cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2019-18799
2019-11-06T16:15:10.930
LibSass before 3.6.3 allows a NULL pointer dereference in Sass::Parser::parseCompoundSelector in parser_selectors.cpp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/sass/libsass/issues/3001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.co...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sass-lang:libsass:*:*:*:*:*:*:*:*", "matchCriteriaId": "95D2FCD6-0BE0-41D4-93B6-05B7AE69EBF8", "versionEndExcluding": "3.6.3", "versionEndIncluding": null, "versionStartExclu...
[ "476" ]
476
https://github.com/sass/libsass/issues/3001
[ "Exploit", "Third Party Advisory" ]
github.com
[ "sass", "libsass" ]
We found SEGV in sassc binary and sassc is complied with clang enabling ASAN. **Machine Setup** ``` Machine : Ubuntu 16.04.3 LTS gcc version 5.4.0 20160609 (Ubuntu 5.4.0-6ubuntu1~16.04.11) Commit : 4da7c4b Command : sassc POC ``` **Complilation** : CC=afl-clang-fast CXX=afl-clang-fast++ AFL_USE_ASAN=1 make -C...
SEGV in sassc
https://api.github.com/repos/sass/libsass/issues/3001/comments
1
2019-10-07T14:51:08Z
2019-11-12T12:36:06Z
https://github.com/sass/libsass/issues/3001
503,503,493
3,001
833
CVE-2019-18815
2019-11-07T17:15:15.880
PopojiCMS 2.0.1 allows refer= Open Redirection.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/PopojiCMS/PopojiCMS/issues/22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:popojicms:popojicms:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "2215DA94-615C-4B2C-BCC4-4497C233208C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "601" ]
601
https://github.com/PopojiCMS/PopojiCMS/issues/22
[ "Exploit", "Third Party Advisory" ]
github.com
[ "PopojiCMS", "PopojiCMS" ]
Hi, @abdilahrf and I found open redirection vulnerability on the PopojiCMS. The vulnerable code is on **index.php** file line number **101** ![](https://i.imgur.com/6RrMCgU.png) notice the parameter refer was used by the code to redirect the user's to another page. So by crafting a request that using the POST method ...
Open Redirection Vulnerability
https://api.github.com/repos/PopojiCMS/PopojiCMS/issues/22/comments
2
2019-10-19T06:27:43Z
2019-12-18T09:20:29Z
https://github.com/PopojiCMS/PopojiCMS/issues/22
509,403,693
22
834
CVE-2019-18816
2019-11-07T17:15:15.943
po-admin/route.php?mod=post&act=edit in PopojiCMS 2.0.1 allows post[1][content]= stored XSS.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/PopojiCMS/PopojiCMS/issues/21" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:popojicms:popojicms:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "2215DA94-615C-4B2C-BCC4-4497C233208C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "79" ]
79
https://github.com/PopojiCMS/PopojiCMS/issues/21
[ "Exploit", "Third Party Advisory" ]
github.com
[ "PopojiCMS", "PopojiCMS" ]
Hi, @abdilahrf and I found a stored XSS vulnerability on the Post feature. By intercepting the request, we are able to edit the request body to insert a XSS payload. ![](https://i.imgur.com/ifEyydR.png) and it is executed just fine ![](https://i.imgur.com/1nnh6vC.png)
Stored XSS on Post feature
https://api.github.com/repos/PopojiCMS/PopojiCMS/issues/21/comments
3
2019-10-18T17:21:47Z
2019-12-25T18:57:09Z
https://github.com/PopojiCMS/PopojiCMS/issues/21
509,214,349
21
835
CVE-2019-18840
2019-11-09T13:15:10.227
In wolfSSL 4.1.0 through 4.2.0c, there are missing sanity checks of memory accesses in parsing ASN.1 certificate data while handshaking. Specifically, there is a one-byte heap-based buffer overflow inside the DecodedCert structure in GetName in wolfcrypt/src/asn.c because the domain name location index is mishandled. B...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wolfSSL/wolfssl/issues/2555" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7B7AC0D-F131-43AB-93A0-598DD96B519D", "versionEndExcluding": null, "versionEndIncluding": "4.2.0c", "versionStartExclud...
[ "787" ]
787
https://github.com/wolfSSL/wolfssl/issues/2555
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wolfSSL", "wolfssl" ]
WolfSSL in versions 4.1.0 and 4.2.0 incorrectly handles X.509 certificates leading to a heap-buffer overflow inside the DecodedCert structure, overwriting a NULL pointer and as a result crash during memory deallocation. This vulnerability affects both client and server in two supported protocols: TLS and DTLS. Duri...
Heap based buffer overflow while parsing crafted X.509 certificates
https://api.github.com/repos/wolfSSL/wolfssl/issues/2555/comments
6
2019-11-04T17:01:40Z
2019-11-13T20:50:52Z
https://github.com/wolfSSL/wolfssl/issues/2555
517,282,984
2,555
836
CVE-2019-18836
2019-11-11T01:15:10.210
Envoy 1.12.0 allows a remote denial of service because of resource loops, as demonstrated by a single idle TCP connection being able to keep a worker thread in an infinite busy loop when continue_on_listener_filters_timeout is used."
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://blog.envoyproxy.io" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xvf-4396-cj46" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:envoyproxy:envoy:1.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "64A23B79-2694-46D3-A796-DD647442B403", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "835" ]
835
https://github.com/istio/istio/issues/18229
[ "Exploit", "Third Party Advisory" ]
github.com
[ "istio", "istio" ]
**Bug description** We are running Istio v1.3.3 (this also happend on v1.3.0), most of our applications are running fine. However, in one of our deployments the CPU on the sidecar is pegged at 1.0 for the life of the pod. This happens for the majority of the pods in the same deployment but not all. The pod contains ng...
Istio Sidecar consuming high CPU Istio 1.30-1.3.3
https://api.github.com/repos/istio/istio/issues/18229/comments
30
2019-10-23T15:46:28Z
2020-07-03T08:51:34Z
https://github.com/istio/istio/issues/18229
511,415,965
18,229
837
CVE-2019-18844
2019-11-13T20:15:11.020
The Device Model in ACRN before 2019w25.5-140000p relies on assert calls in devicemodel/hw/pci/core.c and devicemodel/include/pci_core.h (instead of other mechanisms for propagating error information or diagnostic information), which might allow attackers to cause a denial of service (assertion failure) within pci core...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/projectacrn/acrn-hypervisor/commit/2b3dedfb9ba13f15887f22b935d373f36c9a59fa" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:acrn:*:*:*:*:*:*:*:*", "matchCriteriaId": "230540A5-B9A3-4A5E-9DB3-0AE1785537E4", "versionEndExcluding": "2019w25.5-140000p", "versionEndIncluding": null, "versionStart...
[ "617" ]
617
https://github.com/projectacrn/acrn-hypervisor/issues/3252
[ "Third Party Advisory" ]
github.com
[ "projectacrn", "acrn-hypervisor" ]
Assert usages issue in device model from KW work.
Assert usages issue in device model from KW work.
https://api.github.com/repos/projectacrn/acrn-hypervisor/issues/3252/comments
2
2019-06-12T08:24:06Z
2019-07-22T02:05:38Z
https://github.com/projectacrn/acrn-hypervisor/issues/3252
455,076,074
3,252
838
CVE-2019-18954
2019-11-14T00:15:11.017
Pomelo v2.2.5 allows external control of critical state data. A malicious user input can corrupt arbitrary methods and attributes in template/game-server/app/servers/connector/handler/entryHandler.js because certain internal attributes can be overwritten via a conflicting name. Hence, a malicious attacker can manipulat...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/NetEase/pomelo/issues/1149" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cl0udz/vulne...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netease:pomelo:2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "F174E06D-AC65-457A-A9A9-CF0808DD6303", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "668" ]
668
https://github.com/NetEase/pomelo/issues/1149
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "NetEase", "pomelo" ]
We found that pomelo allows external control of critical state data. A malicious user-input can corrupt arbitrary methods and attributes in template/game-server/app/servers/connector/handler/entryHandler.js because certain internal attributes can be overwritten via a conflicting name. Hence, a malicious attacker can la...
A state poisoning vulnerability in pomelo
https://api.github.com/repos/NetEase/pomelo/issues/1149/comments
5
2019-11-08T00:04:23Z
2020-03-23T19:09:46Z
https://github.com/NetEase/pomelo/issues/1149
519,582,593
1,149
839
CVE-2019-19011
2019-11-17T18:15:10.987
MiniUPnP ngiflib 0.4 has a NULL pointer dereference in GifIndexToTrueColor in ngiflib.c via a file that lacks a palette.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/miniupnp/ngiflib/issues/16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:miniupnp_project:ngiflib:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5BE2BAA9-5D76-4039-A655-3F478ED5D601", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "476" ]
476
https://github.com/miniupnp/ngiflib/issues/16
[ "Exploit", "Third Party Advisory" ]
github.com
[ "miniupnp", "ngiflib" ]
We found Segmentation Fault issue in gif2tga binary and gif2tga is complied with clang enabling ASAN. **Machine Setup** Machine : Ubuntu 16.04.3 LTS gcc version 5.4.0 20160609 (Ubuntu 5.4.0-6ubuntu1~16.04.11) Commit : 992d272 Command : ./gif2tga $POC POC :- [GifIndexToTrueColor-SEGV.zip](https://github.com/mi...
Segmentation Fault in ngiflib.c
https://api.github.com/repos/miniupnp/ngiflib/issues/16/comments
0
2019-10-30T18:20:15Z
2019-11-09T13:10:39Z
https://github.com/miniupnp/ngiflib/issues/16
514,884,667
16
840
CVE-2019-19040
2019-11-17T21:15:11.303
KairosDB through 1.2.2 has XSS in view.html because of showErrorMessage in js/graph.js, as demonstrated by view.html?q= with a '"sampling":{"value":"<script>' substring.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/kairosdb/kairosdb/issues/569" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://githu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kairosdb_project:kairosdb:*:*:*:*:*:*:*:*", "matchCriteriaId": "3174FC53-9A62-4F03-B106-047BF91DAB50", "versionEndExcluding": null, "versionEndIncluding": "1.2.2", "versionSt...
[ "79" ]
79
https://github.com/kairosdb/kairosdb/issues/569
[ "Exploit", "Third Party Advisory" ]
github.com
[ "kairosdb", "kairosdb" ]
Hello, I want to report a Reflect Cross-site scripting issue on `view.html`. ## Vulnerability A function call on [view.html, Line 48](https://github.com/kairosdb/kairosdb/blob/master/webroot/view.html#L48) will append error message by `showErrorMessage` function. `showErrorMessage` function was declared in [j...
Reflect Cross-site Scripting on error message (WEB UI / view.html, graph.js)
https://api.github.com/repos/kairosdb/kairosdb/issues/569/comments
3
2019-10-24T21:22:52Z
2020-01-26T13:47:31Z
https://github.com/kairosdb/kairosdb/issues/569
512,188,289
569
842
CVE-2019-19084
2019-11-18T16:15:12.370
In Octopus Deploy 3.3.0 through 2019.10.4, an authenticated user with PackagePush permission to upload packages could upload a maliciously crafted package, triggering an exception that exposes underlying operating system details.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/5971" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/iss...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*", "matchCriteriaId": "1621F446-4AB3-45D5-AF0A-845BA5BA5A21", "versionEndExcluding": null, "versionEndIncluding": "2019.10.4", "versionS...
[ "434" ]
434
https://github.com/OctopusDeploy/Issues/issues/5971
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
_Note: affects customers on Octopus Cloud hosted instances. For all other customers this was fixed in https://github.com/OctopusDeploy/Issues/issues/5956_ An authenticated user could upload a maliciously crafted package, triggering an exception that discloses details of the underlying operating system. CVE: `CVE...
(Hosted only) Local path configuration disclosed when uploading maliciously crafted package
https://api.github.com/repos/OctopusDeploy/Issues/issues/5971/comments
4
2019-11-05T04:10:15Z
2020-02-16T23:36:40Z
https://github.com/OctopusDeploy/Issues/issues/5971
517,537,845
5,971
843
CVE-2019-19085
2019-11-18T16:15:12.497
A persistent cross-site scripting (XSS) vulnerability in Octopus Server 3.4.0 through 2019.10.5 allows remote authenticated attackers to inject arbitrary web script or HTML.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/5961" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/iss...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:server:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B92955C-E874-43E4-B043-3DE908250A01", "versionEndExcluding": null, "versionEndIncluding": "2019.10.5", "versionStartExcl...
[ "79" ]
79
https://github.com/OctopusDeploy/Issues/issues/5961
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
An authenticated user with edit permissions could upload a maliciously crafted file, allowing attackers to inject arbitrary web script or HTML. CVE: CVE-2019-19085 Relates to https://github.com/OctopusDeploy/OctopusDeploy/issues/4642
XSS vulnerability
https://api.github.com/repos/OctopusDeploy/Issues/issues/5961/comments
3
2019-11-04T04:11:46Z
2020-02-16T23:36:30Z
https://github.com/OctopusDeploy/Issues/issues/5961
516,951,481
5,961
844
CVE-2019-19113
2019-11-18T17:15:11.707
main/resources/mapper/NewBeeMallGoodsMapper.xml in newbee-mall (aka New Bee) before 2019-10-23 allows search?goodsCategoryId=&keyword= SQL Injection.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/newbee-ltd/newbee-mall/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:newbee-mall_project:newbee-mall:*:*:*:*:*:*:*:*", "matchCriteriaId": "4CF0527F-5552-4086-9880-2E9DF0DA9F5F", "versionEndExcluding": "2019-10-23", "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/newbee-ltd/newbee-mall/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "newbee-ltd", "newbee-mall" ]
\src\main\resources\mapper\NewBeeMallGoodsMapper.xml ``` <select id="findNewBeeMallGoodsListBySearch" parameterType="Map" resultMap="BaseResultMap"> select <include refid="Base_Column_List"/> from tb_newbee_mall_goods_info <where> <if test="keyword!=null and keywor...
SQL Injection in ` \src\main\resources\mapper\NewBeeMallGoodsMapper.xml `
https://api.github.com/repos/newbee-ltd/newbee-mall/issues/1/comments
1
2019-10-19T16:20:39Z
2019-10-23T15:47:52Z
https://github.com/newbee-ltd/newbee-mall/issues/1
509,475,318
1
845
CVE-2019-19203
2019-11-21T21:15:11.497
An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function gb18030_mbc_enc_len in file gb18030.c, a UChar pointer is dereferenced without checking if it passed the end of the matched string. This leads to a heap-based buffer over-read.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ManhNDd/CVE-2019-19203" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/kkos/oni...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oniguruma_project:oniguruma:*:*:*:*:*:*:*:*", "matchCriteriaId": "7696B698-FAA5-4F0E-B9BC-C152135F9D6A", "versionEndExcluding": "6.9.4", "versionEndIncluding": null, "version...
[ "125" ]
125
https://github.com/kkos/oniguruma/issues/163
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "kkos", "oniguruma" ]
In gb18030_mbc_enc_len, p ++ then p is dereferenced without checking if it passes the end of string, which leads to heap-buffer-overflow. ``` static int gb18030_mbc_enc_len(const UChar* p) { if (GB18030_MAP[*p] != CM) return 1; p++; if (GB18030_MAP[*p] == C4) return 4; return 2; } ``` P...
heap-buffer-overflow in gb18030_mbc_enc_len
https://api.github.com/repos/kkos/oniguruma/issues/163/comments
2
2019-11-06T09:39:01Z
2019-11-21T22:19:38Z
https://github.com/kkos/oniguruma/issues/163
518,351,276
163
846
CVE-2019-19204
2019-11-21T21:15:11.577
An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function fetch_interval_quantifier (formerly known as fetch_range_quantifier) in regparse.c, PFETCH is called without checking PEND. This leads to a heap-based buffer over-read.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ManhNDd/CVE-2019-19204" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/kkos/oni...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oniguruma_project:oniguruma:*:*:*:*:*:*:*:*", "matchCriteriaId": "7696B698-FAA5-4F0E-B9BC-C152135F9D6A", "versionEndExcluding": "6.9.4", "versionEndIncluding": null, "version...
[ "125" ]
125
https://github.com/kkos/oniguruma/issues/162
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "kkos", "oniguruma" ]
At regparse.c:4182 in fetch_interval_quantifier, PFETCH is called without checking PEND: ```PFETCH(c); if (IS_SYNTAX_OP(env->syntax, ONIG_SYN_OP_ESC_BRACE_INTERVAL)) { if (c != MC_ESC(env->syntax)) goto invalid; PFETCH(c); } ``` This leads to heap-buffer-overflow. PoC: ``` #include <stdlib.h> #in...
heap-buffer-overflow in fetch_interval_quantifier due to double PFETCH
https://api.github.com/repos/kkos/oniguruma/issues/162/comments
2
2019-11-06T07:43:08Z
2019-11-21T22:19:15Z
https://github.com/kkos/oniguruma/issues/162
518,296,883
162
847
CVE-2019-19221
2019-11-21T23:15:13.887
In Libarchive 3.4.0, archive_wstring_append_from_mbs in archive_string.c has an out-of-bounds read because of an incorrect mbrtowc or mbtowc call. For example, bsdtar crashes via a crafted archive.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libarchive/libarchive/commit/22b1db9d46654afc6f0c28f90af8cdc84a199f41" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Ad...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libarchive:libarchive:3.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "89750E2E-3206-45C0-B882-EF74E66D45C4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "125" ]
125
https://github.com/libarchive/libarchive/issues/1276
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libarchive", "libarchive" ]
bsdtar: An error in archive_wstring_append_from_mbs() (archive_string.c) triggers an out-of-bounds read memory access that results into a crash, via a specially crafted archive file. This bug was found using our custom fuzzer. Basic Information: Version of libarchive: libarchive-3.4.0, libarchive-3.4.1dev Ho...
bsdtar: An error in archive_wstring_append_from_mbs() (archive_string.c) allows out-of-bounds read memory access and subsequently cause a crash
https://api.github.com/repos/libarchive/libarchive/issues/1276/comments
2
2019-11-07T03:40:18Z
2019-11-21T22:25:59Z
https://github.com/libarchive/libarchive/issues/1276
519,020,870
1,276
848
CVE-2019-13566
2019-11-22T21:15:10.880
An issue was discovered in the ROS communications-related packages (aka ros_comm or ros-melodic-ros-comm) through 1.14.3. A buffer overflow allows attackers to cause a denial of service and possibly execute arbitrary code via an IP address with a long hostname.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ros/ros_comm/issues/1735" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/ros/ros_comm/issues/1752" }, { "source": "cve@mitre.org", "t...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ros:ros-comm:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0EBCB1B-9EB9-4FDC-B3FB-8ED23B84BC71", "versionEndExcluding": null, "versionEndIncluding": "1.14.3", "versionStartExcluding...
[ "120" ]
120
https://github.com/ros/ros_comm/issues/1735
[ "Patch", "Third Party Advisory" ]
github.com
[ "ros", "ros_comm" ]
Using Coverity static analysis tool report a potential string overflow in the following code: (10) Event fixed_size_dest: You might overrun the 128-character fixed-size string "namebuf" by copying the return value of "inet_ntoa" without checking the length. https://github.com/ros/ros_comm/blob/29053c4832229efa7160f...
Coverity report potential string overflow in transport_udp.cpp
https://api.github.com/repos/ros/ros_comm/issues/1735/comments
2
2019-07-02T19:28:39Z
2019-11-28T09:25:32Z
https://github.com/ros/ros_comm/issues/1735
463,397,685
1,735
849
CVE-2019-13566
2019-11-22T21:15:10.880
An issue was discovered in the ROS communications-related packages (aka ros_comm or ros-melodic-ros-comm) through 1.14.3. A buffer overflow allows attackers to cause a denial of service and possibly execute arbitrary code via an IP address with a long hostname.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ros/ros_comm/issues/1735" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/ros/ros_comm/issues/1752" }, { "source": "cve@mitre.org", "t...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ros:ros-comm:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0EBCB1B-9EB9-4FDC-B3FB-8ED23B84BC71", "versionEndExcluding": null, "versionEndIncluding": "1.14.3", "versionStartExcluding...
[ "120" ]
120
https://github.com/ros/ros_comm/issues/1752
null
github.com
[ "ros", "ros_comm" ]
Copy the Internet host address of address->sin_addr to local variable with checking the buffer length, can cause potential buffer overflow if using a IP address with a long hostname that is obtained via a reverse DNS lookup https://github.com/ros/ros_comm/blob/29053c4832229efa7160fb944c05e3bc82e11540/clients/roscpp/...
Potential buffer overflow
https://api.github.com/repos/ros/ros_comm/issues/1752/comments
1
2019-07-10T19:24:37Z
2019-08-07T22:56:26Z
https://github.com/ros/ros_comm/issues/1752
466,477,248
1,752
850
CVE-2019-10217
2019-11-25T16:15:13.347
A flaw was found in ansible 2.8.0 before 2.8.4. Fields managing sensitive data should be set as such by no_log feature. Some of these fields in GCP modules are not set properly. service_account_contents() which is common class for all gcp modules is not setting no_log to True. Any sensitive data managed by that functio...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "secalert@redhat.com", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html" }, { "source": "secalert@redhat.com", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html" }, { "sourc...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*", "matchCriteriaId": "313A09AC-5BD9-4660-8D33-56A5E0CC239F", "versionEndExcluding": "2.8.4", "versionEndIncluding": null, "versionStartExcludin...
[ "200" ]
200
https://github.com/ansible/ansible/issues/56269
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ansible", "ansible" ]
<!--- Verify first that your issue is not already reported on GitHub --> <!--- Also test if the latest release and devel branch are affected too --> <!--- Complete *all* sections as described, this form is processed automatically --> ##### SUMMARY <!--- Explain the problem briefly below --> When I use `service_a...
gcp_storage_object fails with service_account_contents option
https://api.github.com/repos/ansible/ansible/issues/56269/comments
5
2019-05-09T14:08:26Z
2019-08-26T14:04:39Z
https://github.com/ansible/ansible/issues/56269
442,256,818
56,269
851
CVE-2019-19270
2019-11-26T04:15:12.950
An issue was discovered in tls_verify_crl in ProFTPD through 1.3.6b. Failure to check for the appropriate field of a CRL entry (checking twice for subject, rather than once for subject and once for issuer) prevents some valid CRLs from being taken into account, and can allow clients whose certificates have been revoked...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00009.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/proftpd/proftpd/issues/859" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:proftpd:proftpd:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8267809-FDF5-459D-B34D-8CFF65B03A22", "versionEndExcluding": null, "versionEndIncluding": "1.3.5", "versionStartExcludi...
[ "295" ]
295
https://github.com/proftpd/proftpd/issues/859
[ "Patch", "Third Party Advisory" ]
github.com
[ "proftpd", "proftpd" ]
This is the 2nd of 4 bugs in the tls_verify_crl() function. The code fails to perform a CRL lookup by issuer (as the comment right above the block states), it instead performs a second lookup by subject. As a result, in our tests, after crash bugs 1 and 4 (issue #858 and issue #861) were fixed, ProFTPD still failed to ...
Improper TLS CRL handling 1/2 in mod_tls of ProFTPD master HEAD
https://api.github.com/repos/proftpd/proftpd/issues/859/comments
2
2019-11-04T16:08:50Z
2019-11-26T07:34:05Z
https://github.com/proftpd/proftpd/issues/859
517,251,790
859
852
CVE-2019-19271
2019-11-26T04:15:13.013
An issue was discovered in tls_verify_crl in ProFTPD before 1.3.6. A wrong iteration variable, used when checking a client certificate against CRL entries (installed by a system administrator), can cause some CRL entries to be ignored, and can allow clients whose certificates have been revoked to proceed with a connect...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/proftpd/proftpd/issues/860" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:proftpd:proftpd:*:*:*:*:*:*:*:*", "matchCriteriaId": "19DF8347-D2E6-4736-849D-F0707FE8E0F3", "versionEndExcluding": "1.3.6", "versionEndIncluding": null, "versionStartExcludi...
[ "295" ]
295
https://github.com/proftpd/proftpd/issues/860
[ "Patch", "Third Party Advisory" ]
github.com
[ "proftpd", "proftpd" ]
For tracking purposes (this problem is fixed in 1.3.6+). This is the 3rd of 4 bugs in the tls_verify_crl() function. The wrong iteration variable is passed to sk_X509_REVOKED_value(), probably causing some CRL entries to be ignored. From the 1.3.5 -> 1.3.6 branches diff: ``` @@ -6001,14 +9084,15 @@ static int tls_ve...
Improper TLS CRL handling 2/2 in mod_tls of ProFTPD < 1.3.6
https://api.github.com/repos/proftpd/proftpd/issues/860/comments
2
2019-11-04T16:09:38Z
2019-11-27T15:25:05Z
https://github.com/proftpd/proftpd/issues/860
517,252,338
860
853
CVE-2019-19272
2019-11-26T04:15:13.060
An issue was discovered in tls_verify_crl in ProFTPD before 1.3.6. Direct dereference of a NULL pointer (a variable initialized to NULL) leads to a crash when validating the certificate of a client connecting to the server in a TLS client/server mutual-authentication setup.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/proftpd/proftpd/issues/858" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/proftpd/proftpd/issues/858" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:proftpd:proftpd:*:*:*:*:*:*:*:*", "matchCriteriaId": "19DF8347-D2E6-4736-849D-F0707FE8E0F3", "versionEndExcluding": "1.3.6", "versionEndIncluding": null, "versionStartExcludi...
[ "476" ]
476
https://github.com/proftpd/proftpd/issues/858
[ "Third Party Advisory" ]
github.com
[ "proftpd", "proftpd" ]
For tracking purposes (this problem is fixed in 1.3.6+). This is the 1st of 4 bugs in the tls_verify_crl() function. It's a direct nullptr dereference: variable initialized to NULL, then dereferenced. I fixed it on my side, then I noticed that it had been fixed upstream in 1.3.6. From the 1.3.5 -> 1.3.6 branches diff:...
DoS (nullptr dereference) 1/2 with CRLs in mod_tls of ProFTPD < 1.3.6
https://api.github.com/repos/proftpd/proftpd/issues/858/comments
2
2019-11-04T16:07:44Z
2019-11-27T15:24:35Z
https://github.com/proftpd/proftpd/issues/858
517,251,126
858
854
CVE-2015-9537
2019-11-26T15:15:11.190
The NextGEN Gallery plugin before 2.1.10 for WordPress has multiple XSS issues involving thumbnail_width, thumbnail_height, thumbwidth, thumbheight, wmXpos, and wmYpos, and template.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2015-9537-nextgen.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.co...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagely:nextgen_gallery:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "F6FF0678-1E8F-4693-AE22-4AFEF12528BB", "versionEndExcluding": "2.1.10", "versionEndIncluding": null, "ve...
[ "79" ]
79
https://github.com/cybersecurityworks/Disclosed/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details Word Press Product Bugs Report Bug Name XSS (Cross Site Scripting) Software: NextGen Gallery Version: 2.1.7 Last Updated: 12-08-2015 Homepage: https://wordpress.org/plugins/nextgen-gallery/download/ Compatible Up to Wordpress 4.3.0 Version (Requires: 3.6.1 or higher) Severity High Description: Multip...
Multiple XSS in NextGEN Gallery by Photocrati Version 2.1.7
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/1/comments
1
2015-08-27T13:22:02Z
2024-05-10T04:43:44Z
https://github.com/cybersecurityworks/Disclosed/issues/1
103,507,915
1
855
CVE-2015-9538
2019-11-26T15:15:11.253
The NextGEN Gallery plugin before 2.1.15 for WordPress allows ../ Directory Traversal in path selection.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cxsecurity.com/issue/WLB-2015080165" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagely:nextgen_gallery:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "5E4A9794-77D2-4813-B40A-B7D784E77A9B", "versionEndExcluding": "2.1.15", "versionEndIncluding": null, "ve...
[ "22" ]
22
https://github.com/cybersecurityworks/Disclosed/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
Word Press Product Bugs Report Bug Name LFI (Local File Inclusion) Area Path NextGEN Gallery by Photocrati Version 2.1.7 (Plugin) Last Updated 12-08-2015 Compatible Up to Wordpress 4.3.0 Version (Requires: 3.6.1 or higher) Severity High Reported by Sathish from <a href="http://www.cybersecurityworks.com">Cyber Security...
Traversal Attack / Local File Inclusion (LFI) in NextGEN Gallery by Photocrati Version 2.1.7
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/2/comments
0
2015-08-28T11:58:55Z
2015-11-25T11:23:59Z
https://github.com/cybersecurityworks/Disclosed/issues/2
103,705,424
2
856
CVE-2015-9539
2019-11-26T15:15:11.347
The Fast Secure Contact Form plugin before 4.0.38 for WordPress allows fs_contact_form1[welcome] XSS.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2015-9539-fastsecure.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/amansaini/fa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fast_secure_contact_form_project:fast_secure_contact_form:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "94936F04-9861-47BF-9F06-F5B7F29E124A", "versionEndExcluding": "4.0.38", "versionEn...
[ "79" ]
79
https://github.com/cybersecurityworks/Disclosed/issues/4
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details Word Press Product Bugs Report Bug Name XSS (Cross Site Scripting) Software: Fast Secure Contact Form plugin Version: 4.0.37 Last Updated: 21-08-2015 Homepage: https://wordpress.org/plugins/si-contact-form/ Compatible Up to Wordpress 4.3.0 Version (Requires: 3.4.2 or higher) Severity High Descriptio...
XSS Vulnerability in Fast Secure Contact form version 4.0.37
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/4/comments
0
2015-09-14T10:50:07Z
2015-09-14T10:58:55Z
https://github.com/cybersecurityworks/Disclosed/issues/4
106,317,022
4
857
CVE-2019-19306
2019-11-26T15:15:13.377
The Zoho CRM Lead Magnet plugin 1.6.9.1 for WordPress allows XSS via module, EditShortcode, or LayoutName.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-19306-zoho.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoho:lead_magnet:1.6.9.1:*:*:*:*:wordpress:*:*", "matchCriteriaId": "CF9D5215-A5D4-4616-8D29-7C225C9E39D2", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "79" ]
79
https://github.com/cybersecurityworks/Disclosed/issues/16
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details ZOHO CRM Lead Magnet version 1.6.9.1 Bug Name: Reflected Cross Site Scripting (XSS) in WordPress Plugin Product: ZOHO CRM Lead Magnet version 1.6.9.1 Version: 1.6.9.1 Last Updated: 14-10-2019 Homepage: http://localhost/wordpress/ Severity: High Status: Fixed Exploitation Requires Authentication?: ...
ZOHO CRM Lead Magnet version 1.6.9.1
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/16/comments
0
2019-10-16T11:06:22Z
2019-10-16T13:31:02Z
https://github.com/cybersecurityworks/Disclosed/issues/16
507,779,866
16
858
CVE-2019-19375
2019-11-28T17:15:12.383
In Octopus Deploy before 2019.10.7, in a configuration where SSL offloading is enabled, the CSRF cookie was sometimes sent without the secure attribute. (The fix for this was backported to LTS versions 2019.6.14 and 2019.9.8.)
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/5998" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/iss...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:-:*:*:*", "matchCriteriaId": "70EDE3D5-F20F-4921-8D92-A22ADB705325", "versionEndExcluding": "2019.10.7", "versionEndIncluding": null, "versionS...
[ "352" ]
352
https://github.com/OctopusDeploy/Issues/issues/5998
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
When Octopus is configured to behind a load balancer, and SSL offloading is configured, Octopus will sometimes send the CSRF cookie without the `secure` attribute. CVE: `CVE-2019-19375` Relates to https://github.com/OctopusDeploy/OctopusDeploy/issues/4763
CSRF cookie sometimes missing secure attribute
https://api.github.com/repos/OctopusDeploy/Issues/issues/5998/comments
2
2019-11-14T02:15:57Z
2020-02-28T07:02:35Z
https://github.com/OctopusDeploy/Issues/issues/5998
522,581,170
5,998
860
CVE-2019-19269
2019-11-30T23:15:18.223
An issue was discovered in tls_verify_crl in ProFTPD through 1.3.6b. A dereference of a NULL pointer may occur. This pointer is returned by the OpenSSL sk_X509_REVOKED_value() function when encountering an empty CRL installed by a system administrator. The dereference occurs when validating the certificate of a client ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00009.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/proftpd/proftpd/issues/861" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:proftpd:proftpd:*:*:*:*:*:*:*:*", "matchCriteriaId": "9489E448-D5B8-4A38-99CE-C472EA881D69", "versionEndExcluding": null, "versionEndIncluding": "1.3.5e", "versionStartExclud...
[ "476" ]
476
https://github.com/proftpd/proftpd/issues/861
[ "Patch", "Third Party Advisory" ]
github.com
[ "proftpd", "proftpd" ]
This is the 4th of 4 bugs in the tls_verify_crl() function. The code fails to take into account an empty CRL, for which sk_X509_REVOKED_value() returned NULL in my tests. It proceeds to dereferencing the NULL pointer, crashing the application. My patch is as follows: ``` @@ -6005,7 +6014,8 @@ ASN1_INTEGE...
DoS (nullptr dereference) 2/2 with CRLs in mod_tls of ProFTPD master HEAD
https://api.github.com/repos/proftpd/proftpd/issues/861/comments
2
2019-11-04T16:10:29Z
2019-11-26T07:33:45Z
https://github.com/proftpd/proftpd/issues/861
517,252,879
861
862
CVE-2019-19507
2019-12-02T17:15:13.187
In jpv (aka Json Pattern Validator) before 2.1.1, compareCommon() can be bypassed because certain internal attributes can be overwritten via a conflicting name, as demonstrated by 'constructor': {'name':'Array'}. This affects validate(). Hence, a crafted payload can overwrite this builtin attribute to manipulate the ty...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/manvel-khnkoyan/jpv/issues/6" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://www.npmjs.com/package/jpv" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:json_pattern_validator_project:json_pattern_validator:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F1083D2-D514-48D7-884F-CBC15FE194F7", "versionEndExcluding": "2.1.1", "versionEndIncluding": ...
[ "287" ]
287
https://github.com/manvel-khnkoyan/jpv/issues/6
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "manvel-khnkoyan", "jpv" ]
We found that a maliciously crafted json can bypass the validation logics of jpv. The vulnerability is from the following code: jpv leverages the built-in constructor of unsafe user-input to detect type information. However, a crafted payload can overwrite this builtin attribute to manipulate the type detection result...
A vulnerability in validate()
https://api.github.com/repos/manvel-khnkoyan/jpv/issues/6/comments
1
2019-11-28T22:12:05Z
2019-12-02T09:14:57Z
https://github.com/manvel-khnkoyan/jpv/issues/6
530,087,847
6
863
CVE-2019-19588
2019-12-05T01:15:14.317
The validators package 0.12.2 through 0.12.5 for Python enters an infinite loop when validators.domain is called with a crafted domain string. This is fixed in 0.12.6.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/kvesteri/validators/issues/86" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:validators_project:validators:*:*:*:*:*:python:*:*", "matchCriteriaId": "30573335-BFF9-4B00-8F4F-9C0186ED3170", "versionEndExcluding": null, "versionEndIncluding": "0.12.5", ...
[ "835" ]
835
https://github.com/kvesteri/validators/issues/86
[ "Exploit", "Third Party Advisory" ]
github.com
[ "kvesteri", "validators" ]
The following string makes validators 0.12.2 get lock at 100% CPU forever. ``` crazy_string='p.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.' ``` Logs: ``` root@db8fc13972fc:/myapp# pip list | grep validators validators 0.12.2 ro...
Text string that causes validators.domain to lock at 100% CPU usage
https://api.github.com/repos/python-validators/validators/issues/86/comments
1
2018-06-06T23:00:03Z
2019-12-04T13:13:21Z
https://github.com/python-validators/validators/issues/86
330,061,628
86
865
CVE-2019-19601
2019-12-05T13:15:11.970
OpenDetex 2.8.5 has a Buffer Overflow in TexOpen in detex.l because of an incorrect sprintf.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pkubowicz/opendetex/issues/60" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opendetex_project:opendetex:2.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AC0793B-C54B-4A0B-8CBC-4D401D990E7A", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ "119" ]
119
https://github.com/pkubowicz/opendetex/issues/60
[ "Exploit", "Third Party Advisory" ]
github.com
[ "pkubowicz", "opendetex" ]
Hi, While fuzzing OpenDetex with Honggfuzz, I found a buffer overflow in the TexOpen() function, in detex.l. Attaching a reproducer (gzipped so GitHub accepts it): [test01.gz](https://github.com/pkubowicz/opendetex/files/3925690/test01.gz) Issue can be reproduced by running: ``` detex test01 ``` ``` =...
Buffer overflow in the TexOpen() function
https://api.github.com/repos/pkubowicz/opendetex/issues/60/comments
2
2019-12-05T08:11:30Z
2020-01-25T12:56:16Z
https://github.com/pkubowicz/opendetex/issues/60
533,191,085
60
867
CVE-2019-19602
2019-12-05T14:15:09.257
fpregs_state_valid in arch/x86/include/asm/fpu/internal.h in the Linux kernel before 5.4.2, when GCC 9 is used, allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact because of incorrect fpu_fpregs_owner_ctx caching, as demonstrated by mishandling ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.4, "confidentialityImpact": "COMPLE...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.kernel.org/show_bug.cgi?id=205663" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://cdn.kernel.org/pu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "EDA2DEC6-C9B1-4CBB-99ED-EF1EB2832A99", "versionEndExcluding": "5.4.2", "versionEndIncluding": null, "versionStartExcl...
[ "119" ]
119
https://github.com/golang/go/issues/35777#issuecomment-561935388
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "golang", "go" ]
We've had several reports of memory corruption on Linux 5.3.x (or later) kernels from people running tip since asynchronous preemption was committed. This is a super-bug to track these issues. I suspect they all have one root cause. Typically these are "runtime error: invalid memory address or nil pointer dereferenc...
runtime: memory corruption on Linux 5.2+
https://api.github.com/repos/golang/go/issues/35777/comments
93
2019-11-22T15:24:36Z
2024-09-13T15:13:41Z
https://github.com/golang/go/issues/35777
527,259,718
35,777
868
CVE-2018-1002102
2019-12-05T16:15:10.427
Improper validation of URL redirection in the Kubernetes API server in versions prior to v1.14.0 allows an attacker-controlled Kubelet to redirect API server requests from streaming endpoints to arbitrary hosts. Impacted API servers will follow the redirect as a GET request with client-certificate credentials for authe...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", ...
[ { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/85867" }, { "source": "jordan@liggitt.net", "tags": null, "url": "https://lists.fedoraproject.org/archives/l...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "1774C3E1-5BE8-4DC0-8A61-39B183C36F96", "versionEndExcluding": null, "versionEndIncluding": "1.13.13", "versionStar...
[ "601" ]
601
https://github.com/kubernetes/kubernetes/issues/85867
[ "Issue Tracking", "Mitigation", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: [CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:N/E:F (Low)](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:N/E:F) An attacker-controlled Kubelet can return an arbitrary redirect when responding to certain apiserver requests. Impacted kube-apiservers will follow the red...
CVE-2018-1002102: Unvalidated redirect
https://api.github.com/repos/kubernetes/kubernetes/issues/85867/comments
3
2019-12-03T22:58:37Z
2021-12-02T22:56:35Z
https://github.com/kubernetes/kubernetes/issues/85867
532,323,568
85,867
869
CVE-2019-11255
2019-12-05T16:15:10.567
Improper input validation in Kubernetes CSI sidecar containers for external-provisioner (<v0.4.3, <v1.0.2, v1.1, <v1.2.2, <v1.3.1), external-snapshotter (<v0.4.2, <v1.0.2, v1.1, <1.2.2), and external-resizer (v0.1, v0.2) could result in unauthorized PersistentVolume data access or volume mutation during snapshot, resto...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL"...
[ { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4054" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4096" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:external-provisioner:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A78A50B-5286-400D-A54A-49F1023D97D6", "versionEndExcluding": null, "versionEndIncluding": "0.4.2", "ver...
[ "20" ]
20
https://github.com/kubernetes/kubernetes/issues/85233
[ "Mitigation", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
<!-- Please use this template while reporting a bug and provide as much info as possible. Not doing so may result in your bug not being addressed in a timely manner. Thanks! If the matter is security related, please disclose it privately via https://kubernetes.io/security/ --> **Am I vulnerable?** CSI snapsho...
CVE-2019-11255: CSI volume snapshot, cloning and resizing features can result in unauthorized volume data access or mutation
https://api.github.com/repos/kubernetes/kubernetes/issues/85233/comments
5
2019-11-13T20:57:31Z
2022-10-14T02:00:55Z
https://github.com/kubernetes/kubernetes/issues/85233
522,468,661
85,233
870
CVE-2019-19624
2019-12-06T15:15:10.330
An out-of-bounds read was discovered in OpenCV before 4.1.1. Specifically, variable coarsest_scale is assumed to be greater than or equal to finest_scale within the calc()/ocl_calc() functions in dis_flow.cpp. However, this is not true when dealing with small images, leading to an out-of-bounds read of the heap-allocat...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/opencv/opencv/commit/d1615ba11a93062b1429fce9f0f638d1572d3418" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opencv:opencv:*:*:*:*:*:*:*:*", "matchCriteriaId": "B00DAA9A-1738-491E-9220-BFFB8580CAB4", "versionEndExcluding": "4.1.1", "versionEndIncluding": null, "versionStartExcluding...
[ "125" ]
125
https://github.com/opencv/opencv/issues/14554
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "opencv", "opencv" ]
##### System information (version) <!-- Example - OpenCV => 4.0 - Operating System / Platform => Windows 64 Bit - Compiler => Visual Studio 2015 --> - OpenCV => 4.0 - Operating System / Platform => Any - Compiler => Any ##### Detailed description DISOpticalFlow segfaults for small images. The problem i...
DISOpticalFlow: segfault for small images
https://api.github.com/repos/opencv/opencv/issues/14554/comments
2
2019-05-14T13:24:09Z
2024-05-10T02:57:12Z
https://github.com/opencv/opencv/issues/14554
443,913,502
14,554
871
CVE-2019-19625
2019-12-06T16:15:11.247
SROS 2 0.8.1 (which provides the tools that generate and distribute keys for Robot Operating System 2 and uses the underlying security plugins of DDS from ROS 2) leaks node information due to a leaky default configuration as indicated in the policy/defaults/dds/governance.xml document.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/922" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ros2/sros2/pull/171" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ros:sros2:0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "E2332494-1342-4DDB-8C8F-FC27B3292728", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "200" ]
200
https://github.com/aliasrobotics/RVD/issues/922
[ "Exploit", "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml cve: CVE-2019-19625 cwe: CWE-200 (Information Exposure) description: We found that SROS 2, the tools to generate and distribute keys for ROS 2 and use the underlying security plugins of DDS from ROS 2 leak node information due to a leaky default configuration as inidicated at https://github.com/ros2/sr...
RVD#922: SROS2 leaks node information
https://api.github.com/repos/aliasrobotics/RVD/issues/922/comments
2
2019-12-05T21:44:23Z
2020-06-23T14:25:37Z
https://github.com/aliasrobotics/RVD/issues/922
533,616,302
922
872
CVE-2019-19627
2019-12-06T16:15:11.357
SROS 2 0.8.1 (after CVE-2019-19625 is mitigated) leaks ROS 2 node-related information regardless of the rtps_protection_kind configuration. (SROS2 provides the tools to generate and distribute keys for Robot Operating System 2 and uses the underlying security plugins of DDS from ROS 2.)
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://asciinema.org/a/yuGkBlaPC33wqL4qABRlgxBkd" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/922" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ros:sros2:0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "E2332494-1342-4DDB-8C8F-FC27B3292728", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "200" ]
200
https://github.com/ros2/sros2/issues/172
[ "Third Party Advisory" ]
github.com
[ "ros2", "sros2" ]
## Bug report Connected to https://github.com/ros2/sros2/pull/171/files. After this patch one wold expect that node information isn't disclosed anymore but testing led to a different result. I'm not that experienced with `sros2` at this point so I might be missing something? Ping to @mikaelarguedas and @ruffsl. ...
SROS2 leaks node information, regardless of rtps_protection_kind setup
https://api.github.com/repos/ros2/sros2/issues/172/comments
4
2019-12-06T10:08:16Z
2020-02-13T22:26:42Z
https://github.com/ros2/sros2/issues/172
533,865,650
172
873
CVE-2019-19630
2019-12-08T02:15:10.030
HTMLDOC 1.9.7 allows a stack-based buffer overflow in the hd_strlcpy() function in string.c (when called from render_contents in ps-pdf.cxx) via a crafted HTML document.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/370" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "htt...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:1.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "FB9F993E-D4F5-4ED1-B93C-71EAEFFFF408", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "787" ]
787
https://github.com/michaelrsweet/htmldoc/issues/370
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
Hi, While fuzzing htmldoc with Honggfuzz, I found a stack-based buffer overflow in the hd_strlcpy() function, in string.c. Attaching a reproducer (gzipped so GitHub accepts it): [test01.html.gz](https://github.com/michaelrsweet/htmldoc/files/3933370/test01.html.gz) Issue can be reproduced by running: ``` ...
Stack-based buffer overflow in the hd_strlcpy() function
https://api.github.com/repos/michaelrsweet/htmldoc/issues/370/comments
4
2019-12-06T17:57:51Z
2019-12-08T19:02:42Z
https://github.com/michaelrsweet/htmldoc/issues/370
534,181,098
370
874
CVE-2019-19635
2019-12-08T03:15:10.897
An issue was discovered in libsixel 1.8.2. There is a heap-based buffer overflow in the function sixel_decode_raw_impl at fromsixel.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/103" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/103" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "787" ]
787
https://github.com/saitoha/libsixel/issues/103
[ "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
# libsixel ## version libsixel 1.8.2 ## description ```txt None ``` ## download link None ## others please send email to teamseri0us360@gmail.com if you have any questions. --------------------- ## sixel_decode_raw_impl@fromsixel.c:608-41___heap-buffer-overflow ### descr...
A heap-buffer-overflow in function sixel_decode_raw_impl at fromsixel.c:608-4, due to integer overflow
https://api.github.com/repos/saitoha/libsixel/issues/103/comments
2
2019-12-02T10:49:48Z
2019-12-17T12:05:50Z
https://github.com/saitoha/libsixel/issues/103
531,046,092
103
875
CVE-2019-19636
2019-12-08T03:15:10.973
An issue was discovered in libsixel 1.8.2. There is an integer overflow in the function sixel_encode_body at tosixel.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/104" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/104" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "190" ]
190
https://github.com/saitoha/libsixel/issues/104
[ "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
# libsixel ## version libsixel 1.8.2 ## description ```txt None ``` ## download link None ## others please send email to teamseri0us360@gmail.com if you have any questions. --------------------- ## sixel_encode_body@tosixel.c:562-38___SEGV_UNKNOW ### description An ...
An integer overflow in function sixel_encode_body at tosixel.c:562-38
https://api.github.com/repos/saitoha/libsixel/issues/104/comments
2
2019-12-02T10:51:14Z
2019-12-17T12:05:34Z
https://github.com/saitoha/libsixel/issues/104
531,046,886
104
876
CVE-2019-19637
2019-12-08T03:15:11.020
An issue was discovered in libsixel 1.8.2. There is an integer overflow in the function sixel_decode_raw_impl at fromsixel.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/105" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "190" ]
190
https://github.com/saitoha/libsixel/issues/105
[ "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
# libsixel ## version libsixel 1.8.2 ## description ```txt None ``` ## download link None ## others please send email to teamseri0us360@gmail.com if you have any questions. --------------------- ## sixel_decode_raw_impl@fromsixel.c:650_integer_overflow ### description ...
An integer overflow in function sixel_decode_raw_impl at fromsixel.c:650
https://api.github.com/repos/saitoha/libsixel/issues/105/comments
2
2019-12-02T10:52:00Z
2019-12-17T12:05:12Z
https://github.com/saitoha/libsixel/issues/105
531,047,331
105
877
CVE-2019-19647
2019-12-09T01:15:10.280
radare2 through 4.0.0 lacks validation of the content variable in the function r_asm_pseudo_incbin at libr/asm/asm.c, ultimately leading to an arbitrary write. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted input.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/issues/15545" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraprojec...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F2CC41D-F155-4528-AB57-DD94A54A0CE4", "versionEndExcluding": null, "versionEndIncluding": "4.0.0", "versionStartExcludin...
[ "476" ]
476
https://github.com/radareorg/radare2/issues/15545
[ "Exploit", "Third Party Advisory" ]
github.com
[ "radareorg", "radare2" ]
### Work environment | Questions | Answers |------------------------------------------------------|-------------------- | OS/arch/bits (mandatory) | Ubuntu x86 64 | File format of the file you reverse (mandatory) | None | Architecture/bi...
Lack of Validation Check for `r_asm_pseudo_incbin` at `libr/asm/asm.c`
https://api.github.com/repos/radareorg/radare2/issues/15545/comments
1
2019-12-06T07:49:36Z
2019-12-15T22:38:41Z
https://github.com/radareorg/radare2/issues/15545
533,802,860
15,545
879
CVE-2019-19648
2019-12-09T01:15:10.357
In the macho_parse_file functionality in macho/macho.c of YARA 3.11.0, command_size may be inconsistent with the real size. A specially crafted MachO file can cause an out-of-bounds memory access, resulting in Denial of Service (application crash) or potential code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/VirusTotal/yara/issues/1178" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.o...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:virustotal:yara:3.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "632E7FAC-875C-4A8F-8629-FDE518400BF0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "125" ]
125
https://github.com/VirusTotal/yara/issues/1178
[ "Exploit", "Third Party Advisory" ]
github.com
[ "VirusTotal", "yara" ]
In [libyara/modules/macho/macho.c](https://github.com/VirusTotal/yara/blob/master/libyara/modules/macho/macho.c), yara doesn't check whether the variable [command_size](https://github.com/VirusTotal/yara/blob/master/libyara/modules/macho/macho.c#L370) is consistent with the command's real size. A crafted MachO file wil...
Out-of-Bounds Memory Access in macho module
https://api.github.com/repos/VirusTotal/yara/issues/1178/comments
5
2019-12-08T08:50:29Z
2021-12-22T21:11:54Z
https://github.com/VirusTotal/yara/issues/1178
534,511,077
1,178
880
CVE-2019-19698
2019-12-10T07:15:11.210
marc-q libwav through 2017-04-20 has a NULL pointer dereference in wav_content_read() at libwav.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/marc-q/libwav/issues/25" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/xiaoxiongwang/security...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libwav_project:libwav:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B1ADCA2-142E-4BE6-997F-4549F987C0E1", "versionEndExcluding": null, "versionEndIncluding": "2017-04-20", "versionS...
[ "476" ]
476
https://github.com/marc-q/libwav/issues/25
[ "Exploit", "Third Party Advisory" ]
github.com
[ "marc-q", "libwav" ]
# SEGV in function wav_content_read in libwav.c Tested in Ubuntu 14.04, 32bit I use the [file](https://github.com/xiaoxiongwang/security/blob/master/libwav/wav_gain_crash_SEGV_wav_content_read.wav) and the following command: ```shell ./wav_gain wav_gain_crash_SEGV_wav_content_read.wav test.wav ``` and get...
SEGV in function wav_content_read in libwav.c
https://api.github.com/repos/marc-q/libwav/issues/25/comments
1
2019-10-24T07:14:38Z
2020-03-06T16:21:50Z
https://github.com/marc-q/libwav/issues/25
511,754,019
25
881
CVE-2019-19702
2019-12-10T20:15:17.497
The modoboa-dmarc plugin 1.1.0 for Modoboa is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this to perform a denial of service against the DMARC reporting functionality, such as by referencing the /dev/random file within XML documents that are ema...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/modoboa/modoboa-dmarc/issues/38" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:modoboa:modoboa-dmarc:1.1.0:*:*:*:*:modoboa:*:*", "matchCriteriaId": "18B12094-EDD2-4119-AB3A-ED7F2980E88A", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ "611" ]
611
https://github.com/modoboa/modoboa-dmarc/issues/38
[ "Exploit", "Third Party Advisory" ]
github.com
[ "modoboa", "modoboa-dmarc" ]
<h2>Background</h2> XXE Injection is a type of attack against an application that parses XML input. By default, many XML processors allow specification of an external entity, a URI that is dereferenced and evaluated during XML processing. When an XML document is being parsed, the parser can make a request and inc...
XML External Entity (XXE) Injection during import of aggregated report
https://api.github.com/repos/modoboa/modoboa-dmarc/issues/38/comments
3
2019-11-25T22:32:21Z
2020-03-02T08:35:57Z
https://github.com/modoboa/modoboa-dmarc/issues/38
528,376,022
38
882
CVE-2019-19703
2019-12-10T20:15:17.577
In Ktor through 1.2.6, the client resends data from the HTTP Authorization header to a redirect location.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ktorio/ktor/issues/1467" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jetbrains:ktor:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFA330B1-67DD-4292-A909-1A6373D9D0EE", "versionEndExcluding": null, "versionEndIncluding": "1.2.6", "versionStartExcludin...
[ "601" ]
601
https://github.com/ktorio/ktor/issues/1467
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ktorio", "ktor" ]
**Ktor Version and Engine Used** Ktor HTTP client 1.2.5 with Apache engine. **Describe the bug** Enable `followRedirects` for http client and send request with auth data to the host `https://foo/redirect` which redirects to the host `https://bar` with auth data from host `foo`. **To Reproduce** Steps to repr...
Ktor client resends auth data to redirect location
https://api.github.com/repos/ktorio/ktor/issues/1467/comments
1
2019-11-29T11:37:32Z
2019-12-11T13:09:36Z
https://github.com/ktorio/ktor/issues/1467
530,301,344
1,467
883
CVE-2019-19720
2019-12-11T04:15:10.667
Yabasic 2.86.1 has a heap-based buffer overflow in the yylex() function in flex.c via a crafted BASIC source file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://www.yabasic.de/whatsnew.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/marcIhm/yabasic/issues/36" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yabasic:yabasic:2.86.1:*:*:*:*:*:*:*", "matchCriteriaId": "4D67B1F9-F159-487B-B234-1DDE353D7013", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "787" ]
787
https://github.com/marcIhm/yabasic/issues/36
[ "Exploit", "Third Party Advisory" ]
github.com
[ "marcIhm", "yabasic" ]
Hi, While fuzzing yabasic 2.86.1 with Honggfuzz, I found a heap-based buffer overflow in the yylex() function, in flex.c. Attaching a reproducer (gzipped so GitHub accepts it): [test01.yab.gz](https://github.com/marcIhm/yabasic/files/3944942/test01.yab.gz) Issue can be reproduced by running: ``` yabasic te...
Heap-based buffer overflow in the yylex() function
https://api.github.com/repos/marcIhm/yabasic/issues/36/comments
5
2019-12-10T13:08:41Z
2019-12-15T18:10:35Z
https://github.com/marcIhm/yabasic/issues/36
535,719,373
36
884
CVE-2019-18960
2019-12-11T13:15:11.827
Firecracker vsock implementation buffer overflow in versions 0.18.0 and 0.19.0. This can result in potentially exploitable crashes.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/12/10/1" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwal...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amazon:firecracker:0.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "27A5DF1A-483D-4FD6-BA01-8E96052DBD35", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "120" ]
120
https://github.com/firecracker-microvm/firecracker/issues/1462
[ "Third Party Advisory" ]
github.com
[ "firecracker-microvm", "firecracker" ]
We have identified an issue in the Firecracker v0.18.0 and v0.19.0 vsock implementation. ### Issue Description A logical error in bounds checking performed on vsock virtio descriptors can be used by a malicious guest to read from and write to a segment of the host-side Firecracker process' heap address space, direc...
Firecracker vsock implementation buffer overflow in versions v0.18.0 and v0.19.0 that can result in potentially exploitable crashes.
https://api.github.com/repos/firecracker-microvm/firecracker/issues/1462/comments
1
2019-12-09T22:22:37Z
2019-12-12T11:07:18Z
https://github.com/firecracker-microvm/firecracker/issues/1462
535,373,916
1,462
885
CVE-2019-19725
2019-12-11T18:16:20.053
sysstat through 12.2.0 has a double free in check_file_actlst in sa_common.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sysstat/sysstat/issues/242" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://l...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sysstat_project:sysstat:*:*:*:*:*:*:*:*", "matchCriteriaId": "B526E161-4710-45B6-A241-FC3D68E30BD3", "versionEndExcluding": null, "versionEndIncluding": "12.2.0", "versionSta...
[ "415" ]
415
https://github.com/sysstat/sysstat/issues/242
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sysstat", "sysstat" ]
When I run a sadf utility with [the stat file](https://gist.github.com/RKX1209/b962907a46d5f8b11d456b69008d0118/raw/89d4b9c53a9248bf5dad71d8fff21c1306d9145c/dfree_sysstat.in), it leads double free bug in check_file_actlst(). ``` $ ./sadf dfree_sysstat.in skip_extra_struct: extra_size=0 types=0,16777216,128 ======...
Double free in check_file_actlst()
https://api.github.com/repos/sysstat/sysstat/issues/242/comments
1
2019-12-09T09:54:32Z
2019-12-09T16:55:34Z
https://github.com/sysstat/sysstat/issues/242
534,812,824
242
886
CVE-2019-19729
2019-12-11T20:15:11.100
An issue was discovered in the BSON ObjectID (aka bson-objectid) package 1.3.0 for Node.js. ObjectID() allows an attacker to generate a malformed objectid by inserting an additional property to the user-input, because bson-objectid will return early if it detects _bsontype==ObjectID in the user-input object. As a resul...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/williamkapke/bson-objectid/issues/30" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://www.npmjs.com/package/bson-objectid" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bson-objectid_project:bson-objectid:1.3.0:*:*:*:*:node.js:*:*", "matchCriteriaId": "B520A955-921F-4EA4-9E4D-DC9ED042DBED", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "670" ]
670
https://github.com/williamkapke/bson-objectid/issues/30
[ "Exploit", "Third Party Advisory" ]
github.com
[ "williamkapke", "bson-objectid" ]
We found that ObjectID() allows an attacker to generate a malformed objectid by inserting an additional property to his user-input. The vulnerable code is as follows: bson-objectid will return early if it detects _bsontype == ObjectID in user-input object. As a result, objects in arbitrary forms can bypass formatti...
A vulnerability in ObjectID()
https://api.github.com/repos/cabinjs/bson-objectid/issues/30/comments
11
2019-12-07T21:03:35Z
2020-11-23T14:22:38Z
https://github.com/cabinjs/bson-objectid/issues/30
534,452,549
30
887
CVE-2019-19766
2019-12-12T19:15:21.030
The Bitwarden server through 1.32.0 has a potentially unwanted KDF.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/bitwarden/jslib/issues/52" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/bitwarden/server/issues/589" }, { "source": "a...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bitwarden:server:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF9E422B-8B9D-4EFE-B242-1312807280F9", "versionEndExcluding": null, "versionEndIncluding": "1.32.0", "versionStartExclu...
[ "916" ]
916
https://github.com/bitwarden/jslib/issues/52
[ "Third Party Advisory" ]
github.com
[ "bitwarden", "jslib" ]
https://github.com/bitwarden/jslib/blob/cd46f64993545a1cb772e2f6a2137a675554f3c3/src/enums/kdfType.ts It looks like the only supported choice for a PBKDF is SHA256. This is possibly the worst choice available for a password-based KDF, as a PBKDF should be relatively slow, and SHA256 is perhaps practically the faste...
SHA256 is a terrible choice for a PBKDF in 2019.
https://api.github.com/repos/bitwarden/jslib/issues/52/comments
34
2019-10-31T14:31:41Z
2022-04-12T19:52:10Z
https://github.com/bitwarden/jslib/issues/52
515,480,136
52
889
CVE-2019-19766
2019-12-12T19:15:21.030
The Bitwarden server through 1.32.0 has a potentially unwanted KDF.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/bitwarden/jslib/issues/52" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/bitwarden/server/issues/589" }, { "source": "a...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bitwarden:server:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF9E422B-8B9D-4EFE-B242-1312807280F9", "versionEndExcluding": null, "versionEndIncluding": "1.32.0", "versionStartExclu...
[ "916" ]
916
https://github.com/bitwarden/server/issues/589
[ "Third Party Advisory" ]
github.com
[ "bitwarden", "server" ]
https://github.com/bitwarden/server/blob/da5c385d4af3cb6707b473cf89963c190a6e44f9/src/Core/Models/Api/Request/Accounts/KdfRequestModel.cs#L22 From https://github.com/bitwarden/jslib/issues/52 : > However, that workaround is specifically prohibited by Bitwarden, restricting it to 2M iterations. Modern SHA256 hardw...
Security Issue: KDF max iterations is too low
https://api.github.com/repos/bitwarden/server/issues/589/comments
31
2019-11-01T13:55:38Z
2023-01-31T08:01:13Z
https://github.com/bitwarden/server/issues/589
516,127,468
589
890
CVE-2019-19777
2019-12-13T02:15:10.893
stb_image.h (aka the stb image loader) 2.23, as used in libsixel and other products, has a heap-based buffer over-read in stbi__load_main.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/109" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "125" ]
125
https://github.com/saitoha/libsixel/issues/109
[ "Exploit", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
version : img2sixel 1.8.2 There is a heap-buffer-overflow in stbi__load_main at stb_image.h:5580 please run following cmd to reproduce it. ``` img2sixel --monochrome $PoC ``` [poc](https://drive.google.com/file/d/1KHIYy8gfuMFHKVyb_dpOPVKSpPVeikUK/view?usp=sharing) ASAN LOG ``` ==9030==ERROR: AddressSanitize...
heap-buffer-overflow in stbi__load_main at stb_image.h:5580
https://api.github.com/repos/saitoha/libsixel/issues/109/comments
3
2019-12-12T14:03:22Z
2019-12-18T05:20:36Z
https://github.com/saitoha/libsixel/issues/109
536,997,354
109
891
CVE-2019-19778
2019-12-13T02:15:10.940
An issue was discovered in libsixel 1.8.2. There is a heap-based buffer over-read in the function load_sixel at loader.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/110" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "125" ]
125
https://github.com/saitoha/libsixel/issues/110
[ "Exploit", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
version : img2sixel 1.8.2 There is a heap-buffer-overflow in load_sixel at loader.c:629 please run following cmd to reproduce it. ``` img2sixel --high-color $PoC ``` [poc](https://drive.google.com/file/d/1siMEF20AcBJhV_RDuNrgnHZz5EvYlGMT/view?usp=sharing) ASAN LOG ``` ==36913==ERROR: AddressSanitizer: heap-b...
heap-buffer-overflow in load_sixel at loader.c:629
https://api.github.com/repos/saitoha/libsixel/issues/110/comments
2
2019-12-12T15:11:41Z
2019-12-15T15:40:23Z
https://github.com/saitoha/libsixel/issues/110
537,037,845
110
892
CVE-2019-17599
2019-12-13T14:15:12.297
The quiz-master-next (aka Quiz And Survey Master) plugin before 6.3.5 for WordPress is affected by: Cross Site Scripting (XSS). The impact is: Allows an attacker to execute arbitrary HTML and JavaScript code via the from or till parameter (and/or the quiz_id parameter). The component is: admin/quiz-options-page.php. Th...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/QuizandSurveyMaster/quiz_master_next/issues/795" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/QuizandSurveyMa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:expresstech:quiz_and_survey_master:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "2B1BF849-9385-4CBF-9209-21A237DBF005", "versionEndExcluding": "6.3.5", "versionEndIncluding": null, ...
[ "79" ]
79
https://github.com/QuizandSurveyMaster/quiz_master_next/issues/795
[ "Exploit", "Third Party Advisory" ]
github.com
[ "QuizandSurveyMaster", "quiz_master_next" ]
**IF YOU DO NOT FOLLOW THIS TEMPLATE, YOUR ISSUE MAY BE CLOSED!!** Please provide the following information when creating your issues: ## Site Info WordPress Version: Latest QSM Version: 6.3.3 and 6.3.4 Browser: chrome 78.0.3904.87 ## General description Quiz And Survey Master – Best Quiz Plugin for WordPr...
report reflected xss vulnerability
https://api.github.com/repos/QuizandSurveyMaster/quiz_master_next/issues/795/comments
4
2019-11-13T07:45:25Z
2019-11-21T08:42:20Z
https://github.com/QuizandSurveyMaster/quiz_master_next/issues/795
522,018,302
795
893
CVE-2019-19794
2019-12-13T22:15:11.357
The miekg Go DNS package before 1.1.25, as used in CoreDNS before 1.6.6 and other products, improperly generates random numbers because math/rand is used. The TXID becomes predictable, leading to response forgeries.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/coredns/coredns/issues/3519" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/coredns/coredns/issues/3547"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:miekg-dns_project:miekg-dns:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F0F7709-230B-4274-AF38-B3704AD451AB", "versionEndExcluding": "1.1.25", "versionEndIncluding": null, "versio...
[ "338" ]
338
https://github.com/coredns/coredns/issues/3519
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "coredns", "coredns" ]
This issue is to keep track of 1.6.6 release. Specifically we want to update the https://github.com/miekg/dns that carries https://github.com/miekg/dns/pull/1044 /cc @miekg
CoreDNS 1.6.6 Release Tracking
https://api.github.com/repos/coredns/coredns/issues/3519/comments
11
2019-12-08T16:31:44Z
2019-12-13T11:28:31Z
https://github.com/coredns/coredns/issues/3519
534,566,228
3,519
894
CVE-2019-19794
2019-12-13T22:15:11.357
The miekg Go DNS package before 1.1.25, as used in CoreDNS before 1.6.6 and other products, improperly generates random numbers because math/rand is used. The TXID becomes predictable, leading to response forgeries.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/coredns/coredns/issues/3519" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/coredns/coredns/issues/3547"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:miekg-dns_project:miekg-dns:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F0F7709-230B-4274-AF38-B3704AD451AB", "versionEndExcluding": "1.1.25", "versionEndIncluding": null, "versio...
[ "338" ]
338
https://github.com/coredns/coredns/issues/3547
[ "Third Party Advisory" ]
github.com
[ "coredns", "coredns" ]
This is a public announcement of a security vulnerability discovered in earlier versions of CoreDNS before v1.6.6: https://nvd.nist.gov/vuln/detail/CVE-2019-19794 As was mentioned in CVE-2019-19794, one of the upstream library miekg/dns used Golang's `math/rand`. This causes predictable TXID and may allow cache ...
[Security] CVE-2019-19794
https://api.github.com/repos/coredns/coredns/issues/3547/comments
9
2019-12-16T21:18:11Z
2020-01-03T22:00:35Z
https://github.com/coredns/coredns/issues/3547
538,665,274
3,547
895
CVE-2019-19794
2019-12-13T22:15:11.357
The miekg Go DNS package before 1.1.25, as used in CoreDNS before 1.6.6 and other products, improperly generates random numbers because math/rand is used. The TXID becomes predictable, leading to response forgeries.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/coredns/coredns/issues/3519" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/coredns/coredns/issues/3547"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:miekg-dns_project:miekg-dns:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F0F7709-230B-4274-AF38-B3704AD451AB", "versionEndExcluding": "1.1.25", "versionEndIncluding": null, "versio...
[ "338" ]
338
https://github.com/miekg/dns/issues/1043
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "miekg", "dns" ]
The default `Id` function uses math/rand, meaning the outputs are predictable, and an attacker might be able to use this to forge responses without being on path. Seeding math/rand from crypto/rand is pointless, as the math/rand algorithm is invertible: given a sequence of outputs it's possible to reconstruct the `R...
[security] Predictable TXID can lead to response forgeries
https://api.github.com/repos/miekg/dns/issues/1043/comments
1
2019-12-05T19:08:46Z
2019-12-11T07:31:10Z
https://github.com/miekg/dns/issues/1043
533,538,848
1,043
896
CVE-2019-19795
2019-12-13T22:15:11.437
samurai 0.7 has a heap-based buffer overflow in canonpath in util.c via a crafted build file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/michaelforney/samurai/issues/29" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:samurai_project:samurai:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "154461A0-FE5B-41BF-B22E-FCE41E3A4827", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "787" ]
787
https://github.com/michaelforney/samurai/issues/29
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "michaelforney", "samurai" ]
Hi, While fuzzing samurai 0.7 with American Fuzzy Lop, I found a heap-based buffer overflow in the canonpath() function, in util.c. Attaching a reproducer (gzipped so GitHub accepts it): [test01.gz](https://github.com/michaelforney/samurai/files/3962091/test01.gz) Issue can be reproduced by running: ``` ...
Heap-based buffer overflow in the canonpath() function
https://api.github.com/repos/michaelforney/samurai/issues/29/comments
5
2019-12-13T18:05:45Z
2019-12-14T10:08:38Z
https://github.com/michaelforney/samurai/issues/29
537,691,130
29
897
CVE-2019-19796
2019-12-13T22:15:11.497
Yabasic 2.86.2 has a heap-based buffer overflow in myformat in function.c via a crafted BASIC source file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/marcIhm/yabasic/issues/37" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Par...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yabasic:yabasic:2.86.2:*:*:*:*:*:*:*", "matchCriteriaId": "DD965673-7B4A-40E1-BEF2-D1CB8DCDF35F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "787" ]
787
https://github.com/marcIhm/yabasic/issues/37
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "marcIhm", "yabasic" ]
Hi, While fuzzing yabasic 2.86.2 with Honggfuzz, I found a heap-based buffer overflow in the myformat() function, in function.c. Attaching a reproducer (gzipped so GitHub accepts it): [test02.yab.gz](https://github.com/marcIhm/yabasic/files/3962433/test02.yab.gz) Issue can be reproduced by running: ``` y...
Heap-based buffer overflow in the myformat() function
https://api.github.com/repos/marcIhm/yabasic/issues/37/comments
2
2019-12-13T19:41:08Z
2019-12-17T10:37:35Z
https://github.com/marcIhm/yabasic/issues/37
537,739,601
37
898
CVE-2019-10773
2019-12-16T20:15:14.477
In Yarn before 1.21.1, the package install functionality can be abused to generate arbitrary symlinks on the host filesystem by using specially crafted "bin" keys. Existing files could be overwritten depending on the current user permission set.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "report@snyk.io", "tags": null, "url": "https://access.redhat.com/errata/RHSA-2020:0475" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://blog.daniel-ruf.de/critical-design-flaw-npm-pnpm-yarn/" }, { "sourc...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yarnpkg:yarn:*:*:*:*:*:*:*:*", "matchCriteriaId": "6AD33651-1103-4375-8BCF-983DBCDF6470", "versionEndExcluding": "1.21.1", "versionEndIncluding": null, "versionStartExcluding...
[ "59" ]
59
https://github.com/yarnpkg/yarn/issues/7761#issuecomment-565493023
[ "Exploit", "Third Party Advisory" ]
github.com
[ "yarnpkg", "yarn" ]
<!-- *Before creating an issue please make sure you are using the latest version of yarn.* --> npm has announced vulnerabilities that npm has been fixed. https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli One of the vulnerabilities has been fixed at yarn v1.12.1. Thank you! 👏👏👏 But ...
globally-installed package overwrites an existing binary in the target install location
https://api.github.com/repos/yarnpkg/yarn/issues/7761/comments
9
2019-12-12T08:13:35Z
2020-09-04T18:06:48Z
https://github.com/yarnpkg/yarn/issues/7761
536,820,897
7,761
899
CVE-2019-19847
2019-12-17T16:15:14.733
Libspiro through 20190731 has a stack-based buffer overflow in the spiro_to_bpath0() function in spiro.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/fontforge/libspiro/issues/21" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libspiro_project:libspiro:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1535676-284B-419A-AAAF-C0433F730B51", "versionEndExcluding": null, "versionEndIncluding": "20190731", "versio...
[ "787" ]
787
https://github.com/fontforge/libspiro/issues/21
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "fontforge", "libspiro" ]
Hi, When building libspiro 20190731 with AddressSanitizer enabled and running the test suite, I found a stack-based buffer overflow in spiro_to_bpath0() in spiro.c. In the test suite, `call-test14` to `call-test19` all trigger the same issue. The issue can be triggered as follow: ``` ./configure CFLAGS="-f...
Stack-based buffer overflow in the spiro_to_bpath0() function
https://api.github.com/repos/fontforge/libspiro/issues/21/comments
12
2019-12-17T10:19:54Z
2020-05-05T08:20:03Z
https://github.com/fontforge/libspiro/issues/21
538,970,632
21
900
CVE-2019-19887
2019-12-18T19:15:11.843
bitstr_tell at bitstr.c in ffjpeg through 2019-08-21 has a NULL pointer dereference related to jfif_encode.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D9E7EB6-DB1F-4806-AFFE-531905453943", "versionEndExcluding": null, "versionEndIncluding": "2019-08-21", "versionStartE...
[ "476" ]
476
https://github.com/rockcarry/ffjpeg/issues/14
[ "Exploit", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
run `ffjpeg -e poc.bmp` in linux result in gdb. ``` Stopped reason: SIGSEGV 0x0000000000401968 in bitstr_tell (stream=0x0) at bitstr.c:221 221 int type = *(int*)stream; gdb-peda$ ``` steam is a pointer which is null in this case. Dereferencing null pointer cause segment fault. fix: ``` long bitstr...
SegmentFault in jfif_encode at jfif.c:842
https://api.github.com/repos/rockcarry/ffjpeg/issues/14/comments
1
2019-12-17T15:58:08Z
2020-02-24T07:35:00Z
https://github.com/rockcarry/ffjpeg/issues/14
539,157,799
14
901
CVE-2019-19888
2019-12-18T19:15:11.937
jfif_decode in jfif.c in ffjpeg through 2019-08-21 has a divide-by-zero error.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D9E7EB6-DB1F-4806-AFFE-531905453943", "versionEndExcluding": null, "versionEndIncluding": "2019-08-21", "versionStartE...
[ "369" ]
369
https://github.com/rockcarry/ffjpeg/issues/13
[ "Exploit", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
file: jfif.c function: jfif_decode line: 425 mcuw = sfh_max * 8; mcuh = sfv_max * 8; jw = ALIGN(jfif->width , mcuw); jh = ALIGN(jfif->height, mcuh); mcuc = jw / mcuw; <------- mcuw can be zero mcur = jh / mcuh; //-- calculate mcu info
Deny of Service caused by dividing zero without sanity check in jfif.c
https://api.github.com/repos/rockcarry/ffjpeg/issues/13/comments
3
2019-12-17T06:48:47Z
2020-07-27T06:47:58Z
https://github.com/rockcarry/ffjpeg/issues/13
538,872,327
13
902
CVE-2019-19899
2019-12-19T00:15:12.767
Pebble Templates 3.1.2 allows attackers to bypass a protection mechanism (intended to block access to instances of java.lang.Class) because getClass is accessible via the public static java.lang.Class java.lang.Class.forName(java.lang.Module,java.lang.String) signature.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/PebbleTemplates/pebble/issues/493" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pebbletemplates:pebble_templates:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "37E9F48E-5A34-4BC3-9171-32EA356B1D9B", "versionEndExcluding": null, "versionEndIncluding": null, "v...
[ "862" ]
862
https://github.com/PebbleTemplates/pebble/issues/493
[ "Exploit", "Third Party Advisory" ]
github.com
[ "PebbleTemplates", "pebble" ]
I was reading about https://research.securitum.com/server-side-template-injection-on-the-example-of-pebble/ and found a bypass to the fix in [454](https://github.com/PebbleTemplates/pebble/issues/454). The following code will throw a security exception after the fix in 454: `{{(1).TYPE.getClass()}}` However y...
Unsafe Methods Bypass
https://api.github.com/repos/PebbleTemplates/pebble/issues/493/comments
2
2019-12-18T21:59:56Z
2020-05-21T00:20:42Z
https://github.com/PebbleTemplates/pebble/issues/493
539,947,665
493
903
CVE-2019-11780
2019-12-19T16:16:42.370
Improper access control in the computed fields system of the framework of Odoo Community 13.0 and Odoo Enterprise 13.0 allows remote authenticated attackers to access sensitive information via crafted RPC requests, which could lead to privilege escalation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL"...
[ { "source": "security@odoo.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/42196" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:13.0:*:*:*:community:*:*:*", "matchCriteriaId": "4CE8B4A3-0EA3-4813-A511-16FB7D2B06AF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "284" ]
284
https://github.com/odoo/odoo/issues/42196
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2019-10-25-1 Improper access control in the computed fields system of the framework of Odoo Community 13.0 and Odoo Enterprise 13.0 allows remote authenticated attackers to access sensitive information via crafted RPC requests, which could lead to privilege escalation. **Affects**: Odoo ...
[SEC] ODOO-SA-2019-10-25-1 (CVE-2019-11780) - Improper access control in the computed fiel...
https://api.github.com/repos/odoo/odoo/issues/42196/comments
0
2019-12-19T15:42:28Z
2019-12-19T15:42:29Z
https://github.com/odoo/odoo/issues/42196
540,393,344
42,196
904
CVE-2019-19922
2019-12-22T20:15:10.823
kernel/sched/fair.c in the Linux kernel before 5.3.9, when cpu.cfs_quota_us is used (e.g., with Kubernetes), allows attackers to cause a denial of service against non-cpu-bound applications by generating a workload that triggers unwanted slice expiration, aka CID-de53fd7aedb1. (In other words, although this slice expir...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ], "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ], "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "72AC7518-B872-42E3-A43B-F2D010211A8D", "versionEndExcluding": "5.3.9", "versionEndIncluding": null, "versionStartExcl...
[ "400" ]
400
https://github.com/kubernetes/kubernetes/issues/67577
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
> /kind bug This is not a bug in Kubernets per se, it's more of a heads-up. I've read this great blog post: * https://kubernetes.io/blog/2018/07/24/feature-highlight-cpu-manager/ From the blog post I learned that k8s is using cfs quotas to enforce CPU limits. Unfortunately, those can lead to unnecessary thr...
CFS quotas can lead to unnecessary throttling
https://api.github.com/repos/kubernetes/kubernetes/issues/67577/comments
146
2018-08-20T04:06:20Z
2023-01-16T14:53:22Z
https://github.com/kubernetes/kubernetes/issues/67577
351,978,078
67,577
907
CVE-2019-19930
2019-12-23T03:15:12.070
In libIEC61850 1.4.0, MmsValue_newOctetString in mms/iso_mms/common/mms_value.c has an integer signedness error that can lead to an attempted excessive memory allocation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mz-automation/libiec61850/issues/193" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mz-automation:libiec61850:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6F82EDC5-C42C-4EED-A04D-D27F75F61D21", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "190" ]
190
https://github.com/mz-automation/libiec61850/issues/193
[ "Exploit", "Third Party Advisory" ]
github.com
[ "mz-automation", "libiec61850" ]
Function `MmsValue_newOctetString` didn't check argument maxSize if it's negative. If it is a negative number, then argument which malloc will use later is a huge number. For example -1 would be interpreted as 0xffffffff on 32 bit arch or 0xffffffffffffffff on 64 bit arch. <img width="629" alt="Screen Shot 2019-12-20 ...
Deny of Service, caused by integer overflow in function MmsValue_newOctetString mms/iso_mms/common/mms_value.c:1324
https://api.github.com/repos/mz-automation/libiec61850/issues/193/comments
1
2019-12-20T13:37:27Z
2020-01-04T15:29:36Z
https://github.com/mz-automation/libiec61850/issues/193
540,998,941
193
908
CVE-2019-19931
2019-12-23T03:15:12.147
In libIEC61850 1.4.0, MmsValue_decodeMmsData in mms/iso_mms/server/mms_access_result.c has a heap-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mz-automation/libiec61850/issues/194" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mz-automation:libiec61850:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6F82EDC5-C42C-4EED-A04D-D27F75F61D21", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "787" ]
787
https://github.com/mz-automation/libiec61850/issues/194
[ "Exploit", "Third Party Advisory" ]
github.com
[ "mz-automation", "libiec61850" ]
Function `MmsValue_decodeMmsData` has heap overflow vulnerability in file mms/iso_mms/server/mms_access_result.c. <img width="639" alt="Screen Shot 2019-12-20 at 9 48 22 PM" src="https://user-images.githubusercontent.com/20929895/71259266-04fb2300-2373-11ea-8086-8389fc3e4d6f.png"> poc: [poc.zip](https://github.c...
Heap overflow in function MmsValue_decodeMmsData mms/iso_mms/server/mms_access_result.c:238
https://api.github.com/repos/mz-automation/libiec61850/issues/194/comments
0
2019-12-20T13:55:52Z
2020-01-04T15:00:40Z
https://github.com/mz-automation/libiec61850/issues/194
541,007,177
194
909
CVE-2019-19944
2019-12-23T19:15:11.497
In libIEC61850 1.4.0, BerDecoder_decodeUint32 in mms/asn1/ber_decode.c has an out-of-bounds read, related to intLen and bufPos.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mz-automation/libiec61850/issues/196" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mz-automation:libiec61850:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6F82EDC5-C42C-4EED-A04D-D27F75F61D21", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "125" ]
125
https://github.com/mz-automation/libiec61850/issues/196
[ "Exploit", "Third Party Advisory" ]
github.com
[ "mz-automation", "libiec61850" ]
BerDecoder_decodeUint32 in src/mms/asn1/ber_decode.c doesn't check passed arguments. `intLen` and `bufPos` can be large number, so following memory access `buffer[bufPos+i]` would segment fault. <img width="540" alt="Screen Shot 2019-12-23 at 3 11 34 PM" src="https://user-images.githubusercontent.com/20929895/7134...
Deny of service caused in function BerDecoder_decodeUint32 in src/mms/asn1/ber_decode.c
https://api.github.com/repos/mz-automation/libiec61850/issues/196/comments
2
2019-12-23T07:20:53Z
2020-03-03T15:01:49Z
https://github.com/mz-automation/libiec61850/issues/196
541,616,205
196
910
CVE-2019-19948
2019-12-24T01:15:11.247
In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer overflow in the function WriteSGIImage of coders/sgi.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00006.html" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-43:q16:*:*:*:*:*:*", "matchCriteriaId": "2EDF50C4-9FFE-4EBF-A5BE-44AF7E6988D9", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "787" ]
787
https://github.com/ImageMagick/ImageMagick/issues/1562
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [X] I have written a descriptive issue title - [X] I have verified that I am using the latest version of ImageMagick - [X] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow in WriteSGIImage of coders/sgi.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1562/comments
2
2019-04-29T03:08:25Z
2020-02-07T01:34:56Z
https://github.com/ImageMagick/ImageMagick/issues/1562
438,134,907
1,562
911
CVE-2019-19949
2019-12-24T01:15:11.327
In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WritePNGImage of coders/png.c, related to Magick_png_write_raw_profile and LocaleNCompare.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00006.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "78819D62-25B5-4F9E-8291-2C1FD9803531", "versionEndExcluding": "6.9.10-43", "versionEndIncluding": null, "version...
[ "125" ]
125
https://github.com/ImageMagick/ImageMagick/issues/1561
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [X] I have verified that I am using the latest version of ImageMagick - [X] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow in WritePNGImage of png.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1561/comments
3
2019-04-29T02:55:44Z
2019-12-26T12:39:58Z
https://github.com/ImageMagick/ImageMagick/issues/1561
438,133,289
1,561
912
CVE-2019-19952
2019-12-24T01:15:11.527
In ImageMagick 7.0.9-7 Q16, there is a use-after-free in the function MngInfoDiscardObject of coders/png.c, related to ReadOneMNGImage.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1791" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advis...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "857D548F-3DED-4D35-B2AD-4003378032DA", "versionEndExcluding": "7.0.9-7", "versionEndIncluding": null, "versionSt...
[ "416" ]
416
https://github.com/ImageMagick/ImageMagick/issues/1791
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [X] I have written a descriptive issue title - [X] I have verified that I am using the latest version of ImageMagick - [X] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-use-after-free in MngInfoDiscardObject of coders/png.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1791/comments
8
2019-11-27T06:48:11Z
2020-03-08T20:06:50Z
https://github.com/ImageMagick/ImageMagick/issues/1791
529,151,827
1,791
913
CVE-2019-19957
2019-12-24T22:15:11.247
In libIEC61850 1.4.0, getNumberOfElements in mms/iso_mms/server/mms_access_result.c has an out-of-bounds read vulnerability, related to bufPos and elementLength.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mz-automation/libiec61850/issues/197" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mz-automation:libiec61850:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6F82EDC5-C42C-4EED-A04D-D27F75F61D21", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "125" ]
125
https://github.com/mz-automation/libiec61850/issues/197
[ "Exploit", "Third Party Advisory" ]
github.com
[ "mz-automation", "libiec61850" ]
There is a out bound read vulnerability in `getNumberOfElements` because `getNumberOfElements` doesn't check `bufPos`, `elementLength` arguments. So `bufPos` and `elementLength` can be very large number. <img width="689" alt="Screen Shot 2019-12-24 at 4 45 03 PM" src="https://user-images.githubusercontent.com/209298...
SegmentFault in getNumberOfElements in src/mms/iso_mms/server/mms_access_result.c
https://api.github.com/repos/mz-automation/libiec61850/issues/197/comments
2
2019-12-24T08:51:15Z
2020-03-03T15:02:51Z
https://github.com/mz-automation/libiec61850/issues/197
542,050,001
197
914
CVE-2019-19999
2019-12-26T04:15:10.923
Halo before 1.2.0-beta.1 allows Server Side Template Injection (SSTI) because TemplateClassResolver.SAFER_RESOLVER is not used in the FreeMarker configuration.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/compare/v1.1.3-beta.2...v1.2.0-beta.1" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD55ABB0-278F-4658-A126-C9D20F58B59E", "versionEndExcluding": null, "versionEndIncluding": "1.1.1", "versionStartExcluding": n...
[ "918" ]
918
https://github.com/halo-dev/halo/issues/419
[ "Exploit", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
<!-- 如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。 提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way --> **I am sure I have checked** - [x] [Halo User Guide Documentation ](https://halo.run/docs) - [x] [Halo BBS](https://bbs.halo.run) - [x] [Github Wiki ](https://github.com/halo-dev/halo/wiki/4.-%...
A Server-Side Freemarker template injection vulnerability could cause remote command execution
https://api.github.com/repos/halo-dev/halo/issues/419/comments
1
2019-12-11T10:44:41Z
2019-12-12T17:27:08Z
https://github.com/halo-dev/halo/issues/419
536,287,817
419
916
CVE-2019-19999
2019-12-26T04:15:10.923
Halo before 1.2.0-beta.1 allows Server Side Template Injection (SSTI) because TemplateClassResolver.SAFER_RESOLVER is not used in the FreeMarker configuration.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/compare/v1.1.3-beta.2...v1.2.0-beta.1" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD55ABB0-278F-4658-A126-C9D20F58B59E", "versionEndExcluding": null, "versionEndIncluding": "1.1.1", "versionStartExcluding": n...
[ "918" ]
918
https://github.com/halo-dev/halo/issues/440
[ "Exploit", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
<!-- 如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。 提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way --> **我确定我已经查看了** (标注`[ ]`为`[x]`) - [ ] [Halo 使用文档](https://halo.run/docs) - [ ] [Halo 论坛](https://bbs.halo.run) - [ ] [Github Wiki 常见问题](https://github.com/halo-dev/halo/wiki/4.-%E5%B8%B8%E8%A7%8...
unsafe template file permissions edit cause Server Side Template Injection(SSTI)
https://api.github.com/repos/halo-dev/halo/issues/440/comments
6
2019-12-24T15:49:53Z
2019-12-25T13:37:00Z
https://github.com/halo-dev/halo/issues/440
542,163,626
440
917
CVE-2019-20008
2019-12-26T23:15:11.303
In Archery before 1.3, inserting an XSS payload into a project name (either by creating a new project or editing an existing one) will result in stored XSS on the vulnerability-scan scheduling page.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/archerysec/archerysec/compare/archerysec-v1.2...v1.3" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:archerysec:archery:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0271FCA-9224-4601-984B-195AB0539496", "versionEndExcluding": "1.3", "versionEndIncluding": null, "versionStartExclud...
[ "79" ]
79
https://github.com/archerysec/archerysec/issues/338
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "archerysec", "archerysec" ]
Upon a security analysis of the platform, a stored cross site scripting vulnerability was identified on the Web and Infrastructure Scan Scheduler's project dropdown selection. The payload is present on the project name attribute, but it is only executed upon javascript interaction by the Select2 library utilized on ...
Stored XSS on the scheduler projects list
https://api.github.com/repos/archerysec/archerysec/issues/338/comments
4
2019-12-03T02:59:59Z
2019-12-29T13:04:49Z
https://github.com/archerysec/archerysec/issues/338
531,680,066
338
918
CVE-2019-20009
2019-12-27T01:15:13.257
An issue was discovered in GNU LibreDWG before 0.93. Crafted input will lead to an attempted excessive memory allocation in dwg_decode_SPLINE_private in dwg.spec.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "09B5D2C4-D4B2-4226-AA34-A346E6064FA2", "versionEndExcluding": "0.9.3", "versionEndIncluding": null, "versionStartExcluding"...
[ "770" ]
770
https://github.com/LibreDWG/libredwg/issues/176
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: dwg2dxf $PoC **1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (src/dwg.spec:1639)** PoC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG/id:000000%2Csig:06%2Csrc:000000%2...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/176/comments
24
2019-12-24T03:44:32Z
2020-01-16T12:12:03Z
https://github.com/LibreDWG/libredwg/issues/176
541,977,765
176
919
CVE-2019-20009
2019-12-27T01:15:13.257
An issue was discovered in GNU LibreDWG before 0.93. Crafted input will lead to an attempted excessive memory allocation in dwg_decode_SPLINE_private in dwg.spec.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "09B5D2C4-D4B2-4226-AA34-A346E6064FA2", "versionEndExcluding": "0.9.3", "versionEndIncluding": null, "versionStartExcluding"...
[ "770" ]
770
https://github.com/LibreDWG/libredwg/issues/176#issue-541977765
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: dwg2dxf $PoC **1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (src/dwg.spec:1639)** PoC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG/id:000000%2Csig:06%2Csrc:000000%2...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/176/comments
24
2019-12-24T03:44:32Z
2020-01-16T12:12:03Z
https://github.com/LibreDWG/libredwg/issues/176
541,977,765
176
920
CVE-2019-20010
2019-12-27T01:15:13.320
An issue was discovered in GNU LibreDWG 0.92. There is a use-after-free in resolve_objectref_vector in decode.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6967607-F26E-477A-8D60-8B0D55594EC9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "416" ]
416
https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643383
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: dwg2dxf $PoC **1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (src/dwg.spec:1639)** PoC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG/id:000000%2Csig:06%2Csrc:000000%2...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/176/comments
24
2019-12-24T03:44:32Z
2020-01-16T12:12:03Z
https://github.com/LibreDWG/libredwg/issues/176
541,977,765
176
921
CVE-2019-20011
2019-12-27T01:15:13.383
An issue was discovered in GNU LibreDWG 0.92. There is a heap-based buffer over-read in decode_R13_R2000 in decode.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6967607-F26E-477A-8D60-8B0D55594EC9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "125" ]
125
https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643439
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: dwg2dxf $PoC **1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (src/dwg.spec:1639)** PoC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG/id:000000%2Csig:06%2Csrc:000000%2...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/176/comments
24
2019-12-24T03:44:32Z
2020-01-16T12:12:03Z
https://github.com/LibreDWG/libredwg/issues/176
541,977,765
176
922
CVE-2019-20012
2019-12-27T01:15:13.460
An issue was discovered in GNU LibreDWG 0.92. Crafted input will lead to an attempted excessive memory allocation in dwg_decode_HATCH_private in dwg.spec.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6967607-F26E-477A-8D60-8B0D55594EC9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "770" ]
770
https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643088
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: dwg2dxf $PoC **1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (src/dwg.spec:1639)** PoC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG/id:000000%2Csig:06%2Csrc:000000%2...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/176/comments
24
2019-12-24T03:44:32Z
2020-01-16T12:12:03Z
https://github.com/LibreDWG/libredwg/issues/176
541,977,765
176
923
CVE-2019-20013
2019-12-27T01:15:13.523
An issue was discovered in GNU LibreDWG before 0.93. Crafted input will lead to an attempted excessive memory allocation in decode_3dsolid in dwg.spec.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "09B5D2C4-D4B2-4226-AA34-A346E6064FA2", "versionEndExcluding": "0.9.3", "versionEndIncluding": null, "versionStartExcluding"...
[ "770" ]
770
https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643060
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: dwg2dxf $PoC **1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (src/dwg.spec:1639)** PoC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG/id:000000%2Csig:06%2Csrc:000000%2...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/176/comments
24
2019-12-24T03:44:32Z
2020-01-16T12:12:03Z
https://github.com/LibreDWG/libredwg/issues/176
541,977,765
176
924
CVE-2019-20014
2019-12-27T01:15:13.587
An issue was discovered in GNU LibreDWG before 0.93. There is a double-free in dwg_free in free.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "09B5D2C4-D4B2-4226-AA34-A346E6064FA2", "versionEndExcluding": "0.9.3", "versionEndIncluding": null, "versionStartExcluding"...
[ "415" ]
415
https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643172
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: dwg2dxf $PoC **1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (src/dwg.spec:1639)** PoC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG/id:000000%2Csig:06%2Csrc:000000%2...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/176/comments
24
2019-12-24T03:44:32Z
2020-01-16T12:12:03Z
https://github.com/LibreDWG/libredwg/issues/176
541,977,765
176
925
CVE-2019-20015
2019-12-27T01:15:13.647
An issue was discovered in GNU LibreDWG 0.92. Crafted input will lead to an attempted excessive memory allocation in dwg_decode_LWPOLYLINE_private in dwg.spec.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6967607-F26E-477A-8D60-8B0D55594EC9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "770" ]
770
https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643028
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: dwg2dxf $PoC **1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (src/dwg.spec:1639)** PoC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG/id:000000%2Csig:06%2Csrc:000000%2...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/176/comments
24
2019-12-24T03:44:32Z
2020-01-16T12:12:03Z
https://github.com/LibreDWG/libredwg/issues/176
541,977,765
176
926
CVE-2019-20016
2019-12-27T02:15:10.467
libmysofa before 2019-11-24 does not properly restrict recursive function calls, as demonstrated by reports of stack consumption in readOHDRHeaderMessageDatatype in dataobject.c and directblockRead in fractalhead.c. NOTE: a download of v0.9 after 2019-12-06 should fully remediate this issue.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/hoene/libmysofa/commit/2e6fac6ab6156dae8e8c6f417741388084b70d6f" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "htt...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symonics:libmysofa:*:*:*:*:*:*:*:*", "matchCriteriaId": "433A645E-4A6E-4B59-BD0E-DCC5AFA7AB9E", "versionEndExcluding": "0.9", "versionEndIncluding": null, "versionStartExclud...
[ "787" ]
787
https://github.com/hoene/libmysofa/issues/83
[ "Exploit", "Third Party Advisory" ]
github.com
[ "hoene", "libmysofa" ]
A crafted input will lead to crash in fractalhead.c at libmysofa v0.8. Triggered by ./mysofa2json POC Poc [overflow-libmysofa1](https://github.com/gutiniao/afltest/blob/master/overflow-libmysofa1) The ASAN information is as follows: ``` ./mysofa2json overflow-libmysofa1 ASAN:SIGSEGV ================...
There is a stack-based buffer overflow in the directblockRead function of fractalhead.c(at 172)
https://api.github.com/repos/hoene/libmysofa/issues/83/comments
1
2019-10-31T07:21:20Z
2019-11-24T10:07:23Z
https://github.com/hoene/libmysofa/issues/83
515,219,307
83
927
CVE-2019-20016
2019-12-27T02:15:10.467
libmysofa before 2019-11-24 does not properly restrict recursive function calls, as demonstrated by reports of stack consumption in readOHDRHeaderMessageDatatype in dataobject.c and directblockRead in fractalhead.c. NOTE: a download of v0.9 after 2019-12-06 should fully remediate this issue.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/hoene/libmysofa/commit/2e6fac6ab6156dae8e8c6f417741388084b70d6f" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "htt...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symonics:libmysofa:*:*:*:*:*:*:*:*", "matchCriteriaId": "433A645E-4A6E-4B59-BD0E-DCC5AFA7AB9E", "versionEndExcluding": "0.9", "versionEndIncluding": null, "versionStartExclud...
[ "787" ]
787
https://github.com/hoene/libmysofa/issues/84
[ "Exploit", "Third Party Advisory" ]
github.com
[ "hoene", "libmysofa" ]
A crafted input will lead to crash in dataobject.c at libmysofa v0.8. Triggered by ./mysofa2json POC Poc [overflow-libmysofa2](https://github.com/gutiniao/afltest/blob/master/overflow-libmysofa2) The ASAN information is as follows: ``` ./mysofa2json overflow-libmysofa2 ASAN:SIGSEGV ===================...
There is a stack-based buffer overflow in the readOHDRHeaderMessageDatatype function of dataobject.c(at 216)
https://api.github.com/repos/hoene/libmysofa/issues/84/comments
1
2019-10-31T07:31:18Z
2019-11-24T09:45:24Z
https://github.com/hoene/libmysofa/issues/84
515,223,744
84
928
CVE-2019-20017
2019-12-27T02:15:10.547
A stack-based buffer over-read was discovered in Mat_VarReadNextInfo5 in mat5.c in matio 1.5.17.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tbeu/matio/issues/127" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:matio_project:matio:1.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "BA202CA9-93FA-4D2E-8968-0A2748AC055D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ "125" ]
125
https://github.com/tbeu/matio/issues/127
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "tbeu", "matio" ]
A crafted input will lead to crash in mat5.c at matio 1.5.17. Triggered by ./matdump POC Poc [001-stackover-Mat_VarReadNextInfo5_mat54915](https://github.com/gutiniao/afltest/blob/master/001-stackover-Mat_VarReadNextInfo5_mat54915) The ASAN information is as follows: ``` ./matdump 001-stackover-Mat_VarRead...
There is a stack-based buffer overflow in the Mat_VarReadNextInfo5 function of mat5.c(at 4915)
https://api.github.com/repos/tbeu/matio/issues/127/comments
5
2019-11-07T03:14:45Z
2019-12-27T08:42:46Z
https://github.com/tbeu/matio/issues/127
519,013,678
127
929
CVE-2019-20018
2019-12-27T02:15:10.610
A stack-based buffer over-read was discovered in ReadNextCell in mat5.c in matio 1.5.17.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tbeu/matio/issues/129" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:matio_project:matio:1.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "BA202CA9-93FA-4D2E-8968-0A2748AC055D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ "125" ]
125
https://github.com/tbeu/matio/issues/129
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "tbeu", "matio" ]
A crafted input will lead to crash in mat5.c at matio 1.5.17. Triggered by ./matdump POC Poc [003-stackoverflow-ReadNextCell-mat51001](https://github.com/gutiniao/afltest/blob/master/003-stackoverflow-ReadNextCell-mat51001) The ASAN information is as follows: ``` ./matdump 003-stackoverflow-ReadNextCell-ma...
There is a stack-based buffer overflow in the ReadNextCell function of mat5.c(at 1001)
https://api.github.com/repos/tbeu/matio/issues/129/comments
4
2019-11-07T03:27:18Z
2019-12-27T08:42:16Z
https://github.com/tbeu/matio/issues/129
519,017,135
129
930
CVE-2019-20019
2019-12-27T02:15:10.657
An attempted excessive memory allocation was discovered in Mat_VarRead5 in mat5.c in matio 1.5.17.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tbeu/matio/issues/130" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:matio_project:matio:1.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "BA202CA9-93FA-4D2E-8968-0A2748AC055D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ "770" ]
770
https://github.com/tbeu/matio/issues/130
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "tbeu", "matio" ]
A crafted input will lead to crash in mat5.c at matio 1.5.17. Triggered by ./matdump POC Poc [004Mat_VarRead53574](https://github.com/gutiniao/afltest/blob/master/004Mat_VarRead53574) The ASAN information is as follows: ``` ./matdump 004Mat_VarRead53574 ==22145==ERROR: AddressSanitizer failed to allocate...
it is a memory exhaustion issue in Mat_VarRead5 (mat5.c:3574)
https://api.github.com/repos/tbeu/matio/issues/130/comments
4
2019-11-07T03:44:40Z
2019-12-27T08:41:32Z
https://github.com/tbeu/matio/issues/130
519,022,065
130
931
CVE-2019-20020
2019-12-27T02:15:10.733
A stack-based buffer over-read was discovered in ReadNextStructField in mat5.c in matio 1.5.17.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tbeu/matio/issues/128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:matio_project:matio:1.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "BA202CA9-93FA-4D2E-8968-0A2748AC055D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ "125" ]
125
https://github.com/tbeu/matio/issues/128
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "tbeu", "matio" ]
A crafted input will lead to crash in mat5.c at matio 1.5.17. Triggered by ./matdump POC Poc [002-stackover-ReadNextStructField-mat51393](https://github.com/gutiniao/afltest/blob/master/002-stackover-ReadNextStructField-mat51393) The ASAN information is as follows: ``` ./matdump 002-stackover-ReadNextStruc...
There is a stack-based buffer overflow in the ReadNextStructField function of mat5.c(at 1393)
https://api.github.com/repos/tbeu/matio/issues/128/comments
5
2019-11-07T03:23:25Z
2019-12-27T11:10:26Z
https://github.com/tbeu/matio/issues/128
519,016,046
128
932
CVE-2019-20021
2019-12-27T02:15:10.797
A heap-based buffer over-read was discovered in canUnpack in p_mach.cpp in UPX 3.95 via a crafted Mach-O file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00003.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:3.95:*:*:*:*:*:*:*", "matchCriteriaId": "7986910F-E5B0-488F-813B-D6B4367F16F4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "125" ]
125
https://github.com/upx/upx/issues/315
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
A crafted input will lead to crash in p_mach.cpp at UPX 3.95(latest version,git clone from branch devel) Triggered by ./upx.out -d -f POC OS: Ubuntu 18.04.3 LTS CPU architecture: x86_64 Poc [002](https://github.com/gutiniao/afltest/blob/master/002) The ASAN information is as follows: ``` ./upx.out ...
There is a heap-buffer-overflow in the canUnpack function of p_mach.cpp:1539
https://api.github.com/repos/upx/upx/issues/315/comments
4
2019-11-14T03:04:37Z
2021-09-12T01:45:32Z
https://github.com/upx/upx/issues/315
522,594,596
315
933
CVE-2019-20022
2019-12-27T02:15:10.873
An invalid memory address dereference was discovered in load_pnm in frompnm.c in libsixel before 1.8.3.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/108" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A5CB650-56E4-4DF9-9310-080C174E1528", "versionEndExcluding": "1.8.3", "versionEndIncluding": null, "versionSt...
[ "672" ]
672
https://github.com/saitoha/libsixel/issues/108
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
A crafted input will lead to crash in frompnm.c at libsixel 1.8.2. Triggered by: ./img2sixel 004-SEGV-load-pnm288 Poc: [004-SEGV-load-pnm288](https://github.com/gutiniao/afltest/blob/master/004-SEGV-load-pnm288) The gdb debug info: ``` # gdb ./img2sixel \GNU gdb (Ubuntu 8.1-0ubuntu3.2) 8.1.0.20180409-g...
Segmentation fault (ASAN: SEGV on unknown address) in the load_pnm function of frompnm.c:288
https://api.github.com/repos/saitoha/libsixel/issues/108/comments
2
2019-12-11T08:22:08Z
2019-12-27T08:22:37Z
https://github.com/saitoha/libsixel/issues/108
536,213,002
108
934
CVE-2019-20023
2019-12-27T02:15:10.920
A memory leak was discovered in image_buffer_resize in fromsixel.c in libsixel 1.8.4.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF1F3897-870A-4F82-896A-EBE9581C656A", "versionEndExcluding": "1.8.4", "versionEndIncluding": null, "versionSt...
[ "401" ]
401
https://github.com/saitoha/libsixel/issues/120
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
A crafted input will lead to crash in frompnm.c at libsixel 1.8.3.(git from the [branch](https://github.com/saitoha/libsixel/tree/release-1.8) ) Triggered by: ./img2sixel 000-memleak-rpl_malloc Poc: [000-memleak-rpl_malloc](https://github.com/gutiniao/afltest/blob/master/000-memleak-rpl_malloc) The ASAN in...
A memory leaks issue in image_buffer_resize at fromsixel.c:293
https://api.github.com/repos/saitoha/libsixel/issues/120/comments
5
2019-12-18T05:03:40Z
2020-01-03T01:33:53Z
https://github.com/saitoha/libsixel/issues/120
539,453,569
120
935
CVE-2019-20024
2019-12-27T02:15:11.000
A heap-based buffer overflow was discovered in image_buffer_resize in fromsixel.c in libsixel before 1.8.4.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/121" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF1F3897-870A-4F82-896A-EBE9581C656A", "versionEndExcluding": "1.8.4", "versionEndIncluding": null, "versionSt...
[ "787" ]
787
https://github.com/saitoha/libsixel/issues/121
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
A crafted input will lead to crash in frompnm.c at libsixel 1.8.3.(git from the [branch](https://github.com/saitoha/libsixel/tree/release-1.8)) Triggered by: ./img2sixel 001-heap-- Poc: [001-heap--](https://github.com/gutiniao/afltest/blob/master/001-heap--) The ASAN info: ``` # ./img2sixel 001-heap-- ...
A heap-buffer-overflow in image_buffer_resize at fromsixel.c:308
https://api.github.com/repos/saitoha/libsixel/issues/121/comments
3
2019-12-18T05:10:27Z
2019-12-27T08:19:23Z
https://github.com/saitoha/libsixel/issues/121
539,455,360
121
936
CVE-2019-20051
2019-12-27T22:15:11.347
A floating-point exception was discovered in PackLinuxElf::elf_hash in p_lx_elf.cpp in UPX 3.95. The vulnerability causes an application crash, which leads to denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/313" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:3.95:*:*:*:*:*:*:*", "matchCriteriaId": "7986910F-E5B0-488F-813B-D6B4367F16F4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "682" ]
682
https://github.com/upx/upx/issues/313
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
A crafted input will lead to crash in p_lx_elf.cpp.cpp at UPX 3.95(latest version,git clone from master) Triggered by ./upx.out -d -f POC OS: Ubuntu 18.04.3 LTS CPU architecture: x86_64 Poc [004](https://github.com/gutiniao/afltest/blob/master/004) The ASAN information is as follows: ``` ./upx.out ...
Floating-point exception abort (DoS) in PackLinuxElf::elf_hash() of p_lx_elf.cpp:4569
https://api.github.com/repos/upx/upx/issues/313/comments
3
2019-11-13T10:02:39Z
2020-01-16T11:40:04Z
https://github.com/upx/upx/issues/313
522,091,065
313
937
CVE-2019-20052
2019-12-27T22:15:11.800
A memory leak was discovered in Mat_VarCalloc in mat.c in matio 1.5.17 because SafeMulDims does not consider the rank==0 case.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tbeu/matio/issues/131" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:matio_project:matio:1.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "BA202CA9-93FA-4D2E-8968-0A2748AC055D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ "401" ]
401
https://github.com/tbeu/matio/issues/131
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "tbeu", "matio" ]
A crafted input will lead to crash in mat.c at matio 1.5.17. Triggered by ./matdump POC Poc [006-memleak](https://github.com/gutiniao/afltest/blob/master/006-memleak) The ASAN information is as follows: ``` ./matdump /usr/local/matio_asan/bin/006-memleak InflateRankDims: inflate returned data error Infl...
it is a memory leaks issue in Mat_VarCalloc (mat.c:807)
https://api.github.com/repos/tbeu/matio/issues/131/comments
9
2019-11-12T05:36:29Z
2021-11-27T17:38:54Z
https://github.com/tbeu/matio/issues/131
521,339,404
131
938
CVE-2019-20053
2019-12-27T22:15:11.923
An invalid memory address dereference was discovered in the canUnpack function in p_mach.cpp in UPX 3.95 via a crafted Mach-O file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00003.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:3.95:*:*:*:*:*:*:*", "matchCriteriaId": "7986910F-E5B0-488F-813B-D6B4367F16F4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "119" ]
119
https://github.com/upx/upx/issues/314
[ "Exploit", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
A crafted input will lead to crash in p_mach.cpp at UPX 3.95(latest version,git clone from branch devel) Triggered by ./upx.out -d -f POC OS: Ubuntu 18.04.3 LTS CPU architecture: x86_64 Poc [001](https://github.com/gutiniao/afltest/blob/master/001) The ASAN information is as follows: ``` ./upx.out ...
Segmentation fault (ASAN: SEGV on unknown address) in the PackMachBase<N_Mach::MachClass_64<N_BELE_CTP::LEPolicy> >::canUnpack() function of p_mach.cpp:1539
https://api.github.com/repos/upx/upx/issues/314/comments
2
2019-11-14T01:57:00Z
2020-01-16T11:39:42Z
https://github.com/upx/upx/issues/314
522,576,017
314
939
CVE-2019-20056
2019-12-29T19:15:11.167
stb_image.h (aka the stb image loader) 2.23, as used in libsixel and other products, has an assertion failure in stbi__shiftsigned.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/126" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_image.h:2.23:*:*:*:*:*:*:*", "matchCriteriaId": "62B321FB-09DA-46F1-B7BE-4B8AAE636D18", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "617" ]
617
https://github.com/saitoha/libsixel/issues/126
[ "Exploit", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
stbi__shiftsigned has assertion which can be triggered by user supplied image file. ![Screen Shot 2019-12-29 at 9 38 06 PM](https://user-images.githubusercontent.com/20929895/71557651-ed631f00-2a83-11ea-94a3-8f46f8b1ae7b.png) poc: [poc.zip](https://github.com/saitoha/libsixel/files/4008085/poc.zip) result: ...
assertion failure in stbi__shiftsigned in stb_image.h
https://api.github.com/repos/saitoha/libsixel/issues/126/comments
2
2019-12-29T13:43:51Z
2020-01-03T01:32:36Z
https://github.com/saitoha/libsixel/issues/126
543,403,783
126
940
CVE-2019-20057
2019-12-29T19:15:11.637
com.proxyman.NSProxy.HelperTool in Privileged Helper Tool in Proxyman for macOS 1.11.0 and earlier allows an attacker to change the System Proxy and redirect all traffic to an attacker-controlled computer, enabling MITM attacks.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ProxymanApp/Proxyman/issues/364" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ProxymanApp/Proxyman/issu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:proxyman:proxyman:*:*:*:*:*:macos:*:*", "matchCriteriaId": "A88B9038-B2DA-4113-AE3F-D4F58F2195A4", "versionEndExcluding": null, "versionEndIncluding": "1.11.0", "versionStart...
[ "345" ]
345
https://github.com/ProxymanApp/Proxyman/issues/364
[ "Third Party Advisory" ]
github.com
[ "ProxymanApp", "Proxyman" ]
## 🐶 Brief There is a report from a dedicated user that Proxyman Helper Tool (PrivilegedHelperTools)could be exploited to change the System Proxy from unsigned apps. Basically, it's the same issue with [Little Snitch CVE-2019-13013](https://blog.obdev.at/what-we-have-learned-from-a-vulnerability/) since Proxyman a...
Helper Tool: Security Vulnerability
https://api.github.com/repos/ProxymanApp/Proxyman/issues/364/comments
1
2019-12-29T04:38:45Z
2019-12-29T05:20:26Z
https://github.com/ProxymanApp/Proxyman/issues/364
543,316,658
364
941
CVE-2019-20058
2019-12-29T19:15:11.727
Bolt 3.7.0, if Symfony Web Profiler is used, allows XSS because unsanitized search?search= input is shown on the _profiler page. NOTE: this is disputed because profiling was never intended for use in production. This is related to CVE-2018-12040
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/bolt/bolt/issues/7830" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/b...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:boltcms:bolt:3.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "0953D04C-A5F2-423D-919D-15CD4A43EA36", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "79" ]
79
https://github.com/bolt/bolt/issues/7830
[ "Exploit", "Third Party Advisory" ]
github.com
[ "bolt", "bolt" ]
**1. **Bug Summary:**** **Stored Cross-Site Scripting:** Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a brow...
Unauthenticated Stored Cross-Site Scripting (XSS) - Admin Account Takeover
https://api.github.com/repos/bolt/bolt/issues/7830/comments
5
2019-12-17T13:13:09Z
2020-02-24T06:29:29Z
https://github.com/bolt/bolt/issues/7830
539,057,977
7,830
942