cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2024-7592
2024-08-19T19:15:08.180
There is a LOW severity vulnerability affecting CPython, specifically the 'http.cookies' standard library module. When parsing cookies that contained backslashes for quoted characters in the cookie value, the parser would use an algorithm with quadratic complexity, resulting in excess CPU resources being used while p...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cna@python.org", "tags": [ "Patch" ], "url": "https://github.com/python/cpython/commit/391e5626e3ee5af267b97e37abc7475732e67621" }, { "source": "cna@python.org", "tags": [ "Patch" ], "url": "https://github.com/python/cpython/commit/44e458357fca05ca0ae2658...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "matchCriteriaId": "B475FA53-D1F3-44C8-80CD-0CEA88129109", "versionEndExcluding": "3.8.20", "versionEndIncluding": null, "versionStartExcludin...
[ "1333" ]
1333
https://github.com/python/cpython/issues/123067
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "python", "cpython" ]
# Bug report ### Bug description: ## Description A potential Denial of Service (DoS) vulnerability, identified as CVE-2024-7592, has been discovered in the `_unquote()` method of the `http.cookies` module in Python's standard library. This vulnerability is particularly concerning as it affects frameworks that utiliz...
CVE-2024-7592: Denial of Service Vulnerability in `http.cookies._unquote()`
https://api.github.com/repos/python/cpython/issues/123067/comments
6
2024-08-16T13:31:26Z
2024-09-04T15:50:52Z
https://github.com/python/cpython/issues/123067
2,470,285,353
123,067
6,198
CVE-2024-7929
2024-08-19T22:15:06.470
A vulnerability, which was classified as problematic, was found in SourceCodester Simple Forum Website 1.0. This affects an unknown part of the file /registration.php of the component Signup Page. The manipulation of the argument username leads to cross site scripting. It is possible to initiate the attack remotely. Th...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ulayaha/ulayaha.github.io/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "http...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oretnom23:simple_forum_website:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "0C9F288C-09B8-4C6A-879F-E21B7B48214C", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "79" ]
79
https://github.com/ulayaha/ulayaha.github.io/issues/2
[ "Exploit", "Issue Tracking" ]
github.com
[ "ulayaha", "ulayaha.github.io" ]
My screenshot of setting up the PHP project: ![网站搭建](https://github.com/user-attachments/assets/6ceed3b3-5e79-4e26-9f51-da50d6ebbff0) First, register a regular user, then name your username with the following attack payload: `"><img src=x onerror=alert(1)> ` ![创用户](https://github.com/user-attachments/assets/042520...
XSS exists in the Simple Forum Website‘s user registration area
https://api.github.com/repos/ulayaha/ulayaha.github.io/issues/2/comments
1
2024-08-16T09:08:29Z
2024-08-22T09:48:27Z
https://github.com/ulayaha/ulayaha.github.io/issues/2
2,469,848,087
2
6,199
CVE-2024-7946
2024-08-20T02:15:06.097
A vulnerability was found in itsourcecode Online Blood Bank Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file register.php of the component User Signup. The manipulation of the argument user leads to sql injection. The attack may be launched remotely....
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/a1175165157/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adonesevangelista:online_blood_bank_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F53F723-1E87-4190-A902-24A47378C80B", "versionEndExcluding": null, "versionEndIncluding": n...
[ "89" ]
89
https://github.com/a1175165157/cve/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "a1175165157", "cve" ]
# Itsourcecode "Online Blood Bank Management System" in PHP 1.0 "register.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Blood Bank Management System" in PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-blood-bank-management-system-in-php-with-source-code/ # AFFECTED A...
Itsourcecode "Online Blood Bank Management System" in PHP 1.0 "register.php" SQL injection
https://api.github.com/repos/a1175165157/cve/issues/1/comments
0
2024-08-18T08:57:36Z
2024-08-18T09:02:31Z
https://github.com/a1175165157/cve/issues/1
2,471,866,573
1
6,200
CVE-2024-7947
2024-08-20T02:15:06.337
A vulnerability classified as critical has been found in SourceCodester Point of Sales and Inventory Management System 1.0. This affects an unknown part of the file login.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/CveSecLook/cve/issues/60" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:janobe:point_of_sales_and_inventory_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BB4CAA5E-2FA9-4FCB-A2C2-B4D4E4D73896", "versionEndExcluding": null, "versionEndIncluding": n...
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/60
[ "Exploit", "Issue Tracking" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Point of Sales and Inventory Management System in PHP/PDO with Full Source Code login.php V1.0 SQL injection vulnerability # NAME OF AFFECTED PRODUCT(S) + Point of Sales and Inventory Management System in PHP/PDO with Full Source Code ## Vendor Homepage + https://www.sourcecodester.com/php/14724/po...
SourceCodester Point of Sales and Inventory Management System in PHP/PDO with Full Source Code login.php V1.0 SQL injection
https://api.github.com/repos/CveSecLook/cve/issues/60/comments
0
2024-08-18T11:48:27Z
2024-08-18T11:48:27Z
https://github.com/CveSecLook/cve/issues/60
2,471,929,525
60
6,201
CVE-2024-39094
2024-08-20T14:15:09.330
Friendica 2024.03 is vulnerable to Cross Site Scripting (XSS) in settings/profile via the homepage, xmpp, and matrix parameters.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://friendi.ca/2024/08/17/friendica-2024-08-released/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/friendica/friendica/issues/14220" }...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:friendica:friendica:2024.03:*:*:*:*:*:*:*", "matchCriteriaId": "2F8639D6-03C8-4E15-BB2D-4217078E983E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "79" ]
79
https://github.com/friendica/friendica/issues/14220
[ "Exploit", "Issue Tracking" ]
github.com
[ "friendica", "friendica" ]
- [X] I have searched open and closed issues for duplicates ### Bug Description When a malicious Javascript payload is sent via the above mentioned parameters to the `/settings/profile` endpoint, they are stored and reflected on the `/profile/[username]` endpoint without any sanitisation, leading to XSS. ### Ste...
/settings/profile - Stored XSS via homepage, xmpp and matrix parameters
https://api.github.com/repos/friendica/friendica/issues/14220/comments
6
2024-06-08T23:50:18Z
2024-07-05T13:39:02Z
https://github.com/friendica/friendica/issues/14220
2,341,912,786
14,220
6,202
CVE-2024-8003
2024-08-20T14:15:10.767
A vulnerability was found in Go-Tribe gotribe-admin 1.0 and classified as problematic. Affected by this issue is the function InitRoutes of the file internal/app/routes/routes.go of the component Log Handler. The manipulation leads to deserialization. The patch is identified as 45ac90d6d1f82716f77dbcdf8e7309c229080e3c....
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 2.7, "confidentialityImpact": "PA...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/Go-Tribe/gotribe-admin/commit/45ac90d6d1f82716f77dbcdf8e7309c229080e3c" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Go-Tribe/gotr...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gotribe:gotribe-admin:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5EF585EE-2F2A-498F-9FD5-A35321C6DD16", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "502" ]
502
https://github.com/Go-Tribe/gotribe-admin/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "Go-Tribe", "gotribe-admin" ]
```Go r.NoRoute(func(c *gin.Context) { fmt.Printf("%s doesn't exists, redirect on /\n", c.Request.URL.Path) c.Redirect(http.StatusMovedPermanently, "/") }) ``` Flaw reason: in the ` internal/app/routes/routes go ` file of 53 line, using the ` FMT. Printf ` to print log, the log content contains the user t...
Improper Output Neutralization for Logs in the routes go
https://api.github.com/repos/Go-Tribe/gotribe-admin/issues/1/comments
1
2024-08-19T12:58:04Z
2024-08-20T07:44:16Z
https://github.com/Go-Tribe/gotribe-admin/issues/1
2,473,301,960
1
6,203
CVE-2024-8003
2024-08-20T14:15:10.767
A vulnerability was found in Go-Tribe gotribe-admin 1.0 and classified as problematic. Affected by this issue is the function InitRoutes of the file internal/app/routes/routes.go of the component Log Handler. The manipulation leads to deserialization. The patch is identified as 45ac90d6d1f82716f77dbcdf8e7309c229080e3c....
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 2.7, "confidentialityImpact": "PA...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/Go-Tribe/gotribe-admin/commit/45ac90d6d1f82716f77dbcdf8e7309c229080e3c" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Go-Tribe/gotr...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gotribe:gotribe-admin:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5EF585EE-2F2A-498F-9FD5-A35321C6DD16", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "502" ]
502
https://github.com/Go-Tribe/gotribe-admin/issues/1#issuecomment-2298187923
[ "Exploit", "Issue Tracking" ]
github.com
[ "Go-Tribe", "gotribe-admin" ]
```Go r.NoRoute(func(c *gin.Context) { fmt.Printf("%s doesn't exists, redirect on /\n", c.Request.URL.Path) c.Redirect(http.StatusMovedPermanently, "/") }) ``` Flaw reason: in the ` internal/app/routes/routes go ` file of 53 line, using the ` FMT. Printf ` to print log, the log content contains the user t...
Improper Output Neutralization for Logs in the routes go
https://api.github.com/repos/Go-Tribe/gotribe-admin/issues/1/comments
1
2024-08-19T12:58:04Z
2024-08-20T07:44:16Z
https://github.com/Go-Tribe/gotribe-admin/issues/1
2,473,301,960
1
6,204
CVE-2024-8005
2024-08-20T14:15:11.130
A vulnerability was found in demozx gf_cms 1.0/1.0.1. It has been classified as critical. This affects the function init of the file internal/logic/auth/auth.go of the component JWT Authentication. The manipulation leads to hard-coded credentials. It is possible to initiate the attack remotely. The exploit has been dis...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/demozx/gf_cms/commit/be702ada7cb6fdabc02689d90b38139c827458a5" }, { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/demozx/gf_cms/commit/de51cc57a96ccca905c837ef925...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:demozx:gf_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "52F0EE72-5D7B-4635-8319-3BC72516D597", "versionEndExcluding": "1.0.2", "versionEndIncluding": null, "versionStartExcluding...
[ "798" ]
798
https://github.com/demozx/gf_cms/issues/5
[ "Issue Tracking" ]
github.com
[ "demozx", "gf_cms" ]
func init() { service.RegisterAuth(New()) auth := jwt.New(&jwt.GfJWTMiddleware{ Realm: "test zone", Key: []byte("secret key"), Timeout: time.Minute * 5, MaxRefresh: time.Minute * 5, IdentityKey: "id", TokenLookup: "header: Authorization, query: token, c...
Hardcoded Secret Key in JWT Authentication Initialization
https://api.github.com/repos/demozx/gf_cms/issues/5/comments
1
2024-08-19T12:40:20Z
2024-09-02T03:04:53Z
https://github.com/demozx/gf_cms/issues/5
2,473,263,608
5
6,205
CVE-2024-8005
2024-08-20T14:15:11.130
A vulnerability was found in demozx gf_cms 1.0/1.0.1. It has been classified as critical. This affects the function init of the file internal/logic/auth/auth.go of the component JWT Authentication. The manipulation leads to hard-coded credentials. It is possible to initiate the attack remotely. The exploit has been dis...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/demozx/gf_cms/commit/be702ada7cb6fdabc02689d90b38139c827458a5" }, { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/demozx/gf_cms/commit/de51cc57a96ccca905c837ef925...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:demozx:gf_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "52F0EE72-5D7B-4635-8319-3BC72516D597", "versionEndExcluding": "1.0.2", "versionEndIncluding": null, "versionStartExcluding...
[ "798" ]
798
https://github.com/demozx/gf_cms/issues/5#issuecomment-2296590417
[ "Issue Tracking" ]
github.com
[ "demozx", "gf_cms" ]
func init() { service.RegisterAuth(New()) auth := jwt.New(&jwt.GfJWTMiddleware{ Realm: "test zone", Key: []byte("secret key"), Timeout: time.Minute * 5, MaxRefresh: time.Minute * 5, IdentityKey: "id", TokenLookup: "header: Authorization, query: token, c...
Hardcoded Secret Key in JWT Authentication Initialization
https://api.github.com/repos/demozx/gf_cms/issues/5/comments
1
2024-08-19T12:40:20Z
2024-09-02T03:04:53Z
https://github.com/demozx/gf_cms/issues/5
2,473,263,608
5
6,206
CVE-2024-43404
2024-08-20T15:15:23.867
MEGABOT is a fully customized Discord bot for learning and fun. The `/math` command and functionality of MEGABOT versions < 1.5.0 contains a remote code execution vulnerability due to a Python `eval()`. The vulnerability allows an attacker to inject Python code into the `expression` parameter when using `/math` in any ...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/NicPWNs/MEGABOT/commit/71e79e5581ea36313700385b112d863053fb7ed6" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/Nic...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:megacord:megabot:*:*:*:*:*:*:*:*", "matchCriteriaId": "F3BDF1BF-C31D-4E71-AD47-05CBA3B7FD60", "versionEndExcluding": "1.5.0", "versionEndIncluding": null, "versionStartExclud...
[ "94" ]
94
https://github.com/NicPWNs/MEGABOT/issues/137
[ "Issue Tracking" ]
github.com
[ "NicPWNs", "MEGABOT" ]
There is a Remote Code Execution (RCE) vulnerability in the `/math` functionality of the bot.
RCE Vulnerability
https://api.github.com/repos/NicPWNs/MEGABOT/issues/137/comments
1
2024-08-19T22:25:34Z
2024-08-19T22:43:34Z
https://github.com/NicPWNs/MEGABOT/issues/137
2,474,339,698
137
6,207
CVE-2024-8081
2024-08-22T22:15:05.510
A vulnerability classified as critical was found in itsourcecode Payroll Management System 1.0. Affected by this vulnerability is an unknown functionality of the file login.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the p...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ppp-src/ha/issues/6" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://itsourcecode.com/" }, { "source": "cna@vuldb.com", "tags": [ ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kevinwong:payroll_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "493685F6-0114-46FA-A25F-7B05A7D5ACDB", "versionEndExcluding": null, "versionEndIncluding": null, "...
[ "89" ]
89
https://github.com/ppp-src/ha/issues/6
[ "Exploit", "Issue Tracking" ]
github.com
[ "ppp-src", "ha" ]
# Itsourcecode "Payroll Management System " in PHP 1.0 "login.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Payroll Management System ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-food-ordering-system-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + tornseck #...
# Itsourcecode "Payroll Management System " in PHP 1.0 "login.php" SQL injection
https://api.github.com/repos/ppp-src/ha/issues/6/comments
1
2024-08-22T07:06:36Z
2024-08-24T14:22:27Z
https://github.com/ppp-src/ha/issues/6
2,480,007,118
6
6,208
CVE-2024-8135
2024-08-24T22:15:13.827
A vulnerability classified as critical has been found in Go-Tribe gotribe up to cd3ccd32cd77852c9ea73f986eaf8c301cfb6310. Affected is the function Sign of the file pkg/token/token.go. The manipulation of the argument config.key leads to hard-coded credentials. Continious delivery with rolling releases is used by this p...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact":...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/Go-Tribe/gotribe/commit/4fb9b9e80a2beedd09d9fde4b9cf5bd510baf18f" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/Go-Tribe/gotribe/issues/1" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gotribe:gotribe:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F46A939-AF95-4372-9A2A-CBC91D96B52A", "versionEndExcluding": "2024-08-23", "versionEndIncluding": null, "versionStartEx...
[ "798" ]
798
https://github.com/Go-Tribe/gotribe/issues/1
[ "Issue Tracking" ]
github.com
[ "Go-Tribe", "gotribe" ]
pkg/token/token.go ```Go var ( config = Config{"Rtg8BPKNEf2mB4mgvKONGPZZQSaJWNLijxR42qRgq0iBb5", "identityKey"} once sync.Once ) ........... ........... // Sign 使用 jwtSecret 签发 token,token 的 claims 中会存放传入的 subject. func Sign(identityKey string) (tokenString string, err error) { // Token 的内容 token := jw...
Use of Hard-coded Credentials in token.go
https://api.github.com/repos/Go-Tribe/gotribe/issues/1/comments
1
2024-08-22T08:59:40Z
2024-08-23T14:25:19Z
https://github.com/Go-Tribe/gotribe/issues/1
2,480,223,072
1
6,209
CVE-2024-8135
2024-08-24T22:15:13.827
A vulnerability classified as critical has been found in Go-Tribe gotribe up to cd3ccd32cd77852c9ea73f986eaf8c301cfb6310. Affected is the function Sign of the file pkg/token/token.go. The manipulation of the argument config.key leads to hard-coded credentials. Continious delivery with rolling releases is used by this p...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact":...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/Go-Tribe/gotribe/commit/4fb9b9e80a2beedd09d9fde4b9cf5bd510baf18f" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/Go-Tribe/gotribe/issues/1" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gotribe:gotribe:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F46A939-AF95-4372-9A2A-CBC91D96B52A", "versionEndExcluding": "2024-08-23", "versionEndIncluding": null, "versionStartEx...
[ "798" ]
798
https://github.com/Go-Tribe/gotribe/issues/1#issuecomment-2307205980
[ "Issue Tracking" ]
github.com
[ "Go-Tribe", "gotribe" ]
pkg/token/token.go ```Go var ( config = Config{"Rtg8BPKNEf2mB4mgvKONGPZZQSaJWNLijxR42qRgq0iBb5", "identityKey"} once sync.Once ) ........... ........... // Sign 使用 jwtSecret 签发 token,token 的 claims 中会存放传入的 subject. func Sign(identityKey string) (tokenString string, err error) { // Token 的内容 token := jw...
Use of Hard-coded Credentials in token.go
https://api.github.com/repos/Go-Tribe/gotribe/issues/1/comments
1
2024-08-22T08:59:40Z
2024-08-23T14:25:19Z
https://github.com/Go-Tribe/gotribe/issues/1
2,480,223,072
1
6,210
CVE-2024-8139
2024-08-25T01:15:11.300
A vulnerability has been found in itsourcecode E-Commerce Website 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file search_list.php. The manipulation of the argument user leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/ha/issues/7" }, { "source": "cna@vuldb.com", "tags": [ "Not Applicable" ], "url": "https://itsourcecode.com/" }, { "source": "cna@vuldb.com", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:e-commerce_website:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9F2AFD8B-420C-4152-AE26-691362CAE64D", "versionEndExcluding": null, "versionEndIncluding": null, "v...
[ "89" ]
89
https://github.com/ppp-src/ha/issues/7
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "ha" ]
# Itsourcecode "E-Commerce Website" in PHP 1.0 "search_list.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + E-Commerce Website In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/e-commerce-website-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submit...
Itsourcecode "E-Commerce Website" in PHP 1.0 "search_list.php" SQL injection
https://api.github.com/repos/ppp-src/ha/issues/7/comments
0
2024-08-23T08:56:49Z
2024-08-23T08:56:49Z
https://github.com/ppp-src/ha/issues/7
2,482,662,465
7
6,211
CVE-2024-8150
2024-08-25T22:15:05.310
A vulnerability was found in ContiNew Admin 3.2.0 and classified as critical. Affected by this issue is the function top.continew.starter.extension.crud.controller.BaseController#page of the file /api/system/user?deptId=1&page=1&size=10. The manipulation of the argument sort leads to sql injection. The attack may be la...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PAR...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Chiexf/cve/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.275738" }, { "source": "cna@vuldb.c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:continew:continew_admin:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "3504E98B-9616-4544-A4F3-3603A49AB49C", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "89" ]
89
https://github.com/Chiexf/cve/issues/2
[ "Exploit", "Issue Tracking" ]
github.com
[ "Chiexf", "cve" ]
### Summary _The controllable `sort` parameter has led to SQL injection in Continue Admin v3.2.0._ ### Environment Setup _Build the backend code locally by downloading "https://github.com/continew-org/continew-admin"._ _Build the front-end page locally by downloading "https://github.com/continew-org/continew-admi...
Continew Admin V3.2.0 Presence of SQL Injection_1
https://api.github.com/repos/Chiexf/cve/issues/2/comments
0
2024-08-14T03:09:23Z
2024-08-14T14:53:56Z
https://github.com/Chiexf/cve/issues/2
2,464,797,988
2
6,212
CVE-2024-8155
2024-08-25T23:15:04.123
A vulnerability classified as critical was found in ContiNew Admin 3.2.0. Affected by this vulnerability is the function top.continew.starter.extension.crud.controller.BaseController#tree of the file /api/system/dept/tree?sort=parentId%2Casc&sort=sort%2Casc. The manipulation of the argument sort leads to sql injection....
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PAR...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Chiexf/cve/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.275743" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:continew:admin:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C339F881-93D0-46ED-89B4-B8FA0E22E861", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "89" ]
89
https://github.com/Chiexf/cve/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Chiexf", "cve" ]
### Summary _The controllable `sort` parameter has led to SQL injection in Continue Admin v3.2.0._ ### Environment Setup _Build the backend code locally by downloading "https://github.com/continew-org/continew-admin"._ _Build the front-end page locally by downloading "https://github.com/continew-org/continew-admi...
Continew Admin V3.2.0 Presence of SQL Injection_2
https://api.github.com/repos/Chiexf/cve/issues/3/comments
0
2024-08-14T11:39:03Z
2024-08-15T15:19:19Z
https://github.com/Chiexf/cve/issues/3
2,465,601,895
3
6,213
CVE-2024-8167
2024-08-26T15:15:09.593
A vulnerability was found in code-projects Job Portal 1.0. It has been classified as critical. Affected is an unknown function of the file /forget.php. The manipulation of the argument email/mobile leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/t4rrega/cve/issues/1" }, { "source":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:job_portal:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "43FB0433-4530-4F0A-A88F-B017F5DD72F2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "89" ]
89
https://github.com/t4rrega/cve/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "t4rrega", "cve" ]
# code-projects Job Portal Using PHP With Source Code v1.0 forget.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Job Portal Using PHP With Source Code ## Vendor Homepage + https://code-projects.org/job-portal-using-php-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + t4rrega ## Vulnerable File...
code-projects Job Portal Using PHP With Source Code v1.0 forget.php SQL injection
https://api.github.com/repos/t4rrega/cve/issues/1/comments
0
2024-08-25T13:41:13Z
2024-08-25T13:43:20Z
https://github.com/t4rrega/cve/issues/1
2,485,263,489
1
6,214
CVE-2024-8168
2024-08-26T15:15:09.857
A vulnerability was found in code-projects Online Bus Reservation Site 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file login.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disc...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/t4rrega/cve/issues/2" }, { "source":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:online_bus_reservation_site:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6370AED9-FA1C-4C5C-94A3-8DC8497337DD", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/t4rrega/cve/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "t4rrega", "cve" ]
# code-projects Online Bus Reservation Site Using PHP With Source Code v1.0 login.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Bus Reservation Site Using PHP With Source Code ## Vendor Homepage + https://code-projects.org/online-bus-reservation-system-using-php-source-code/ # AFFECTED AND/OR FIXED VERS...
code-projects Online Bus Reservation Site Using PHP With Source Code v1.0 login.php SQL injection
https://api.github.com/repos/t4rrega/cve/issues/2/comments
0
2024-08-25T13:45:59Z
2024-08-25T13:45:59Z
https://github.com/t4rrega/cve/issues/2
2,485,266,983
2
6,215
CVE-2024-8169
2024-08-26T15:15:10.123
A vulnerability was found in code-projects Online Quiz Site 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file signupuser.php. The manipulation of the argument lid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/t4rrega/cve/issues/5" }, { "source":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:online_quiz_site:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "15DF6E37-6F4D-459A-823E-73DB8450C6CC", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "89" ]
89
https://github.com/t4rrega/cve/issues/5
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "t4rrega", "cve" ]
# code-projects Online Quiz Site Using PHP With Source Code v1.0 signupuser.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Quiz Site Using PHP With Source Code ## Vendor Homepage + https://code-projects.org/online-quiz-site-using-php-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + t4rreg...
code-projects Online Quiz Site Using PHP With Source Code v1.0 signupuser.php SQL injection
https://api.github.com/repos/t4rrega/cve/issues/5/comments
0
2024-08-25T13:56:04Z
2024-08-25T13:56:04Z
https://github.com/t4rrega/cve/issues/5
2,485,274,271
5
6,216
CVE-2024-8171
2024-08-26T16:15:11.273
A vulnerability classified as critical was found in itsourcecode Tailoring Management System 1.0. This vulnerability affects unknown code of the file staffcatedit.php. The manipulation of the argument title leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and ma...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/t4rrega/cve/issues/6" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://itsourcecode.com/" }, { "source": "cna@vuldb.com", "tags": [...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/t4rrega/cve/issues/6
[ "Exploit", "Issue Tracking" ]
github.com
[ "t4rrega", "cve" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 staffcatedit.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-ph...
Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 staffcatedit.php SQL injection
https://api.github.com/repos/t4rrega/cve/issues/6/comments
1
2024-08-25T13:59:06Z
2024-08-28T12:19:53Z
https://github.com/t4rrega/cve/issues/6
2,485,276,575
6
6,217
CVE-2024-44793
2024-08-26T20:15:08.007
A cross-site scripting (XSS) vulnerability in the component /managers/multiple_freeleech.php of Gazelle commit 63b3370 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the torrents parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://gazelle.com" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/WhatCD/Gazelle" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gazelle_project:gazelle:*:*:*:*:*:*:*:*", "matchCriteriaId": "032237DC-F7F0-436E-8AE6-00709E76A3A4", "versionEndExcluding": "2016-11-08", "versionEndIncluding": null, "versio...
[ "79" ]
79
https://github.com/WhatCD/Gazelle/issues/131
[ "Exploit", "Issue Tracking" ]
github.com
[ "WhatCD", "Gazelle" ]
Hello, I would like to report for a XSS vulnerability in gazelle commit 63b3370 In file https://github.com/WhatCD/Gazelle/blob/master/sections/tools/managers/multiple_freeleech.php ```php ... <textarea name="torrents" style="width: 95%; height: 200px;"><?=$_POST['torrents']?></textarea><br /><br /> // Lin...
xss_3
https://api.github.com/repos/WhatCD/Gazelle/issues/131/comments
3
2024-07-15T03:28:34Z
2025-01-05T15:31:54Z
https://github.com/WhatCD/Gazelle/issues/131
2,407,788,642
131
6,218
CVE-2024-44794
2024-08-26T20:15:08.073
A cross-site scripting (XSS) vulnerability in the component /master/auth/OnedriveRedirect.php of PicUploader commit fcf82ea allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the error_description parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://picuploader.com" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/xiebruce/PicUploader" }, { "source": "cve@mitre.org", "tags": [ "Exploit", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xiebruce:picuploader:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6938C89-B864-4B8D-A87B-5EF1F9912A0F", "versionEndExcluding": "2024-02-13", "versionEndIncluding": null, "versionSt...
[ "79" ]
79
https://github.com/xiebruce/PicUploader/issues/91
[ "Exploit", "Issue Tracking" ]
github.com
[ "xiebruce", "PicUploader" ]
Hello, I would like to report for a xss vulnerability in PicUploader commit fcf82ea # Analysis The path of the vulnerability: https://github.com/xiebruce/PicUploader/blob/master/auth/OnedriveRedirect.php ```php if(isset($_GET['code'])){ // Line 21 (Check) ... }else if(isset($_GET['error']) && ...
xss_2
https://api.github.com/repos/xiebruce/PicUploader/issues/91/comments
0
2024-07-17T08:03:24Z
2024-08-15T12:54:49Z
https://github.com/xiebruce/PicUploader/issues/91
2,412,943,655
91
6,219
CVE-2024-44795
2024-08-26T20:15:08.140
A cross-site scripting (XSS) vulnerability in the component /login/disabled.php of Gazelle commit 63b3370 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the username parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://gazelle.com" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/WhatCD/Gazelle" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gazelle_project:gazelle:*:*:*:*:*:*:*:*", "matchCriteriaId": "032237DC-F7F0-436E-8AE6-00709E76A3A4", "versionEndExcluding": "2016-11-08", "versionEndIncluding": null, "versio...
[ "79" ]
79
https://github.com/WhatCD/Gazelle/issues/129
[ "Exploit", "Issue Tracking" ]
github.com
[ "WhatCD", "Gazelle" ]
Hello, I would like to report for a XSS vulnerability in gazelle commit 63b3370 In file https://github.com/WhatCD/Gazelle/blob/master/sections/login/disabled.php ```php ... <form action="" method="POST"> <input type="email" class="inputtext" placeholder="Email Address" name="email" required /> <input ty...
xss_1
https://api.github.com/repos/WhatCD/Gazelle/issues/129/comments
1
2024-07-15T03:28:30Z
2024-08-15T12:53:23Z
https://github.com/WhatCD/Gazelle/issues/129
2,407,788,581
129
6,220
CVE-2024-44796
2024-08-26T20:15:08.200
A cross-site scripting (XSS) vulnerability in the component /auth/AzureRedirect.php of PicUploader commit fcf82ea allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the error_description parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://picuploader.com" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/xiebruce/PicUploader" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ],...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xiebruce:picuploader:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6938C89-B864-4B8D-A87B-5EF1F9912A0F", "versionEndExcluding": "2024-02-13", "versionEndIncluding": null, "versionSt...
[ "79" ]
79
https://github.com/xiebruce/PicUploader/issues/90
[ "Exploit" ]
github.com
[ "xiebruce", "PicUploader" ]
Hello, I would like to report for a xss vulnerability in PicUploader commit fcf82ea # Analysis The path of the vulnerability: https://github.com/xiebruce/PicUploader/blob/master/auth/AzureRedirect.php ```php if(isset($_GET['code'])){ // Line 21 (Check) ... }else if(isset($_GET['error']) && iss...
xss_1
https://api.github.com/repos/xiebruce/PicUploader/issues/90/comments
0
2024-07-17T08:03:23Z
2024-08-15T12:54:36Z
https://github.com/xiebruce/PicUploader/issues/90
2,412,943,616
90
6,221
CVE-2024-44797
2024-08-26T20:15:08.257
A cross-site scripting (XSS) vulnerability in the component /managers/enable_requests.php of Gazelle commit 63b3370 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the view parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://gazelle.com" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/WhatCD/Gazelle" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "u...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gazelle_project:gazelle:*:*:*:*:*:*:*:*", "matchCriteriaId": "032237DC-F7F0-436E-8AE6-00709E76A3A4", "versionEndExcluding": "2016-11-08", "versionEndIncluding": null, "versio...
[ "79" ]
79
https://github.com/WhatCD/Gazelle/issues/130
[ "Exploit" ]
github.com
[ "WhatCD", "Gazelle" ]
Hello, I would like to report for a XSS vulnerability in gazelle commit 63b3370 In file https://github.com/WhatCD/Gazelle/blob/master/sections/tools/managers/enable_requests.php ```php <input type="hidden" name="view" value="<?=$_GET['view']?>" /> // Line 159 <td><input type="text" name="username" value="<...
xss_2
https://api.github.com/repos/WhatCD/Gazelle/issues/130/comments
1
2024-07-15T03:28:32Z
2024-08-15T12:53:39Z
https://github.com/WhatCD/Gazelle/issues/130
2,407,788,608
130
6,222
CVE-2024-45321
2024-08-27T04:15:09.010
The App::cpanminus package through 1.7047 for Perl downloads code via insecure HTTP, enabling code execution for network attackers.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/miyagawa/cpanminus/issues/611" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/miyagawa/cpanminus/pull/674" }, { "sour...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:app\\:\\:cpanminus_project:app\\:\\:cpanminus:*:*:*:*:*:perl:*:*", "matchCriteriaId": "E7633BA7-2A2E-45A8-9A0F-69E1E35D0D2A", "versionEndExcluding": null, "versionEndIncluding": "1.7047"...
[ "494" ]
494
https://github.com/miyagawa/cpanminus/issues/611
[ "Issue Tracking" ]
github.com
[ "miyagawa", "cpanminus" ]
Hi! I'm starting to work across the community to try and help "[Securing Perl](https://docs.google.com/document/d/1DRkiCJhJu4RDI0u_JppBpFa0djouskxEyNHax912U_w/edit#)" by encouraging the checking of module signatures, moving mirrors to HTTPS, nudging defaults toward connecting to HTTPS mirrors when possible, and checkin...
Securing Perl: cpanm HTTPS + verify_SSL + verify signatures?
https://api.github.com/repos/miyagawa/cpanminus/issues/611/comments
18
2020-06-24T07:03:53Z
2024-09-09T10:10:48Z
https://github.com/miyagawa/cpanminus/issues/611
644,372,617
611
6,223
CVE-2024-43788
2024-08-27T17:15:07.967
Webpack is a module bundler. Its main purpose is to bundle JavaScript files for usage in a browser, yet it is also capable of transforming, bundling, or packaging just about any resource or asset. The webpack developers have discovered a DOM Clobbering vulnerability in Webpack’s `AutoPublicPathRuntimeModule`. The DOM C...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "inte...
[ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/webpack/webpack/commit/955e057abc6cc83cbc3fa1e1ef67a49758bf5a61" }, { "source": "security-advisories@github.com", "tags": null, "url": "https://github.com/webpack/webpack/issues/18718#...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webpack.js:webpack:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "10BD162E-912D-4458-A67B-F7BC3602FDC5", "versionEndExcluding": "5.94.0", "versionEndIncluding": null, "versionSt...
[ "79" ]
79
https://github.com/webpack/webpack/issues/18718#issuecomment-2326296270
null
github.com
[ "webpack", "webpack" ]
I see CVE-2024-43788 was [patched](https://github.com/webpack/webpack/pull/18700) in Webpack 5, and the CVE shows that Webpack 4 and below are affected, but are Webpack 4 and below actually affected? I don't see any code in Webpack 4 that looks like the patch that was applied to Webpack 5.
Does CVE-2024-43788 actually affect Webpack 4?
https://api.github.com/repos/webpack/webpack/issues/18718/comments
7
2024-08-28T17:19:38Z
2024-09-17T14:17:02Z
https://github.com/webpack/webpack/issues/18718
2,492,626,936
18,718
6,224
CVE-2024-8218
2024-08-27T21:15:08.350
A vulnerability was found in code-projects Online Quiz Site 1.0 and classified as critical. This issue affects some unknown processing of the file index.php. The manipulation of the argument loginid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be use...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/t4rrega/cve/issues/7" }, { "source": "cna@vuldb.com", "t...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:online_quiz_site:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "15DF6E37-6F4D-459A-823E-73DB8450C6CC", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "89" ]
89
https://github.com/t4rrega/cve/issues/7
[ "Exploit", "Third Party Advisory" ]
github.com
[ "t4rrega", "cve" ]
# code-projects Online Quiz Site Using PHP With Source Code v1.0 index.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Quiz Site Using PHP With Source Code ## Vendor Homepage + https://code-projects.org/online-quiz-site-using-php-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + t4rrega ##...
code-projects Online Quiz Site Using PHP With Source Code v1.0 index.php SQL injection
https://api.github.com/repos/t4rrega/cve/issues/7/comments
0
2024-08-26T13:48:47Z
2024-08-26T15:25:03Z
https://github.com/t4rrega/cve/issues/7
2,486,925,466
7
6,225
CVE-2024-8219
2024-08-27T22:15:05.340
A vulnerability was found in code-projects Responsive Hotel Site 1.0. It has been classified as critical. Affected is an unknown function of the file index.php. The manipulation of the argument name/phone/email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the p...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/t4rrega/cve/issues/8" }, { "source": "cna@vuldb.com", "t...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:responsive_hotel_site:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E1C10207-0B0E-455F-B5AE-2CAA6C98BA15", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/t4rrega/cve/issues/8
[ "Exploit", "Third Party Advisory" ]
github.com
[ "t4rrega", "cve" ]
# code-projects Responsive Hotel Site Using PHP With Source Code v1.0 index.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Responsive Hotel Site Using PHP With Source Code ## Vendor Homepage + https://code-projects.org/responsive-hotel-site-using-php-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter...
code-projects Responsive Hotel Site Using PHP With Source Code v1.0 index.php SQL injection
https://api.github.com/repos/t4rrega/cve/issues/8/comments
0
2024-08-26T13:52:14Z
2024-08-26T15:25:14Z
https://github.com/t4rrega/cve/issues/8
2,486,933,355
8
6,226
CVE-2024-8220
2024-08-27T22:15:05.630
A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file staffedit.php. The manipulation of the argument id/stafftype/address/fullname/phonenumber/salary leads to sql injection. The attack can be l...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/dd456-dd/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://itsourcecode.com/" }, { "source": "cna@vuldb.com", "t...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/dd456-dd/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "dd456-dd", "cve" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 staffedit.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-w...
Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 staffedit.php SQL injection
https://api.github.com/repos/dd456-dd/cve/issues/1/comments
1
2024-08-26T14:13:31Z
2024-08-26T14:13:40Z
https://github.com/dd456-dd/cve/issues/1
2,486,983,875
1
6,227
CVE-2024-45054
2024-08-28T20:15:08.547
Hwameistor is an HA local storage system for cloud-native stateful workloads. This ClusterRole has * verbs of * resources. If a malicious user can access the worker node which has hwameistor's deployment, he/she can abuse these excessive permissions to do whatever he/she likes to the whole cluster, resulting in a clust...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityI...
[ { "source": "security-advisories@github.com", "tags": [ "Product" ], "url": "https://github.com/hwameistor/hwameistor/blob/main/helm/hwameistor/templates/clusterrole.yaml" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hwameistor:hwameistor:*:*:*:*:*:go:*:*", "matchCriteriaId": "789E23CD-2922-45F8-BD3A-AD17E16D06CA", "versionEndExcluding": "0.14.6", "versionEndIncluding": null, "versionStar...
[ "200" ]
200
https://github.com/hwameistor/hwameistor/issues/1457
[ "Issue Tracking" ]
github.com
[ "hwameistor", "hwameistor" ]
Hi community! I just found a possible security issue when reading the code. I would like to discuss whether it is a real vulnerability. ## Description The bug is that the DaemonSet `hwameistor-local-disk-manager` in the charts has too much RBAC permission than it needs, which may cause some security problems, and...
[Bug] DaemonSet hwameistor-local-disk-manager has too much RBAC permission which may leads the whole cluster being hijacked
https://api.github.com/repos/hwameistor/hwameistor/issues/1457/comments
2
2024-04-28T13:52:58Z
2024-07-29T01:36:37Z
https://github.com/hwameistor/hwameistor/issues/1457
2,267,577,538
1,457
6,228
CVE-2024-45054
2024-08-28T20:15:08.547
Hwameistor is an HA local storage system for cloud-native stateful workloads. This ClusterRole has * verbs of * resources. If a malicious user can access the worker node which has hwameistor's deployment, he/she can abuse these excessive permissions to do whatever he/she likes to the whole cluster, resulting in a clust...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityI...
[ { "source": "security-advisories@github.com", "tags": [ "Product" ], "url": "https://github.com/hwameistor/hwameistor/blob/main/helm/hwameistor/templates/clusterrole.yaml" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hwameistor:hwameistor:*:*:*:*:*:go:*:*", "matchCriteriaId": "789E23CD-2922-45F8-BD3A-AD17E16D06CA", "versionEndExcluding": "0.14.6", "versionEndIncluding": null, "versionStar...
[ "200" ]
200
https://github.com/hwameistor/hwameistor/issues/1460
[ "Issue Tracking" ]
github.com
[ "hwameistor", "hwameistor" ]
Dear Team Members: Greetings! Our team is very interested in your project and we recently identified a potential RBAC security risk while doing a security assessment of your project. Therefore, we would like to report it to you and provide you with the relevant details so that you can fix and improve it accordingly....
A potential risk in hwameistor that could lead to takeover the cluster
https://api.github.com/repos/hwameistor/hwameistor/issues/1460/comments
2
2024-04-29T07:56:29Z
2024-07-25T09:06:47Z
https://github.com/hwameistor/hwameistor/issues/1460
2,268,367,950
1,460
6,229
CVE-2024-45435
2024-08-29T03:15:05.357
Chartist 1.x through 1.3.0 allows Prototype Pollution via the extend function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://gist.github.com/tariqhawis/c67177164d3b7975210caddb25b60d62" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/chartist-js/chartist/issues/1427" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chartist:chartist:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "EC330989-A887-440D-9A6A-AFE444D028C7", "versionEndExcluding": null, "versionEndIncluding": "1.3.0", "versionStar...
[ "1321" ]
1321
https://github.com/chartist-js/chartist/issues/1427
[ "Issue Tracking" ]
github.com
[ "chartist-js", "chartist" ]
### Would you like to work on a fix? - [ ] Check this if you would like to implement a PR, we are more than happy to help you go through the process. ### Current and expected behavior ### Overview A Prototype Pollution vulnerability Affecting chartist , versions >=1.0.0 <=1.3.0, due to missing check if th...
[Bug]: Prototype Pollution Vulnerability Affecting chartist module, versions >=1.0.0 <=1.3.0
https://api.github.com/repos/chartist-js/chartist/issues/1427/comments
3
2024-03-29T20:52:33Z
2025-04-07T18:21:10Z
https://github.com/chartist-js/chartist/issues/1427
2,215,986,311
1,427
6,230
CVE-2024-8297
2024-08-29T13:15:07.370
A vulnerability was found in kitsada8621 Digital Library Management System 1.0. It has been classified as problematic. Affected is the function JwtRefreshAuth of the file middleware/jwt_refresh_token_middleware.go. The manipulation of the argument Authorization leads to improper output neutralization for logs. It is po...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/kitsada8621/Digital-Library-Management-System/commit/81b3336b4c9240f0bf50c13cb8375cf860d945f1" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking", "Product" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kitsada8621:digital_library_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D1405CD5-ECA2-4027-B5A3-89E60FDF28E4", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "116" ]
116
https://github.com/kitsada8621/Digital-Library-Management-System/issues/1
[ "Issue Tracking", "Product" ]
github.com
[ "kitsada8621", "Digital-Library-Management-System" ]
``` header := ctx.GetHeader("Authorization") if header == "" { ctx.JSON(http.StatusUnauthorized, models.ResponseJson{ Success: false, Message: "authorization is required", }) ctx.Abort() return } parts := strings.Split(header, " ") fmt.Println(parts) ``` In line 28 of the mi...
log-injection in middleware/jwt_refresh_token_middleware.go
https://api.github.com/repos/kitsada8621/Digital-Library-Management-System/issues/1/comments
0
2024-08-20T10:34:12Z
2024-08-20T10:34:12Z
https://github.com/kitsada8621/Digital-Library-Management-System/issues/1
2,475,300,907
1
6,231
CVE-2024-8304
2024-08-29T15:15:35.070
A vulnerability has been found in jpress up to 5.1.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/template/edit of the component Template Module Handler. The manipulation leads to path traversal. The attack can be launched remotely. The exploit has been discl...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PAR...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/JPressProjects/jpress/issues/189" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.276079" }, { "source":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpress:jpress:*:*:*:*:*:*:*:*", "matchCriteriaId": "F631C7C4-C4DB-4188-A24F-5E127F52571A", "versionEndExcluding": null, "versionEndIncluding": "5.1.1", "versionStartExcluding...
[ "22" ]
22
https://github.com/JPressProjects/jpress/issues/189
[ "Exploit", "Issue Tracking" ]
github.com
[ "JPressProjects", "jpress" ]
## Affected version ≤Jpress v5.1.1 ## Vendor https://github.com/JPressProjects/jpress ## vulnerability File jfinal-5.1.9.jar ## Description Enter the background at [http://127.0.0.1:8080/admin/login](http://127.0.0.1:8080/admin/login). In System Management → Template → Edit Module, select to ed...
jpress has an arbitrary file read vulnerability
https://api.github.com/repos/JPressProjects/jpress/issues/189/comments
0
2024-08-22T14:51:08Z
2024-08-22T14:51:08Z
https://github.com/JPressProjects/jpress/issues/189
2,480,992,964
189
6,232
CVE-2024-44930
2024-08-29T18:15:14.830
Serilog before v2.1.0 was discovered to contain a Client IP Spoofing vulnerability, which allows attackers to falsify their IP addresses by specifying an arbitrary IP as a value of X-Forwarded-For or Client-Ip headers while performing HTTP requests.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/serilog-contrib/serilog-enrichers-clientinfo/issues/29" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/serilog-contrib/serilog-enrichers-clie...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:serilog-contrib:serilog-enrichers-clientinfo:*:*:*:*:*:*:*:*", "matchCriteriaId": "88E20775-E328-4A4C-AA68-7AC7BF303C43", "versionEndExcluding": "2.1.0", "versionEndIncluding": null, ...
[ "79" ]
79
https://github.com/serilog-contrib/serilog-enrichers-clientinfo/issues/29
[ "Issue Tracking" ]
github.com
[ "serilog-contrib", "serilog-enrichers-clientinfo" ]
Instead of directly reading the X-Forwarded-Header by default, it's much better to use the ForwardedHeaders middleware (https://learn.microsoft.com/en-us/aspnet/core/host-and-deploy/proxy-load-balancer?view=aspnetcore-7.0) and then let that middleware set the HttpContext.Connection.RemoteIpAddress so we only log that i...
ClientIp enricher should have a way to not read X-Forwarded-For
https://api.github.com/repos/serilog-contrib/serilog-enrichers-clientinfo/issues/29/comments
8
2023-10-29T19:52:46Z
2024-08-29T20:50:35Z
https://github.com/serilog-contrib/serilog-enrichers-clientinfo/issues/29
1,967,132,009
29
6,233
CVE-2024-41345
2024-08-29T20:15:08.393
openflights commit 5234b5b is vulnerable to Cross-Site Scripting (XSS) via php/trip.php
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/jpatokal/openflights/issues/1480" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpatokal:openflights:2024-08-20:*:*:*:*:*:*:*", "matchCriteriaId": "DDD7A74D-22DA-4AB3-A155-268E6FE10A96", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "79" ]
79
https://github.com/jpatokal/openflights/issues/1480
[ "Exploit", "Issue Tracking" ]
github.com
[ "jpatokal", "openflights" ]
Hello, I would like to report for a XSS vulnerability in openflights. The path of the vulnerability. In file https://github.com/jpatokal/openflights/blob/master/php/trip.php ``` $type = $_POST["type"]; // Line 6 $trid = $_POST["trid"] ?? null; // Line 7 if ($type != "NEW" && (!$trid || $trid ...
XSS vulnerability_4
https://api.github.com/repos/jpatokal/openflights/issues/1480/comments
0
2024-07-09T03:16:34Z
2024-08-22T11:54:32Z
https://github.com/jpatokal/openflights/issues/1480
2,397,005,522
1,480
6,234
CVE-2024-41346
2024-08-29T20:15:08.483
openflights commit 5234b5b is vulnerable to Cross-Site Scripting (XSS) via php/submit.php
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/jpatokal/openflights/issues/1479" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpatokal:openflights:2024-08-20:*:*:*:*:*:*:*", "matchCriteriaId": "DDD7A74D-22DA-4AB3-A155-268E6FE10A96", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "79" ]
79
https://github.com/jpatokal/openflights/issues/1479
[ "Exploit", "Issue Tracking" ]
github.com
[ "jpatokal", "openflights" ]
Hello, I would like to report for a XSS vulnerability in openflights. The path of the vulnerability. In file https://github.com/jpatokal/openflights/blob/master/php/submit.php ``` $uid = $_SESSION["uid"]; // Line 4 if (!$uid || empty($uid)) { // Line 5 printf(_("Not logged in, aborting")); ...
XSS vulnerability_3
https://api.github.com/repos/jpatokal/openflights/issues/1479/comments
0
2024-07-09T03:15:53Z
2024-08-22T11:54:32Z
https://github.com/jpatokal/openflights/issues/1479
2,397,004,832
1,479
6,235
CVE-2024-41347
2024-08-29T20:15:08.573
openflights commit 5234b5b is vulnerable to Cross-Site Scripting (XSS) via php/settings.php
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/jpatokal/openflights/issues/1477" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpatokal:openflights:2024-08-20:*:*:*:*:*:*:*", "matchCriteriaId": "DDD7A74D-22DA-4AB3-A155-268E6FE10A96", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "79" ]
79
https://github.com/jpatokal/openflights/issues/1477
[ "Exploit", "Issue Tracking" ]
github.com
[ "jpatokal", "openflights" ]
Hello, I would like to report for a xss vulnerability in openflights. The path of the vulnerability. In file https://github.com/jpatokal/openflights/blob/master/php/settings.php ``` $type = $_POST["type"]; //Line 6 ... die("0;" . sprintf(_("Unknown action %s"), $type)); //Line 60 ``` We see that ...
XSS vulnerability_1
https://api.github.com/repos/jpatokal/openflights/issues/1477/comments
3
2024-07-09T03:10:14Z
2024-08-22T11:54:31Z
https://github.com/jpatokal/openflights/issues/1477
2,396,998,856
1,477
6,236
CVE-2024-41348
2024-08-29T20:15:08.667
openflights commit 5234b5b is vulnerable to Cross-Site Scripting (XSS) via php/alsearch.php
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/jpatokal/openflights/issues/1478" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpatokal:openflights:2024-08-20:*:*:*:*:*:*:*", "matchCriteriaId": "DDD7A74D-22DA-4AB3-A155-268E6FE10A96", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "79" ]
79
https://github.com/jpatokal/openflights/issues/1478
[ "Exploit", "Issue Tracking" ]
github.com
[ "jpatokal", "openflights" ]
Hello, I would like to report for multiple XSS vulnerabilities in openflights. The path of the vulnerability. In file https://github.com/jpatokal/openflights/blob/master/php/alsearch.php A total of three XSS vulnerabilities were found, one of which did not require any permissions and two required normal use...
multiple XSS vulnerabilities_2
https://api.github.com/repos/jpatokal/openflights/issues/1478/comments
1
2024-07-09T03:14:25Z
2024-08-22T13:11:49Z
https://github.com/jpatokal/openflights/issues/1478
2,397,003,191
1,478
6,237
CVE-2024-41358
2024-08-29T20:15:08.873
phpipam 1.6 is vulnerable to Cross Site Scripting (XSS) via app\admin\import-export\import-load-data.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/phpipam/phpipam/issues/4148" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpipam:phpipam:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "76AB84E7-3B77-4A35-B047-7DE3D2D77950", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/phpipam/phpipam/issues/4148
[ "Exploit", "Issue Tracking" ]
github.com
[ "phpipam", "phpipam" ]
Hello, I would like to report for multiple XSS vulnerabilities in phpipam-1.6. The source come from file: app\admin\import-export\import-load-data.php The sink in: app\admin\import-export\import-devices-preview.php(**Other files include import-load-data.php are also vulnerable**) # XSS1 ```php # im...
xss_4
https://api.github.com/repos/phpipam/phpipam/issues/4148/comments
0
2024-07-11T03:23:15Z
2024-07-15T20:35:45Z
https://github.com/phpipam/phpipam/issues/4148
2,402,156,061
4,148
6,238
CVE-2024-41361
2024-08-29T20:15:08.953
RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\manageFilesFolders.php
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2398" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sourcefabric:phoniebox:2.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D8F3672-D6B8-4655-908F-417A730F8081", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "94" ]
94
https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2398
[ "Exploit", "Issue Tracking" ]
github.com
[ "MiczFlor", "RPi-Jukebox-RFID" ]
### Version v2.7.0 ### Branch released ### OS ubuntu 22 ### Pi model unknown ### Hardware _No response_ ### What happened? Hello, I would like to report for a RCE vulnerability in RPi-Jukebox-RFID-v2.7(**No permissions required**) # Analysis The path of the vulnerability: htdocs\manageFilesFolders....
🐛 | RPi-Jukebox-RFID V2.7_RCE_3
https://api.github.com/repos/MiczFlor/RPi-Jukebox-RFID/issues/2398/comments
1
2024-07-11T17:29:36Z
2024-07-12T04:51:34Z
https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2398
2,403,698,934
2,398
6,239
CVE-2024-41364
2024-08-29T20:15:09.033
RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\trackEdit.php
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2400" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sourcefabric:phoniebox:2.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D8F3672-D6B8-4655-908F-417A730F8081", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "94" ]
94
https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2400
[ "Exploit", "Issue Tracking" ]
github.com
[ "MiczFlor", "RPi-Jukebox-RFID" ]
### Version v2.7.0 ### Branch released ### OS ubuntu 22 ### Pi model unknown ### Hardware _No response_ ### What happened? Hello, I would like to report for a RCE vulnerability in RPi-Jukebox-RFID-v2.7(**No permissions required**) # Analysis The path of the vulnerability: htdocs\trackEdit.php ``...
🐛 | RPi-Jukebox-RFID V2.7_RCE_5
https://api.github.com/repos/MiczFlor/RPi-Jukebox-RFID/issues/2400/comments
1
2024-07-11T17:29:42Z
2024-07-12T04:57:33Z
https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2400
2,403,699,086
2,400
6,240
CVE-2024-41366
2024-08-29T20:15:09.113
RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\userScripts.php
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2399" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sourcefabric:phoniebox:2.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D8F3672-D6B8-4655-908F-417A730F8081", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "94" ]
94
https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2399
[ "Exploit", "Issue Tracking" ]
github.com
[ "MiczFlor", "RPi-Jukebox-RFID" ]
### Version v2.7.0 ### Branch released ### OS ubuntu 22 ### Pi model unknown ### Hardware _No response_ ### What happened? Hello, I would like to report for a RCE vulnerability in RPi-Jukebox-RFID-v2.7(**No permissions required**) # Analysis The path of the vulnerability: htdocs\userScripts.php ...
🐛 | RPi-Jukebox-RFID V2.7_RCE_4
https://api.github.com/repos/MiczFlor/RPi-Jukebox-RFID/issues/2399/comments
1
2024-07-11T17:29:39Z
2024-07-12T04:54:46Z
https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2399
2,403,699,035
2,399
6,241
CVE-2024-41367
2024-08-29T20:15:09.193
RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\api\playlist\appendFileToPlaylist.php
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2397" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sourcefabric:phoniebox:2.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D8F3672-D6B8-4655-908F-417A730F8081", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "94" ]
94
https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2397
[ "Exploit", "Issue Tracking" ]
github.com
[ "MiczFlor", "RPi-Jukebox-RFID" ]
### Version v2.7.0 ### Branch released ### OS ubuntu 22 ### Pi model unknown ### Hardware _No response_ ### What happened? Hello, I would like to report for a RCE vulnerability in RPi-Jukebox-RFID-v2.7(**No permissions required**) # Analysis The path of the vulnerability: htdocs\api\playlist\append...
🐛 | RPi-Jukebox-RFID V2.7_RCE_2
https://api.github.com/repos/MiczFlor/RPi-Jukebox-RFID/issues/2397/comments
1
2024-07-11T17:29:34Z
2024-07-12T04:47:33Z
https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2397
2,403,698,874
2,397
6,242
CVE-2024-41368
2024-08-29T20:15:09.277
RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\inc.setWlanIpMail.php
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2396" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sourcefabric:phoniebox:2.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D8F3672-D6B8-4655-908F-417A730F8081", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "94" ]
94
https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2396
[ "Exploit", "Issue Tracking" ]
github.com
[ "MiczFlor", "RPi-Jukebox-RFID" ]
### Version v2.7.0 ### Branch released ### OS ubuntu 22 ### Pi model unknown ### Hardware _No response_ ### What happened? Hello, I would like to report for a RCE vulnerability in RPi-Jukebox-RFID-v2.7(**No permissions required**) # Analysis The path of the vulnerability: htdocs\inc.setWlanIpMail.p...
🐛 | RPi-Jukebox-RFID V2.7_RCE_1
https://api.github.com/repos/MiczFlor/RPi-Jukebox-RFID/issues/2396/comments
3
2024-07-11T17:29:32Z
2024-07-13T09:15:46Z
https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2396
2,403,698,799
2,396
6,243
CVE-2024-41369
2024-08-29T20:15:09.350
RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\inc.setWifi.php
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2401" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sourcefabric:phoniebox:2.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D8F3672-D6B8-4655-908F-417A730F8081", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "94" ]
94
https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2401
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "MiczFlor", "RPi-Jukebox-RFID" ]
### Version v2.7.0 ### Branch released ### OS ubuntu 22 ### Pi model unknown ### Hardware _No response_ ### What happened? Hello, I would like to report for a RCE vulnerability in RPi-Jukebox-RFID-v2.7(**No permissions required**) # Analysis The path of the vulnerability: htdocs\inc.setWifi.php ...
🐛 | RPi-Jukebox-RFID V2.7_RCE_6
https://api.github.com/repos/MiczFlor/RPi-Jukebox-RFID/issues/2401/comments
0
2024-07-12T06:08:17Z
2024-07-12T06:08:32Z
https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2401
2,404,828,568
2,401
6,244
CVE-2024-41370
2024-08-29T20:15:09.433
Organizr v1.90 was discovered to contain a SQL injection vulnerability via chat/setlike.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/causefx/Organizr" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/causefx/Organizr/issues/1998" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:organizr:organizr:1.90:*:*:*:*:*:*:*", "matchCriteriaId": "4B3D3C6A-EA37-41D2-8289-A9EAFCF3CA7F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "89" ]
89
https://github.com/causefx/Organizr/issues/1998
[ "Exploit", "Issue Tracking" ]
github.com
[ "causefx", "Organizr" ]
Hello, I would like to report for a Sqli vulnerability in Organizr-v1.9, This vulnerability can lead to RCE. # Analysis The path of the vulnerability: chat/setlike.php ```php $messageid = $_POST["messageid"]; // Line 3(Source) ... $db->exec("UPDATE chatpack_log SET liked='0' WHERE id='$messageid'"); // ...
SQLI(RCE)_1 in Organizr-v1.9
https://api.github.com/repos/causefx/Organizr/issues/1998/comments
1
2024-07-12T14:27:54Z
2024-07-12T16:08:52Z
https://github.com/causefx/Organizr/issues/1998
2,405,740,963
1,998
6,245
CVE-2024-41371
2024-08-29T20:15:09.493
Organizr v1.90 is vulnerable to Cross Site Scripting (XSS) via api.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/causefx/Organizr" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/causefx/Organizr/issues/1997" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:organizr:organizr:1.90:*:*:*:*:*:*:*", "matchCriteriaId": "4B3D3C6A-EA37-41D2-8289-A9EAFCF3CA7F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "79" ]
79
https://github.com/causefx/Organizr/issues/1997
[ "Exploit", "Issue Tracking" ]
github.com
[ "causefx", "Organizr" ]
Hello, I would like to report for a xss vulnerability in Organizr-v1.9 (**No permissions required**) # Analysis The path of the vulnerability: api.php ```php if (isset($_GET['a'])) { $action = $_GET['a']; } // Line 9(Source) if (isset($_GET['k'])) { $key = $_GET['k']; } // Line 10 ... if (!isset($ke...
xxs in Organizr-v1.9
https://api.github.com/repos/causefx/Organizr/issues/1997/comments
1
2024-07-12T14:27:53Z
2024-07-12T16:08:42Z
https://github.com/causefx/Organizr/issues/1997
2,405,740,841
1,997
6,246
CVE-2024-41372
2024-08-29T20:15:09.553
Organizr v1.90 was discovered to contain a SQL injection vulnerability via chat/settyping.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/causefx/Organizr" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/causefx/Organizr/issues/1999" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:organizr:organizr:1.90:*:*:*:*:*:*:*", "matchCriteriaId": "4B3D3C6A-EA37-41D2-8289-A9EAFCF3CA7F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "89" ]
89
https://github.com/causefx/Organizr/issues/1999
[ "Exploit", "Issue Tracking" ]
github.com
[ "causefx", "Organizr" ]
Hello, I would like to report for a Sqli vulnerability in Organizr-v1.9, This vulnerability can lead to RCE. # Analysis The path of the vulnerability: chat/settyping.php ```php $data = $_POST["datavars"]; // Line 3(Source) $dataarray = explode("###", $data); $user = $dataarray[0]; $settyping = $dataa...
SQLI(RCE)_2 in Organizr-v1.9
https://api.github.com/repos/causefx/Organizr/issues/1999/comments
3
2024-07-12T14:27:57Z
2024-07-12T16:09:04Z
https://github.com/causefx/Organizr/issues/1999
2,405,741,088
1,999
6,247
CVE-2024-41349
2024-08-29T21:15:10.433
unmark 1.9.2 is vulnerable to Cross Site Scripting (XSS) via application/views/marks/add_by_url.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/cdevroe/unmark/issues/290" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cdevroe:unmark:1.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "04DDDEEB-EC3D-4E0A-9DD9-C0B078E5B5C5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "79" ]
79
https://github.com/cdevroe/unmark/issues/290
[ "Exploit", "Issue Tracking" ]
github.com
[ "cdevroe", "unmark" ]
Hello, I would like to report for a xss vulnerability in unmark-1.9.2. The path of the vulnerability. In file application/views/marks/add_by_url.php ```php if ( $_POST ) : // Line 3 $url = $_POST['url']; // Line 7 echo '<p><strong>URL:</strong>' . $url . '</p>'; // Line 8 ``` ...
XSS vulnerability
https://api.github.com/repos/cdevroe/unmark/issues/290/comments
0
2024-07-09T12:10:19Z
2024-07-09T12:10:19Z
https://github.com/cdevroe/unmark/issues/290
2,398,031,234
290
6,248
CVE-2024-45490
2024-08-30T03:15:03.757
An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/libexpat/libexpat/issues/887" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/libexpat/libexpat/pull/890" }, { "source": "af854a3a-2127-422b-9...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*", "matchCriteriaId": "FDDF6E7A-AF1C-4370-B0B0-29A35C454FFB", "versionEndExcluding": "2.6.3", "versionEndIncluding": null, "versionSt...
[ "611" ]
611
https://github.com/libexpat/libexpat/issues/887
[ "Issue Tracking" ]
github.com
[ "libexpat", "libexpat" ]
`xmlparse.c` does not reject a negative length for `XML_ParseBuffer()`, which may cause memory corruption or code execution.
CVE-2024-45490
https://api.github.com/repos/libexpat/libexpat/issues/887/comments
3
2024-08-26T03:42:05Z
2024-09-05T01:22:57Z
https://github.com/libexpat/libexpat/issues/887
2,485,799,902
887
6,249
CVE-2024-45491
2024-08-30T03:15:03.850
An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/libexpat/libexpat/issues/888" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/libexpat/libexpat/pull/891" }, { "source": "af854a3a-2127-422b-9...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*", "matchCriteriaId": "FDDF6E7A-AF1C-4370-B0B0-29A35C454FFB", "versionEndExcluding": "2.6.3", "versionEndIncluding": null, "versionSt...
[ "190" ]
190
https://github.com/libexpat/libexpat/issues/888
[ "Issue Tracking" ]
github.com
[ "libexpat", "libexpat" ]
`xmlparse.c` has an integer overflow for `nDefaultAtts` on 32-bit platforms, which may cause denial of service or code execution.
CVE-2024-45491
https://api.github.com/repos/libexpat/libexpat/issues/888/comments
1
2024-08-26T03:42:28Z
2024-09-05T01:23:40Z
https://github.com/libexpat/libexpat/issues/888
2,485,800,340
888
6,250
CVE-2024-45492
2024-08-30T03:15:03.930
An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/libexpat/libexpat/issues/889" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/libexpat/libexpat/pull/892" }, { "source": "af854a3a-2127-422b-9...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*", "matchCriteriaId": "FDDF6E7A-AF1C-4370-B0B0-29A35C454FFB", "versionEndExcluding": "2.6.3", "versionEndIncluding": null, "versionSt...
[ "190" ]
190
https://github.com/libexpat/libexpat/issues/889
[ "Issue Tracking" ]
github.com
[ "libexpat", "libexpat" ]
`xmlparse.c` has an integer overflow for `m_groupSize` on 32-bit platforms, which may cause denial of service or code execution.
CVE-2024-45492
https://api.github.com/repos/libexpat/libexpat/issues/889/comments
1
2024-08-26T03:42:49Z
2024-09-05T01:23:58Z
https://github.com/libexpat/libexpat/issues/889
2,485,800,734
889
6,251
CVE-2024-8332
2024-08-30T12:15:04.657
A vulnerability was found in master-nan Sweet-CMS up to 5f441e022b8876f07cde709c77b5be6d2f262e3f. It has been declared as critical. This vulnerability affects unknown code of the file /table/index. The manipulation leads to sql injection. The attack can be initiated remotely. This product is using a rolling release to ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/master-nan/sweet-cms/commit/146359646a5a90cb09156dbd0013b7df77f2aa6c" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/master-nan/swee...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:master-nan:sweet-cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFB82646-0A21-4490-A9EB-0264F9692648", "versionEndExcluding": "2024-08-28", "versionEndIncluding": null, "versionSt...
[ "89" ]
89
https://github.com/master-nan/sweet-cms/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "master-nan", "sweet-cms" ]
In line 63 of the repository/impl/ sys_table_imp.go file, you use fmt.Sprintf to build SQL statements directly, including user-supplied values (via the parameters indexName, tableName, and fields). If an attacker is able to control any of these parameters, they could inject malicious SQL code into them to manipulate da...
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in /table/index
https://api.github.com/repos/master-nan/sweet-cms/issues/1/comments
1
2024-08-27T16:59:13Z
2024-08-28T06:42:48Z
https://github.com/master-nan/sweet-cms/issues/1
2,489,915,764
1
6,252
CVE-2024-8332
2024-08-30T12:15:04.657
A vulnerability was found in master-nan Sweet-CMS up to 5f441e022b8876f07cde709c77b5be6d2f262e3f. It has been declared as critical. This vulnerability affects unknown code of the file /table/index. The manipulation leads to sql injection. The attack can be initiated remotely. This product is using a rolling release to ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/master-nan/sweet-cms/commit/146359646a5a90cb09156dbd0013b7df77f2aa6c" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/master-nan/swee...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:master-nan:sweet-cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFB82646-0A21-4490-A9EB-0264F9692648", "versionEndExcluding": "2024-08-28", "versionEndIncluding": null, "versionSt...
[ "89" ]
89
https://github.com/master-nan/sweet-cms/issues/2
[ "Exploit", "Issue Tracking" ]
github.com
[ "master-nan", "sweet-cms" ]
Vulnerability Description: The query relies on user-supplied values. In this case, the problem is with the dynamically constructed dropIndexSQL statement. Using user-supplied 'indexName' and 'tableName' to insert directly into SQL statements without proper validation and/or escape can lead an attacker to insert malic...
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in /table/index/:id
https://api.github.com/repos/master-nan/sweet-cms/issues/2/comments
1
2024-08-27T17:02:33Z
2024-08-28T06:43:05Z
https://github.com/master-nan/sweet-cms/issues/2
2,489,921,868
2
6,253
CVE-2024-8334
2024-08-30T13:15:12.587
A vulnerability was found in master-nan Sweet-CMS up to 5f441e022b8876f07cde709c77b5be6d2f262e3f. It has been rated as problematic. This issue affects the function LogHandler of the file middleware/log.go. The manipulation leads to improper output neutralization for logs. The attack may be initiated remotely. This prod...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/master-nan/sweet-cms/commit/2024c370e6c78b07b358c9d4257fa5d1be732c38" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/master-nan/sweet-cms/issues/3" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:master-nan:sweet-cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D137526-44BB-408B-9776-E98590D6EFD6", "versionEndExcluding": null, "versionEndIncluding": "2024-08-27", "versionSt...
[ "117" ]
117
https://github.com/master-nan/sweet-cms/issues/3
[ "Issue Tracking" ]
github.com
[ "master-nan", "sweet-cms" ]
Cause of vulnerability: In lines 58-62 of the file 'middleware/log.go', the log entry relies on a user-supplied value (' c.reequest '). If the values provided by the user contain special characters or malicious code, these values may be logged directly into the log, resulting in log injection attacks. Attackers may m...
Improper Output Neutralization for Logs in middleware/log.go
https://api.github.com/repos/master-nan/sweet-cms/issues/3/comments
1
2024-08-27T17:03:15Z
2024-08-28T06:43:51Z
https://github.com/master-nan/sweet-cms/issues/3
2,489,923,237
3
6,254
CVE-2024-8334
2024-08-30T13:15:12.587
A vulnerability was found in master-nan Sweet-CMS up to 5f441e022b8876f07cde709c77b5be6d2f262e3f. It has been rated as problematic. This issue affects the function LogHandler of the file middleware/log.go. The manipulation leads to improper output neutralization for logs. The attack may be initiated remotely. This prod...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/master-nan/sweet-cms/commit/2024c370e6c78b07b358c9d4257fa5d1be732c38" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/master-nan/sweet-cms/issues/3" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:master-nan:sweet-cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D137526-44BB-408B-9776-E98590D6EFD6", "versionEndExcluding": null, "versionEndIncluding": "2024-08-27", "versionSt...
[ "117" ]
117
https://github.com/master-nan/sweet-cms/issues/3#issuecomment-2314447003
[ "Issue Tracking" ]
github.com
[ "master-nan", "sweet-cms" ]
Cause of vulnerability: In lines 58-62 of the file 'middleware/log.go', the log entry relies on a user-supplied value (' c.reequest '). If the values provided by the user contain special characters or malicious code, these values may be logged directly into the log, resulting in log injection attacks. Attackers may m...
Improper Output Neutralization for Logs in middleware/log.go
https://api.github.com/repos/master-nan/sweet-cms/issues/3/comments
1
2024-08-27T17:03:15Z
2024-08-28T06:43:51Z
https://github.com/master-nan/sweet-cms/issues/3
2,489,923,237
3
6,255
CVE-2024-8368
2024-09-01T05:15:12.187
A vulnerability was found in code-projects Hospital Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file index.php of the component Login. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/qingluan-bot/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permission...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:hospital_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "7FD44159-7FA3-4BA5-AD83-C1D439EEF374", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/qingluan-bot/cve/issues/1
[ "Exploit" ]
github.com
[ "qingluan-bot", "cve" ]
# code-projects Hospital Management System Using PHP With Source Code v1.0 /hms/doctor/index.php SQL injection # usernameOF AFFECTED PRODUCT(S) + Hospital Management System Using PHP With Source Code ## Vendor Homepage + https://code-projects.org/hospital-management-system-using-php-source-code/ # AFFECTED AND/OR ...
code-projects Hospital Management System Using PHP With Source Code v1.0 /hms/doctor/index.php SQL injection
https://api.github.com/repos/qingluan-bot/cve/issues/1/comments
0
2024-08-31T12:07:46Z
2024-08-31T12:07:46Z
https://github.com/qingluan-bot/cve/issues/1
2,498,814,105
1
6,256
CVE-2024-45508
2024-09-01T22:15:13.987
HTMLDOC before 1.9.19 has an out-of-bounds write in parse_paragraph in ps-pdf.cxx because of an attempt to strip leading whitespace from a whitespace-only node.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/michaelrsweet/htmldoc/blob/2d5b2ab9ddbf2aee2209010cebc11efdd1cab6e2/CHANGES.md" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/michaelrsweet/htmldoc/c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*", "matchCriteriaId": "41C36E7A-1413-44D0-B604-E7BD5C6CD652", "versionEndExcluding": "1.9.19", "versionEndIncluding": null, "versionSta...
[ "787" ]
787
https://github.com/michaelrsweet/htmldoc/issues/528
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "michaelrsweet", "htmldoc" ]
Hello, I found an out of bounds memory write in parse_paragraph function,ps-pdf.cxx Reporter: WhereisDoujo from Ocean University of China test platform: htmldoc Version :current OS :Kali 6.6.9-1kali1 (2024-01-08) kernel: 6.6.9-amd64 reproduced: (htmldoc with asan build option) ./htmldoc -f 1.pdf ./poc....
AddressSanitizer: out of bounds memory write in parse_paragraph functionin,htmldoc/htmldoc/ps-pdf.cxx:5208
https://api.github.com/repos/michaelrsweet/htmldoc/issues/528/comments
1
2024-08-28T14:45:26Z
2024-08-28T18:23:16Z
https://github.com/michaelrsweet/htmldoc/issues/528
2,492,313,862
528
6,257
CVE-2024-6232
2024-09-03T13:15:05.363
There is a MEDIUM severity vulnerability affecting CPython. Regular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cna@python.org", "tags": [ "Patch" ], "url": "https://github.com/python/cpython/commit/34ddb64d088dd7ccc321f6103d23153256caa5d4" }, { "source": "cna@python.org", "tags": [ "Patch" ], "url": "https://github.com/python/cpython/commit/4eaf4891c12589e3c7bdad5...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "matchCriteriaId": "B475FA53-D1F3-44C8-80CD-0CEA88129109", "versionEndExcluding": "3.8.20", "versionEndIncluding": null, "versionStartExcludin...
[ "1333" ]
1333
https://github.com/python/cpython/issues/121285
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "python", "cpython" ]
### Bug description: Today the `tarfile` module parsing of header values allows for backtracking when parsing header values. Headers have a well-known format that doesn't require backtracking to parse reliably, the new method of parsing will only require a single pass over a byte stream. ### CPython versions tested o...
Remove backtracking from parsing tarfile members and headers
https://api.github.com/repos/python/cpython/issues/121285/comments
5
2024-07-02T18:31:41Z
2024-09-18T22:22:37Z
https://github.com/python/cpython/issues/121285
2,386,893,180
121,285
6,258
CVE-2024-8407
2024-09-04T14:15:15.113
A vulnerability was found in alwindoss akademy up to 35caccea888ed63d5489e211c99edff1f62efdba. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file cmd/akademy/handler/handlers.go. The manipulation of the argument emailAddress leads to cross site scripting. The att...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/alwindoss/akademy/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Permissions Required", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alwindoss:akademy:*:*:*:*:*:*:*:*", "matchCriteriaId": "917BD204-5A35-4973-8C7D-0751F5CE5C59", "versionEndExcluding": null, "versionEndIncluding": "2024-08-24", "versionStart...
[ "79" ]
79
https://github.com/alwindoss/akademy/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "alwindoss", "akademy" ]
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cmd/akademy/handler/handlers.go Flaw reason: in the CMD file/akademy/handler/handlers. Go line 40, output code directly provided by the user email address (obtained from the form values), without any form of filtering or escaped....
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cmd/akademy/handler/handlers.go
https://api.github.com/repos/alwindoss/akademy/issues/1/comments
0
2024-08-24T08:41:55Z
2024-08-24T08:41:55Z
https://github.com/alwindoss/akademy/issues/1
2,484,369,124
1
6,259
CVE-2024-8418
2024-09-04T15:15:15.773
A flaw was found in Aardvark-dns, which is vulnerable to a Denial of Service attack due to the serial processing of TCP DNS queries. An attacker can exploit this flaw by keeping a TCP connection open indefinitely, causing the server to become unresponsive and resulting in other DNS queries timing out. This issue preven...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2024-8418" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309683" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:containers:aardvark-dns:1.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "500D2E84-A5C1-452D-92B3-5F72EA9A3B65", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "400" ]
400
https://github.com/containers/aardvark-dns/issues/500
[ "Exploit", "Issue Tracking" ]
github.com
[ "containers", "aardvark-dns" ]
### Issue Description The issue I have is that my podman containers stops resolving internal & external DNS after some time ~1h. If I restart whole podman or reboot system I can resolve all of the dns records and ping between containers or external network. After ~1h I can no longer resolve dns, or ping between co...
DNS Stops working after some time in bridge network
https://api.github.com/repos/containers/aardvark-dns/issues/500/comments
12
2024-08-28T07:51:59Z
2024-09-02T13:43:32Z
https://github.com/containers/aardvark-dns/issues/500
2,491,661,448
500
6,260
CVE-2024-8391
2024-09-04T16:15:09.253
In Eclipse Vert.x version 4.3.0 to 4.5.9, the gRPC server does not limit the maximum length of message payload (Maven GAV: io.vertx:vertx-grpc-server and io.vertx:vertx-grpc-client).  This is fixed in the 4.5.10 version.  Note this does not affect the Vert.x gRPC server based grpc-java and Netty libraries (Mave...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "emo@eclipse.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/eclipse-vertx/vertx-grpc/issues/113" }, { "source": "emo@eclipse.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://gitlab.eclipse.org/security/cve-assign...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eclipse:vert.x:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A26F841-8F44-472F-B3CA-561D561DF1F4", "versionEndExcluding": "4.5.10", "versionEndIncluding": null, "versionStartExcludi...
[ "770" ]
770
https://github.com/eclipse-vertx/vertx-grpc/issues/113
[ "Issue Tracking" ]
github.com
[ "eclipse-vertx", "vertx-grpc" ]
Motivation: The gRPC message decoder uses the default limit allowed by the gRPC HTTP/2 transport (2^32 bytes). The default maximum size should be smaller and configurable. This can be used to consume memory of a server or a client and is referenced as [CVE-2024-8391](https://www.cve.org/CVERecord?id=CVE-2024-839...
Set a configurable maximum payload size for the message decoder and add an invalid message handler to catch invalid messages
https://api.github.com/repos/eclipse-vertx/vertx-grpc/issues/113/comments
3
2024-09-04T14:38:04Z
2024-12-01T18:20:31Z
https://github.com/eclipse-vertx/vertx-grpc/issues/113
2,505,559,540
113
6,261
CVE-2024-8412
2024-09-04T16:15:09.393
A vulnerability, which was classified as problematic, was found in LinuxOSsk Shakal-NG up to 1.3.3. Affected is an unknown function of the file comments/views.py. The manipulation of the argument next leads to open redirect. It is possible to launch the attack remotely. The name of the patch is ebd1c2cba59cbac198bf2fd5...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/LinuxOSsk/Shakal-NG/commit/ebd1c2cba59cbac198bf2fd5a10565994d4f02cb" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/LinuxOSsk/Shakal...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:linuxos:shakal-ng:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6248D95-9207-49D3-BD21-0A8003C1F0BF", "versionEndExcluding": null, "versionEndIncluding": "1.3.3", "versionStartExclu...
[ "601" ]
601
https://github.com/LinuxOSsk/Shakal-NG/issues/202
[ "Exploit", "Issue Tracking" ]
github.com
[ "LinuxOSsk", "Shakal-NG" ]
The code uses the user-controlled next variable to redirect. If next is not verified, an attacker could induce users to redirect to a malicious website. First: ``` Snippets of code comments/urls.pypy (line 10) : path('odpovedat/<int:parent>/', views.Reply.as_view(), name='reply'), Snippet of code comments/vi...
CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in comments/views.py
https://api.github.com/repos/LinuxOSsk/Shakal-NG/issues/202/comments
1
2024-08-31T12:56:24Z
2024-09-02T18:32:09Z
https://github.com/LinuxOSsk/Shakal-NG/issues/202
2,498,833,346
202
6,262
CVE-2024-8412
2024-09-04T16:15:09.393
A vulnerability, which was classified as problematic, was found in LinuxOSsk Shakal-NG up to 1.3.3. Affected is an unknown function of the file comments/views.py. The manipulation of the argument next leads to open redirect. It is possible to launch the attack remotely. The name of the patch is ebd1c2cba59cbac198bf2fd5...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/LinuxOSsk/Shakal-NG/commit/ebd1c2cba59cbac198bf2fd5a10565994d4f02cb" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/LinuxOSsk/Shakal...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:linuxos:shakal-ng:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6248D95-9207-49D3-BD21-0A8003C1F0BF", "versionEndExcluding": null, "versionEndIncluding": "1.3.3", "versionStartExclu...
[ "601" ]
601
https://github.com/LinuxOSsk/Shakal-NG/issues/202#issuecomment-2325187434
[ "Exploit", "Issue Tracking" ]
github.com
[ "LinuxOSsk", "Shakal-NG" ]
The code uses the user-controlled next variable to redirect. If next is not verified, an attacker could induce users to redirect to a malicious website. First: ``` Snippets of code comments/urls.pypy (line 10) : path('odpovedat/<int:parent>/', views.Reply.as_view(), name='reply'), Snippet of code comments/vi...
CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in comments/views.py
https://api.github.com/repos/LinuxOSsk/Shakal-NG/issues/202/comments
1
2024-08-31T12:56:24Z
2024-09-02T18:32:09Z
https://github.com/LinuxOSsk/Shakal-NG/issues/202
2,498,833,346
202
6,263
CVE-2024-8567
2024-09-08T02:15:10.643
A vulnerability, which was classified as critical, has been found in itsourcecode Payroll Management System 1.0. This issue affects some unknown processing of the file /ajax.php?action=delete_deductions. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has be...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ppp-src/ha/issues/8" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://itsourcecode.com/" }, { "source": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:payroll_management_system_project:payroll_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFB980ED-C02B-49D9-845F-8953C6709DB1", "versionEndExcluding": null, "versionEndIncludi...
[ "89" ]
89
https://github.com/ppp-src/ha/issues/8
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ppp-src", "ha" ]
# Itsourcecode "Payroll Management System " in PHP 1.0 "ajax.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Payroll Management System ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-food-ordering-system-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + xxxx ## Vul...
Itsourcecode "Payroll Management System " in PHP 1.0 "ajax.php" SQL injection
https://api.github.com/repos/ppp-src/ha/issues/8/comments
0
2024-09-07T01:57:19Z
2024-09-07T01:57:19Z
https://github.com/ppp-src/ha/issues/8
2,511,380,300
8
6,264
CVE-2024-8569
2024-09-08T05:15:10.763
A vulnerability has been found in code-projects Hospital Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file user-login.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been di...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/teachersongsec/cve/issues/1" }, { "s...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:hospital_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "7FD44159-7FA3-4BA5-AD83-C1D439EEF374", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/teachersongsec/cve/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "teachersongsec", "cve" ]
# code-projects Hospital Management System Using PHP With Source Code v1.0 user-login.php SQL injection # usernameOF AFFECTED PRODUCT(S) + Hospital Management System Using PHP With Source Code ## Vendor Homepage + https://code-projects.org/hospital-management-system-using-php-source-code/ # AFFECTED AND/OR FIXED V...
code-projects Hospital Management System Using PHP With Source Code v1.0 user-login.php SQL injection
https://api.github.com/repos/teachersongsec/cve/issues/1/comments
0
2024-09-05T08:48:18Z
2024-09-05T08:48:19Z
https://github.com/teachersongsec/cve/issues/1
2,507,171,933
1
6,265
CVE-2024-8570
2024-09-08T07:15:01.977
A vulnerability was found in itsourcecode Tailoring Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /inccatadd.php. The manipulation of the argument title leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/teachersongsec/cve/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://itsourcecode.com/" }, { "so...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/teachersongsec/cve/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "teachersongsec", "cve" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 inccatadd.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-w...
Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 inccatadd.php SQL injection
https://api.github.com/repos/teachersongsec/cve/issues/2/comments
0
2024-09-05T08:50:05Z
2024-09-05T08:50:06Z
https://github.com/teachersongsec/cve/issues/2
2,507,176,177
2
6,266
CVE-2024-8571
2024-09-08T08:15:13.157
A vulnerability was found in erjemin roll_cms up to 1484fe2c4e0805946a7bcf46218509fcb34883a9. It has been classified as problematic. This affects an unknown part of the file roll_cms/roll_cms/views.py. The manipulation leads to information exposure through error message. This product takes the approach of rolling relea...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 2.7, "confidentialityImpact": "PA...
[ { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/erjemin/roll_cms/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.276801" }, { "source": "cna@vuldb.com", "t...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:erjemin:roll_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "6760B301-68D3-4FBD-B0BA-D46392FBDDB3", "versionEndExcluding": "2024-08-31", "versionEndIncluding": null, "versionStartE...
[ "209" ]
209
https://github.com/erjemin/roll_cms/issues/1
[ "Issue Tracking" ]
github.com
[ "erjemin", "roll_cms" ]
Generation of Error Message Containing Sensitive Information in roll_cms/roll_cms/views.py ``` Snippets of code roll_cms/roll_cms/views.py (lines 360 to 360) : except TemplateDoesNotExist as e: Snippet of code roll_cms/roll_cms/views.py (lines 362 through 362) : Return an HttpResponse (f "О Ш И Б К А RollCSM...
Generation of Error Message Containing Sensitive Information in roll_cms/roll_cms/views.py
https://api.github.com/repos/erjemin/roll_cms/issues/1/comments
0
2024-08-31T13:41:06Z
2024-08-31T13:41:06Z
https://github.com/erjemin/roll_cms/issues/1
2,498,851,543
1
6,267
CVE-2024-8572
2024-09-08T08:15:13.443
A vulnerability was found in Gouniverse GoLang CMS 1.4.0. It has been declared as problematic. This vulnerability affects the function PageRenderHtmlByAlias of the file FrontendHandler.go. The manipulation of the argument alias leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1....
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/gouniverse/cms/commit/3e661cdfb4beeb9fe2ad507cdb8104c0b17d072c" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/gouniverse/cms/issues/5" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gouniverse:golang_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9A55696-4C86-4339-A3D2-59DF1590653A", "versionEndExcluding": "1.4.1", "versionEndIncluding": null, "versionStartE...
[ "79" ]
79
https://github.com/gouniverse/cms/issues/5
[ "Issue Tracking" ]
github.com
[ "gouniverse", "cms" ]
Cause of vulnerability: A potential Cross-site scripting (XSS) vulnerability exists on line 19 of the FrontendHandler.go file in the code. The vulnerability is caused by user-supplied values being inserted directly into the generated HTML page without proper processing or escaping. Specifically, the 'PageRenderHtmlBy...
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in FrontendHandler.go
https://api.github.com/repos/gouniverse/cms/issues/5/comments
1
2024-09-03T15:08:24Z
2024-09-05T07:52:18Z
https://github.com/gouniverse/cms/issues/5
2,503,131,319
5
6,268
CVE-2024-8572
2024-09-08T08:15:13.443
A vulnerability was found in Gouniverse GoLang CMS 1.4.0. It has been declared as problematic. This vulnerability affects the function PageRenderHtmlByAlias of the file FrontendHandler.go. The manipulation of the argument alias leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1....
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/gouniverse/cms/commit/3e661cdfb4beeb9fe2ad507cdb8104c0b17d072c" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/gouniverse/cms/issues/5" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gouniverse:golang_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9A55696-4C86-4339-A3D2-59DF1590653A", "versionEndExcluding": "1.4.1", "versionEndIncluding": null, "versionStartE...
[ "79" ]
79
https://github.com/gouniverse/cms/issues/5#issuecomment-2330848731
[ "Issue Tracking" ]
github.com
[ "gouniverse", "cms" ]
Cause of vulnerability: A potential Cross-site scripting (XSS) vulnerability exists on line 19 of the FrontendHandler.go file in the code. The vulnerability is caused by user-supplied values being inserted directly into the generated HTML page without proper processing or escaping. Specifically, the 'PageRenderHtmlBy...
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in FrontendHandler.go
https://api.github.com/repos/gouniverse/cms/issues/5/comments
1
2024-09-03T15:08:24Z
2024-09-05T07:52:18Z
https://github.com/gouniverse/cms/issues/5
2,503,131,319
5
6,269
CVE-2024-8611
2024-09-09T21:15:13.377
A vulnerability classified as critical was found in itsourcecode Tailoring Management System 1.0. Affected by this vulnerability is an unknown functionality of the file ssms.php. The manipulation of the argument customer leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/elegant228/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://itsourcecode.com/" }, { "source": "cna@vuldb.com", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/elegant228/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "elegant228", "cve" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 ssms.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-with-s...
Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 ssms.php SQL injection
https://api.github.com/repos/elegant228/cve/issues/1/comments
0
2024-09-09T11:55:12Z
2024-09-09T11:55:12Z
https://github.com/elegant228/cve/issues/1
2,513,753,664
1
6,270
CVE-2024-8762
2024-09-13T01:15:02.320
A vulnerability was found in code-projects Crud Operation System 1.0. It has been classified as critical. This affects an unknown part of the file /updatedata.php. The manipulation of the argument sid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public an...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Kangsiyuan/1/issues/1" }, { "source": "cna@vuldb.com", "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:code-projects:crud_operation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D15BB350-68BE-4E74-B9CE-BC9120B6F230", "versionEndExcluding": null, "versionEndIncluding": null, "...
[ "89" ]
89
https://github.com/Kangsiyuan/1/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Kangsiyuan", "1" ]
# code-projects.org"Crud Operation System" in PHP 1.0 "updatedata.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code ## Vendor Homepage + https://code-projects.org/crud-operation-system-in-php-with-source-code/ # A...
code-projects.org"Crud Operation System" in PHP 1.0 "updatedata.php" SQL injection
https://api.github.com/repos/Kangsiyuan/1/issues/1/comments
0
2024-09-11T03:56:30Z
2024-09-11T03:56:30Z
https://github.com/Kangsiyuan/1/issues/1
2,518,398,732
1
6,271
CVE-2024-8866
2024-09-15T02:15:01.900
A vulnerability was found in AutoCMS 5.4. It has been classified as problematic. This affects an unknown part of the file /admin/robot.php. The manipulation of the argument sidebar leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hebing123/cve/issues/68" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.277503" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autocms_project:autocms:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "07746BD9-33B7-43BD-A742-EA1878F842D4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "79" ]
79
https://github.com/Hebing123/cve/issues/68
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hebing123", "cve" ]
# Summary AutoCMS v5.4 is affected by a Cross-Site Scripting (XSS) vulnerability and a PHP Code Injection vulnerability. The XSS vulnerability can be exploited to capture administrator credentials, which can then be used to exploit the PHP Code Injection vulnerability. # Details ## Cross-Site Scripting (XSS) Vulner...
AutoCMS v5.4 XSS and RCE
https://api.github.com/repos/Hebing123/cve/issues/68/comments
1
2024-08-13T07:37:01Z
2024-09-14T07:10:17Z
https://github.com/Hebing123/cve/issues/68
2,462,624,535
68
6,272
CVE-2024-8868
2024-09-15T03:15:02.153
A vulnerability was found in code-projects Crud Operation System 1.0. It has been rated as critical. This issue affects some unknown processing of the file savedata.php. The manipulation of the argument sname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/a/issues/7" }, { "source": "cna@vuldb.com", "tag...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:code-projects:crud_operation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D15BB350-68BE-4E74-B9CE-BC9120B6F230", "versionEndExcluding": null, "versionEndIncluding": null, "...
[ "89" ]
89
https://github.com/ppp-src/a/issues/7
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "a" ]
![3](https://github.com/user-attachments/assets/ceb913c5-e5ac-4fcf-8710-3815de3df6ca) # code-projects.org"Crud Operation System" in PHP 1.0 "savedata.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code ## Vendor Ho...
# code-projects.org"Crud Operation System" in PHP 1.0 "savedata.php" SQL injection
https://api.github.com/repos/ppp-src/a/issues/7/comments
0
2024-09-14T06:50:03Z
2024-09-14T06:50:03Z
https://github.com/ppp-src/a/issues/7
2,526,035,039
7
6,273
CVE-2024-8944
2024-09-17T18:15:05.690
A vulnerability, which was classified as critical, was found in code-projects Hospital Management System 1.0. This affects an unknown part of the file check_availability.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/65241/cve/issues/1" }, { "source": "cna@vuldb.com", "tag...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:hospital_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "7FD44159-7FA3-4BA5-AD83-C1D439EEF374", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/65241/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "65241", "cve" ]
# code-projects Hospital Management System Using PHP With Source Code v1.0 check_availability.php SQL injection # emailOF AFFECTED PRODUCT(S) + Hospital Management System Using PHP With Source Code ## Vendor Homepage + https://code-projects.org/hospital-management-system-using-php-source-code/ # AFFECTED AND/OR FI...
code-projects Hospital Management System Using PHP With Source Code v1.0 check_availability.php SQL injection
https://api.github.com/repos/65241/cve/issues/1/comments
0
2024-09-16T06:57:17Z
2024-09-16T06:57:18Z
https://github.com/65241/cve/issues/1
2,527,653,063
1
6,274
CVE-2024-8946
2024-09-17T19:15:29.220
A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affected is the function mp_vfs_umount of the file extmod/vfs.c of the component VFS Unmount Handler. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/micropython/micropython/commit/29943546343c92334e8518695a11fc0e2ceea68b" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/micropython/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:micropython:micropython:1.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "EBC6A30E-745D-4C20-B482-1358929743FA", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "787" ]
787
https://github.com/micropython/micropython/issues/13006
[ "Exploit", "Issue Tracking" ]
github.com
[ "micropython", "micropython" ]
# Summary - **OS**: Ubuntu 22.04 - **version**: micropython@a00c9d56db775ee5fc14c2db60eb07bab8e872dd - **port**: unix - **contribution**: Junwha Hong and Wonil Jang @S2-Lab UNIST - **description**: - at `mp_vfs_umount` extmod/vfs.c:276, the comparison between unmount string and previous mounts are performed...
heap-buffer-overflow: incorrect length choice on memcpy at vfs unmount
https://api.github.com/repos/micropython/micropython/issues/13006/comments
2
2023-11-17T09:50:10Z
2024-07-23T02:32:29Z
https://github.com/micropython/micropython/issues/13006
1,998,710,063
13,006
6,275
CVE-2024-8946
2024-09-17T19:15:29.220
A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affected is the function mp_vfs_umount of the file extmod/vfs.c of the component VFS Unmount Handler. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/micropython/micropython/commit/29943546343c92334e8518695a11fc0e2ceea68b" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/micropython/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:micropython:micropython:1.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "EBC6A30E-745D-4C20-B482-1358929743FA", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "787" ]
787
https://github.com/micropython/micropython/issues/13006#issuecomment-1820309455
[ "Exploit", "Third Party Advisory" ]
github.com
[ "micropython", "micropython" ]
# Summary - **OS**: Ubuntu 22.04 - **version**: micropython@a00c9d56db775ee5fc14c2db60eb07bab8e872dd - **port**: unix - **contribution**: Junwha Hong and Wonil Jang @S2-Lab UNIST - **description**: - at `mp_vfs_umount` extmod/vfs.c:276, the comparison between unmount string and previous mounts are performed...
heap-buffer-overflow: incorrect length choice on memcpy at vfs unmount
https://api.github.com/repos/micropython/micropython/issues/13006/comments
2
2023-11-17T09:50:10Z
2024-07-23T02:32:29Z
https://github.com/micropython/micropython/issues/13006
1,998,710,063
13,006
6,276
CVE-2024-8947
2024-09-17T19:15:29.483
A vulnerability was found in MicroPython 1.22.2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file py/objarray.c. The manipulation leads to use after free. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIA...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/micropython/micropython/commit/4bed614e707c0644c06e117f848fa12605c711cd" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/microp...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:micropython:micropython:1.22.2:*:*:*:*:*:*:*", "matchCriteriaId": "F367A317-2420-445C-B455-21BAFD6E2064", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "416" ]
416
https://github.com/micropython/micropython/issues/13283
[ "Exploit", "Third Party Advisory" ]
github.com
[ "micropython", "micropython" ]
Hi all, I'm Wonil Jang, from the research group S2Lab in UNIST. We found a use after free bug from micropython by our custom tool. The detailed information is as follows. ## Environment - OS: Ubuntu 22.04 - Version: micropython at commit a5bdd39127 - Build: unix ports - Bug Type: use-after-free - Bug Location:...
use after free found at micropython/py/objarray.c:509 [micropython@a5bdd39127]
https://api.github.com/repos/micropython/micropython/issues/13283/comments
4
2023-12-27T16:49:55Z
2024-04-22T02:12:14Z
https://github.com/micropython/micropython/issues/13283
2,057,585,750
13,283
6,277
CVE-2024-8947
2024-09-17T19:15:29.483
A vulnerability was found in MicroPython 1.22.2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file py/objarray.c. The manipulation leads to use after free. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIA...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/micropython/micropython/commit/4bed614e707c0644c06e117f848fa12605c711cd" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/microp...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:micropython:micropython:1.22.2:*:*:*:*:*:*:*", "matchCriteriaId": "F367A317-2420-445C-B455-21BAFD6E2064", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "416" ]
416
https://github.com/micropython/micropython/issues/13283#issuecomment-1918479709
[ "Exploit", "Third Party Advisory" ]
github.com
[ "micropython", "micropython" ]
Hi all, I'm Wonil Jang, from the research group S2Lab in UNIST. We found a use after free bug from micropython by our custom tool. The detailed information is as follows. ## Environment - OS: Ubuntu 22.04 - Version: micropython at commit a5bdd39127 - Build: unix ports - Bug Type: use-after-free - Bug Location:...
use after free found at micropython/py/objarray.c:509 [micropython@a5bdd39127]
https://api.github.com/repos/micropython/micropython/issues/13283/comments
4
2023-12-27T16:49:55Z
2024-04-22T02:12:14Z
https://github.com/micropython/micropython/issues/13283
2,057,585,750
13,283
6,278
CVE-2024-8948
2024-09-17T19:15:29.747
A vulnerability was found in MicroPython 1.23.0. It has been rated as critical. Affected by this issue is the function mpz_as_bytes of the file py/objint.c. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The patch ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/micropython/micropython/commit/908ab1ceca15ee6fd0ef82ca4cba770a3ec41894" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "h...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:micropython:micropython:1.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "EBC6A30E-745D-4C20-B482-1358929743FA", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "787" ]
787
https://github.com/micropython/micropython/issues/13041
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "micropython", "micropython" ]
Thank you for the super fast responses for the previous bugs, we found new bug in the core module. ## Summary - **OS**: Ubuntu 22.04 - **version**: micropython a00c9d5 - **port**: unix - **contribution**: Junwha Hong and Wonil Jang @S2-Lab, UNIST - **description**: Because the length check of int_to_bytes doe...
heap-buffer-overflow: from 0 length int_to_bytes
https://api.github.com/repos/micropython/micropython/issues/13041/comments
1
2023-11-21T16:51:00Z
2024-06-24T04:37:55Z
https://github.com/micropython/micropython/issues/13041
2,004,741,539
13,041
6,279
CVE-2024-46382
2024-09-19T13:15:04.007
A SQL injection vulnerability in linlinjava litemall 1.8.0 allows a remote attacker to obtain sensitive information via the goodsId, goodsSn, and name parameters in AdminGoodscontroller.java.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/linlinjava/litemall/issues/552" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:linlinjava:litemall:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEBF7CF8-8C16-4129-AF35-F29414CD08EF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "89" ]
89
https://github.com/linlinjava/litemall/issues/552
[ "Exploit" ]
github.com
[ "linlinjava", "litemall" ]
SQL injection vulnerability in linlinjava litemall v.1.8.0 allows a remote attacker to obtain sensitive information via the goodsId, goodsSn, name parameters of the AdminOrderController..java component. 1.Steps to reproduce (复现步骤) 访问商品管理,昵称输入1 ,点击查询,抓取数据包 ![微信图片_20240831160605](https://github.com/user-attachments/as...
[vulnerability] SQL Injection Vulnerability in AdminOrderController.java
https://api.github.com/repos/linlinjava/litemall/issues/552/comments
0
2024-08-31T08:12:17Z
2024-08-31T08:12:17Z
https://github.com/linlinjava/litemall/issues/552
2,498,722,441
552
6,280
CVE-2024-9006
2024-09-19T23:15:12.570
A vulnerability was found in jeanmarc77 123solar 1.8.4.5. It has been rated as critical. Affected by this issue is some unknown functionality of the file config/config_invt1.php. The manipulation of the argument PASSOx leads to code injection. The attack may be launched remotely. The exploit has been disclosed to the p...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/jeanmarc77/123solar/commit/f4a8c748ec436e5a79f91ccb6a6f73752b336aa5" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeanmarc77:123solar:1.8.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "B96B3FED-CC2C-46C3-8BBE-07E78A555F33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "94" ]
94
https://github.com/jeanmarc77/123solar/issues/74
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jeanmarc77", "123solar" ]
# Summary > 123Solar is a lightweight set of PHP/JS files that makes a web logger to monitor your photovoltaic inverter(s). It just need a web server and PHP, no databases are even needed. The philosophy is: To keep it simple, fast, with a low foot print to run on cheap and low powered devices. 123Solar 1.8.4.5 con...
123Solar 1.8.4.5 has a PHP Code Injection vulnerability
https://api.github.com/repos/jeanmarc77/123solar/issues/74/comments
1
2024-09-14T06:19:16Z
2024-09-18T07:00:25Z
https://github.com/jeanmarc77/123solar/issues/74
2,526,023,476
74
6,281
CVE-2024-9006
2024-09-19T23:15:12.570
A vulnerability was found in jeanmarc77 123solar 1.8.4.5. It has been rated as critical. Affected by this issue is some unknown functionality of the file config/config_invt1.php. The manipulation of the argument PASSOx leads to code injection. The attack may be launched remotely. The exploit has been disclosed to the p...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/jeanmarc77/123solar/commit/f4a8c748ec436e5a79f91ccb6a6f73752b336aa5" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeanmarc77:123solar:1.8.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "B96B3FED-CC2C-46C3-8BBE-07E78A555F33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "94" ]
94
https://github.com/jeanmarc77/123solar/issues/74#issuecomment-2357653441
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jeanmarc77", "123solar" ]
# Summary > 123Solar is a lightweight set of PHP/JS files that makes a web logger to monitor your photovoltaic inverter(s). It just need a web server and PHP, no databases are even needed. The philosophy is: To keep it simple, fast, with a low foot print to run on cheap and low powered devices. 123Solar 1.8.4.5 con...
123Solar 1.8.4.5 has a PHP Code Injection vulnerability
https://api.github.com/repos/jeanmarc77/123solar/issues/74/comments
1
2024-09-14T06:19:16Z
2024-09-18T07:00:25Z
https://github.com/jeanmarc77/123solar/issues/74
2,526,023,476
74
6,282
CVE-2024-9007
2024-09-19T23:15:12.830
A vulnerability classified as problematic has been found in jeanmarc77 123solar 1.8.4.5. This affects an unknown part of the file /detailed.php. The manipulation of the argument date1 leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be u...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/jeanmarc77/123solar/commit/94bf9ab7ad0ccb7fbdc02f172f37f0e2ea08d48f" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jeanmarc77...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeanmarc77:123solar:1.8.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "B96B3FED-CC2C-46C3-8BBE-07E78A555F33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "79" ]
79
https://github.com/jeanmarc77/123solar/issues/73
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jeanmarc77", "123solar" ]
# Summary > 123Solar is a lightweight set of PHP/JS files that makes a web logger to monitor your photovoltaic inverter(s). It just need a web server and PHP, no databases are even needed. The philosophy is: To keep it simple, fast, with a low foot print to run on cheap and low powered devices. A reflected Cross Si...
123Solar 1.8.4.5 has a reflected XSS vulnerability
https://api.github.com/repos/jeanmarc77/123solar/issues/73/comments
1
2024-09-14T05:47:09Z
2024-09-18T06:52:59Z
https://github.com/jeanmarc77/123solar/issues/73
2,526,010,847
73
6,283
CVE-2024-9007
2024-09-19T23:15:12.830
A vulnerability classified as problematic has been found in jeanmarc77 123solar 1.8.4.5. This affects an unknown part of the file /detailed.php. The manipulation of the argument date1 leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be u...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/jeanmarc77/123solar/commit/94bf9ab7ad0ccb7fbdc02f172f37f0e2ea08d48f" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jeanmarc77...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeanmarc77:123solar:1.8.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "B96B3FED-CC2C-46C3-8BBE-07E78A555F33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "79" ]
79
https://github.com/jeanmarc77/123solar/issues/73#issuecomment-2357648077
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jeanmarc77", "123solar" ]
# Summary > 123Solar is a lightweight set of PHP/JS files that makes a web logger to monitor your photovoltaic inverter(s). It just need a web server and PHP, no databases are even needed. The philosophy is: To keep it simple, fast, with a low foot print to run on cheap and low powered devices. A reflected Cross Si...
123Solar 1.8.4.5 has a reflected XSS vulnerability
https://api.github.com/repos/jeanmarc77/123solar/issues/73/comments
1
2024-09-14T05:47:09Z
2024-09-18T06:52:59Z
https://github.com/jeanmarc77/123solar/issues/73
2,526,010,847
73
6,284
CVE-2024-9009
2024-09-20T00:15:03.997
A vulnerability, which was classified as critical, has been found in code-projects Online Quiz Site 1.0. This issue affects some unknown processing of the file showtest.php. The manipulation of the argument subid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ZTurNA/cve/issues/1" }, { "source": "cna@vuldb.com", "ta...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:online_quiz_site:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "15DF6E37-6F4D-459A-823E-73DB8450C6CC", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "89" ]
89
https://github.com/ZTurNA/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ZTurNA", "cve" ]
# code-projects Online Quiz Site Using PHP With Source Code v1.0 showtest.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Quiz Site Using PHP With Source Code ## Vendor Homepage + https://code-projects.org/online-quiz-site-using-php-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + ZTurNA ...
code-projects Online Quiz Site Using PHP With Source Code v1.0 showtest.php SQL injection
https://api.github.com/repos/ZTurNA/cve/issues/1/comments
0
2024-09-18T08:03:26Z
2024-09-18T08:03:26Z
https://github.com/ZTurNA/cve/issues/1
2,533,017,975
1
6,285
CVE-2024-9011
2024-09-20T01:15:10.550
A vulnerability, which was classified as critical, was found in code-projects Crud Operation System 1.0. Affected is an unknown function of the file updata.php. The manipulation of the argument sid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/a/issues/14" }, { "source": "cna@vuldb.com", "ta...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:code-projects:crud_operation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D15BB350-68BE-4E74-B9CE-BC9120B6F230", "versionEndExcluding": null, "versionEndIncluding": null, "...
[ "89" ]
89
https://github.com/ppp-src/a/issues/14
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "a" ]
# code-projects.org"Crud Operation System" in PHP 1.0 "updata.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code ## Vendor Homepage + https://code-projects.org/crud-operation-system-in-php-with-source-code/ # AFFEC...
code-projects.org"Crud Operation System" in PHP 1.0 "updata.php" SQL injection
https://api.github.com/repos/ppp-src/a/issues/14/comments
0
2024-09-18T09:39:42Z
2024-09-18T09:39:42Z
https://github.com/ppp-src/a/issues/14
2,533,224,679
14
6,286
CVE-2024-9078
2024-09-22T04:15:04.203
A vulnerability has been found in code-projects Student Record System 1.0 and classified as critical. This vulnerability affects unknown code of the file /course.php. The manipulation of the argument coursename leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public an...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/a/issues/15" }, { "source": "cna@vuldb.com", "ta...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:code-projects:student_record_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E81D3A4D-EB3A-4716-B5AA-71424DC86572", "versionEndExcluding": null, "versionEndIncluding": null, "...
[ "89" ]
89
https://github.com/ppp-src/a/issues/15
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "a" ]
# code-projects.org"Student Record System" in PHP 1.0 "course.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Student Record System In PHP With Source Code ## Vendor Homepage + https://code-projects.org/student-record-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + xxxx ## V...
# code-projects.org"Student Record System" in PHP 1.0 "course.php" SQL injection
https://api.github.com/repos/ppp-src/a/issues/15/comments
0
2024-09-20T07:19:59Z
2024-09-20T07:19:59Z
https://github.com/ppp-src/a/issues/15
2,538,075,549
15
6,287
CVE-2024-9079
2024-09-22T05:15:11.710
A vulnerability was found in code-projects Student Record System 1.0 and classified as critical. This issue affects some unknown processing of the file /marks.php. The manipulation of the argument coursename leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and m...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/a/issues/16" }, { "source": "cna@vuldb.com", "ta...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:code-projects:student_record_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E81D3A4D-EB3A-4716-B5AA-71424DC86572", "versionEndExcluding": null, "versionEndIncluding": null, "...
[ "89" ]
89
https://github.com/ppp-src/a/issues/16
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "a" ]
# code-projects.org"Student Record System" in PHP 1.0 "marks.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Student Record System In PHP With Source Code ## Vendor Homepage + https://code-projects.org/student-record-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + xxxx ## Vu...
# code-projects.org"Student Record System" in PHP 1.0 "marks.php" SQL injection
https://api.github.com/repos/ppp-src/a/issues/16/comments
0
2024-09-21T04:08:40Z
2024-09-21T04:08:40Z
https://github.com/ppp-src/a/issues/16
2,539,958,391
16
6,288
CVE-2024-9080
2024-09-22T07:15:10.607
A vulnerability was found in code-projects Student Record System 1.0. It has been classified as critical. Affected is an unknown function of the file /pincode-verification.php. The manipulation of the argument pincode leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/a/issues/17" }, { "source": "cna@vuldb.com", "ta...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:code-projects:student_record_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E81D3A4D-EB3A-4716-B5AA-71424DC86572", "versionEndExcluding": null, "versionEndIncluding": null, "...
[ "89" ]
89
https://github.com/ppp-src/a/issues/17
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "a" ]
# code-projects.org"Student Record System" in PHP 1.0 "pincode-verification.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Student Record System In PHP With Source Code ## Vendor Homepage + https://code-projects.org/student-record-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter...
# code-projects.org"Student Record System" in PHP 1.0 "pincode-verification.php" SQL injection
https://api.github.com/repos/ppp-src/a/issues/17/comments
0
2024-09-21T04:16:46Z
2024-09-21T04:16:46Z
https://github.com/ppp-src/a/issues/17
2,539,960,931
17
6,289
CVE-2024-9085
2024-09-22T08:15:02.393
A vulnerability was found in code-projects Restaurant Reservation System 1.0. It has been rated as critical. This issue affects some unknown processing of the file index.php. The manipulation of the argument date leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/a/issues/18" }, { "source": "cna@vuldb.com", "ta...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:code-projects:restaurant_reservation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE12AD85-FC4C-4F66-82E3-7BDCB43D3903", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/ppp-src/a/issues/18
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "a" ]
# code-projects.org"Restaurant Reservation System" in PHP 1.0 "index.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code ## Vendor Homepage + https://code-projects.org/restaurant-reservation-system-in-php-with-source...
# code-projects.org"Restaurant Reservation System" in PHP 1.0 "index.php" SQL injection
https://api.github.com/repos/ppp-src/a/issues/18/comments
0
2024-09-21T04:19:00Z
2024-09-21T04:30:03Z
https://github.com/ppp-src/a/issues/18
2,539,961,611
18
6,290
CVE-2024-9086
2024-09-22T21:15:10.813
A vulnerability classified as critical has been found in code-projects Restaurant Reservation System 1.0. Affected is an unknown function of the file /filter.php. The manipulation of the argument from/to leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public a...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/a/issues/20" }, { "source": "cna@vuldb.com", "ta...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:code-projects:restaurant_reservation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE12AD85-FC4C-4F66-82E3-7BDCB43D3903", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/ppp-src/a/issues/20
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "a" ]
# code-projects.org"Restaurant Reservation System" in PHP 1.0 "filter.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code ## Vendor Homepage + https://code-projects.org/restaurant-reservation-system-in-php-with-sourc...
# code-projects.org"Restaurant Reservation System" in PHP 1.0 "filter.php" SQL injection
https://api.github.com/repos/ppp-src/a/issues/20/comments
0
2024-09-21T04:35:48Z
2024-09-21T04:35:48Z
https://github.com/ppp-src/a/issues/20
2,539,967,099
20
6,291
CVE-2024-9087
2024-09-22T22:15:02.177
A vulnerability, which was classified as critical, was found in code-projects Vehicle Management 1.0. This affects an unknown part of the file /edit1.php. The manipulation of the argument sno leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/a/issues/19" }, { "source": "cna@vuldb.com", "ta...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vehicle_management_project:vehicle_management:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9B2AD25F-FE85-4D6F-9FDD-2439840FE0CB", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/ppp-src/a/issues/19
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "a" ]
# code-projects.org"Vehicle Management" in PHP 1.0 "edit1.php " SQL injection # NAME OF AFFECTED PRODUCT(S) + Vehicle Management In PHP With Source Code ## Vendor Homepage + https://code-projects.org/vehicle-management-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + xxxx ## Vulnerable...
# code-projects.org"Vehicle Management" in PHP 1.0 "edit1.php " SQL injection
https://api.github.com/repos/ppp-src/a/issues/19/comments
0
2024-09-21T04:32:56Z
2024-09-21T04:32:56Z
https://github.com/ppp-src/a/issues/19
2,539,966,191
19
6,292
CVE-2024-9088
2024-09-22T22:15:02.447
A vulnerability has been found in SourceCodester Telecom Billing Management System 1.0 and classified as critical. This vulnerability affects the function login. The manipulation of the argument uname leads to buffer overflow. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact":...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/61" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:razormist:telecom_billing_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "C9BFF928-A473-475F-8BA1-939856BCA7C8", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "120" ]
120
https://github.com/CveSecLook/cve/issues/61
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# Telecom Billing Management System in C++ with Source Code v1.0 - Buffer Overflow Supplier:https://www.sourcecodester.com/sites/default/files/download/razormist/telecom-billing-management-system-in-c.zip In the main program file, there is a variable of type char called uname, which receives data using scanf, res...
Telecom Billing Management System in C++ with Source Code v1.0 - Buffer Overflow
https://api.github.com/repos/CveSecLook/cve/issues/61/comments
0
2024-09-21T04:58:47Z
2024-09-21T04:58:48Z
https://github.com/CveSecLook/cve/issues/61
2,539,974,591
61
6,293
CVE-2024-9091
2024-09-23T00:15:11.537
A vulnerability was found in code-projects Student Record System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /index.php. The manipulation of the argument regno leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/a/issues/21" }, { "source": "cna@vuldb.com", "ta...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:code-projects:student_record_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E81D3A4D-EB3A-4716-B5AA-71424DC86572", "versionEndExcluding": null, "versionEndIncluding": null, "...
[ "89" ]
89
https://github.com/ppp-src/a/issues/21
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "a" ]
# code-projects.org"Student Record System" in PHP 1.0 "index.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Student Record System In PHP With Source Code ## Vendor Homepage + https://code-projects.org/student-record-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + xxxx ## Vu...
# code-projects.org"Student Record System" in PHP 1.0 "index.php" SQL injection
https://api.github.com/repos/ppp-src/a/issues/21/comments
0
2024-09-21T11:46:42Z
2024-09-21T11:46:42Z
https://github.com/ppp-src/a/issues/21
2,540,205,258
21
6,294
CVE-2024-9281
2024-09-27T13:15:18.153
A vulnerability was found in bg5sbk MiniCMS up to 1.11 and classified as problematic. This issue affects some unknown processing of the file post-edit.php. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The initia...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/bg5sbk/MiniCMS/issues/51" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.278663" }, { "source": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bg5sbk:minicms:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DD09C60-55E3-42A0-8B9C-EA9C208D4F8A", "versionEndExcluding": "1.11", "versionEndIncluding": null, "versionStartExcluding...
[ "352" ]
352
https://github.com/bg5sbk/MiniCMS/issues/51
[ "Exploit", "Third Party Advisory" ]
github.com
[ "bg5sbk", "MiniCMS" ]
# Vendor of Product https://github.com/bg5sbk/MiniCMS # Vulnerability Type CSRF # Vulnerable File post-edit.php # Affected Product Code Base <v1.11 # POC ``` <html> <!-- CSRF PoC - generated by Burp Suite Professional --> <body> <script>history.pushState('', '', '/')</script> <form action...
There is another CSRF vulnerabilities in post-edit.php that can lead to add article
https://api.github.com/repos/bg5sbk/MiniCMS/issues/51/comments
1
2024-09-19T07:51:49Z
2024-10-08T14:28:26Z
https://github.com/bg5sbk/MiniCMS/issues/51
2,535,570,662
51
6,295
CVE-2024-9282
2024-09-27T13:15:18.443
A vulnerability was found in bg5sbk MiniCMS 1.11. It has been classified as problematic. Affected is an unknown function of the file page-edit.php. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The initia...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bg5sbk/MiniCMS/issues/52" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.278664" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bg5sbk:minicms:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DD09C60-55E3-42A0-8B9C-EA9C208D4F8A", "versionEndExcluding": "1.11", "versionEndIncluding": null, "versionStartExcluding...
[ "352" ]
352
https://github.com/bg5sbk/MiniCMS/issues/52
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "bg5sbk", "MiniCMS" ]
# Vendor of Product https://github.com/bg5sbk/MiniCMS # Vulnerability Type CSRF # Vulnerable File page-edit.php # Affected Product Code Base <v1.11 # POC ``` <html> <!-- CSRF PoC - generated by Burp Suite Professional --> <body> <script>history.pushState('', '', '/')</script> <form actio...
There is another CSRF vulnerabilities in page-edit.php that can lead to add page
https://api.github.com/repos/bg5sbk/MiniCMS/issues/52/comments
0
2024-09-19T08:16:07Z
2024-09-19T08:16:07Z
https://github.com/bg5sbk/MiniCMS/issues/52
2,535,621,425
52
6,296
CVE-2024-44910
2024-09-27T15:15:14.907
NASA CryptoLib v1.3.0 was discovered to contain an Out-of-Bounds read via the AOS subsystem (crypto_aos.c).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/nasa/CryptoLib/issues/268" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Technical Description" ], "url": "https://visionspace.com/crashing-cryptolib/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nasa:cryptolib:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7F7FD1A-BA84-49EB-8B0C-10D72AF81E9C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "125" ]
125
https://github.com/nasa/CryptoLib/issues/268
[ "Issue Tracking" ]
github.com
[ "nasa", "CryptoLib" ]
It is possible to get a seg fault by first passing an invalid index to `sa_if->sa_get_from_spi(spi, &sa_ptr)`, then dereferencing the pointer in the `// Determine SA Service Type` code blocks in `crypto_aos.c`, `crypto_tc.c`, and `crypto_tm.c`. To fix this, check if the SPI is within the SA array length before retri...
Out-of-Bounds reads on TM/TC/AOS Frames
https://api.github.com/repos/nasa/CryptoLib/issues/268/comments
0
2024-08-05T12:50:24Z
2024-08-07T18:35:34Z
https://github.com/nasa/CryptoLib/issues/268
2,448,479,893
268
6,297