cve_id stringlengths 13 16 | cve_published stringdate 2019-01-01 16:29:00 2025-02-25 20:15:37 | cve_descriptions stringlengths 34 2.6k | cve_metrics dict | cve_references listlengths 1 281 | cve_configurations listlengths 1 70 | cve_cwe_list listlengths 1 1 | cve_primary_cwe stringclasses 164
values | url stringlengths 36 97 | cve_tags listlengths 1 5 ⌀ | domain stringclasses 1
value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 198k ⌀ | issue_title stringlengths 1 335 | issue_comments_url stringlengths 55 116 | issue_comments_count int64 0 338 | issue_created_at stringdate 2012-06-06 09:34:24 2025-04-02 09:37:20 | issue_updated_at stringdate 2014-04-01 20:16:21 2025-06-16 12:26:58 | issue_html_url stringlengths 36 97 | issue_github_id int64 4.93M 2.97B | issue_number int64 1 199k | __index_level_0__ int64 0 6.55k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2024-7592 | 2024-08-19T19:15:08.180 | There is a LOW severity vulnerability affecting CPython, specifically the
'http.cookies' standard library module.
When parsing cookies that contained backslashes for quoted characters in
the cookie value, the parser would use an algorithm with quadratic
complexity, resulting in excess CPU resources being used while p... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cna@python.org",
"tags": [
"Patch"
],
"url": "https://github.com/python/cpython/commit/391e5626e3ee5af267b97e37abc7475732e67621"
},
{
"source": "cna@python.org",
"tags": [
"Patch"
],
"url": "https://github.com/python/cpython/commit/44e458357fca05ca0ae2658... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B475FA53-D1F3-44C8-80CD-0CEA88129109",
"versionEndExcluding": "3.8.20",
"versionEndIncluding": null,
"versionStartExcludin... | [
"1333"
] | 1333 | https://github.com/python/cpython/issues/123067 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"python",
"cpython"
] | # Bug report
### Bug description:
## Description
A potential Denial of Service (DoS) vulnerability, identified as CVE-2024-7592, has been discovered in the `_unquote()` method of the `http.cookies` module in Python's standard library. This vulnerability is particularly concerning as it affects frameworks that utiliz... | CVE-2024-7592: Denial of Service Vulnerability in `http.cookies._unquote()` | https://api.github.com/repos/python/cpython/issues/123067/comments | 6 | 2024-08-16T13:31:26Z | 2024-09-04T15:50:52Z | https://github.com/python/cpython/issues/123067 | 2,470,285,353 | 123,067 | 6,198 |
CVE-2024-7929 | 2024-08-19T22:15:06.470 | A vulnerability, which was classified as problematic, was found in SourceCodester Simple Forum Website 1.0. This affects an unknown part of the file /registration.php of the component Signup Page. The manipulation of the argument username leads to cross site scripting. It is possible to initiate the attack remotely. Th... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ulayaha/ulayaha.github.io/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "http... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oretnom23:simple_forum_website:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0C9F288C-09B8-4C6A-879F-E21B7B48214C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | [
"79"
] | 79 | https://github.com/ulayaha/ulayaha.github.io/issues/2 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ulayaha",
"ulayaha.github.io"
] | My screenshot of setting up the PHP project:

First, register a regular user, then name your username with the following attack payload:
`"><img src=x onerror=alert(1)>
`

+ Online Blood Bank Management System" in PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-blood-bank-management-system-in-php-with-source-code/
# AFFECTED A... | Itsourcecode "Online Blood Bank Management System" in PHP 1.0 "register.php" SQL injection | https://api.github.com/repos/a1175165157/cve/issues/1/comments | 0 | 2024-08-18T08:57:36Z | 2024-08-18T09:02:31Z | https://github.com/a1175165157/cve/issues/1 | 2,471,866,573 | 1 | 6,200 |
CVE-2024-7947 | 2024-08-20T02:15:06.337 | A vulnerability classified as critical has been found in SourceCodester Point of Sales and Inventory Management System 1.0. This affects an unknown part of the file login.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/CveSecLook/cve/issues/60"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:janobe:point_of_sales_and_inventory_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BB4CAA5E-2FA9-4FCB-A2C2-B4D4E4D73896",
"versionEndExcluding": null,
"versionEndIncluding": n... | [
"89"
] | 89 | https://github.com/CveSecLook/cve/issues/60 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"CveSecLook",
"cve"
] | # SourceCodester Point of Sales and Inventory Management System in PHP/PDO with Full Source Code login.php V1.0 SQL injection vulnerability
# NAME OF AFFECTED PRODUCT(S)
+ Point of Sales and Inventory Management System in PHP/PDO with Full Source Code
## Vendor Homepage
+ https://www.sourcecodester.com/php/14724/po... | SourceCodester Point of Sales and Inventory Management System in PHP/PDO with Full Source Code login.php V1.0 SQL injection | https://api.github.com/repos/CveSecLook/cve/issues/60/comments | 0 | 2024-08-18T11:48:27Z | 2024-08-18T11:48:27Z | https://github.com/CveSecLook/cve/issues/60 | 2,471,929,525 | 60 | 6,201 |
CVE-2024-39094 | 2024-08-20T14:15:09.330 | Friendica 2024.03 is vulnerable to Cross Site Scripting (XSS) in settings/profile via the homepage, xmpp, and matrix parameters. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Release Notes"
],
"url": "https://friendi.ca/2024/08/17/friendica-2024-08-released/"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/friendica/friendica/issues/14220"
}... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:friendica:friendica:2024.03:*:*:*:*:*:*:*",
"matchCriteriaId": "2F8639D6-03C8-4E15-BB2D-4217078E983E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"79"
] | 79 | https://github.com/friendica/friendica/issues/14220 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"friendica",
"friendica"
] | - [X] I have searched open and closed issues for duplicates
### Bug Description
When a malicious Javascript payload is sent via the above mentioned parameters to the `/settings/profile` endpoint, they are stored and reflected on the `/profile/[username]` endpoint without any sanitisation, leading to XSS.
### Ste... | /settings/profile - Stored XSS via homepage, xmpp and matrix parameters | https://api.github.com/repos/friendica/friendica/issues/14220/comments | 6 | 2024-06-08T23:50:18Z | 2024-07-05T13:39:02Z | https://github.com/friendica/friendica/issues/14220 | 2,341,912,786 | 14,220 | 6,202 |
CVE-2024-8003 | 2024-08-20T14:15:10.767 | A vulnerability was found in Go-Tribe gotribe-admin 1.0 and classified as problematic. Affected by this issue is the function InitRoutes of the file internal/app/routes/routes.go of the component Log Handler. The manipulation leads to deserialization. The patch is identified as 45ac90d6d1f82716f77dbcdf8e7309c229080e3c.... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 2.7,
"confidentialityImpact": "PA... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/Go-Tribe/gotribe-admin/commit/45ac90d6d1f82716f77dbcdf8e7309c229080e3c"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Go-Tribe/gotr... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gotribe:gotribe-admin:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5EF585EE-2F2A-498F-9FD5-A35321C6DD16",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"502"
] | 502 | https://github.com/Go-Tribe/gotribe-admin/issues/1 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"Go-Tribe",
"gotribe-admin"
] | ```Go
r.NoRoute(func(c *gin.Context) {
fmt.Printf("%s doesn't exists, redirect on /\n", c.Request.URL.Path)
c.Redirect(http.StatusMovedPermanently, "/")
})
```
Flaw reason: in the ` internal/app/routes/routes go ` file of 53 line, using the ` FMT. Printf ` to print log, the log content contains the user t... | Improper Output Neutralization for Logs in the routes go | https://api.github.com/repos/Go-Tribe/gotribe-admin/issues/1/comments | 1 | 2024-08-19T12:58:04Z | 2024-08-20T07:44:16Z | https://github.com/Go-Tribe/gotribe-admin/issues/1 | 2,473,301,960 | 1 | 6,203 |
CVE-2024-8003 | 2024-08-20T14:15:10.767 | A vulnerability was found in Go-Tribe gotribe-admin 1.0 and classified as problematic. Affected by this issue is the function InitRoutes of the file internal/app/routes/routes.go of the component Log Handler. The manipulation leads to deserialization. The patch is identified as 45ac90d6d1f82716f77dbcdf8e7309c229080e3c.... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 2.7,
"confidentialityImpact": "PA... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/Go-Tribe/gotribe-admin/commit/45ac90d6d1f82716f77dbcdf8e7309c229080e3c"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Go-Tribe/gotr... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gotribe:gotribe-admin:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5EF585EE-2F2A-498F-9FD5-A35321C6DD16",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"502"
] | 502 | https://github.com/Go-Tribe/gotribe-admin/issues/1#issuecomment-2298187923 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"Go-Tribe",
"gotribe-admin"
] | ```Go
r.NoRoute(func(c *gin.Context) {
fmt.Printf("%s doesn't exists, redirect on /\n", c.Request.URL.Path)
c.Redirect(http.StatusMovedPermanently, "/")
})
```
Flaw reason: in the ` internal/app/routes/routes go ` file of 53 line, using the ` FMT. Printf ` to print log, the log content contains the user t... | Improper Output Neutralization for Logs in the routes go | https://api.github.com/repos/Go-Tribe/gotribe-admin/issues/1/comments | 1 | 2024-08-19T12:58:04Z | 2024-08-20T07:44:16Z | https://github.com/Go-Tribe/gotribe-admin/issues/1 | 2,473,301,960 | 1 | 6,204 |
CVE-2024-8005 | 2024-08-20T14:15:11.130 | A vulnerability was found in demozx gf_cms 1.0/1.0.1. It has been classified as critical. This affects the function init of the file internal/logic/auth/auth.go of the component JWT Authentication. The manipulation leads to hard-coded credentials. It is possible to initiate the attack remotely. The exploit has been dis... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/demozx/gf_cms/commit/be702ada7cb6fdabc02689d90b38139c827458a5"
},
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/demozx/gf_cms/commit/de51cc57a96ccca905c837ef925... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:demozx:gf_cms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "52F0EE72-5D7B-4635-8319-3BC72516D597",
"versionEndExcluding": "1.0.2",
"versionEndIncluding": null,
"versionStartExcluding... | [
"798"
] | 798 | https://github.com/demozx/gf_cms/issues/5 | [
"Issue Tracking"
] | github.com | [
"demozx",
"gf_cms"
] | func init() {
service.RegisterAuth(New())
auth := jwt.New(&jwt.GfJWTMiddleware{
Realm: "test zone",
Key: []byte("secret key"),
Timeout: time.Minute * 5,
MaxRefresh: time.Minute * 5,
IdentityKey: "id",
TokenLookup: "header: Authorization, query: token, c... | Hardcoded Secret Key in JWT Authentication Initialization | https://api.github.com/repos/demozx/gf_cms/issues/5/comments | 1 | 2024-08-19T12:40:20Z | 2024-09-02T03:04:53Z | https://github.com/demozx/gf_cms/issues/5 | 2,473,263,608 | 5 | 6,205 |
CVE-2024-8005 | 2024-08-20T14:15:11.130 | A vulnerability was found in demozx gf_cms 1.0/1.0.1. It has been classified as critical. This affects the function init of the file internal/logic/auth/auth.go of the component JWT Authentication. The manipulation leads to hard-coded credentials. It is possible to initiate the attack remotely. The exploit has been dis... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/demozx/gf_cms/commit/be702ada7cb6fdabc02689d90b38139c827458a5"
},
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/demozx/gf_cms/commit/de51cc57a96ccca905c837ef925... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:demozx:gf_cms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "52F0EE72-5D7B-4635-8319-3BC72516D597",
"versionEndExcluding": "1.0.2",
"versionEndIncluding": null,
"versionStartExcluding... | [
"798"
] | 798 | https://github.com/demozx/gf_cms/issues/5#issuecomment-2296590417 | [
"Issue Tracking"
] | github.com | [
"demozx",
"gf_cms"
] | func init() {
service.RegisterAuth(New())
auth := jwt.New(&jwt.GfJWTMiddleware{
Realm: "test zone",
Key: []byte("secret key"),
Timeout: time.Minute * 5,
MaxRefresh: time.Minute * 5,
IdentityKey: "id",
TokenLookup: "header: Authorization, query: token, c... | Hardcoded Secret Key in JWT Authentication Initialization | https://api.github.com/repos/demozx/gf_cms/issues/5/comments | 1 | 2024-08-19T12:40:20Z | 2024-09-02T03:04:53Z | https://github.com/demozx/gf_cms/issues/5 | 2,473,263,608 | 5 | 6,206 |
CVE-2024-43404 | 2024-08-20T15:15:23.867 | MEGABOT is a fully customized Discord bot for learning and fun. The `/math` command and functionality of MEGABOT versions < 1.5.0 contains a remote code execution vulnerability due to a Python `eval()`. The vulnerability allows an attacker to inject Python code into the `expression` parameter when using `/math` in any ... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/NicPWNs/MEGABOT/commit/71e79e5581ea36313700385b112d863053fb7ed6"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/Nic... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:megacord:megabot:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F3BDF1BF-C31D-4E71-AD47-05CBA3B7FD60",
"versionEndExcluding": "1.5.0",
"versionEndIncluding": null,
"versionStartExclud... | [
"94"
] | 94 | https://github.com/NicPWNs/MEGABOT/issues/137 | [
"Issue Tracking"
] | github.com | [
"NicPWNs",
"MEGABOT"
] | There is a Remote Code Execution (RCE) vulnerability in the `/math` functionality of the bot. | RCE Vulnerability | https://api.github.com/repos/NicPWNs/MEGABOT/issues/137/comments | 1 | 2024-08-19T22:25:34Z | 2024-08-19T22:43:34Z | https://github.com/NicPWNs/MEGABOT/issues/137 | 2,474,339,698 | 137 | 6,207 |
CVE-2024-8081 | 2024-08-22T22:15:05.510 | A vulnerability classified as critical was found in itsourcecode Payroll Management System 1.0. Affected by this vulnerability is an unknown functionality of the file login.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the p... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ppp-src/ha/issues/6"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://itsourcecode.com/"
},
{
"source": "cna@vuldb.com",
"tags": [
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kevinwong:payroll_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "493685F6-0114-46FA-A25F-7B05A7D5ACDB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/ppp-src/ha/issues/6 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ppp-src",
"ha"
] | # Itsourcecode "Payroll Management System " in PHP 1.0 "login.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Payroll Management System
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-food-ordering-system-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ tornseck
#... | # Itsourcecode "Payroll Management System " in PHP 1.0 "login.php" SQL injection | https://api.github.com/repos/ppp-src/ha/issues/6/comments | 1 | 2024-08-22T07:06:36Z | 2024-08-24T14:22:27Z | https://github.com/ppp-src/ha/issues/6 | 2,480,007,118 | 6 | 6,208 |
CVE-2024-8135 | 2024-08-24T22:15:13.827 | A vulnerability classified as critical has been found in Go-Tribe gotribe up to cd3ccd32cd77852c9ea73f986eaf8c301cfb6310. Affected is the function Sign of the file pkg/token/token.go. The manipulation of the argument config.key leads to hard-coded credentials. Continious delivery with rolling releases is used by this p... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact":... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/Go-Tribe/gotribe/commit/4fb9b9e80a2beedd09d9fde4b9cf5bd510baf18f"
},
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/Go-Tribe/gotribe/issues/1"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gotribe:gotribe:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F46A939-AF95-4372-9A2A-CBC91D96B52A",
"versionEndExcluding": "2024-08-23",
"versionEndIncluding": null,
"versionStartEx... | [
"798"
] | 798 | https://github.com/Go-Tribe/gotribe/issues/1 | [
"Issue Tracking"
] | github.com | [
"Go-Tribe",
"gotribe"
] | pkg/token/token.go
```Go
var (
config = Config{"Rtg8BPKNEf2mB4mgvKONGPZZQSaJWNLijxR42qRgq0iBb5", "identityKey"}
once sync.Once
)
...........
...........
// Sign 使用 jwtSecret 签发 token,token 的 claims 中会存放传入的 subject.
func Sign(identityKey string) (tokenString string, err error) {
// Token 的内容
token := jw... | Use of Hard-coded Credentials in token.go | https://api.github.com/repos/Go-Tribe/gotribe/issues/1/comments | 1 | 2024-08-22T08:59:40Z | 2024-08-23T14:25:19Z | https://github.com/Go-Tribe/gotribe/issues/1 | 2,480,223,072 | 1 | 6,209 |
CVE-2024-8135 | 2024-08-24T22:15:13.827 | A vulnerability classified as critical has been found in Go-Tribe gotribe up to cd3ccd32cd77852c9ea73f986eaf8c301cfb6310. Affected is the function Sign of the file pkg/token/token.go. The manipulation of the argument config.key leads to hard-coded credentials. Continious delivery with rolling releases is used by this p... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact":... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/Go-Tribe/gotribe/commit/4fb9b9e80a2beedd09d9fde4b9cf5bd510baf18f"
},
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/Go-Tribe/gotribe/issues/1"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gotribe:gotribe:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F46A939-AF95-4372-9A2A-CBC91D96B52A",
"versionEndExcluding": "2024-08-23",
"versionEndIncluding": null,
"versionStartEx... | [
"798"
] | 798 | https://github.com/Go-Tribe/gotribe/issues/1#issuecomment-2307205980 | [
"Issue Tracking"
] | github.com | [
"Go-Tribe",
"gotribe"
] | pkg/token/token.go
```Go
var (
config = Config{"Rtg8BPKNEf2mB4mgvKONGPZZQSaJWNLijxR42qRgq0iBb5", "identityKey"}
once sync.Once
)
...........
...........
// Sign 使用 jwtSecret 签发 token,token 的 claims 中会存放传入的 subject.
func Sign(identityKey string) (tokenString string, err error) {
// Token 的内容
token := jw... | Use of Hard-coded Credentials in token.go | https://api.github.com/repos/Go-Tribe/gotribe/issues/1/comments | 1 | 2024-08-22T08:59:40Z | 2024-08-23T14:25:19Z | https://github.com/Go-Tribe/gotribe/issues/1 | 2,480,223,072 | 1 | 6,210 |
CVE-2024-8139 | 2024-08-25T01:15:11.300 | A vulnerability has been found in itsourcecode E-Commerce Website 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file search_list.php. The manipulation of the argument user leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/ha/issues/7"
},
{
"source": "cna@vuldb.com",
"tags": [
"Not Applicable"
],
"url": "https://itsourcecode.com/"
},
{
"source": "cna@vuldb.com",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:e-commerce_website:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9F2AFD8B-420C-4152-AE26-691362CAE64D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"v... | [
"89"
] | 89 | https://github.com/ppp-src/ha/issues/7 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"ha"
] | # Itsourcecode "E-Commerce Website" in PHP 1.0 "search_list.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ E-Commerce Website In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/e-commerce-website-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submit... | Itsourcecode "E-Commerce Website" in PHP 1.0 "search_list.php" SQL injection | https://api.github.com/repos/ppp-src/ha/issues/7/comments | 0 | 2024-08-23T08:56:49Z | 2024-08-23T08:56:49Z | https://github.com/ppp-src/ha/issues/7 | 2,482,662,465 | 7 | 6,211 |
CVE-2024-8150 | 2024-08-25T22:15:05.310 | A vulnerability was found in ContiNew Admin 3.2.0 and classified as critical. Affected by this issue is the function top.continew.starter.extension.crud.controller.BaseController#page of the file /api/system/user?deptId=1&page=1&size=10. The manipulation of the argument sort leads to sql injection. The attack may be la... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "MULTIPLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PAR... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Chiexf/cve/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.275738"
},
{
"source": "cna@vuldb.c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:continew:continew_admin:3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3504E98B-9616-4544-A4F3-3603A49AB49C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"89"
] | 89 | https://github.com/Chiexf/cve/issues/2 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"Chiexf",
"cve"
] | ### Summary
_The controllable `sort` parameter has led to SQL injection in Continue Admin v3.2.0._
### Environment Setup
_Build the backend code locally by downloading "https://github.com/continew-org/continew-admin"._
_Build the front-end page locally by downloading "https://github.com/continew-org/continew-admi... | Continew Admin V3.2.0 Presence of SQL Injection_1 | https://api.github.com/repos/Chiexf/cve/issues/2/comments | 0 | 2024-08-14T03:09:23Z | 2024-08-14T14:53:56Z | https://github.com/Chiexf/cve/issues/2 | 2,464,797,988 | 2 | 6,212 |
CVE-2024-8155 | 2024-08-25T23:15:04.123 | A vulnerability classified as critical was found in ContiNew Admin 3.2.0. Affected by this vulnerability is the function top.continew.starter.extension.crud.controller.BaseController#tree of the file /api/system/dept/tree?sort=parentId%2Casc&sort=sort%2Casc. The manipulation of the argument sort leads to sql injection.... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "MULTIPLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PAR... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Chiexf/cve/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.275743"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:continew:admin:3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C339F881-93D0-46ED-89B4-B8FA0E22E861",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"89"
] | 89 | https://github.com/Chiexf/cve/issues/3 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Chiexf",
"cve"
] | ### Summary
_The controllable `sort` parameter has led to SQL injection in Continue Admin v3.2.0._
### Environment Setup
_Build the backend code locally by downloading "https://github.com/continew-org/continew-admin"._
_Build the front-end page locally by downloading "https://github.com/continew-org/continew-admi... | Continew Admin V3.2.0 Presence of SQL Injection_2 | https://api.github.com/repos/Chiexf/cve/issues/3/comments | 0 | 2024-08-14T11:39:03Z | 2024-08-15T15:19:19Z | https://github.com/Chiexf/cve/issues/3 | 2,465,601,895 | 3 | 6,213 |
CVE-2024-8167 | 2024-08-26T15:15:09.593 | A vulnerability was found in code-projects Job Portal 1.0. It has been classified as critical. Affected is an unknown function of the file /forget.php. The manipulation of the argument email/mobile leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/t4rrega/cve/issues/1"
},
{
"source":... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fabianros:job_portal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "43FB0433-4530-4F0A-A88F-B017F5DD72F2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"89"
] | 89 | https://github.com/t4rrega/cve/issues/1 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"t4rrega",
"cve"
] | # code-projects Job Portal Using PHP With Source Code v1.0 forget.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Job Portal Using PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/job-portal-using-php-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ t4rrega
## Vulnerable File... | code-projects Job Portal Using PHP With Source Code v1.0 forget.php SQL injection | https://api.github.com/repos/t4rrega/cve/issues/1/comments | 0 | 2024-08-25T13:41:13Z | 2024-08-25T13:43:20Z | https://github.com/t4rrega/cve/issues/1 | 2,485,263,489 | 1 | 6,214 |
CVE-2024-8168 | 2024-08-26T15:15:09.857 | A vulnerability was found in code-projects Online Bus Reservation Site 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file login.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disc... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/t4rrega/cve/issues/2"
},
{
"source":... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fabianros:online_bus_reservation_site:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6370AED9-FA1C-4C5C-94A3-8DC8497337DD",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/t4rrega/cve/issues/2 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"t4rrega",
"cve"
] | # code-projects Online Bus Reservation Site Using PHP With Source Code v1.0 login.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Bus Reservation Site Using PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/online-bus-reservation-system-using-php-source-code/
# AFFECTED AND/OR FIXED VERS... | code-projects Online Bus Reservation Site Using PHP With Source Code v1.0 login.php SQL injection | https://api.github.com/repos/t4rrega/cve/issues/2/comments | 0 | 2024-08-25T13:45:59Z | 2024-08-25T13:45:59Z | https://github.com/t4rrega/cve/issues/2 | 2,485,266,983 | 2 | 6,215 |
CVE-2024-8169 | 2024-08-26T15:15:10.123 | A vulnerability was found in code-projects Online Quiz Site 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file signupuser.php. The manipulation of the argument lid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/t4rrega/cve/issues/5"
},
{
"source":... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fabianros:online_quiz_site:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "15DF6E37-6F4D-459A-823E-73DB8450C6CC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"89"
] | 89 | https://github.com/t4rrega/cve/issues/5 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"t4rrega",
"cve"
] | # code-projects Online Quiz Site Using PHP With Source Code v1.0 signupuser.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Quiz Site Using PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/online-quiz-site-using-php-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ t4rreg... | code-projects Online Quiz Site Using PHP With Source Code v1.0 signupuser.php SQL injection | https://api.github.com/repos/t4rrega/cve/issues/5/comments | 0 | 2024-08-25T13:56:04Z | 2024-08-25T13:56:04Z | https://github.com/t4rrega/cve/issues/5 | 2,485,274,271 | 5 | 6,216 |
CVE-2024-8171 | 2024-08-26T16:15:11.273 | A vulnerability classified as critical was found in itsourcecode Tailoring Management System 1.0. This vulnerability affects unknown code of the file staffcatedit.php. The manipulation of the argument title leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and ma... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/t4rrega/cve/issues/6"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://itsourcecode.com/"
},
{
"source": "cna@vuldb.com",
"tags": [... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/t4rrega/cve/issues/6 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"t4rrega",
"cve"
] | # Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 staffcatedit.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-ph... | Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 staffcatedit.php SQL injection | https://api.github.com/repos/t4rrega/cve/issues/6/comments | 1 | 2024-08-25T13:59:06Z | 2024-08-28T12:19:53Z | https://github.com/t4rrega/cve/issues/6 | 2,485,276,575 | 6 | 6,217 |
CVE-2024-44793 | 2024-08-26T20:15:08.007 | A cross-site scripting (XSS) vulnerability in the component /managers/multiple_freeleech.php of Gazelle commit 63b3370 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the torrents parameter. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
],
"url": "http://gazelle.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/WhatCD/Gazelle"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gazelle_project:gazelle:*:*:*:*:*:*:*:*",
"matchCriteriaId": "032237DC-F7F0-436E-8AE6-00709E76A3A4",
"versionEndExcluding": "2016-11-08",
"versionEndIncluding": null,
"versio... | [
"79"
] | 79 | https://github.com/WhatCD/Gazelle/issues/131 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"WhatCD",
"Gazelle"
] | Hello,
I would like to report for a XSS vulnerability in gazelle commit 63b3370
In file https://github.com/WhatCD/Gazelle/blob/master/sections/tools/managers/multiple_freeleech.php
```php
...
<textarea name="torrents" style="width: 95%; height: 200px;"><?=$_POST['torrents']?></textarea><br /><br /> // Lin... | xss_3 | https://api.github.com/repos/WhatCD/Gazelle/issues/131/comments | 3 | 2024-07-15T03:28:34Z | 2025-01-05T15:31:54Z | https://github.com/WhatCD/Gazelle/issues/131 | 2,407,788,642 | 131 | 6,218 |
CVE-2024-44794 | 2024-08-26T20:15:08.073 | A cross-site scripting (XSS) vulnerability in the component /master/auth/OnedriveRedirect.php of PicUploader commit fcf82ea allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the error_description parameter. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://picuploader.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/xiebruce/PicUploader"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xiebruce:picuploader:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C6938C89-B864-4B8D-A87B-5EF1F9912A0F",
"versionEndExcluding": "2024-02-13",
"versionEndIncluding": null,
"versionSt... | [
"79"
] | 79 | https://github.com/xiebruce/PicUploader/issues/91 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"xiebruce",
"PicUploader"
] | Hello,
I would like to report for a xss vulnerability in PicUploader commit fcf82ea
# Analysis
The path of the vulnerability: https://github.com/xiebruce/PicUploader/blob/master/auth/OnedriveRedirect.php
```php
if(isset($_GET['code'])){ // Line 21 (Check)
...
}else if(isset($_GET['error']) && ... | xss_2 | https://api.github.com/repos/xiebruce/PicUploader/issues/91/comments | 0 | 2024-07-17T08:03:24Z | 2024-08-15T12:54:49Z | https://github.com/xiebruce/PicUploader/issues/91 | 2,412,943,655 | 91 | 6,219 |
CVE-2024-44795 | 2024-08-26T20:15:08.140 | A cross-site scripting (XSS) vulnerability in the component /login/disabled.php of Gazelle commit 63b3370 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the username parameter. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
],
"url": "http://gazelle.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/WhatCD/Gazelle"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gazelle_project:gazelle:*:*:*:*:*:*:*:*",
"matchCriteriaId": "032237DC-F7F0-436E-8AE6-00709E76A3A4",
"versionEndExcluding": "2016-11-08",
"versionEndIncluding": null,
"versio... | [
"79"
] | 79 | https://github.com/WhatCD/Gazelle/issues/129 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"WhatCD",
"Gazelle"
] |
Hello,
I would like to report for a XSS vulnerability in gazelle commit 63b3370
In file https://github.com/WhatCD/Gazelle/blob/master/sections/login/disabled.php
```php
...
<form action="" method="POST">
<input type="email" class="inputtext" placeholder="Email Address" name="email" required /> <input ty... | xss_1 | https://api.github.com/repos/WhatCD/Gazelle/issues/129/comments | 1 | 2024-07-15T03:28:30Z | 2024-08-15T12:53:23Z | https://github.com/WhatCD/Gazelle/issues/129 | 2,407,788,581 | 129 | 6,220 |
CVE-2024-44796 | 2024-08-26T20:15:08.200 | A cross-site scripting (XSS) vulnerability in the component /auth/AzureRedirect.php of PicUploader commit fcf82ea allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the error_description parameter. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://picuploader.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/xiebruce/PicUploader"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xiebruce:picuploader:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C6938C89-B864-4B8D-A87B-5EF1F9912A0F",
"versionEndExcluding": "2024-02-13",
"versionEndIncluding": null,
"versionSt... | [
"79"
] | 79 | https://github.com/xiebruce/PicUploader/issues/90 | [
"Exploit"
] | github.com | [
"xiebruce",
"PicUploader"
] | Hello,
I would like to report for a xss vulnerability in PicUploader commit fcf82ea
# Analysis
The path of the vulnerability: https://github.com/xiebruce/PicUploader/blob/master/auth/AzureRedirect.php
```php
if(isset($_GET['code'])){ // Line 21 (Check)
...
}else if(isset($_GET['error']) && iss... | xss_1 | https://api.github.com/repos/xiebruce/PicUploader/issues/90/comments | 0 | 2024-07-17T08:03:23Z | 2024-08-15T12:54:36Z | https://github.com/xiebruce/PicUploader/issues/90 | 2,412,943,616 | 90 | 6,221 |
CVE-2024-44797 | 2024-08-26T20:15:08.257 | A cross-site scripting (XSS) vulnerability in the component /managers/enable_requests.php of Gazelle commit 63b3370 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the view parameter. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
],
"url": "http://gazelle.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/WhatCD/Gazelle"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"u... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gazelle_project:gazelle:*:*:*:*:*:*:*:*",
"matchCriteriaId": "032237DC-F7F0-436E-8AE6-00709E76A3A4",
"versionEndExcluding": "2016-11-08",
"versionEndIncluding": null,
"versio... | [
"79"
] | 79 | https://github.com/WhatCD/Gazelle/issues/130 | [
"Exploit"
] | github.com | [
"WhatCD",
"Gazelle"
] | Hello,
I would like to report for a XSS vulnerability in gazelle commit 63b3370
In file https://github.com/WhatCD/Gazelle/blob/master/sections/tools/managers/enable_requests.php
```php
<input type="hidden" name="view" value="<?=$_GET['view']?>" /> // Line 159
<td><input type="text" name="username" value="<... | xss_2 | https://api.github.com/repos/WhatCD/Gazelle/issues/130/comments | 1 | 2024-07-15T03:28:32Z | 2024-08-15T12:53:39Z | https://github.com/WhatCD/Gazelle/issues/130 | 2,407,788,608 | 130 | 6,222 |
CVE-2024-45321 | 2024-08-27T04:15:09.010 | The App::cpanminus package through 1.7047 for Perl downloads code via insecure HTTP, enabling code execution for network attackers. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/miyagawa/cpanminus/issues/611"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/miyagawa/cpanminus/pull/674"
},
{
"sour... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:app\\:\\:cpanminus_project:app\\:\\:cpanminus:*:*:*:*:*:perl:*:*",
"matchCriteriaId": "E7633BA7-2A2E-45A8-9A0F-69E1E35D0D2A",
"versionEndExcluding": null,
"versionEndIncluding": "1.7047"... | [
"494"
] | 494 | https://github.com/miyagawa/cpanminus/issues/611 | [
"Issue Tracking"
] | github.com | [
"miyagawa",
"cpanminus"
] | Hi! I'm starting to work across the community to try and help "[Securing Perl](https://docs.google.com/document/d/1DRkiCJhJu4RDI0u_JppBpFa0djouskxEyNHax912U_w/edit#)" by encouraging the checking of module signatures, moving mirrors to HTTPS, nudging defaults toward connecting to HTTPS mirrors when possible, and checkin... | Securing Perl: cpanm HTTPS + verify_SSL + verify signatures? | https://api.github.com/repos/miyagawa/cpanminus/issues/611/comments | 18 | 2020-06-24T07:03:53Z | 2024-09-09T10:10:48Z | https://github.com/miyagawa/cpanminus/issues/611 | 644,372,617 | 611 | 6,223 |
CVE-2024-43788 | 2024-08-27T17:15:07.967 | Webpack is a module bundler. Its main purpose is to bundle JavaScript files for usage in a browser, yet it is also capable of transforming, bundling, or packaging just about any resource or asset. The webpack developers have discovered a DOM Clobbering vulnerability in Webpack’s `AutoPublicPathRuntimeModule`. The DOM C... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"inte... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/webpack/webpack/commit/955e057abc6cc83cbc3fa1e1ef67a49758bf5a61"
},
{
"source": "security-advisories@github.com",
"tags": null,
"url": "https://github.com/webpack/webpack/issues/18718#... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:webpack.js:webpack:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "10BD162E-912D-4458-A67B-F7BC3602FDC5",
"versionEndExcluding": "5.94.0",
"versionEndIncluding": null,
"versionSt... | [
"79"
] | 79 | https://github.com/webpack/webpack/issues/18718#issuecomment-2326296270 | null | github.com | [
"webpack",
"webpack"
] | I see CVE-2024-43788 was [patched](https://github.com/webpack/webpack/pull/18700) in Webpack 5, and the CVE shows that Webpack 4 and below are affected, but are Webpack 4 and below actually affected? I don't see any code in Webpack 4 that looks like the patch that was applied to Webpack 5. | Does CVE-2024-43788 actually affect Webpack 4? | https://api.github.com/repos/webpack/webpack/issues/18718/comments | 7 | 2024-08-28T17:19:38Z | 2024-09-17T14:17:02Z | https://github.com/webpack/webpack/issues/18718 | 2,492,626,936 | 18,718 | 6,224 |
CVE-2024-8218 | 2024-08-27T21:15:08.350 | A vulnerability was found in code-projects Online Quiz Site 1.0 and classified as critical. This issue affects some unknown processing of the file index.php. The manipulation of the argument loginid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be use... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/t4rrega/cve/issues/7"
},
{
"source": "cna@vuldb.com",
"t... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fabianros:online_quiz_site:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "15DF6E37-6F4D-459A-823E-73DB8450C6CC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"89"
] | 89 | https://github.com/t4rrega/cve/issues/7 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"t4rrega",
"cve"
] | # code-projects Online Quiz Site Using PHP With Source Code v1.0 index.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Quiz Site Using PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/online-quiz-site-using-php-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ t4rrega
##... | code-projects Online Quiz Site Using PHP With Source Code v1.0 index.php SQL injection | https://api.github.com/repos/t4rrega/cve/issues/7/comments | 0 | 2024-08-26T13:48:47Z | 2024-08-26T15:25:03Z | https://github.com/t4rrega/cve/issues/7 | 2,486,925,466 | 7 | 6,225 |
CVE-2024-8219 | 2024-08-27T22:15:05.340 | A vulnerability was found in code-projects Responsive Hotel Site 1.0. It has been classified as critical. Affected is an unknown function of the file index.php. The manipulation of the argument name/phone/email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the p... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/t4rrega/cve/issues/8"
},
{
"source": "cna@vuldb.com",
"t... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fabianros:responsive_hotel_site:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E1C10207-0B0E-455F-B5AE-2CAA6C98BA15",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"89"
] | 89 | https://github.com/t4rrega/cve/issues/8 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"t4rrega",
"cve"
] | # code-projects Responsive Hotel Site Using PHP With Source Code v1.0 index.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Responsive Hotel Site Using PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/responsive-hotel-site-using-php-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter... | code-projects Responsive Hotel Site Using PHP With Source Code v1.0 index.php SQL injection | https://api.github.com/repos/t4rrega/cve/issues/8/comments | 0 | 2024-08-26T13:52:14Z | 2024-08-26T15:25:14Z | https://github.com/t4rrega/cve/issues/8 | 2,486,933,355 | 8 | 6,226 |
CVE-2024-8220 | 2024-08-27T22:15:05.630 | A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file staffedit.php. The manipulation of the argument id/stafftype/address/fullname/phonenumber/salary leads to sql injection. The attack can be l... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/dd456-dd/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://itsourcecode.com/"
},
{
"source": "cna@vuldb.com",
"t... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/dd456-dd/cve/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"dd456-dd",
"cve"
] | # Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 staffedit.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-w... | Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 staffedit.php SQL injection | https://api.github.com/repos/dd456-dd/cve/issues/1/comments | 1 | 2024-08-26T14:13:31Z | 2024-08-26T14:13:40Z | https://github.com/dd456-dd/cve/issues/1 | 2,486,983,875 | 1 | 6,227 |
CVE-2024-45054 | 2024-08-28T20:15:08.547 | Hwameistor is an HA local storage system for cloud-native stateful workloads. This ClusterRole has * verbs of * resources. If a malicious user can access the worker node which has hwameistor's deployment, he/she can abuse these excessive permissions to do whatever he/she likes to the whole cluster, resulting in a clust... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 2.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityI... | [
{
"source": "security-advisories@github.com",
"tags": [
"Product"
],
"url": "https://github.com/hwameistor/hwameistor/blob/main/helm/hwameistor/templates/clusterrole.yaml"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hwameistor:hwameistor:*:*:*:*:*:go:*:*",
"matchCriteriaId": "789E23CD-2922-45F8-BD3A-AD17E16D06CA",
"versionEndExcluding": "0.14.6",
"versionEndIncluding": null,
"versionStar... | [
"200"
] | 200 | https://github.com/hwameistor/hwameistor/issues/1457 | [
"Issue Tracking"
] | github.com | [
"hwameistor",
"hwameistor"
] | Hi community! I just found a possible security issue when reading the code. I would like to discuss whether it is a real vulnerability.
## Description
The bug is that the DaemonSet `hwameistor-local-disk-manager` in the charts has too much RBAC permission than it needs, which may cause some security problems, and... | [Bug] DaemonSet hwameistor-local-disk-manager has too much RBAC permission which may leads the whole cluster being hijacked | https://api.github.com/repos/hwameistor/hwameistor/issues/1457/comments | 2 | 2024-04-28T13:52:58Z | 2024-07-29T01:36:37Z | https://github.com/hwameistor/hwameistor/issues/1457 | 2,267,577,538 | 1,457 | 6,228 |
CVE-2024-45054 | 2024-08-28T20:15:08.547 | Hwameistor is an HA local storage system for cloud-native stateful workloads. This ClusterRole has * verbs of * resources. If a malicious user can access the worker node which has hwameistor's deployment, he/she can abuse these excessive permissions to do whatever he/she likes to the whole cluster, resulting in a clust... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 2.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityI... | [
{
"source": "security-advisories@github.com",
"tags": [
"Product"
],
"url": "https://github.com/hwameistor/hwameistor/blob/main/helm/hwameistor/templates/clusterrole.yaml"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hwameistor:hwameistor:*:*:*:*:*:go:*:*",
"matchCriteriaId": "789E23CD-2922-45F8-BD3A-AD17E16D06CA",
"versionEndExcluding": "0.14.6",
"versionEndIncluding": null,
"versionStar... | [
"200"
] | 200 | https://github.com/hwameistor/hwameistor/issues/1460 | [
"Issue Tracking"
] | github.com | [
"hwameistor",
"hwameistor"
] | Dear Team Members:
Greetings! Our team is very interested in your project and we recently identified a potential RBAC security risk while doing a security assessment of your project. Therefore, we would like to report it to you and provide you with the relevant details so that you can fix and improve it accordingly.... | A potential risk in hwameistor that could lead to takeover the cluster | https://api.github.com/repos/hwameistor/hwameistor/issues/1460/comments | 2 | 2024-04-29T07:56:29Z | 2024-07-25T09:06:47Z | https://github.com/hwameistor/hwameistor/issues/1460 | 2,268,367,950 | 1,460 | 6,229 |
CVE-2024-45435 | 2024-08-29T03:15:05.357 | Chartist 1.x through 1.3.0 allows Prototype Pollution via the extend function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://gist.github.com/tariqhawis/c67177164d3b7975210caddb25b60d62"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/chartist-js/chartist/issues/1427"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:chartist:chartist:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "EC330989-A887-440D-9A6A-AFE444D028C7",
"versionEndExcluding": null,
"versionEndIncluding": "1.3.0",
"versionStar... | [
"1321"
] | 1321 | https://github.com/chartist-js/chartist/issues/1427 | [
"Issue Tracking"
] | github.com | [
"chartist-js",
"chartist"
] | ### Would you like to work on a fix?
- [ ] Check this if you would like to implement a PR, we are more than happy to help you go through the process.
### Current and expected behavior
### Overview
A Prototype Pollution vulnerability Affecting chartist , versions >=1.0.0 <=1.3.0, due to missing check if th... | [Bug]: Prototype Pollution Vulnerability Affecting chartist module, versions >=1.0.0 <=1.3.0 | https://api.github.com/repos/chartist-js/chartist/issues/1427/comments | 3 | 2024-03-29T20:52:33Z | 2025-04-07T18:21:10Z | https://github.com/chartist-js/chartist/issues/1427 | 2,215,986,311 | 1,427 | 6,230 |
CVE-2024-8297 | 2024-08-29T13:15:07.370 | A vulnerability was found in kitsada8621 Digital Library Management System 1.0. It has been classified as problematic. Affected is the function JwtRefreshAuth of the file middleware/jwt_refresh_token_middleware.go. The manipulation of the argument Authorization leads to improper output neutralization for logs. It is po... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/kitsada8621/Digital-Library-Management-System/commit/81b3336b4c9240f0bf50c13cb8375cf860d945f1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking",
"Product"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kitsada8621:digital_library_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D1405CD5-ECA2-4027-B5A3-89E60FDF28E4",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"116"
] | 116 | https://github.com/kitsada8621/Digital-Library-Management-System/issues/1 | [
"Issue Tracking",
"Product"
] | github.com | [
"kitsada8621",
"Digital-Library-Management-System"
] | ```
header := ctx.GetHeader("Authorization")
if header == "" {
ctx.JSON(http.StatusUnauthorized, models.ResponseJson{
Success: false,
Message: "authorization is required",
})
ctx.Abort()
return
}
parts := strings.Split(header, " ")
fmt.Println(parts)
```
In line 28 of the mi... | log-injection in middleware/jwt_refresh_token_middleware.go | https://api.github.com/repos/kitsada8621/Digital-Library-Management-System/issues/1/comments | 0 | 2024-08-20T10:34:12Z | 2024-08-20T10:34:12Z | https://github.com/kitsada8621/Digital-Library-Management-System/issues/1 | 2,475,300,907 | 1 | 6,231 |
CVE-2024-8304 | 2024-08-29T15:15:35.070 | A vulnerability has been found in jpress up to 5.1.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/template/edit of the component Template Module Handler. The manipulation leads to path traversal. The attack can be launched remotely. The exploit has been discl... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "MULTIPLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PAR... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/JPressProjects/jpress/issues/189"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.276079"
},
{
"source":... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jpress:jpress:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F631C7C4-C4DB-4188-A24F-5E127F52571A",
"versionEndExcluding": null,
"versionEndIncluding": "5.1.1",
"versionStartExcluding... | [
"22"
] | 22 | https://github.com/JPressProjects/jpress/issues/189 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"JPressProjects",
"jpress"
] | ## Affected version
≤Jpress v5.1.1
## Vendor
https://github.com/JPressProjects/jpress
## vulnerability File
jfinal-5.1.9.jar
## Description
Enter the background at [http://127.0.0.1:8080/admin/login](http://127.0.0.1:8080/admin/login). In System Management → Template → Edit Module, select to ed... | jpress has an arbitrary file read vulnerability | https://api.github.com/repos/JPressProjects/jpress/issues/189/comments | 0 | 2024-08-22T14:51:08Z | 2024-08-22T14:51:08Z | https://github.com/JPressProjects/jpress/issues/189 | 2,480,992,964 | 189 | 6,232 |
CVE-2024-44930 | 2024-08-29T18:15:14.830 | Serilog before v2.1.0 was discovered to contain a Client IP Spoofing vulnerability, which allows attackers to falsify their IP addresses by specifying an arbitrary IP as a value of X-Forwarded-For or Client-Ip headers while performing HTTP requests. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/serilog-contrib/serilog-enrichers-clientinfo/issues/29"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes"
],
"url": "https://github.com/serilog-contrib/serilog-enrichers-clie... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:serilog-contrib:serilog-enrichers-clientinfo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "88E20775-E328-4A4C-AA68-7AC7BF303C43",
"versionEndExcluding": "2.1.0",
"versionEndIncluding": null,
... | [
"79"
] | 79 | https://github.com/serilog-contrib/serilog-enrichers-clientinfo/issues/29 | [
"Issue Tracking"
] | github.com | [
"serilog-contrib",
"serilog-enrichers-clientinfo"
] | Instead of directly reading the X-Forwarded-Header by default, it's much better to use the ForwardedHeaders middleware (https://learn.microsoft.com/en-us/aspnet/core/host-and-deploy/proxy-load-balancer?view=aspnetcore-7.0) and then let that middleware set the HttpContext.Connection.RemoteIpAddress so we only log that i... | ClientIp enricher should have a way to not read X-Forwarded-For | https://api.github.com/repos/serilog-contrib/serilog-enrichers-clientinfo/issues/29/comments | 8 | 2023-10-29T19:52:46Z | 2024-08-29T20:50:35Z | https://github.com/serilog-contrib/serilog-enrichers-clientinfo/issues/29 | 1,967,132,009 | 29 | 6,233 |
CVE-2024-41345 | 2024-08-29T20:15:08.393 | openflights commit 5234b5b is vulnerable to Cross-Site Scripting (XSS) via php/trip.php | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/jpatokal/openflights/issues/1480"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jpatokal:openflights:2024-08-20:*:*:*:*:*:*:*",
"matchCriteriaId": "DDD7A74D-22DA-4AB3-A155-268E6FE10A96",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"79"
] | 79 | https://github.com/jpatokal/openflights/issues/1480 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"jpatokal",
"openflights"
] | Hello,
I would like to report for a XSS vulnerability in openflights.
The path of the vulnerability.
In file https://github.com/jpatokal/openflights/blob/master/php/trip.php
```
$type = $_POST["type"]; // Line 6
$trid = $_POST["trid"] ?? null; // Line 7
if ($type != "NEW" && (!$trid || $trid ... | XSS vulnerability_4 | https://api.github.com/repos/jpatokal/openflights/issues/1480/comments | 0 | 2024-07-09T03:16:34Z | 2024-08-22T11:54:32Z | https://github.com/jpatokal/openflights/issues/1480 | 2,397,005,522 | 1,480 | 6,234 |
CVE-2024-41346 | 2024-08-29T20:15:08.483 | openflights commit 5234b5b is vulnerable to Cross-Site Scripting (XSS) via php/submit.php | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/jpatokal/openflights/issues/1479"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jpatokal:openflights:2024-08-20:*:*:*:*:*:*:*",
"matchCriteriaId": "DDD7A74D-22DA-4AB3-A155-268E6FE10A96",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"79"
] | 79 | https://github.com/jpatokal/openflights/issues/1479 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"jpatokal",
"openflights"
] | Hello,
I would like to report for a XSS vulnerability in openflights.
The path of the vulnerability.
In file https://github.com/jpatokal/openflights/blob/master/php/submit.php
```
$uid = $_SESSION["uid"]; // Line 4
if (!$uid || empty($uid)) { // Line 5
printf(_("Not logged in, aborting"));
... | XSS vulnerability_3 | https://api.github.com/repos/jpatokal/openflights/issues/1479/comments | 0 | 2024-07-09T03:15:53Z | 2024-08-22T11:54:32Z | https://github.com/jpatokal/openflights/issues/1479 | 2,397,004,832 | 1,479 | 6,235 |
CVE-2024-41347 | 2024-08-29T20:15:08.573 | openflights commit 5234b5b is vulnerable to Cross-Site Scripting (XSS) via php/settings.php | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/jpatokal/openflights/issues/1477"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jpatokal:openflights:2024-08-20:*:*:*:*:*:*:*",
"matchCriteriaId": "DDD7A74D-22DA-4AB3-A155-268E6FE10A96",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"79"
] | 79 | https://github.com/jpatokal/openflights/issues/1477 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"jpatokal",
"openflights"
] | Hello,
I would like to report for a xss vulnerability in openflights.
The path of the vulnerability.
In file https://github.com/jpatokal/openflights/blob/master/php/settings.php
```
$type = $_POST["type"]; //Line 6
...
die("0;" . sprintf(_("Unknown action %s"), $type)); //Line 60
```
We see that ... | XSS vulnerability_1 | https://api.github.com/repos/jpatokal/openflights/issues/1477/comments | 3 | 2024-07-09T03:10:14Z | 2024-08-22T11:54:31Z | https://github.com/jpatokal/openflights/issues/1477 | 2,396,998,856 | 1,477 | 6,236 |
CVE-2024-41348 | 2024-08-29T20:15:08.667 | openflights commit 5234b5b is vulnerable to Cross-Site Scripting (XSS) via php/alsearch.php | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/jpatokal/openflights/issues/1478"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jpatokal:openflights:2024-08-20:*:*:*:*:*:*:*",
"matchCriteriaId": "DDD7A74D-22DA-4AB3-A155-268E6FE10A96",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"79"
] | 79 | https://github.com/jpatokal/openflights/issues/1478 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"jpatokal",
"openflights"
] | Hello,
I would like to report for multiple XSS vulnerabilities in openflights.
The path of the vulnerability.
In file https://github.com/jpatokal/openflights/blob/master/php/alsearch.php
A total of three XSS vulnerabilities were found, one of which did not require any permissions and two required normal use... | multiple XSS vulnerabilities_2 | https://api.github.com/repos/jpatokal/openflights/issues/1478/comments | 1 | 2024-07-09T03:14:25Z | 2024-08-22T13:11:49Z | https://github.com/jpatokal/openflights/issues/1478 | 2,397,003,191 | 1,478 | 6,237 |
CVE-2024-41358 | 2024-08-29T20:15:08.873 | phpipam 1.6 is vulnerable to Cross Site Scripting (XSS) via app\admin\import-export\import-load-data.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/phpipam/phpipam/issues/4148"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:phpipam:phpipam:1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "76AB84E7-3B77-4A35-B047-7DE3D2D77950",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/phpipam/phpipam/issues/4148 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"phpipam",
"phpipam"
] | Hello,
I would like to report for multiple XSS vulnerabilities in phpipam-1.6.
The source come from file: app\admin\import-export\import-load-data.php
The sink in: app\admin\import-export\import-devices-preview.php(**Other files include import-load-data.php are also vulnerable**)
# XSS1
```php
# im... | xss_4 | https://api.github.com/repos/phpipam/phpipam/issues/4148/comments | 0 | 2024-07-11T03:23:15Z | 2024-07-15T20:35:45Z | https://github.com/phpipam/phpipam/issues/4148 | 2,402,156,061 | 4,148 | 6,238 |
CVE-2024-41361 | 2024-08-29T20:15:08.953 | RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\manageFilesFolders.php | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2398"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sourcefabric:phoniebox:2.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5D8F3672-D6B8-4655-908F-417A730F8081",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"94"
] | 94 | https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2398 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"MiczFlor",
"RPi-Jukebox-RFID"
] | ### Version
v2.7.0
### Branch
released
### OS
ubuntu 22
### Pi model
unknown
### Hardware
_No response_
### What happened?
Hello,
I would like to report for a RCE vulnerability in RPi-Jukebox-RFID-v2.7(**No permissions required**)
# Analysis
The path of the vulnerability: htdocs\manageFilesFolders.... | 🐛 | RPi-Jukebox-RFID V2.7_RCE_3 | https://api.github.com/repos/MiczFlor/RPi-Jukebox-RFID/issues/2398/comments | 1 | 2024-07-11T17:29:36Z | 2024-07-12T04:51:34Z | https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2398 | 2,403,698,934 | 2,398 | 6,239 |
CVE-2024-41364 | 2024-08-29T20:15:09.033 | RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\trackEdit.php | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2400"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sourcefabric:phoniebox:2.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5D8F3672-D6B8-4655-908F-417A730F8081",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"94"
] | 94 | https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2400 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"MiczFlor",
"RPi-Jukebox-RFID"
] | ### Version
v2.7.0
### Branch
released
### OS
ubuntu 22
### Pi model
unknown
### Hardware
_No response_
### What happened?
Hello,
I would like to report for a RCE vulnerability in RPi-Jukebox-RFID-v2.7(**No permissions required**)
# Analysis
The path of the vulnerability: htdocs\trackEdit.php
``... | 🐛 | RPi-Jukebox-RFID V2.7_RCE_5 | https://api.github.com/repos/MiczFlor/RPi-Jukebox-RFID/issues/2400/comments | 1 | 2024-07-11T17:29:42Z | 2024-07-12T04:57:33Z | https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2400 | 2,403,699,086 | 2,400 | 6,240 |
CVE-2024-41366 | 2024-08-29T20:15:09.113 | RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\userScripts.php | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2399"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sourcefabric:phoniebox:2.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5D8F3672-D6B8-4655-908F-417A730F8081",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"94"
] | 94 | https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2399 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"MiczFlor",
"RPi-Jukebox-RFID"
] | ### Version
v2.7.0
### Branch
released
### OS
ubuntu 22
### Pi model
unknown
### Hardware
_No response_
### What happened?
Hello,
I would like to report for a RCE vulnerability in RPi-Jukebox-RFID-v2.7(**No permissions required**)
# Analysis
The path of the vulnerability: htdocs\userScripts.php
... | 🐛 | RPi-Jukebox-RFID V2.7_RCE_4 | https://api.github.com/repos/MiczFlor/RPi-Jukebox-RFID/issues/2399/comments | 1 | 2024-07-11T17:29:39Z | 2024-07-12T04:54:46Z | https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2399 | 2,403,699,035 | 2,399 | 6,241 |
CVE-2024-41367 | 2024-08-29T20:15:09.193 | RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\api\playlist\appendFileToPlaylist.php | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2397"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sourcefabric:phoniebox:2.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5D8F3672-D6B8-4655-908F-417A730F8081",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"94"
] | 94 | https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2397 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"MiczFlor",
"RPi-Jukebox-RFID"
] | ### Version
v2.7.0
### Branch
released
### OS
ubuntu 22
### Pi model
unknown
### Hardware
_No response_
### What happened?
Hello,
I would like to report for a RCE vulnerability in RPi-Jukebox-RFID-v2.7(**No permissions required**)
# Analysis
The path of the vulnerability: htdocs\api\playlist\append... | 🐛 | RPi-Jukebox-RFID V2.7_RCE_2 | https://api.github.com/repos/MiczFlor/RPi-Jukebox-RFID/issues/2397/comments | 1 | 2024-07-11T17:29:34Z | 2024-07-12T04:47:33Z | https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2397 | 2,403,698,874 | 2,397 | 6,242 |
CVE-2024-41368 | 2024-08-29T20:15:09.277 | RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\inc.setWlanIpMail.php | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2396"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sourcefabric:phoniebox:2.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5D8F3672-D6B8-4655-908F-417A730F8081",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"94"
] | 94 | https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2396 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"MiczFlor",
"RPi-Jukebox-RFID"
] | ### Version
v2.7.0
### Branch
released
### OS
ubuntu 22
### Pi model
unknown
### Hardware
_No response_
### What happened?
Hello,
I would like to report for a RCE vulnerability in RPi-Jukebox-RFID-v2.7(**No permissions required**)
# Analysis
The path of the vulnerability: htdocs\inc.setWlanIpMail.p... | 🐛 | RPi-Jukebox-RFID V2.7_RCE_1 | https://api.github.com/repos/MiczFlor/RPi-Jukebox-RFID/issues/2396/comments | 3 | 2024-07-11T17:29:32Z | 2024-07-13T09:15:46Z | https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2396 | 2,403,698,799 | 2,396 | 6,243 |
CVE-2024-41369 | 2024-08-29T20:15:09.350 | RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\inc.setWifi.php | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2401"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sourcefabric:phoniebox:2.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5D8F3672-D6B8-4655-908F-417A730F8081",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"94"
] | 94 | https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2401 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"MiczFlor",
"RPi-Jukebox-RFID"
] | ### Version
v2.7.0
### Branch
released
### OS
ubuntu 22
### Pi model
unknown
### Hardware
_No response_
### What happened?
Hello,
I would like to report for a RCE vulnerability in RPi-Jukebox-RFID-v2.7(**No permissions required**)
# Analysis
The path of the vulnerability: htdocs\inc.setWifi.php
... | 🐛 | RPi-Jukebox-RFID V2.7_RCE_6 | https://api.github.com/repos/MiczFlor/RPi-Jukebox-RFID/issues/2401/comments | 0 | 2024-07-12T06:08:17Z | 2024-07-12T06:08:32Z | https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2401 | 2,404,828,568 | 2,401 | 6,244 |
CVE-2024-41370 | 2024-08-29T20:15:09.433 | Organizr v1.90 was discovered to contain a SQL injection vulnerability via chat/setlike.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/causefx/Organizr"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/causefx/Organizr/issues/1998"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:organizr:organizr:1.90:*:*:*:*:*:*:*",
"matchCriteriaId": "4B3D3C6A-EA37-41D2-8289-A9EAFCF3CA7F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"89"
] | 89 | https://github.com/causefx/Organizr/issues/1998 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"causefx",
"Organizr"
] | Hello,
I would like to report for a Sqli vulnerability in Organizr-v1.9, This vulnerability can lead to RCE.
# Analysis
The path of the vulnerability: chat/setlike.php
```php
$messageid = $_POST["messageid"]; // Line 3(Source)
...
$db->exec("UPDATE chatpack_log SET liked='0' WHERE id='$messageid'"); // ... | SQLI(RCE)_1 in Organizr-v1.9 | https://api.github.com/repos/causefx/Organizr/issues/1998/comments | 1 | 2024-07-12T14:27:54Z | 2024-07-12T16:08:52Z | https://github.com/causefx/Organizr/issues/1998 | 2,405,740,963 | 1,998 | 6,245 |
CVE-2024-41371 | 2024-08-29T20:15:09.493 | Organizr v1.90 is vulnerable to Cross Site Scripting (XSS) via api.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/causefx/Organizr"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/causefx/Organizr/issues/1997"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:organizr:organizr:1.90:*:*:*:*:*:*:*",
"matchCriteriaId": "4B3D3C6A-EA37-41D2-8289-A9EAFCF3CA7F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"79"
] | 79 | https://github.com/causefx/Organizr/issues/1997 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"causefx",
"Organizr"
] | Hello,
I would like to report for a xss vulnerability in Organizr-v1.9 (**No permissions required**)
# Analysis
The path of the vulnerability: api.php
```php
if (isset($_GET['a'])) { $action = $_GET['a']; } // Line 9(Source)
if (isset($_GET['k'])) { $key = $_GET['k']; } // Line 10
...
if (!isset($ke... | xxs in Organizr-v1.9 | https://api.github.com/repos/causefx/Organizr/issues/1997/comments | 1 | 2024-07-12T14:27:53Z | 2024-07-12T16:08:42Z | https://github.com/causefx/Organizr/issues/1997 | 2,405,740,841 | 1,997 | 6,246 |
CVE-2024-41372 | 2024-08-29T20:15:09.553 | Organizr v1.90 was discovered to contain a SQL injection vulnerability via chat/settyping.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/causefx/Organizr"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/causefx/Organizr/issues/1999"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:organizr:organizr:1.90:*:*:*:*:*:*:*",
"matchCriteriaId": "4B3D3C6A-EA37-41D2-8289-A9EAFCF3CA7F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"89"
] | 89 | https://github.com/causefx/Organizr/issues/1999 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"causefx",
"Organizr"
] | Hello,
I would like to report for a Sqli vulnerability in Organizr-v1.9, This vulnerability can lead to RCE.
# Analysis
The path of the vulnerability: chat/settyping.php
```php
$data = $_POST["datavars"]; // Line 3(Source)
$dataarray = explode("###", $data);
$user = $dataarray[0];
$settyping = $dataa... | SQLI(RCE)_2 in Organizr-v1.9 | https://api.github.com/repos/causefx/Organizr/issues/1999/comments | 3 | 2024-07-12T14:27:57Z | 2024-07-12T16:09:04Z | https://github.com/causefx/Organizr/issues/1999 | 2,405,741,088 | 1,999 | 6,247 |
CVE-2024-41349 | 2024-08-29T21:15:10.433 | unmark 1.9.2 is vulnerable to Cross Site Scripting (XSS) via application/views/marks/add_by_url.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/cdevroe/unmark/issues/290"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cdevroe:unmark:1.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "04DDDEEB-EC3D-4E0A-9DD9-C0B078E5B5C5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"79"
] | 79 | https://github.com/cdevroe/unmark/issues/290 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"cdevroe",
"unmark"
] | Hello,
I would like to report for a xss vulnerability in unmark-1.9.2.
The path of the vulnerability.
In file application/views/marks/add_by_url.php
```php
if ( $_POST ) : // Line 3
$url = $_POST['url']; // Line 7
echo '<p><strong>URL:</strong>' . $url . '</p>'; // Line 8
```
... | XSS vulnerability | https://api.github.com/repos/cdevroe/unmark/issues/290/comments | 0 | 2024-07-09T12:10:19Z | 2024-07-09T12:10:19Z | https://github.com/cdevroe/unmark/issues/290 | 2,398,031,234 | 290 | 6,248 |
CVE-2024-45490 | 2024-08-30T03:15:03.757 | An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/libexpat/libexpat/issues/887"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/libexpat/libexpat/pull/890"
},
{
"source": "af854a3a-2127-422b-9... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FDDF6E7A-AF1C-4370-B0B0-29A35C454FFB",
"versionEndExcluding": "2.6.3",
"versionEndIncluding": null,
"versionSt... | [
"611"
] | 611 | https://github.com/libexpat/libexpat/issues/887 | [
"Issue Tracking"
] | github.com | [
"libexpat",
"libexpat"
] | `xmlparse.c` does not reject a negative length for `XML_ParseBuffer()`, which may cause memory corruption or code execution. | CVE-2024-45490 | https://api.github.com/repos/libexpat/libexpat/issues/887/comments | 3 | 2024-08-26T03:42:05Z | 2024-09-05T01:22:57Z | https://github.com/libexpat/libexpat/issues/887 | 2,485,799,902 | 887 | 6,249 |
CVE-2024-45491 | 2024-08-30T03:15:03.850 | An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/libexpat/libexpat/issues/888"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/libexpat/libexpat/pull/891"
},
{
"source": "af854a3a-2127-422b-9... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FDDF6E7A-AF1C-4370-B0B0-29A35C454FFB",
"versionEndExcluding": "2.6.3",
"versionEndIncluding": null,
"versionSt... | [
"190"
] | 190 | https://github.com/libexpat/libexpat/issues/888 | [
"Issue Tracking"
] | github.com | [
"libexpat",
"libexpat"
] | `xmlparse.c` has an integer overflow for `nDefaultAtts` on 32-bit platforms, which may cause denial of service or code execution. | CVE-2024-45491 | https://api.github.com/repos/libexpat/libexpat/issues/888/comments | 1 | 2024-08-26T03:42:28Z | 2024-09-05T01:23:40Z | https://github.com/libexpat/libexpat/issues/888 | 2,485,800,340 | 888 | 6,250 |
CVE-2024-45492 | 2024-08-30T03:15:03.930 | An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/libexpat/libexpat/issues/889"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/libexpat/libexpat/pull/892"
},
{
"source": "af854a3a-2127-422b-9... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FDDF6E7A-AF1C-4370-B0B0-29A35C454FFB",
"versionEndExcluding": "2.6.3",
"versionEndIncluding": null,
"versionSt... | [
"190"
] | 190 | https://github.com/libexpat/libexpat/issues/889 | [
"Issue Tracking"
] | github.com | [
"libexpat",
"libexpat"
] | `xmlparse.c` has an integer overflow for `m_groupSize` on 32-bit platforms, which may cause denial of service or code execution. | CVE-2024-45492 | https://api.github.com/repos/libexpat/libexpat/issues/889/comments | 1 | 2024-08-26T03:42:49Z | 2024-09-05T01:23:58Z | https://github.com/libexpat/libexpat/issues/889 | 2,485,800,734 | 889 | 6,251 |
CVE-2024-8332 | 2024-08-30T12:15:04.657 | A vulnerability was found in master-nan Sweet-CMS up to 5f441e022b8876f07cde709c77b5be6d2f262e3f. It has been declared as critical. This vulnerability affects unknown code of the file /table/index. The manipulation leads to sql injection. The attack can be initiated remotely. This product is using a rolling release to ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/master-nan/sweet-cms/commit/146359646a5a90cb09156dbd0013b7df77f2aa6c"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/master-nan/swee... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:master-nan:sweet-cms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BFB82646-0A21-4490-A9EB-0264F9692648",
"versionEndExcluding": "2024-08-28",
"versionEndIncluding": null,
"versionSt... | [
"89"
] | 89 | https://github.com/master-nan/sweet-cms/issues/1 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"master-nan",
"sweet-cms"
] | In line 63 of the repository/impl/ sys_table_imp.go file, you use fmt.Sprintf to build SQL statements directly, including user-supplied values (via the parameters indexName, tableName, and fields). If an attacker is able to control any of these parameters, they could inject malicious SQL code into them to manipulate da... | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in /table/index | https://api.github.com/repos/master-nan/sweet-cms/issues/1/comments | 1 | 2024-08-27T16:59:13Z | 2024-08-28T06:42:48Z | https://github.com/master-nan/sweet-cms/issues/1 | 2,489,915,764 | 1 | 6,252 |
CVE-2024-8332 | 2024-08-30T12:15:04.657 | A vulnerability was found in master-nan Sweet-CMS up to 5f441e022b8876f07cde709c77b5be6d2f262e3f. It has been declared as critical. This vulnerability affects unknown code of the file /table/index. The manipulation leads to sql injection. The attack can be initiated remotely. This product is using a rolling release to ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/master-nan/sweet-cms/commit/146359646a5a90cb09156dbd0013b7df77f2aa6c"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/master-nan/swee... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:master-nan:sweet-cms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BFB82646-0A21-4490-A9EB-0264F9692648",
"versionEndExcluding": "2024-08-28",
"versionEndIncluding": null,
"versionSt... | [
"89"
] | 89 | https://github.com/master-nan/sweet-cms/issues/2 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"master-nan",
"sweet-cms"
] |
Vulnerability Description: The query relies on user-supplied values. In this case, the problem is with the dynamically constructed dropIndexSQL statement. Using user-supplied 'indexName' and 'tableName' to insert directly into SQL statements without proper validation and/or escape can lead an attacker to insert malic... | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in /table/index/:id | https://api.github.com/repos/master-nan/sweet-cms/issues/2/comments | 1 | 2024-08-27T17:02:33Z | 2024-08-28T06:43:05Z | https://github.com/master-nan/sweet-cms/issues/2 | 2,489,921,868 | 2 | 6,253 |
CVE-2024-8334 | 2024-08-30T13:15:12.587 | A vulnerability was found in master-nan Sweet-CMS up to 5f441e022b8876f07cde709c77b5be6d2f262e3f. It has been rated as problematic. This issue affects the function LogHandler of the file middleware/log.go. The manipulation leads to improper output neutralization for logs. The attack may be initiated remotely. This prod... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/master-nan/sweet-cms/commit/2024c370e6c78b07b358c9d4257fa5d1be732c38"
},
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/master-nan/sweet-cms/issues/3"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:master-nan:sweet-cms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6D137526-44BB-408B-9776-E98590D6EFD6",
"versionEndExcluding": null,
"versionEndIncluding": "2024-08-27",
"versionSt... | [
"117"
] | 117 | https://github.com/master-nan/sweet-cms/issues/3 | [
"Issue Tracking"
] | github.com | [
"master-nan",
"sweet-cms"
] |
Cause of vulnerability: In lines 58-62 of the file 'middleware/log.go', the log entry relies on a user-supplied value (' c.reequest '). If the values provided by the user contain special characters or malicious code, these values may be logged directly into the log, resulting in log injection attacks. Attackers may m... | Improper Output Neutralization for Logs in middleware/log.go | https://api.github.com/repos/master-nan/sweet-cms/issues/3/comments | 1 | 2024-08-27T17:03:15Z | 2024-08-28T06:43:51Z | https://github.com/master-nan/sweet-cms/issues/3 | 2,489,923,237 | 3 | 6,254 |
CVE-2024-8334 | 2024-08-30T13:15:12.587 | A vulnerability was found in master-nan Sweet-CMS up to 5f441e022b8876f07cde709c77b5be6d2f262e3f. It has been rated as problematic. This issue affects the function LogHandler of the file middleware/log.go. The manipulation leads to improper output neutralization for logs. The attack may be initiated remotely. This prod... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/master-nan/sweet-cms/commit/2024c370e6c78b07b358c9d4257fa5d1be732c38"
},
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/master-nan/sweet-cms/issues/3"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:master-nan:sweet-cms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6D137526-44BB-408B-9776-E98590D6EFD6",
"versionEndExcluding": null,
"versionEndIncluding": "2024-08-27",
"versionSt... | [
"117"
] | 117 | https://github.com/master-nan/sweet-cms/issues/3#issuecomment-2314447003 | [
"Issue Tracking"
] | github.com | [
"master-nan",
"sweet-cms"
] |
Cause of vulnerability: In lines 58-62 of the file 'middleware/log.go', the log entry relies on a user-supplied value (' c.reequest '). If the values provided by the user contain special characters or malicious code, these values may be logged directly into the log, resulting in log injection attacks. Attackers may m... | Improper Output Neutralization for Logs in middleware/log.go | https://api.github.com/repos/master-nan/sweet-cms/issues/3/comments | 1 | 2024-08-27T17:03:15Z | 2024-08-28T06:43:51Z | https://github.com/master-nan/sweet-cms/issues/3 | 2,489,923,237 | 3 | 6,255 |
CVE-2024-8368 | 2024-09-01T05:15:12.187 | A vulnerability was found in code-projects Hospital Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file index.php of the component Login. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/qingluan-bot/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permission... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fabianros:hospital_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7FD44159-7FA3-4BA5-AD83-C1D439EEF374",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/qingluan-bot/cve/issues/1 | [
"Exploit"
] | github.com | [
"qingluan-bot",
"cve"
] | # code-projects Hospital Management System Using PHP With Source Code v1.0 /hms/doctor/index.php SQL injection
# usernameOF AFFECTED PRODUCT(S)
+ Hospital Management System Using PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/hospital-management-system-using-php-source-code/
# AFFECTED AND/OR ... | code-projects Hospital Management System Using PHP With Source Code v1.0 /hms/doctor/index.php SQL injection | https://api.github.com/repos/qingluan-bot/cve/issues/1/comments | 0 | 2024-08-31T12:07:46Z | 2024-08-31T12:07:46Z | https://github.com/qingluan-bot/cve/issues/1 | 2,498,814,105 | 1 | 6,256 |
CVE-2024-45508 | 2024-09-01T22:15:13.987 | HTMLDOC before 1.9.19 has an out-of-bounds write in parse_paragraph in ps-pdf.cxx because of an attempt to strip leading whitespace from a whitespace-only node. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Release Notes"
],
"url": "https://github.com/michaelrsweet/htmldoc/blob/2d5b2ab9ddbf2aee2209010cebc11efdd1cab6e2/CHANGES.md"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/michaelrsweet/htmldoc/c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*",
"matchCriteriaId": "41C36E7A-1413-44D0-B604-E7BD5C6CD652",
"versionEndExcluding": "1.9.19",
"versionEndIncluding": null,
"versionSta... | [
"787"
] | 787 | https://github.com/michaelrsweet/htmldoc/issues/528 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"michaelrsweet",
"htmldoc"
] | Hello, I found an out of bounds memory write in parse_paragraph function,ps-pdf.cxx
Reporter:
WhereisDoujo from Ocean University of China
test platform:
htmldoc Version :current
OS :Kali 6.6.9-1kali1 (2024-01-08)
kernel: 6.6.9-amd64
reproduced:
(htmldoc with asan build option)
./htmldoc -f 1.pdf ./poc.... | AddressSanitizer: out of bounds memory write in parse_paragraph functionin,htmldoc/htmldoc/ps-pdf.cxx:5208 | https://api.github.com/repos/michaelrsweet/htmldoc/issues/528/comments | 1 | 2024-08-28T14:45:26Z | 2024-08-28T18:23:16Z | https://github.com/michaelrsweet/htmldoc/issues/528 | 2,492,313,862 | 528 | 6,257 |
CVE-2024-6232 | 2024-09-03T13:15:05.363 | There is a MEDIUM severity vulnerability affecting CPython.
Regular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cna@python.org",
"tags": [
"Patch"
],
"url": "https://github.com/python/cpython/commit/34ddb64d088dd7ccc321f6103d23153256caa5d4"
},
{
"source": "cna@python.org",
"tags": [
"Patch"
],
"url": "https://github.com/python/cpython/commit/4eaf4891c12589e3c7bdad5... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B475FA53-D1F3-44C8-80CD-0CEA88129109",
"versionEndExcluding": "3.8.20",
"versionEndIncluding": null,
"versionStartExcludin... | [
"1333"
] | 1333 | https://github.com/python/cpython/issues/121285 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"python",
"cpython"
] | ### Bug description:
Today the `tarfile` module parsing of header values allows for backtracking when parsing header values. Headers have a well-known format that doesn't require backtracking to parse reliably, the new method of parsing will only require a single pass over a byte stream.
### CPython versions tested o... | Remove backtracking from parsing tarfile members and headers | https://api.github.com/repos/python/cpython/issues/121285/comments | 5 | 2024-07-02T18:31:41Z | 2024-09-18T22:22:37Z | https://github.com/python/cpython/issues/121285 | 2,386,893,180 | 121,285 | 6,258 |
CVE-2024-8407 | 2024-09-04T14:15:15.113 | A vulnerability was found in alwindoss akademy up to 35caccea888ed63d5489e211c99edff1f62efdba. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file cmd/akademy/handler/handlers.go. The manipulation of the argument emailAddress leads to cross site scripting. The att... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/alwindoss/akademy/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Permissions Required",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:alwindoss:akademy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "917BD204-5A35-4973-8C7D-0751F5CE5C59",
"versionEndExcluding": null,
"versionEndIncluding": "2024-08-24",
"versionStart... | [
"79"
] | 79 | https://github.com/alwindoss/akademy/issues/1 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"alwindoss",
"akademy"
] | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cmd/akademy/handler/handlers.go
Flaw reason: in the CMD file/akademy/handler/handlers. Go line 40, output code directly provided by the user email address (obtained from the form values), without any form of filtering or escaped.... | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cmd/akademy/handler/handlers.go | https://api.github.com/repos/alwindoss/akademy/issues/1/comments | 0 | 2024-08-24T08:41:55Z | 2024-08-24T08:41:55Z | https://github.com/alwindoss/akademy/issues/1 | 2,484,369,124 | 1 | 6,259 |
CVE-2024-8418 | 2024-09-04T15:15:15.773 | A flaw was found in Aardvark-dns, which is vulnerable to a Denial of Service attack due to the serial processing of TCP DNS queries. An attacker can exploit this flaw by keeping a TCP connection open indefinitely, causing the server to become unresponsive and resulting in other DNS queries timing out. This issue preven... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2024-8418"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309683"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:containers:aardvark-dns:1.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "500D2E84-A5C1-452D-92B3-5F72EA9A3B65",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"400"
] | 400 | https://github.com/containers/aardvark-dns/issues/500 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"containers",
"aardvark-dns"
] | ### Issue Description
The issue I have is that my podman containers stops resolving internal & external DNS after some time ~1h.
If I restart whole podman or reboot system I can resolve all of the dns records and ping between containers or external network.
After ~1h I can no longer resolve dns, or ping between co... | DNS Stops working after some time in bridge network | https://api.github.com/repos/containers/aardvark-dns/issues/500/comments | 12 | 2024-08-28T07:51:59Z | 2024-09-02T13:43:32Z | https://github.com/containers/aardvark-dns/issues/500 | 2,491,661,448 | 500 | 6,260 |
CVE-2024-8391 | 2024-09-04T16:15:09.253 | In Eclipse Vert.x version 4.3.0 to 4.5.9, the gRPC server does not limit the maximum length of message payload (Maven GAV: io.vertx:vertx-grpc-server and io.vertx:vertx-grpc-client).
This is fixed in the 4.5.10 version.
Note this does not affect the Vert.x gRPC server based grpc-java and Netty libraries (Mave... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "emo@eclipse.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/eclipse-vertx/vertx-grpc/issues/113"
},
{
"source": "emo@eclipse.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://gitlab.eclipse.org/security/cve-assign... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eclipse:vert.x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A26F841-8F44-472F-B3CA-561D561DF1F4",
"versionEndExcluding": "4.5.10",
"versionEndIncluding": null,
"versionStartExcludi... | [
"770"
] | 770 | https://github.com/eclipse-vertx/vertx-grpc/issues/113 | [
"Issue Tracking"
] | github.com | [
"eclipse-vertx",
"vertx-grpc"
] | Motivation:
The gRPC message decoder uses the default limit allowed by the gRPC HTTP/2 transport (2^32 bytes). The default maximum size should be smaller and configurable. This can be used to consume memory of a server or a client and is referenced as [CVE-2024-8391](https://www.cve.org/CVERecord?id=CVE-2024-839... | Set a configurable maximum payload size for the message decoder and add an invalid message handler to catch invalid messages | https://api.github.com/repos/eclipse-vertx/vertx-grpc/issues/113/comments | 3 | 2024-09-04T14:38:04Z | 2024-12-01T18:20:31Z | https://github.com/eclipse-vertx/vertx-grpc/issues/113 | 2,505,559,540 | 113 | 6,261 |
CVE-2024-8412 | 2024-09-04T16:15:09.393 | A vulnerability, which was classified as problematic, was found in LinuxOSsk Shakal-NG up to 1.3.3. Affected is an unknown function of the file comments/views.py. The manipulation of the argument next leads to open redirect. It is possible to launch the attack remotely. The name of the patch is ebd1c2cba59cbac198bf2fd5... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/LinuxOSsk/Shakal-NG/commit/ebd1c2cba59cbac198bf2fd5a10565994d4f02cb"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/LinuxOSsk/Shakal... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:linuxos:shakal-ng:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F6248D95-9207-49D3-BD21-0A8003C1F0BF",
"versionEndExcluding": null,
"versionEndIncluding": "1.3.3",
"versionStartExclu... | [
"601"
] | 601 | https://github.com/LinuxOSsk/Shakal-NG/issues/202 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"LinuxOSsk",
"Shakal-NG"
] | The code uses the user-controlled next variable to redirect. If next is not verified, an attacker could induce users to redirect to a malicious website.
First:
```
Snippets of code comments/urls.pypy (line 10) :
path('odpovedat/<int:parent>/', views.Reply.as_view(), name='reply'),
Snippet of code comments/vi... | CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in comments/views.py | https://api.github.com/repos/LinuxOSsk/Shakal-NG/issues/202/comments | 1 | 2024-08-31T12:56:24Z | 2024-09-02T18:32:09Z | https://github.com/LinuxOSsk/Shakal-NG/issues/202 | 2,498,833,346 | 202 | 6,262 |
CVE-2024-8412 | 2024-09-04T16:15:09.393 | A vulnerability, which was classified as problematic, was found in LinuxOSsk Shakal-NG up to 1.3.3. Affected is an unknown function of the file comments/views.py. The manipulation of the argument next leads to open redirect. It is possible to launch the attack remotely. The name of the patch is ebd1c2cba59cbac198bf2fd5... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/LinuxOSsk/Shakal-NG/commit/ebd1c2cba59cbac198bf2fd5a10565994d4f02cb"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/LinuxOSsk/Shakal... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:linuxos:shakal-ng:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F6248D95-9207-49D3-BD21-0A8003C1F0BF",
"versionEndExcluding": null,
"versionEndIncluding": "1.3.3",
"versionStartExclu... | [
"601"
] | 601 | https://github.com/LinuxOSsk/Shakal-NG/issues/202#issuecomment-2325187434 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"LinuxOSsk",
"Shakal-NG"
] | The code uses the user-controlled next variable to redirect. If next is not verified, an attacker could induce users to redirect to a malicious website.
First:
```
Snippets of code comments/urls.pypy (line 10) :
path('odpovedat/<int:parent>/', views.Reply.as_view(), name='reply'),
Snippet of code comments/vi... | CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in comments/views.py | https://api.github.com/repos/LinuxOSsk/Shakal-NG/issues/202/comments | 1 | 2024-08-31T12:56:24Z | 2024-09-02T18:32:09Z | https://github.com/LinuxOSsk/Shakal-NG/issues/202 | 2,498,833,346 | 202 | 6,263 |
CVE-2024-8567 | 2024-09-08T02:15:10.643 | A vulnerability, which was classified as critical, has been found in itsourcecode Payroll Management System 1.0. This issue affects some unknown processing of the file /ajax.php?action=delete_deductions. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has be... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/ha/issues/8"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://itsourcecode.com/"
},
{
"source": "... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:payroll_management_system_project:payroll_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BFB980ED-C02B-49D9-845F-8953C6709DB1",
"versionEndExcluding": null,
"versionEndIncludi... | [
"89"
] | 89 | https://github.com/ppp-src/ha/issues/8 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"ha"
] | # Itsourcecode "Payroll Management System " in PHP 1.0 "ajax.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Payroll Management System
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-food-ordering-system-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ xxxx
## Vul... | Itsourcecode "Payroll Management System " in PHP 1.0 "ajax.php" SQL injection | https://api.github.com/repos/ppp-src/ha/issues/8/comments | 0 | 2024-09-07T01:57:19Z | 2024-09-07T01:57:19Z | https://github.com/ppp-src/ha/issues/8 | 2,511,380,300 | 8 | 6,264 |
CVE-2024-8569 | 2024-09-08T05:15:10.763 | A vulnerability has been found in code-projects Hospital Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file user-login.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been di... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/teachersongsec/cve/issues/1"
},
{
"s... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fabianros:hospital_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7FD44159-7FA3-4BA5-AD83-C1D439EEF374",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/teachersongsec/cve/issues/1 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"teachersongsec",
"cve"
] | # code-projects Hospital Management System Using PHP With Source Code v1.0 user-login.php SQL injection
# usernameOF AFFECTED PRODUCT(S)
+ Hospital Management System Using PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/hospital-management-system-using-php-source-code/
# AFFECTED AND/OR FIXED V... | code-projects Hospital Management System Using PHP With Source Code v1.0 user-login.php SQL injection | https://api.github.com/repos/teachersongsec/cve/issues/1/comments | 0 | 2024-09-05T08:48:18Z | 2024-09-05T08:48:19Z | https://github.com/teachersongsec/cve/issues/1 | 2,507,171,933 | 1 | 6,265 |
CVE-2024-8570 | 2024-09-08T07:15:01.977 | A vulnerability was found in itsourcecode Tailoring Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /inccatadd.php. The manipulation of the argument title leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/teachersongsec/cve/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://itsourcecode.com/"
},
{
"so... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/teachersongsec/cve/issues/2 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"teachersongsec",
"cve"
] | # Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 inccatadd.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-w... | Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 inccatadd.php SQL injection | https://api.github.com/repos/teachersongsec/cve/issues/2/comments | 0 | 2024-09-05T08:50:05Z | 2024-09-05T08:50:06Z | https://github.com/teachersongsec/cve/issues/2 | 2,507,176,177 | 2 | 6,266 |
CVE-2024-8571 | 2024-09-08T08:15:13.157 | A vulnerability was found in erjemin roll_cms up to 1484fe2c4e0805946a7bcf46218509fcb34883a9. It has been classified as problematic. This affects an unknown part of the file roll_cms/roll_cms/views.py. The manipulation leads to information exposure through error message. This product takes the approach of rolling relea... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 2.7,
"confidentialityImpact": "PA... | [
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/erjemin/roll_cms/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.276801"
},
{
"source": "cna@vuldb.com",
"t... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:erjemin:roll_cms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6760B301-68D3-4FBD-B0BA-D46392FBDDB3",
"versionEndExcluding": "2024-08-31",
"versionEndIncluding": null,
"versionStartE... | [
"209"
] | 209 | https://github.com/erjemin/roll_cms/issues/1 | [
"Issue Tracking"
] | github.com | [
"erjemin",
"roll_cms"
] | Generation of Error Message Containing Sensitive Information in roll_cms/roll_cms/views.py
```
Snippets of code roll_cms/roll_cms/views.py (lines 360 to 360) :
except TemplateDoesNotExist as e:
Snippet of code roll_cms/roll_cms/views.py (lines 362 through 362) :
Return an HttpResponse (f "О Ш И Б К А RollCSM... | Generation of Error Message Containing Sensitive Information in roll_cms/roll_cms/views.py | https://api.github.com/repos/erjemin/roll_cms/issues/1/comments | 0 | 2024-08-31T13:41:06Z | 2024-08-31T13:41:06Z | https://github.com/erjemin/roll_cms/issues/1 | 2,498,851,543 | 1 | 6,267 |
CVE-2024-8572 | 2024-09-08T08:15:13.443 | A vulnerability was found in Gouniverse GoLang CMS 1.4.0. It has been declared as problematic. This vulnerability affects the function PageRenderHtmlByAlias of the file FrontendHandler.go. The manipulation of the argument alias leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/gouniverse/cms/commit/3e661cdfb4beeb9fe2ad507cdb8104c0b17d072c"
},
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/gouniverse/cms/issues/5"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gouniverse:golang_cms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C9A55696-4C86-4339-A3D2-59DF1590653A",
"versionEndExcluding": "1.4.1",
"versionEndIncluding": null,
"versionStartE... | [
"79"
] | 79 | https://github.com/gouniverse/cms/issues/5 | [
"Issue Tracking"
] | github.com | [
"gouniverse",
"cms"
] |
Cause of vulnerability: A potential Cross-site scripting (XSS) vulnerability exists on line 19 of the FrontendHandler.go file in the code. The vulnerability is caused by user-supplied values being inserted directly into the generated HTML page without proper processing or escaping. Specifically, the 'PageRenderHtmlBy... | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in FrontendHandler.go | https://api.github.com/repos/gouniverse/cms/issues/5/comments | 1 | 2024-09-03T15:08:24Z | 2024-09-05T07:52:18Z | https://github.com/gouniverse/cms/issues/5 | 2,503,131,319 | 5 | 6,268 |
CVE-2024-8572 | 2024-09-08T08:15:13.443 | A vulnerability was found in Gouniverse GoLang CMS 1.4.0. It has been declared as problematic. This vulnerability affects the function PageRenderHtmlByAlias of the file FrontendHandler.go. The manipulation of the argument alias leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/gouniverse/cms/commit/3e661cdfb4beeb9fe2ad507cdb8104c0b17d072c"
},
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/gouniverse/cms/issues/5"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gouniverse:golang_cms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C9A55696-4C86-4339-A3D2-59DF1590653A",
"versionEndExcluding": "1.4.1",
"versionEndIncluding": null,
"versionStartE... | [
"79"
] | 79 | https://github.com/gouniverse/cms/issues/5#issuecomment-2330848731 | [
"Issue Tracking"
] | github.com | [
"gouniverse",
"cms"
] |
Cause of vulnerability: A potential Cross-site scripting (XSS) vulnerability exists on line 19 of the FrontendHandler.go file in the code. The vulnerability is caused by user-supplied values being inserted directly into the generated HTML page without proper processing or escaping. Specifically, the 'PageRenderHtmlBy... | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in FrontendHandler.go | https://api.github.com/repos/gouniverse/cms/issues/5/comments | 1 | 2024-09-03T15:08:24Z | 2024-09-05T07:52:18Z | https://github.com/gouniverse/cms/issues/5 | 2,503,131,319 | 5 | 6,269 |
CVE-2024-8611 | 2024-09-09T21:15:13.377 | A vulnerability classified as critical was found in itsourcecode Tailoring Management System 1.0. Affected by this vulnerability is an unknown functionality of the file ssms.php. The manipulation of the argument customer leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/elegant228/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://itsourcecode.com/"
},
{
"source": "cna@vuldb.com",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/elegant228/cve/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"elegant228",
"cve"
] | # Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 ssms.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-with-s... | Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 ssms.php SQL injection | https://api.github.com/repos/elegant228/cve/issues/1/comments | 0 | 2024-09-09T11:55:12Z | 2024-09-09T11:55:12Z | https://github.com/elegant228/cve/issues/1 | 2,513,753,664 | 1 | 6,270 |
CVE-2024-8762 | 2024-09-13T01:15:02.320 | A vulnerability was found in code-projects Crud Operation System 1.0. It has been classified as critical. This affects an unknown part of the file /updatedata.php. The manipulation of the argument sid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public an... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Kangsiyuan/1/issues/1"
},
{
"source": "cna@vuldb.com",
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:code-projects:crud_operation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D15BB350-68BE-4E74-B9CE-BC9120B6F230",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/Kangsiyuan/1/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Kangsiyuan",
"1"
] | # code-projects.org"Crud Operation System" in PHP 1.0 "updatedata.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code
## Vendor Homepage
+ https://code-projects.org/crud-operation-system-in-php-with-source-code/
# A... | code-projects.org"Crud Operation System" in PHP 1.0 "updatedata.php" SQL injection | https://api.github.com/repos/Kangsiyuan/1/issues/1/comments | 0 | 2024-09-11T03:56:30Z | 2024-09-11T03:56:30Z | https://github.com/Kangsiyuan/1/issues/1 | 2,518,398,732 | 1 | 6,271 |
CVE-2024-8866 | 2024-09-15T02:15:01.900 | A vulnerability was found in AutoCMS 5.4. It has been classified as problematic. This affects an unknown part of the file /admin/robot.php. The manipulation of the argument sidebar leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/68"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.277503"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autocms_project:autocms:5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "07746BD9-33B7-43BD-A742-EA1878F842D4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"79"
] | 79 | https://github.com/Hebing123/cve/issues/68 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hebing123",
"cve"
] | # Summary
AutoCMS v5.4 is affected by a Cross-Site Scripting (XSS) vulnerability and a PHP Code Injection vulnerability. The XSS vulnerability can be exploited to capture administrator credentials, which can then be used to exploit the PHP Code Injection vulnerability.
# Details
## Cross-Site Scripting (XSS) Vulner... | AutoCMS v5.4 XSS and RCE | https://api.github.com/repos/Hebing123/cve/issues/68/comments | 1 | 2024-08-13T07:37:01Z | 2024-09-14T07:10:17Z | https://github.com/Hebing123/cve/issues/68 | 2,462,624,535 | 68 | 6,272 |
CVE-2024-8868 | 2024-09-15T03:15:02.153 | A vulnerability was found in code-projects Crud Operation System 1.0. It has been rated as critical. This issue affects some unknown processing of the file savedata.php. The manipulation of the argument sname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/a/issues/7"
},
{
"source": "cna@vuldb.com",
"tag... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:code-projects:crud_operation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D15BB350-68BE-4E74-B9CE-BC9120B6F230",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/ppp-src/a/issues/7 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"a"
] |

# code-projects.org"Crud Operation System" in PHP 1.0 "savedata.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code
## Vendor Ho... | # code-projects.org"Crud Operation System" in PHP 1.0 "savedata.php" SQL injection | https://api.github.com/repos/ppp-src/a/issues/7/comments | 0 | 2024-09-14T06:50:03Z | 2024-09-14T06:50:03Z | https://github.com/ppp-src/a/issues/7 | 2,526,035,039 | 7 | 6,273 |
CVE-2024-8944 | 2024-09-17T18:15:05.690 | A vulnerability, which was classified as critical, was found in code-projects Hospital Management System 1.0. This affects an unknown part of the file check_availability.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/65241/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tag... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fabianros:hospital_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7FD44159-7FA3-4BA5-AD83-C1D439EEF374",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/65241/cve/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"65241",
"cve"
] | # code-projects Hospital Management System Using PHP With Source Code v1.0 check_availability.php SQL injection
# emailOF AFFECTED PRODUCT(S)
+ Hospital Management System Using PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/hospital-management-system-using-php-source-code/
# AFFECTED AND/OR FI... | code-projects Hospital Management System Using PHP With Source Code v1.0 check_availability.php SQL injection | https://api.github.com/repos/65241/cve/issues/1/comments | 0 | 2024-09-16T06:57:17Z | 2024-09-16T06:57:18Z | https://github.com/65241/cve/issues/1 | 2,527,653,063 | 1 | 6,274 |
CVE-2024-8946 | 2024-09-17T19:15:29.220 | A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affected is the function mp_vfs_umount of the file extmod/vfs.c of the component VFS Unmount Handler. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/micropython/micropython/commit/29943546343c92334e8518695a11fc0e2ceea68b"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/micropython/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:micropython:micropython:1.23.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EBC6A30E-745D-4C20-B482-1358929743FA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"787"
] | 787 | https://github.com/micropython/micropython/issues/13006 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"micropython",
"micropython"
] | # Summary
- **OS**: Ubuntu 22.04
- **version**: micropython@a00c9d56db775ee5fc14c2db60eb07bab8e872dd
- **port**: unix
- **contribution**: Junwha Hong and Wonil Jang @S2-Lab UNIST
- **description**:
- at `mp_vfs_umount` extmod/vfs.c:276, the comparison between unmount string and previous mounts are performed... | heap-buffer-overflow: incorrect length choice on memcpy at vfs unmount | https://api.github.com/repos/micropython/micropython/issues/13006/comments | 2 | 2023-11-17T09:50:10Z | 2024-07-23T02:32:29Z | https://github.com/micropython/micropython/issues/13006 | 1,998,710,063 | 13,006 | 6,275 |
CVE-2024-8946 | 2024-09-17T19:15:29.220 | A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affected is the function mp_vfs_umount of the file extmod/vfs.c of the component VFS Unmount Handler. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/micropython/micropython/commit/29943546343c92334e8518695a11fc0e2ceea68b"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/micropython/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:micropython:micropython:1.23.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EBC6A30E-745D-4C20-B482-1358929743FA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"787"
] | 787 | https://github.com/micropython/micropython/issues/13006#issuecomment-1820309455 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"micropython",
"micropython"
] | # Summary
- **OS**: Ubuntu 22.04
- **version**: micropython@a00c9d56db775ee5fc14c2db60eb07bab8e872dd
- **port**: unix
- **contribution**: Junwha Hong and Wonil Jang @S2-Lab UNIST
- **description**:
- at `mp_vfs_umount` extmod/vfs.c:276, the comparison between unmount string and previous mounts are performed... | heap-buffer-overflow: incorrect length choice on memcpy at vfs unmount | https://api.github.com/repos/micropython/micropython/issues/13006/comments | 2 | 2023-11-17T09:50:10Z | 2024-07-23T02:32:29Z | https://github.com/micropython/micropython/issues/13006 | 1,998,710,063 | 13,006 | 6,276 |
CVE-2024-8947 | 2024-09-17T19:15:29.483 | A vulnerability was found in MicroPython 1.22.2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file py/objarray.c. The manipulation leads to use after free. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIA... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/micropython/micropython/commit/4bed614e707c0644c06e117f848fa12605c711cd"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/microp... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:micropython:micropython:1.22.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F367A317-2420-445C-B455-21BAFD6E2064",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"416"
] | 416 | https://github.com/micropython/micropython/issues/13283 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"micropython",
"micropython"
] | Hi all, I'm Wonil Jang, from the research group S2Lab in UNIST.
We found a use after free bug from micropython by our custom tool. The detailed information is as follows.
## Environment
- OS: Ubuntu 22.04
- Version: micropython at commit a5bdd39127
- Build: unix ports
- Bug Type: use-after-free
- Bug Location:... | use after free found at micropython/py/objarray.c:509 [micropython@a5bdd39127] | https://api.github.com/repos/micropython/micropython/issues/13283/comments | 4 | 2023-12-27T16:49:55Z | 2024-04-22T02:12:14Z | https://github.com/micropython/micropython/issues/13283 | 2,057,585,750 | 13,283 | 6,277 |
CVE-2024-8947 | 2024-09-17T19:15:29.483 | A vulnerability was found in MicroPython 1.22.2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file py/objarray.c. The manipulation leads to use after free. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIA... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/micropython/micropython/commit/4bed614e707c0644c06e117f848fa12605c711cd"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/microp... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:micropython:micropython:1.22.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F367A317-2420-445C-B455-21BAFD6E2064",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"416"
] | 416 | https://github.com/micropython/micropython/issues/13283#issuecomment-1918479709 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"micropython",
"micropython"
] | Hi all, I'm Wonil Jang, from the research group S2Lab in UNIST.
We found a use after free bug from micropython by our custom tool. The detailed information is as follows.
## Environment
- OS: Ubuntu 22.04
- Version: micropython at commit a5bdd39127
- Build: unix ports
- Bug Type: use-after-free
- Bug Location:... | use after free found at micropython/py/objarray.c:509 [micropython@a5bdd39127] | https://api.github.com/repos/micropython/micropython/issues/13283/comments | 4 | 2023-12-27T16:49:55Z | 2024-04-22T02:12:14Z | https://github.com/micropython/micropython/issues/13283 | 2,057,585,750 | 13,283 | 6,278 |
CVE-2024-8948 | 2024-09-17T19:15:29.747 | A vulnerability was found in MicroPython 1.23.0. It has been rated as critical. Affected by this issue is the function mpz_as_bytes of the file py/objint.c. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The patch ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/micropython/micropython/commit/908ab1ceca15ee6fd0ef82ca4cba770a3ec41894"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "h... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:micropython:micropython:1.23.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EBC6A30E-745D-4C20-B482-1358929743FA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"787"
] | 787 | https://github.com/micropython/micropython/issues/13041 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"micropython",
"micropython"
] | Thank you for the super fast responses for the previous bugs, we found new bug in the core module.
## Summary
- **OS**: Ubuntu 22.04
- **version**: micropython a00c9d5
- **port**: unix
- **contribution**: Junwha Hong and Wonil Jang @S2-Lab, UNIST
- **description**: Because the length check of int_to_bytes doe... | heap-buffer-overflow: from 0 length int_to_bytes | https://api.github.com/repos/micropython/micropython/issues/13041/comments | 1 | 2023-11-21T16:51:00Z | 2024-06-24T04:37:55Z | https://github.com/micropython/micropython/issues/13041 | 2,004,741,539 | 13,041 | 6,279 |
CVE-2024-46382 | 2024-09-19T13:15:04.007 | A SQL injection vulnerability in linlinjava litemall 1.8.0 allows a remote attacker to obtain sensitive information via the goodsId, goodsSn, and name parameters in AdminGoodscontroller.java. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/linlinjava/litemall/issues/552"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:linlinjava:litemall:1.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEBF7CF8-8C16-4129-AF35-F29414CD08EF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"89"
] | 89 | https://github.com/linlinjava/litemall/issues/552 | [
"Exploit"
] | github.com | [
"linlinjava",
"litemall"
] | SQL injection vulnerability in linlinjava litemall v.1.8.0 allows a remote attacker to obtain sensitive information via the goodsId, goodsSn, name parameters of the AdminOrderController..java component.
1.Steps to reproduce (复现步骤)
访问商品管理,昵称输入1 ,点击查询,抓取数据包
. It just need a web server and PHP, no databases are even needed. The philosophy is: To keep it simple, fast, with a low foot print to run on cheap and low powered devices.
123Solar 1.8.4.5 con... | 123Solar 1.8.4.5 has a PHP Code Injection vulnerability | https://api.github.com/repos/jeanmarc77/123solar/issues/74/comments | 1 | 2024-09-14T06:19:16Z | 2024-09-18T07:00:25Z | https://github.com/jeanmarc77/123solar/issues/74 | 2,526,023,476 | 74 | 6,281 |
CVE-2024-9006 | 2024-09-19T23:15:12.570 | A vulnerability was found in jeanmarc77 123solar 1.8.4.5. It has been rated as critical. Affected by this issue is some unknown functionality of the file config/config_invt1.php. The manipulation of the argument PASSOx leads to code injection. The attack may be launched remotely. The exploit has been disclosed to the p... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/jeanmarc77/123solar/commit/f4a8c748ec436e5a79f91ccb6a6f73752b336aa5"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jeanmarc77:123solar:1.8.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B96B3FED-CC2C-46C3-8BBE-07E78A555F33",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"94"
] | 94 | https://github.com/jeanmarc77/123solar/issues/74#issuecomment-2357653441 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"jeanmarc77",
"123solar"
] | # Summary
> 123Solar is a lightweight set of PHP/JS files that makes a web logger to monitor your photovoltaic inverter(s). It just need a web server and PHP, no databases are even needed. The philosophy is: To keep it simple, fast, with a low foot print to run on cheap and low powered devices.
123Solar 1.8.4.5 con... | 123Solar 1.8.4.5 has a PHP Code Injection vulnerability | https://api.github.com/repos/jeanmarc77/123solar/issues/74/comments | 1 | 2024-09-14T06:19:16Z | 2024-09-18T07:00:25Z | https://github.com/jeanmarc77/123solar/issues/74 | 2,526,023,476 | 74 | 6,282 |
CVE-2024-9007 | 2024-09-19T23:15:12.830 | A vulnerability classified as problematic has been found in jeanmarc77 123solar 1.8.4.5. This affects an unknown part of the file /detailed.php. The manipulation of the argument date1 leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be u... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/jeanmarc77/123solar/commit/94bf9ab7ad0ccb7fbdc02f172f37f0e2ea08d48f"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jeanmarc77... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jeanmarc77:123solar:1.8.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B96B3FED-CC2C-46C3-8BBE-07E78A555F33",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"79"
] | 79 | https://github.com/jeanmarc77/123solar/issues/73 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"jeanmarc77",
"123solar"
] | # Summary
> 123Solar is a lightweight set of PHP/JS files that makes a web logger to monitor your photovoltaic inverter(s). It just need a web server and PHP, no databases are even needed. The philosophy is: To keep it simple, fast, with a low foot print to run on cheap and low powered devices.
A reflected Cross Si... | 123Solar 1.8.4.5 has a reflected XSS vulnerability | https://api.github.com/repos/jeanmarc77/123solar/issues/73/comments | 1 | 2024-09-14T05:47:09Z | 2024-09-18T06:52:59Z | https://github.com/jeanmarc77/123solar/issues/73 | 2,526,010,847 | 73 | 6,283 |
CVE-2024-9007 | 2024-09-19T23:15:12.830 | A vulnerability classified as problematic has been found in jeanmarc77 123solar 1.8.4.5. This affects an unknown part of the file /detailed.php. The manipulation of the argument date1 leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be u... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/jeanmarc77/123solar/commit/94bf9ab7ad0ccb7fbdc02f172f37f0e2ea08d48f"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jeanmarc77... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jeanmarc77:123solar:1.8.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B96B3FED-CC2C-46C3-8BBE-07E78A555F33",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"79"
] | 79 | https://github.com/jeanmarc77/123solar/issues/73#issuecomment-2357648077 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"jeanmarc77",
"123solar"
] | # Summary
> 123Solar is a lightweight set of PHP/JS files that makes a web logger to monitor your photovoltaic inverter(s). It just need a web server and PHP, no databases are even needed. The philosophy is: To keep it simple, fast, with a low foot print to run on cheap and low powered devices.
A reflected Cross Si... | 123Solar 1.8.4.5 has a reflected XSS vulnerability | https://api.github.com/repos/jeanmarc77/123solar/issues/73/comments | 1 | 2024-09-14T05:47:09Z | 2024-09-18T06:52:59Z | https://github.com/jeanmarc77/123solar/issues/73 | 2,526,010,847 | 73 | 6,284 |
CVE-2024-9009 | 2024-09-20T00:15:03.997 | A vulnerability, which was classified as critical, has been found in code-projects Online Quiz Site 1.0. This issue affects some unknown processing of the file showtest.php. The manipulation of the argument subid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ZTurNA/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fabianros:online_quiz_site:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "15DF6E37-6F4D-459A-823E-73DB8450C6CC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"89"
] | 89 | https://github.com/ZTurNA/cve/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ZTurNA",
"cve"
] | # code-projects Online Quiz Site Using PHP With Source Code v1.0 showtest.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Quiz Site Using PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/online-quiz-site-using-php-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ ZTurNA
... | code-projects Online Quiz Site Using PHP With Source Code v1.0 showtest.php SQL injection | https://api.github.com/repos/ZTurNA/cve/issues/1/comments | 0 | 2024-09-18T08:03:26Z | 2024-09-18T08:03:26Z | https://github.com/ZTurNA/cve/issues/1 | 2,533,017,975 | 1 | 6,285 |
CVE-2024-9011 | 2024-09-20T01:15:10.550 | A vulnerability, which was classified as critical, was found in code-projects Crud Operation System 1.0. Affected is an unknown function of the file updata.php. The manipulation of the argument sid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/a/issues/14"
},
{
"source": "cna@vuldb.com",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:code-projects:crud_operation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D15BB350-68BE-4E74-B9CE-BC9120B6F230",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/ppp-src/a/issues/14 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"a"
] | # code-projects.org"Crud Operation System" in PHP 1.0 "updata.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code
## Vendor Homepage
+ https://code-projects.org/crud-operation-system-in-php-with-source-code/
# AFFEC... | code-projects.org"Crud Operation System" in PHP 1.0 "updata.php" SQL injection | https://api.github.com/repos/ppp-src/a/issues/14/comments | 0 | 2024-09-18T09:39:42Z | 2024-09-18T09:39:42Z | https://github.com/ppp-src/a/issues/14 | 2,533,224,679 | 14 | 6,286 |
CVE-2024-9078 | 2024-09-22T04:15:04.203 | A vulnerability has been found in code-projects Student Record System 1.0 and classified as critical. This vulnerability affects unknown code of the file /course.php. The manipulation of the argument coursename leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public an... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/a/issues/15"
},
{
"source": "cna@vuldb.com",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:code-projects:student_record_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E81D3A4D-EB3A-4716-B5AA-71424DC86572",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/ppp-src/a/issues/15 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"a"
] | # code-projects.org"Student Record System" in PHP 1.0 "course.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Student Record System In PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/student-record-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ xxxx
## V... | # code-projects.org"Student Record System" in PHP 1.0 "course.php" SQL injection | https://api.github.com/repos/ppp-src/a/issues/15/comments | 0 | 2024-09-20T07:19:59Z | 2024-09-20T07:19:59Z | https://github.com/ppp-src/a/issues/15 | 2,538,075,549 | 15 | 6,287 |
CVE-2024-9079 | 2024-09-22T05:15:11.710 | A vulnerability was found in code-projects Student Record System 1.0 and classified as critical. This issue affects some unknown processing of the file /marks.php. The manipulation of the argument coursename leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and m... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/a/issues/16"
},
{
"source": "cna@vuldb.com",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:code-projects:student_record_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E81D3A4D-EB3A-4716-B5AA-71424DC86572",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/ppp-src/a/issues/16 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"a"
] | # code-projects.org"Student Record System" in PHP 1.0 "marks.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Student Record System In PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/student-record-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ xxxx
## Vu... | # code-projects.org"Student Record System" in PHP 1.0 "marks.php" SQL injection | https://api.github.com/repos/ppp-src/a/issues/16/comments | 0 | 2024-09-21T04:08:40Z | 2024-09-21T04:08:40Z | https://github.com/ppp-src/a/issues/16 | 2,539,958,391 | 16 | 6,288 |
CVE-2024-9080 | 2024-09-22T07:15:10.607 | A vulnerability was found in code-projects Student Record System 1.0. It has been classified as critical. Affected is an unknown function of the file /pincode-verification.php. The manipulation of the argument pincode leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/a/issues/17"
},
{
"source": "cna@vuldb.com",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:code-projects:student_record_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E81D3A4D-EB3A-4716-B5AA-71424DC86572",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/ppp-src/a/issues/17 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"a"
] | # code-projects.org"Student Record System" in PHP 1.0 "pincode-verification.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Student Record System In PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/student-record-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter... | # code-projects.org"Student Record System" in PHP 1.0 "pincode-verification.php" SQL injection | https://api.github.com/repos/ppp-src/a/issues/17/comments | 0 | 2024-09-21T04:16:46Z | 2024-09-21T04:16:46Z | https://github.com/ppp-src/a/issues/17 | 2,539,960,931 | 17 | 6,289 |
CVE-2024-9085 | 2024-09-22T08:15:02.393 | A vulnerability was found in code-projects Restaurant Reservation System 1.0. It has been rated as critical. This issue affects some unknown processing of the file index.php. The manipulation of the argument date leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/a/issues/18"
},
{
"source": "cna@vuldb.com",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:code-projects:restaurant_reservation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE12AD85-FC4C-4F66-82E3-7BDCB43D3903",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/ppp-src/a/issues/18 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"a"
] | # code-projects.org"Restaurant Reservation System" in PHP 1.0 "index.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code
## Vendor Homepage
+ https://code-projects.org/restaurant-reservation-system-in-php-with-source... | # code-projects.org"Restaurant Reservation System" in PHP 1.0 "index.php" SQL injection | https://api.github.com/repos/ppp-src/a/issues/18/comments | 0 | 2024-09-21T04:19:00Z | 2024-09-21T04:30:03Z | https://github.com/ppp-src/a/issues/18 | 2,539,961,611 | 18 | 6,290 |
CVE-2024-9086 | 2024-09-22T21:15:10.813 | A vulnerability classified as critical has been found in code-projects Restaurant Reservation System 1.0. Affected is an unknown function of the file /filter.php. The manipulation of the argument from/to leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public a... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/a/issues/20"
},
{
"source": "cna@vuldb.com",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:code-projects:restaurant_reservation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE12AD85-FC4C-4F66-82E3-7BDCB43D3903",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/ppp-src/a/issues/20 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"a"
] | # code-projects.org"Restaurant Reservation System" in PHP 1.0 "filter.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code
## Vendor Homepage
+ https://code-projects.org/restaurant-reservation-system-in-php-with-sourc... | # code-projects.org"Restaurant Reservation System" in PHP 1.0 "filter.php" SQL injection | https://api.github.com/repos/ppp-src/a/issues/20/comments | 0 | 2024-09-21T04:35:48Z | 2024-09-21T04:35:48Z | https://github.com/ppp-src/a/issues/20 | 2,539,967,099 | 20 | 6,291 |
CVE-2024-9087 | 2024-09-22T22:15:02.177 | A vulnerability, which was classified as critical, was found in code-projects Vehicle Management 1.0. This affects an unknown part of the file /edit1.php. The manipulation of the argument sno leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/a/issues/19"
},
{
"source": "cna@vuldb.com",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vehicle_management_project:vehicle_management:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9B2AD25F-FE85-4D6F-9FDD-2439840FE0CB",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/ppp-src/a/issues/19 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"a"
] | # code-projects.org"Vehicle Management" in PHP 1.0 "edit1.php " SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Vehicle Management In PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/vehicle-management-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ xxxx
## Vulnerable... | # code-projects.org"Vehicle Management" in PHP 1.0 "edit1.php " SQL injection | https://api.github.com/repos/ppp-src/a/issues/19/comments | 0 | 2024-09-21T04:32:56Z | 2024-09-21T04:32:56Z | https://github.com/ppp-src/a/issues/19 | 2,539,966,191 | 19 | 6,292 |
CVE-2024-9088 | 2024-09-22T22:15:02.447 | A vulnerability has been found in SourceCodester Telecom Billing Management System 1.0 and classified as critical. This vulnerability affects the function login. The manipulation of the argument uname leads to buffer overflow. The exploit has been disclosed to the public and may be used. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact":... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/61"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:razormist:telecom_billing_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C9BFF928-A473-475F-8BA1-939856BCA7C8",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"120"
] | 120 | https://github.com/CveSecLook/cve/issues/61 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # Telecom Billing Management System in C++ with Source Code v1.0 - Buffer Overflow
Supplier:https://www.sourcecodester.com/sites/default/files/download/razormist/telecom-billing-management-system-in-c.zip
In the main program file, there is a variable of type char called uname, which receives data using scanf, res... | Telecom Billing Management System in C++ with Source Code v1.0 - Buffer Overflow | https://api.github.com/repos/CveSecLook/cve/issues/61/comments | 0 | 2024-09-21T04:58:47Z | 2024-09-21T04:58:48Z | https://github.com/CveSecLook/cve/issues/61 | 2,539,974,591 | 61 | 6,293 |
CVE-2024-9091 | 2024-09-23T00:15:11.537 | A vulnerability was found in code-projects Student Record System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /index.php. The manipulation of the argument regno leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/a/issues/21"
},
{
"source": "cna@vuldb.com",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:code-projects:student_record_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E81D3A4D-EB3A-4716-B5AA-71424DC86572",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/ppp-src/a/issues/21 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"a"
] | # code-projects.org"Student Record System" in PHP 1.0 "index.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Student Record System In PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/student-record-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ xxxx
## Vu... | # code-projects.org"Student Record System" in PHP 1.0 "index.php" SQL injection | https://api.github.com/repos/ppp-src/a/issues/21/comments | 0 | 2024-09-21T11:46:42Z | 2024-09-21T11:46:42Z | https://github.com/ppp-src/a/issues/21 | 2,540,205,258 | 21 | 6,294 |
CVE-2024-9281 | 2024-09-27T13:15:18.153 | A vulnerability was found in bg5sbk MiniCMS up to 1.11 and classified as problematic. This issue affects some unknown processing of the file post-edit.php. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The initia... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/bg5sbk/MiniCMS/issues/51"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.278663"
},
{
"source": "... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bg5sbk:minicms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0DD09C60-55E3-42A0-8B9C-EA9C208D4F8A",
"versionEndExcluding": "1.11",
"versionEndIncluding": null,
"versionStartExcluding... | [
"352"
] | 352 | https://github.com/bg5sbk/MiniCMS/issues/51 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"bg5sbk",
"MiniCMS"
] | # Vendor of Product
https://github.com/bg5sbk/MiniCMS
# Vulnerability Type
CSRF
# Vulnerable File
post-edit.php
# Affected Product Code Base
<v1.11
# POC
``` <html>
<!-- CSRF PoC - generated by Burp Suite Professional -->
<body>
<script>history.pushState('', '', '/')</script>
<form action... | There is another CSRF vulnerabilities in post-edit.php that can lead to add article | https://api.github.com/repos/bg5sbk/MiniCMS/issues/51/comments | 1 | 2024-09-19T07:51:49Z | 2024-10-08T14:28:26Z | https://github.com/bg5sbk/MiniCMS/issues/51 | 2,535,570,662 | 51 | 6,295 |
CVE-2024-9282 | 2024-09-27T13:15:18.443 | A vulnerability was found in bg5sbk MiniCMS 1.11. It has been classified as problematic. Affected is an unknown function of the file page-edit.php. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The initia... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/bg5sbk/MiniCMS/issues/52"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.278664"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bg5sbk:minicms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0DD09C60-55E3-42A0-8B9C-EA9C208D4F8A",
"versionEndExcluding": "1.11",
"versionEndIncluding": null,
"versionStartExcluding... | [
"352"
] | 352 | https://github.com/bg5sbk/MiniCMS/issues/52 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"bg5sbk",
"MiniCMS"
] | # Vendor of Product
https://github.com/bg5sbk/MiniCMS
# Vulnerability Type
CSRF
# Vulnerable File
page-edit.php
# Affected Product Code Base
<v1.11
# POC
```
<html>
<!-- CSRF PoC - generated by Burp Suite Professional -->
<body>
<script>history.pushState('', '', '/')</script>
<form actio... | There is another CSRF vulnerabilities in page-edit.php that can lead to add page | https://api.github.com/repos/bg5sbk/MiniCMS/issues/52/comments | 0 | 2024-09-19T08:16:07Z | 2024-09-19T08:16:07Z | https://github.com/bg5sbk/MiniCMS/issues/52 | 2,535,621,425 | 52 | 6,296 |
CVE-2024-44910 | 2024-09-27T15:15:14.907 | NASA CryptoLib v1.3.0 was discovered to contain an Out-of-Bounds read via the AOS subsystem (crypto_aos.c). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/nasa/CryptoLib/issues/268"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Technical Description"
],
"url": "https://visionspace.com/crashing-cryptolib/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nasa:cryptolib:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D7F7FD1A-BA84-49EB-8B0C-10D72AF81E9C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"125"
] | 125 | https://github.com/nasa/CryptoLib/issues/268 | [
"Issue Tracking"
] | github.com | [
"nasa",
"CryptoLib"
] | It is possible to get a seg fault by first passing an invalid index to `sa_if->sa_get_from_spi(spi, &sa_ptr)`, then dereferencing the pointer in the `// Determine SA Service Type` code blocks in `crypto_aos.c`, `crypto_tc.c`, and `crypto_tm.c`.
To fix this, check if the SPI is within the SA array length before retri... | Out-of-Bounds reads on TM/TC/AOS Frames | https://api.github.com/repos/nasa/CryptoLib/issues/268/comments | 0 | 2024-08-05T12:50:24Z | 2024-08-07T18:35:34Z | https://github.com/nasa/CryptoLib/issues/268 | 2,448,479,893 | 268 | 6,297 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.