | 2019-09-16T13:15:11.963 | marc-q libwav through 2017-04-20 has a NULL pointer dereference in gain_file() at wav_gain.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/marc-q/libwav/issues/24"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libwav_project:libwav:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0B1ADCA2-142E-4BE6-997F-4549F987C0E1",
"versionEndExcluding": null,
"versionEndIncluding": "2017-04-20",
"versionS... | [
"476"
] | 476 | https://github.com/marc-q/libwav/issues/24 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"marc-q",
"libwav"
] | Tested in Ubuntu 14.04, 64bit, libwav (master 5cc8746)
Triggered by
`$ ./wav_gain $POC /dev/null`
POC file:
https://github.com/Marsman1996/pocs/blob/master/libwav/poc18-gain_file-SEGV
ASAN info:
```
ASAN:SIGSEGV
=================================================================
==21704== ERROR: Addres... | NULL Pointer Dereference in gain_file() at wav_gain.c:33 | https://api.github.com/repos/marc-q/libwav/issues/24/comments | 0 | 2019-08-15T08:01:41Z | 2019-08-15T08:05:55Z | https://github.com/marc-q/libwav/issues/24 | 481,039,670 | 24 | 715 |
CVE-2019-16349 | 2019-09-16T13:15:12.043 | Bento4 1.5.1-628 has a NULL pointer dereference in AP4_ByteStream::ReadUI32 in Core/Ap4ByteStream.cpp when called from the AP4_TrunAtom class. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/422"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https:... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*",
"matchCriteriaId": "27A2EAA1-1740-4A14-BFFC-BD4406E9BD87",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"476"
] | 476 | https://github.com/axiomatic-systems/Bento4/issues/422 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | Tested in Ubuntu 14.04, 64bit, Bento4(master cbebcc9)
Triggered by cmd:
`$ ./mp4tag --list-symbols --list-keys --show-tags $POC`
POC file:
https://github.com/Marsman1996/pocs/blob/master/bento4/poc19-ReadUI32-SEGV
ASAN info:
```
==14819== WARNING: AddressSanitizer failed to allocate 0x000ff00000c0 ... | NULL Pointer Dereference in AP4_ByteStream::ReadUI32() at Ap4ByteStream.cpp:243 | https://api.github.com/repos/axiomatic-systems/Bento4/issues/422/comments | 0 | 2019-08-18T06:57:23Z | 2019-08-25T16:20:06Z | https://github.com/axiomatic-systems/Bento4/issues/422 | 481,961,506 | 422 | 716 |
CVE-2019-16350 | 2019-09-16T13:15:12.107 | ffjpeg before 2019-08-18 has a NULL pointer dereference in idct2d8x8() at dct.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/rockcarry/ffjpeg/issues/10"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9B30E308-95EC-4B21-99B6-F731AF463030",
"versionEndExcluding": "2019-08-18",
"versionEndIncluding": null,
"versionStartE... | [
"476"
] | 476 | https://github.com/rockcarry/ffjpeg/issues/10 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"rockcarry",
"ffjpeg"
] | ## Test Environment
Ubuntu 14.04, 64bit, ffjpeg(master 627c8a9)
## How to trigger
1. compile ffjpeg with cmake file from https://github.com/rockcarry/ffjpeg/issues/6
2. `$ ./ffjpeg -d $POC`
## POC file
https://github.com/Marsman1996/pocs/blob/master/ffjpeg/poc20-idct2d8x8-SEGV
## Details
### Asan report
... | NULL Pointer Dereference in idct2d8x8() at dct.c:201 | https://api.github.com/repos/rockcarry/ffjpeg/issues/10/comments | 2 | 2019-08-18T08:03:41Z | 2019-08-19T03:27:30Z | https://github.com/rockcarry/ffjpeg/issues/10 | 481,966,251 | 10 | 717 |
CVE-2019-16351 | 2019-09-16T13:15:12.183 | ffjpeg before 2019-08-18 has a NULL pointer dereference in huffman_decode_step() at huffman.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/rockcarry/ffjpeg/issues/11"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9B30E308-95EC-4B21-99B6-F731AF463030",
"versionEndExcluding": "2019-08-18",
"versionEndIncluding": null,
"versionStartE... | [
"476"
] | 476 | https://github.com/rockcarry/ffjpeg/issues/11 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"rockcarry",
"ffjpeg"
] | ## Test Environment
Ubuntu 14.04, 64bit, ffjpeg(master 627c8a9)
## How to trigger
1. compile ffjpeg with cmake file from https://github.com/rockcarry/ffjpeg/issues/6
2. `$ ./ffjpeg -d $POC`
## POC file
https://github.com/Marsman1996/pocs/blob/master/ffjpeg/poc21-huffman_decode_step-SEGV
## Details
### Asa... | SEGV in huffman_decode_step() at huffman.c:371 | https://api.github.com/repos/rockcarry/ffjpeg/issues/11/comments | 2 | 2019-08-18T08:04:59Z | 2019-08-19T03:27:21Z | https://github.com/rockcarry/ffjpeg/issues/11 | 481,966,330 | 11 | 718 |
CVE-2019-16352 | 2019-09-16T13:15:12.247 | ffjpeg before 2019-08-21 has a heap-based buffer overflow in jfif_load() at jfif.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/rockcarry/ffjpeg/issues/12"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9B30E308-95EC-4B21-99B6-F731AF463030",
"versionEndExcluding": "2019-08-18",
"versionEndIncluding": null,
"versionStartE... | [
"787"
] | 787 | https://github.com/rockcarry/ffjpeg/issues/12 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"rockcarry",
"ffjpeg"
] | ## Test Environment
Ubuntu 14.04, 64bit, ffjpeg(master 627c8a9)
## How to trigger
1. compile ffjpeg with cmake file from https://github.com/rockcarry/ffjpeg/issues/6
2. `$ ./ffjpeg -d $POC`
## POC file
https://github.com/Marsman1996/pocs/blob/master/ffjpeg/poc22-jfif_load-heapoverflow
## Details
### Asan ... | AddressSanitizer: heap-buffer-overflow in jfif_load() at jfif.c:187 | https://api.github.com/repos/rockcarry/ffjpeg/issues/12/comments | 10 | 2019-08-18T08:07:01Z | 2019-08-21T09:02:45Z | https://github.com/rockcarry/ffjpeg/issues/12 | 481,966,458 | 12 | 719 |
CVE-2019-16366 | 2019-09-16T17:15:14.293 | In XS 9.0.0 in Moddable SDK OS180329, there is a heap-based buffer overflow in fxBeginHost in xsAPI.c when called from fxRunDefine in xsRun.c, as demonstrated by crafted JavaScript code to xst. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Moddable-OpenSource/moddable/issues/235"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:moddable:moddable:os180329:*:*:*:*:*:*:*",
"matchCriteriaId": "34E757B1-02EE-4725-9610-056F3D11F904",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | [
"787"
] | 787 | https://github.com/Moddable-OpenSource/moddable/issues/235 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Moddable-OpenSource",
"moddable"
] | Hello,
We find a heap-buffer-overflow vulnerability in XS 9.0.0, which is reported by Address Sanitizer. We compile and run the xs in linux 64.
The simplified js code:
```
function opt(arg1, arg2, arg3, arg4, arg5) {
var sb = [arg2];
var test_bitor = function() {
return 0;
};
... | XS: Heap-Buffer-Overflow | https://api.github.com/repos/Moddable-OpenSource/moddable/issues/235/comments | 10 | 2019-07-25T07:08:13Z | 2019-09-24T16:45:53Z | https://github.com/Moddable-OpenSource/moddable/issues/235 | 472,701,074 | 235 | 720 |
CVE-2019-16403 | 2019-09-18T12:15:11.067 | In Webkul Bagisto before 0.1.5, the functionalities for customers to change their own values (such as address, review, orders, etc.) can also be manipulated by other customers. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/bagisto/bagisto/issues/749"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:webkul:bagisto:*:*:*:*:*:*:*:*",
"matchCriteriaId": "14941F78-5F05-4C36-8F39-C4CE5D545185",
"versionEndExcluding": "0.1.5",
"versionEndIncluding": null,
"versionStartExcludin... | [
"639"
] | 639 | https://github.com/bagisto/bagisto/issues/749 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"bagisto",
"bagisto"
] | **Threat:** sensitive data disclosure
**Risk level:** HIGH
**Complexity:** medium
**Vulnerable functions:** Bagisto front end
The list of functionality mentioned below are designed for customers to change their own values such as address, review etc can also be manipulated by other customers.
**1) Address fie... | broken access control | https://api.github.com/repos/bagisto/bagisto/issues/749/comments | 2 | 2019-03-27T12:52:24Z | 2019-04-02T05:08:57Z | https://github.com/bagisto/bagisto/issues/749 | 425,942,250 | 749 | 721 |
CVE-2019-16510 | 2019-09-19T16:15:11.730 | libIEC61850 through 1.3.3 has a use-after-free in MmsServer_waitReady in mms/iso_mms/server/mms_server.c, as demonstrated by server_example_goose. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/mz-automation/libiec61850/issues/164"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mz-automation:libiec61850:*:*:*:*:*:*:*:*",
"matchCriteriaId": "64D89754-FF85-462B-8253-C44E8DF11568",
"versionEndExcluding": null,
"versionEndIncluding": "1.3.3",
"versionSt... | [
"416"
] | 416 | https://github.com/mz-automation/libiec61850/issues/164 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"mz-automation",
"libiec61850"
] | Hello we found Heap user after free vulnerability in server_example_goose binary.
**Below are steps followed to reproduce crash**
Download latest source code from : https://github.com/mz-automation/libiec61850.git and compiled using ASAN (cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -fsanitize=leak -g -ggdb -fno-... | Heap-use-after-free in server_example_goose | https://api.github.com/repos/mz-automation/libiec61850/issues/164/comments | 5 | 2019-09-09T18:14:27Z | 2019-09-19T15:57:07Z | https://github.com/mz-automation/libiec61850/issues/164 | 491,247,971 | 164 | 722 |
CVE-2019-16511 | 2019-09-19T16:15:11.777 | An issue was discovered in DTF in FireGiant WiX Toolset before 3.11.2. Microsoft.Deployment.Compression.Cab.dll and Microsoft.Deployment.Compression.Zip.dll allow directory traversal during CAB or ZIP archive extraction, because the full name of an archive file (even with a ../ sequence) is concatenated with the destin... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/GitHubAssessments/CVE_Assessments_09_2019"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/wixtoolset/issues/issues/6075"
},
{
"source": "... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:firegiant:wix_toolset:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ED50D663-0FAF-46D1-827C-A1D32AEFC98B",
"versionEndExcluding": "3.11.2",
"versionEndIncluding": null,
"versionStart... | [
"22"
] | 22 | https://github.com/wixtoolset/issues/issues/6075 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"wixtoolset",
"issues"
] | Please provide answers to the following questions to help us narrow down, reproduce, and fix the problem. Fill out one section and delete the others.
* Which version of WiX are you building with?
> WiX v3.11.1
* Which version of Visual Studio are you building with (if any)?
> N/A
* Which version of the W... | DTF vulnerable to "Zip Slip" | https://api.github.com/repos/wixtoolset/issues/issues/6075/comments | 1 | 2019-09-12T18:10:14Z | 2019-09-15T13:48:35Z | https://github.com/wixtoolset/issues/issues/6075 | 492,953,416 | 6,075 | 723 |
CVE-2019-16642 | 2019-09-20T15:15:14.017 | App\Mobile\Controller\ZhuantiController.class.php in TuziCMS 2.0.6 has SQL injection via the index.php/Mobile/Zhuanti/group?id= substring. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/yeyinshi/tuzicms/issues/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yejiao:tuzicms:2.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8998CDEF-98D4-46B2-B8AC-72E10F37CF85",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"89"
] | 89 | https://github.com/yeyinshi/tuzicms/issues/6 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"yeyinshi",
"tuzicms"
] | **I can't insert image to github~**
**0x01**
App\Home\Controller\ZhuantiController.class.php
`<?php
/*******************************************************************************
* [TuziCMS] 兔子CMS
* @Copyright (C) 2014-2015 http://tuzicms.com All rights reserved.
* @Team Yejiao.net
* @Author: 秦大侠 QQ:17... | tuzicms SQLinjection | https://api.github.com/repos/yeyinshi/tuzicms/issues/6/comments | 0 | 2019-09-17T04:45:42Z | 2019-09-17T04:45:42Z | https://github.com/yeyinshi/tuzicms/issues/6 | 494,398,070 | 6 | 724 |
CVE-2019-16643 | 2019-09-20T16:15:13.680 | An issue was discovered in ZrLog 2.1.1. There is a Stored XSS vulnerability in the article_edit area. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/94fzb/zrlog/issues/54"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party A... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zrlog:zrlog:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CDB89DE9-6695-48D7-9A0B-0207EAAAAD9C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"79"
] | 79 | https://github.com/94fzb/zrlog/issues/54 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"94fzb",
"zrlog"
] | There is a stored XSS in the article_edit area | https://api.github.com/repos/94fzb/zrlog/issues/54/comments | 2 | 2019-09-20T01:05:24Z | 2019-10-13T11:37:41Z | https://github.com/94fzb/zrlog/issues/54 | 496,091,742 | 54 | 725 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.