cve_id stringlengths 13 16 | cve_published stringdate 2019-01-01 16:29:00 2025-02-25 20:15:37 | cve_descriptions stringlengths 34 2.6k | cve_metrics dict | cve_references listlengths 1 281 | cve_configurations listlengths 1 70 | cve_cwe_list listlengths 1 1 | cve_primary_cwe stringclasses 164
values | url stringlengths 36 97 | cve_tags listlengths 1 5 ⌀ | domain stringclasses 1
value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 198k ⌀ | issue_title stringlengths 1 335 | issue_comments_url stringlengths 55 116 | issue_comments_count int64 0 338 | issue_created_at stringdate 2012-06-06 09:34:24 2025-04-02 09:37:20 | issue_updated_at stringdate 2014-04-01 20:16:21 2025-06-16 12:26:58 | issue_html_url stringlengths 36 97 | issue_github_id int64 4.93M 2.97B | issue_number int64 1 199k | __index_level_0__ int64 0 6.55k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2019-18799 | 2019-11-06T16:15:10.930 | LibSass before 3.6.3 allows a NULL pointer dereference in Sass::Parser::parseCompoundSelector in parser_selectors.cpp. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/sass/libsass/issues/3001"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.co... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sass-lang:libsass:*:*:*:*:*:*:*:*",
"matchCriteriaId": "95D2FCD6-0BE0-41D4-93B6-05B7AE69EBF8",
"versionEndExcluding": "3.6.3",
"versionEndIncluding": null,
"versionStartExclu... | [
"476"
] | 476 | https://github.com/sass/libsass/issues/3001 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"sass",
"libsass"
] | We found SEGV in sassc binary and sassc is complied with clang enabling ASAN.
**Machine Setup**
```
Machine : Ubuntu 16.04.3 LTS
gcc version 5.4.0 20160609 (Ubuntu 5.4.0-6ubuntu1~16.04.11)
Commit : 4da7c4b
Command : sassc POC
```
**Complilation** : CC=afl-clang-fast CXX=afl-clang-fast++ AFL_USE_ASAN=1 make -C... | SEGV in sassc | https://api.github.com/repos/sass/libsass/issues/3001/comments | 1 | 2019-10-07T14:51:08Z | 2019-11-12T12:36:06Z | https://github.com/sass/libsass/issues/3001 | 503,503,493 | 3,001 | 833 |
CVE-2019-18815 | 2019-11-07T17:15:15.880 | PopojiCMS 2.0.1 allows refer= Open Redirection. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/PopojiCMS/PopojiCMS/issues/22"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:popojicms:popojicms:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2215DA94-615C-4B2C-BCC4-4497C233208C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"601"
] | 601 | https://github.com/PopojiCMS/PopojiCMS/issues/22 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"PopojiCMS",
"PopojiCMS"
] | Hi, @abdilahrf and I found open redirection vulnerability on the PopojiCMS. The vulnerable code is on **index.php** file line number **101**

notice the parameter refer was used by the code to redirect the user's to another page. So by crafting a request that using the POST method ... | Open Redirection Vulnerability | https://api.github.com/repos/PopojiCMS/PopojiCMS/issues/22/comments | 2 | 2019-10-19T06:27:43Z | 2019-12-18T09:20:29Z | https://github.com/PopojiCMS/PopojiCMS/issues/22 | 509,403,693 | 22 | 834 |
CVE-2019-18816 | 2019-11-07T17:15:15.943 | po-admin/route.php?mod=post&act=edit in PopojiCMS 2.0.1 allows post[1][content]= stored XSS. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/PopojiCMS/PopojiCMS/issues/21"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:popojicms:popojicms:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2215DA94-615C-4B2C-BCC4-4497C233208C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"79"
] | 79 | https://github.com/PopojiCMS/PopojiCMS/issues/21 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"PopojiCMS",
"PopojiCMS"
] | Hi, @abdilahrf and I found a stored XSS vulnerability on the Post feature.
By intercepting the request, we are able to edit the request body to insert a XSS payload.

and it is executed just fine

| Stored XSS on Post feature | https://api.github.com/repos/PopojiCMS/PopojiCMS/issues/21/comments | 3 | 2019-10-18T17:21:47Z | 2019-12-25T18:57:09Z | https://github.com/PopojiCMS/PopojiCMS/issues/21 | 509,214,349 | 21 | 835 |
CVE-2019-18840 | 2019-11-09T13:15:10.227 | In wolfSSL 4.1.0 through 4.2.0c, there are missing sanity checks of memory accesses in parsing ASN.1 certificate data while handshaking. Specifically, there is a one-byte heap-based buffer overflow inside the DecodedCert structure in GetName in wolfcrypt/src/asn.c because the domain name location index is mishandled. B... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wolfSSL/wolfssl/issues/2555"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B7B7AC0D-F131-43AB-93A0-598DD96B519D",
"versionEndExcluding": null,
"versionEndIncluding": "4.2.0c",
"versionStartExclud... | [
"787"
] | 787 | https://github.com/wolfSSL/wolfssl/issues/2555 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"wolfSSL",
"wolfssl"
] | WolfSSL in versions 4.1.0 and 4.2.0 incorrectly handles X.509 certificates leading to a heap-buffer overflow inside the DecodedCert structure, overwriting a NULL pointer and as a result crash during memory deallocation.
This vulnerability affects both client and server in two supported protocols: TLS and DTLS.
Duri... | Heap based buffer overflow while parsing crafted X.509 certificates | https://api.github.com/repos/wolfSSL/wolfssl/issues/2555/comments | 6 | 2019-11-04T17:01:40Z | 2019-11-13T20:50:52Z | https://github.com/wolfSSL/wolfssl/issues/2555 | 517,282,984 | 2,555 | 836 |
CVE-2019-18836 | 2019-11-11T01:15:10.210 | Envoy 1.12.0 allows a remote denial of service because of resource loops, as demonstrated by a single idle TCP connection being able to keep a worker thread in an infinite busy loop when continue_on_listener_filters_timeout is used." | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://blog.envoyproxy.io"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xvf-4396-cj46"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:envoyproxy:envoy:1.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "64A23B79-2694-46D3-A796-DD647442B403",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"835"
] | 835 | https://github.com/istio/istio/issues/18229 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"istio",
"istio"
] | **Bug description**
We are running Istio v1.3.3 (this also happend on v1.3.0), most of our applications are running fine. However, in one of our deployments the CPU on the sidecar is pegged at 1.0 for the life of the pod. This happens for the majority of the pods in the same deployment but not all. The pod contains ng... | Istio Sidecar consuming high CPU Istio 1.30-1.3.3 | https://api.github.com/repos/istio/istio/issues/18229/comments | 30 | 2019-10-23T15:46:28Z | 2020-07-03T08:51:34Z | https://github.com/istio/istio/issues/18229 | 511,415,965 | 18,229 | 837 |
CVE-2019-18844 | 2019-11-13T20:15:11.020 | The Device Model in ACRN before 2019w25.5-140000p relies on assert calls in devicemodel/hw/pci/core.c and devicemodel/include/pci_core.h (instead of other mechanisms for propagating error information or diagnostic information), which might allow attackers to cause a denial of service (assertion failure) within pci core... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/projectacrn/acrn-hypervisor/commit/2b3dedfb9ba13f15887f22b935d373f36c9a59fa"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:acrn:*:*:*:*:*:*:*:*",
"matchCriteriaId": "230540A5-B9A3-4A5E-9DB3-0AE1785537E4",
"versionEndExcluding": "2019w25.5-140000p",
"versionEndIncluding": null,
"versionStart... | [
"617"
] | 617 | https://github.com/projectacrn/acrn-hypervisor/issues/3252 | [
"Third Party Advisory"
] | github.com | [
"projectacrn",
"acrn-hypervisor"
] | Assert usages issue in device model from KW work. | Assert usages issue in device model from KW work. | https://api.github.com/repos/projectacrn/acrn-hypervisor/issues/3252/comments | 2 | 2019-06-12T08:24:06Z | 2019-07-22T02:05:38Z | https://github.com/projectacrn/acrn-hypervisor/issues/3252 | 455,076,074 | 3,252 | 838 |
CVE-2019-18954 | 2019-11-14T00:15:11.017 | Pomelo v2.2.5 allows external control of critical state data. A malicious user input can corrupt arbitrary methods and attributes in template/game-server/app/servers/connector/handler/entryHandler.js because certain internal attributes can be overwritten via a conflicting name. Hence, a malicious attacker can manipulat... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/NetEase/pomelo/issues/1149"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/cl0udz/vulne... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netease:pomelo:2.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F174E06D-AC65-457A-A9A9-CF0808DD6303",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"668"
] | 668 | https://github.com/NetEase/pomelo/issues/1149 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"NetEase",
"pomelo"
] | We found that pomelo allows external control of critical state data. A malicious user-input can corrupt arbitrary methods and attributes in template/game-server/app/servers/connector/handler/entryHandler.js because certain internal attributes can be overwritten via a conflicting name. Hence, a malicious attacker can la... | A state poisoning vulnerability in pomelo | https://api.github.com/repos/NetEase/pomelo/issues/1149/comments | 5 | 2019-11-08T00:04:23Z | 2020-03-23T19:09:46Z | https://github.com/NetEase/pomelo/issues/1149 | 519,582,593 | 1,149 | 839 |
CVE-2019-19011 | 2019-11-17T18:15:10.987 | MiniUPnP ngiflib 0.4 has a NULL pointer dereference in GifIndexToTrueColor in ngiflib.c via a file that lacks a palette. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/miniupnp/ngiflib/issues/16"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:miniupnp_project:ngiflib:0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5BE2BAA9-5D76-4039-A655-3F478ED5D601",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"476"
] | 476 | https://github.com/miniupnp/ngiflib/issues/16 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"miniupnp",
"ngiflib"
] | We found Segmentation Fault issue in gif2tga binary and gif2tga is complied with clang enabling ASAN.
**Machine Setup**
Machine : Ubuntu 16.04.3 LTS
gcc version 5.4.0 20160609 (Ubuntu 5.4.0-6ubuntu1~16.04.11)
Commit : 992d272
Command : ./gif2tga $POC
POC :- [GifIndexToTrueColor-SEGV.zip](https://github.com/mi... | Segmentation Fault in ngiflib.c | https://api.github.com/repos/miniupnp/ngiflib/issues/16/comments | 0 | 2019-10-30T18:20:15Z | 2019-11-09T13:10:39Z | https://github.com/miniupnp/ngiflib/issues/16 | 514,884,667 | 16 | 840 |
CVE-2019-19040 | 2019-11-17T21:15:11.303 | KairosDB through 1.2.2 has XSS in view.html because of showErrorMessage in js/graph.js, as demonstrated by view.html?q= with a '"sampling":{"value":"<script>' substring. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/kairosdb/kairosdb/issues/569"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://githu... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kairosdb_project:kairosdb:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3174FC53-9A62-4F03-B106-047BF91DAB50",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.2",
"versionSt... | [
"79"
] | 79 | https://github.com/kairosdb/kairosdb/issues/569 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"kairosdb",
"kairosdb"
] | Hello,
I want to report a Reflect Cross-site scripting issue on `view.html`.
## Vulnerability
A function call on [view.html, Line 48](https://github.com/kairosdb/kairosdb/blob/master/webroot/view.html#L48) will append error message by `showErrorMessage` function.
`showErrorMessage` function was declared in [j... | Reflect Cross-site Scripting on error message (WEB UI / view.html, graph.js) | https://api.github.com/repos/kairosdb/kairosdb/issues/569/comments | 3 | 2019-10-24T21:22:52Z | 2020-01-26T13:47:31Z | https://github.com/kairosdb/kairosdb/issues/569 | 512,188,289 | 569 | 842 |
CVE-2019-19084 | 2019-11-18T16:15:12.370 | In Octopus Deploy 3.3.0 through 2019.10.4, an authenticated user with PackagePush permission to upload packages could upload a maliciously crafted package, triggering an exception that exposes underlying operating system details. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/issues/5971"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/iss... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1621F446-4AB3-45D5-AF0A-845BA5BA5A21",
"versionEndExcluding": null,
"versionEndIncluding": "2019.10.4",
"versionS... | [
"434"
] | 434 | https://github.com/OctopusDeploy/Issues/issues/5971 | [
"Third Party Advisory"
] | github.com | [
"OctopusDeploy",
"Issues"
] | _Note: affects customers on Octopus Cloud hosted instances. For all other customers this was fixed in https://github.com/OctopusDeploy/Issues/issues/5956_
An authenticated user could upload a maliciously crafted package, triggering an exception that discloses details of the underlying operating system.
CVE: `CVE... | (Hosted only) Local path configuration disclosed when uploading maliciously crafted package | https://api.github.com/repos/OctopusDeploy/Issues/issues/5971/comments | 4 | 2019-11-05T04:10:15Z | 2020-02-16T23:36:40Z | https://github.com/OctopusDeploy/Issues/issues/5971 | 517,537,845 | 5,971 | 843 |
CVE-2019-19085 | 2019-11-18T16:15:12.497 | A persistent cross-site scripting (XSS) vulnerability in Octopus Server 3.4.0 through 2019.10.5 allows remote authenticated attackers to inject arbitrary web script or HTML. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/issues/5961"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/iss... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:octopus:server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7B92955C-E874-43E4-B043-3DE908250A01",
"versionEndExcluding": null,
"versionEndIncluding": "2019.10.5",
"versionStartExcl... | [
"79"
] | 79 | https://github.com/OctopusDeploy/Issues/issues/5961 | [
"Third Party Advisory"
] | github.com | [
"OctopusDeploy",
"Issues"
] | An authenticated user with edit permissions could upload a maliciously crafted file, allowing attackers to inject arbitrary web script or HTML.
CVE: CVE-2019-19085
Relates to https://github.com/OctopusDeploy/OctopusDeploy/issues/4642 | XSS vulnerability | https://api.github.com/repos/OctopusDeploy/Issues/issues/5961/comments | 3 | 2019-11-04T04:11:46Z | 2020-02-16T23:36:30Z | https://github.com/OctopusDeploy/Issues/issues/5961 | 516,951,481 | 5,961 | 844 |
CVE-2019-19113 | 2019-11-18T17:15:11.707 | main/resources/mapper/NewBeeMallGoodsMapper.xml in newbee-mall (aka New Bee) before 2019-10-23 allows search?goodsCategoryId=&keyword= SQL Injection. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/newbee-ltd/newbee-mall/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:newbee-mall_project:newbee-mall:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4CF0527F-5552-4086-9880-2E9DF0DA9F5F",
"versionEndExcluding": "2019-10-23",
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/newbee-ltd/newbee-mall/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"newbee-ltd",
"newbee-mall"
] | \src\main\resources\mapper\NewBeeMallGoodsMapper.xml
```
<select id="findNewBeeMallGoodsListBySearch" parameterType="Map" resultMap="BaseResultMap">
select
<include refid="Base_Column_List"/>
from tb_newbee_mall_goods_info
<where>
<if test="keyword!=null and keywor... | SQL Injection in ` \src\main\resources\mapper\NewBeeMallGoodsMapper.xml ` | https://api.github.com/repos/newbee-ltd/newbee-mall/issues/1/comments | 1 | 2019-10-19T16:20:39Z | 2019-10-23T15:47:52Z | https://github.com/newbee-ltd/newbee-mall/issues/1 | 509,475,318 | 1 | 845 |
CVE-2019-19203 | 2019-11-21T21:15:11.497 | An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function gb18030_mbc_enc_len in file gb18030.c, a UChar pointer is dereferenced without checking if it passed the end of the matched string. This leads to a heap-based buffer over-read. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ManhNDd/CVE-2019-19203"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/kkos/oni... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oniguruma_project:oniguruma:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7696B698-FAA5-4F0E-B9BC-C152135F9D6A",
"versionEndExcluding": "6.9.4",
"versionEndIncluding": null,
"version... | [
"125"
] | 125 | https://github.com/kkos/oniguruma/issues/163 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"kkos",
"oniguruma"
] | In gb18030_mbc_enc_len, p ++ then p is dereferenced without checking if it passes the end of string, which leads to heap-buffer-overflow.
```
static int
gb18030_mbc_enc_len(const UChar* p)
{
if (GB18030_MAP[*p] != CM)
return 1;
p++;
if (GB18030_MAP[*p] == C4)
return 4;
return 2;
}
```
P... | heap-buffer-overflow in gb18030_mbc_enc_len | https://api.github.com/repos/kkos/oniguruma/issues/163/comments | 2 | 2019-11-06T09:39:01Z | 2019-11-21T22:19:38Z | https://github.com/kkos/oniguruma/issues/163 | 518,351,276 | 163 | 846 |
CVE-2019-19204 | 2019-11-21T21:15:11.577 | An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function fetch_interval_quantifier (formerly known as fetch_range_quantifier) in regparse.c, PFETCH is called without checking PEND. This leads to a heap-based buffer over-read. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ManhNDd/CVE-2019-19204"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/kkos/oni... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oniguruma_project:oniguruma:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7696B698-FAA5-4F0E-B9BC-C152135F9D6A",
"versionEndExcluding": "6.9.4",
"versionEndIncluding": null,
"version... | [
"125"
] | 125 | https://github.com/kkos/oniguruma/issues/162 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"kkos",
"oniguruma"
] | At regparse.c:4182 in fetch_interval_quantifier, PFETCH is called without checking PEND:
```PFETCH(c);
if (IS_SYNTAX_OP(env->syntax, ONIG_SYN_OP_ESC_BRACE_INTERVAL)) {
if (c != MC_ESC(env->syntax)) goto invalid;
PFETCH(c);
}
```
This leads to heap-buffer-overflow.
PoC:
```
#include <stdlib.h>
#in... | heap-buffer-overflow in fetch_interval_quantifier due to double PFETCH | https://api.github.com/repos/kkos/oniguruma/issues/162/comments | 2 | 2019-11-06T07:43:08Z | 2019-11-21T22:19:15Z | https://github.com/kkos/oniguruma/issues/162 | 518,296,883 | 162 | 847 |
CVE-2019-19221 | 2019-11-21T23:15:13.887 | In Libarchive 3.4.0, archive_wstring_append_from_mbs in archive_string.c has an out-of-bounds read because of an incorrect mbrtowc or mbtowc call. For example, bsdtar crashes via a crafted archive. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/libarchive/libarchive/commit/22b1db9d46654afc6f0c28f90af8cdc84a199f41"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Ad... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libarchive:libarchive:3.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "89750E2E-3206-45C0-B882-EF74E66D45C4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"125"
] | 125 | https://github.com/libarchive/libarchive/issues/1276 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"libarchive",
"libarchive"
] | bsdtar: An error in archive_wstring_append_from_mbs() (archive_string.c) triggers an out-of-bounds read memory access that results into a crash, via a specially crafted archive file. This bug was found using our custom fuzzer.
Basic Information:
Version of libarchive: libarchive-3.4.0, libarchive-3.4.1dev
Ho... | bsdtar: An error in archive_wstring_append_from_mbs() (archive_string.c) allows out-of-bounds read memory access and subsequently cause a crash | https://api.github.com/repos/libarchive/libarchive/issues/1276/comments | 2 | 2019-11-07T03:40:18Z | 2019-11-21T22:25:59Z | https://github.com/libarchive/libarchive/issues/1276 | 519,020,870 | 1,276 | 848 |
CVE-2019-13566 | 2019-11-22T21:15:10.880 | An issue was discovered in the ROS communications-related packages (aka ros_comm or ros-melodic-ros-comm) through 1.14.3. A buffer overflow allows attackers to cause a denial of service and possibly execute arbitrary code via an IP address with a long hostname. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ros/ros_comm/issues/1735"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/ros/ros_comm/issues/1752"
},
{
"source": "cve@mitre.org",
"t... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ros:ros-comm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D0EBCB1B-9EB9-4FDC-B3FB-8ED23B84BC71",
"versionEndExcluding": null,
"versionEndIncluding": "1.14.3",
"versionStartExcluding... | [
"120"
] | 120 | https://github.com/ros/ros_comm/issues/1735 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"ros",
"ros_comm"
] | Using Coverity static analysis tool report a potential string overflow in the following code:
(10) Event fixed_size_dest: You might overrun the 128-character fixed-size string "namebuf" by copying the return value of "inet_ntoa" without checking the length.
https://github.com/ros/ros_comm/blob/29053c4832229efa7160f... | Coverity report potential string overflow in transport_udp.cpp | https://api.github.com/repos/ros/ros_comm/issues/1735/comments | 2 | 2019-07-02T19:28:39Z | 2019-11-28T09:25:32Z | https://github.com/ros/ros_comm/issues/1735 | 463,397,685 | 1,735 | 849 |
CVE-2019-13566 | 2019-11-22T21:15:10.880 | An issue was discovered in the ROS communications-related packages (aka ros_comm or ros-melodic-ros-comm) through 1.14.3. A buffer overflow allows attackers to cause a denial of service and possibly execute arbitrary code via an IP address with a long hostname. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ros/ros_comm/issues/1735"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/ros/ros_comm/issues/1752"
},
{
"source": "cve@mitre.org",
"t... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ros:ros-comm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D0EBCB1B-9EB9-4FDC-B3FB-8ED23B84BC71",
"versionEndExcluding": null,
"versionEndIncluding": "1.14.3",
"versionStartExcluding... | [
"120"
] | 120 | https://github.com/ros/ros_comm/issues/1752 | null | github.com | [
"ros",
"ros_comm"
] | Copy the Internet host address of address->sin_addr to local variable with checking the buffer length, can cause potential buffer overflow if using a IP address with a long hostname that is obtained via a reverse DNS lookup
https://github.com/ros/ros_comm/blob/29053c4832229efa7160fb944c05e3bc82e11540/clients/roscpp/... | Potential buffer overflow | https://api.github.com/repos/ros/ros_comm/issues/1752/comments | 1 | 2019-07-10T19:24:37Z | 2019-08-07T22:56:26Z | https://github.com/ros/ros_comm/issues/1752 | 466,477,248 | 1,752 | 850 |
CVE-2019-10217 | 2019-11-25T16:15:13.347 | A flaw was found in ansible 2.8.0 before 2.8.4. Fields managing sensitive data should be set as such by no_log feature. Some of these fields in GCP modules are not set properly. service_account_contents() which is common class for all gcp modules is not setting no_log to True. Any sensitive data managed by that functio... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "secalert@redhat.com",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html"
},
{
"sourc... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*",
"matchCriteriaId": "313A09AC-5BD9-4660-8D33-56A5E0CC239F",
"versionEndExcluding": "2.8.4",
"versionEndIncluding": null,
"versionStartExcludin... | [
"200"
] | 200 | https://github.com/ansible/ansible/issues/56269 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ansible",
"ansible"
] | <!--- Verify first that your issue is not already reported on GitHub -->
<!--- Also test if the latest release and devel branch are affected too -->
<!--- Complete *all* sections as described, this form is processed automatically -->
##### SUMMARY
<!--- Explain the problem briefly below -->
When I use `service_a... | gcp_storage_object fails with service_account_contents option | https://api.github.com/repos/ansible/ansible/issues/56269/comments | 5 | 2019-05-09T14:08:26Z | 2019-08-26T14:04:39Z | https://github.com/ansible/ansible/issues/56269 | 442,256,818 | 56,269 | 851 |
CVE-2019-19270 | 2019-11-26T04:15:12.950 | An issue was discovered in tls_verify_crl in ProFTPD through 1.3.6b. Failure to check for the appropriate field of a CRL entry (checking twice for subject, rather than once for subject and once for issuer) prevents some valid CRLs from being taken into account, and can allow clients whose certificates have been revoked... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00009.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/proftpd/proftpd/issues/859"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:proftpd:proftpd:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8267809-FDF5-459D-B34D-8CFF65B03A22",
"versionEndExcluding": null,
"versionEndIncluding": "1.3.5",
"versionStartExcludi... | [
"295"
] | 295 | https://github.com/proftpd/proftpd/issues/859 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"proftpd",
"proftpd"
] | This is the 2nd of 4 bugs in the tls_verify_crl() function. The code fails to perform a CRL lookup by issuer (as the comment right above the block states), it instead performs a second lookup by subject. As a result, in our tests, after crash bugs 1 and 4 (issue #858 and issue #861) were fixed, ProFTPD still failed to ... | Improper TLS CRL handling 1/2 in mod_tls of ProFTPD master HEAD | https://api.github.com/repos/proftpd/proftpd/issues/859/comments | 2 | 2019-11-04T16:08:50Z | 2019-11-26T07:34:05Z | https://github.com/proftpd/proftpd/issues/859 | 517,251,790 | 859 | 852 |
CVE-2019-19271 | 2019-11-26T04:15:13.013 | An issue was discovered in tls_verify_crl in ProFTPD before 1.3.6. A wrong iteration variable, used when checking a client certificate against CRL entries (installed by a system administrator), can cause some CRL entries to be ignored, and can allow clients whose certificates have been revoked to proceed with a connect... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/proftpd/proftpd/issues/860"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:proftpd:proftpd:*:*:*:*:*:*:*:*",
"matchCriteriaId": "19DF8347-D2E6-4736-849D-F0707FE8E0F3",
"versionEndExcluding": "1.3.6",
"versionEndIncluding": null,
"versionStartExcludi... | [
"295"
] | 295 | https://github.com/proftpd/proftpd/issues/860 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"proftpd",
"proftpd"
] | For tracking purposes (this problem is fixed in 1.3.6+).
This is the 3rd of 4 bugs in the tls_verify_crl() function. The wrong iteration variable is passed to sk_X509_REVOKED_value(), probably causing some CRL entries to be ignored. From the 1.3.5 -> 1.3.6 branches diff:
```
@@ -6001,14 +9084,15 @@ static int tls_ve... | Improper TLS CRL handling 2/2 in mod_tls of ProFTPD < 1.3.6 | https://api.github.com/repos/proftpd/proftpd/issues/860/comments | 2 | 2019-11-04T16:09:38Z | 2019-11-27T15:25:05Z | https://github.com/proftpd/proftpd/issues/860 | 517,252,338 | 860 | 853 |
CVE-2019-19272 | 2019-11-26T04:15:13.060 | An issue was discovered in tls_verify_crl in ProFTPD before 1.3.6. Direct dereference of a NULL pointer (a variable initialized to NULL) leads to a crash when validating the certificate of a client connecting to the server in a TLS client/server mutual-authentication setup. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/proftpd/proftpd/issues/858"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/proftpd/proftpd/issues/858"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:proftpd:proftpd:*:*:*:*:*:*:*:*",
"matchCriteriaId": "19DF8347-D2E6-4736-849D-F0707FE8E0F3",
"versionEndExcluding": "1.3.6",
"versionEndIncluding": null,
"versionStartExcludi... | [
"476"
] | 476 | https://github.com/proftpd/proftpd/issues/858 | [
"Third Party Advisory"
] | github.com | [
"proftpd",
"proftpd"
] | For tracking purposes (this problem is fixed in 1.3.6+).
This is the 1st of 4 bugs in the tls_verify_crl() function. It's a direct nullptr dereference: variable initialized to NULL, then dereferenced. I fixed it on my side, then I noticed that it had been fixed upstream in 1.3.6. From the 1.3.5 -> 1.3.6 branches diff:... | DoS (nullptr dereference) 1/2 with CRLs in mod_tls of ProFTPD < 1.3.6 | https://api.github.com/repos/proftpd/proftpd/issues/858/comments | 2 | 2019-11-04T16:07:44Z | 2019-11-27T15:24:35Z | https://github.com/proftpd/proftpd/issues/858 | 517,251,126 | 858 | 854 |
CVE-2015-9537 | 2019-11-26T15:15:11.190 | The NextGEN Gallery plugin before 2.1.10 for WordPress has multiple XSS issues involving thumbnail_width, thumbnail_height, thumbwidth, thumbheight, wmXpos, and wmYpos, and template. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://cybersecurityworks.com/zerodays/cve-2015-9537-nextgen.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.co... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagely:nextgen_gallery:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "F6FF0678-1E8F-4693-AE22-4AFEF12528BB",
"versionEndExcluding": "2.1.10",
"versionEndIncluding": null,
"ve... | [
"79"
] | 79 | https://github.com/cybersecurityworks/Disclosed/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"cybersecurityworks",
"Disclosed"
] | # Details
Word Press Product Bugs Report
Bug Name XSS (Cross Site Scripting)
Software: NextGen Gallery
Version: 2.1.7
Last Updated: 12-08-2015
Homepage: https://wordpress.org/plugins/nextgen-gallery/download/
Compatible Up to Wordpress 4.3.0 Version (Requires: 3.6.1 or higher)
Severity High
Description: Multip... | Multiple XSS in NextGEN Gallery by Photocrati Version 2.1.7 | https://api.github.com/repos/cybersecurityworks/Disclosed/issues/1/comments | 1 | 2015-08-27T13:22:02Z | 2024-05-10T04:43:44Z | https://github.com/cybersecurityworks/Disclosed/issues/1 | 103,507,915 | 1 | 855 |
CVE-2015-9538 | 2019-11-26T15:15:11.253 | The NextGEN Gallery plugin before 2.1.15 for WordPress allows ../ Directory Traversal in path selection. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://cxsecurity.com/issue/WLB-2015080165"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://cybersecurityworks.com/zerodays/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagely:nextgen_gallery:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "5E4A9794-77D2-4813-B40A-B7D784E77A9B",
"versionEndExcluding": "2.1.15",
"versionEndIncluding": null,
"ve... | [
"22"
] | 22 | https://github.com/cybersecurityworks/Disclosed/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"cybersecurityworks",
"Disclosed"
] | Word Press Product Bugs Report
Bug Name LFI (Local File Inclusion)
Area Path NextGEN Gallery by Photocrati Version 2.1.7 (Plugin)
Last Updated 12-08-2015
Compatible Up to Wordpress 4.3.0 Version (Requires: 3.6.1 or higher)
Severity High
Reported by Sathish from <a href="http://www.cybersecurityworks.com">Cyber Security... | Traversal Attack / Local File Inclusion (LFI) in NextGEN Gallery by Photocrati Version 2.1.7 | https://api.github.com/repos/cybersecurityworks/Disclosed/issues/2/comments | 0 | 2015-08-28T11:58:55Z | 2015-11-25T11:23:59Z | https://github.com/cybersecurityworks/Disclosed/issues/2 | 103,705,424 | 2 | 856 |
CVE-2015-9539 | 2019-11-26T15:15:11.347 | The Fast Secure Contact Form plugin before 4.0.38 for WordPress allows fs_contact_form1[welcome] XSS. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://cybersecurityworks.com/zerodays/cve-2015-9539-fastsecure.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/amansaini/fa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fast_secure_contact_form_project:fast_secure_contact_form:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "94936F04-9861-47BF-9F06-F5B7F29E124A",
"versionEndExcluding": "4.0.38",
"versionEn... | [
"79"
] | 79 | https://github.com/cybersecurityworks/Disclosed/issues/4 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"cybersecurityworks",
"Disclosed"
] | # Details
Word Press Product Bugs Report
Bug Name XSS (Cross Site Scripting)
Software: Fast Secure Contact Form plugin
Version: 4.0.37
Last Updated: 21-08-2015
Homepage: https://wordpress.org/plugins/si-contact-form/
Compatible Up to Wordpress 4.3.0 Version (Requires: 3.4.2 or higher)
Severity High
Descriptio... | XSS Vulnerability in Fast Secure Contact form version 4.0.37 | https://api.github.com/repos/cybersecurityworks/Disclosed/issues/4/comments | 0 | 2015-09-14T10:50:07Z | 2015-09-14T10:58:55Z | https://github.com/cybersecurityworks/Disclosed/issues/4 | 106,317,022 | 4 | 857 |
CVE-2019-19306 | 2019-11-26T15:15:13.377 | The Zoho CRM Lead Magnet plugin 1.6.9.1 for WordPress allows XSS via module, EditShortcode, or LayoutName. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://cybersecurityworks.com/zerodays/cve-2019-19306-zoho.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zoho:lead_magnet:1.6.9.1:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "CF9D5215-A5D4-4616-8D29-7C225C9E39D2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | [
"79"
] | 79 | https://github.com/cybersecurityworks/Disclosed/issues/16 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"cybersecurityworks",
"Disclosed"
] | # Details
ZOHO CRM Lead Magnet version 1.6.9.1
Bug Name: Reflected Cross Site Scripting (XSS) in WordPress Plugin
Product: ZOHO CRM Lead Magnet version 1.6.9.1
Version: 1.6.9.1
Last Updated: 14-10-2019
Homepage: http://localhost/wordpress/
Severity: High
Status: Fixed
Exploitation Requires Authentication?: ... | ZOHO CRM Lead Magnet version 1.6.9.1 | https://api.github.com/repos/cybersecurityworks/Disclosed/issues/16/comments | 0 | 2019-10-16T11:06:22Z | 2019-10-16T13:31:02Z | https://github.com/cybersecurityworks/Disclosed/issues/16 | 507,779,866 | 16 | 858 |
CVE-2019-19375 | 2019-11-28T17:15:12.383 | In Octopus Deploy before 2019.10.7, in a configuration where SSL offloading is enabled, the CSRF cookie was sometimes sent without the secure attribute. (The fix for this was backported to LTS versions 2019.6.14 and 2019.9.8.) | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/issues/5998"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/iss... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:-:*:*:*",
"matchCriteriaId": "70EDE3D5-F20F-4921-8D92-A22ADB705325",
"versionEndExcluding": "2019.10.7",
"versionEndIncluding": null,
"versionS... | [
"352"
] | 352 | https://github.com/OctopusDeploy/Issues/issues/5998 | [
"Third Party Advisory"
] | github.com | [
"OctopusDeploy",
"Issues"
] | When Octopus is configured to behind a load balancer, and SSL offloading is configured, Octopus will sometimes send the CSRF cookie without the `secure` attribute.
CVE: `CVE-2019-19375`
Relates to https://github.com/OctopusDeploy/OctopusDeploy/issues/4763 | CSRF cookie sometimes missing secure attribute | https://api.github.com/repos/OctopusDeploy/Issues/issues/5998/comments | 2 | 2019-11-14T02:15:57Z | 2020-02-28T07:02:35Z | https://github.com/OctopusDeploy/Issues/issues/5998 | 522,581,170 | 5,998 | 860 |
CVE-2019-19269 | 2019-11-30T23:15:18.223 | An issue was discovered in tls_verify_crl in ProFTPD through 1.3.6b. A dereference of a NULL pointer may occur. This pointer is returned by the OpenSSL sk_X509_REVOKED_value() function when encountering an empty CRL installed by a system administrator. The dereference occurs when validating the certificate of a client ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00009.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/proftpd/proftpd/issues/861"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:proftpd:proftpd:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9489E448-D5B8-4A38-99CE-C472EA881D69",
"versionEndExcluding": null,
"versionEndIncluding": "1.3.5e",
"versionStartExclud... | [
"476"
] | 476 | https://github.com/proftpd/proftpd/issues/861 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"proftpd",
"proftpd"
] | This is the 4th of 4 bugs in the tls_verify_crl() function. The code fails to take into account an empty CRL, for which sk_X509_REVOKED_value() returned NULL in my tests. It proceeds to dereferencing the NULL pointer, crashing the application.
My patch is as follows:
```
@@ -6005,7 +6014,8 @@
ASN1_INTEGE... | DoS (nullptr dereference) 2/2 with CRLs in mod_tls of ProFTPD master HEAD | https://api.github.com/repos/proftpd/proftpd/issues/861/comments | 2 | 2019-11-04T16:10:29Z | 2019-11-26T07:33:45Z | https://github.com/proftpd/proftpd/issues/861 | 517,252,879 | 861 | 862 |
CVE-2019-19507 | 2019-12-02T17:15:13.187 | In jpv (aka Json Pattern Validator) before 2.1.1, compareCommon() can be bypassed because certain internal attributes can be overwritten via a conflicting name, as demonstrated by 'constructor': {'name':'Array'}. This affects validate(). Hence, a crafted payload can overwrite this builtin attribute to manipulate the ty... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/manvel-khnkoyan/jpv/issues/6"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://www.npmjs.com/package/jpv"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:json_pattern_validator_project:json_pattern_validator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1F1083D2-D514-48D7-884F-CBC15FE194F7",
"versionEndExcluding": "2.1.1",
"versionEndIncluding": ... | [
"287"
] | 287 | https://github.com/manvel-khnkoyan/jpv/issues/6 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"manvel-khnkoyan",
"jpv"
] | We found that a maliciously crafted json can bypass the validation logics of jpv.
The vulnerability is from the following code: jpv leverages the built-in constructor of unsafe user-input to detect type information. However, a crafted payload can overwrite this builtin attribute to manipulate the type detection result... | A vulnerability in validate() | https://api.github.com/repos/manvel-khnkoyan/jpv/issues/6/comments | 1 | 2019-11-28T22:12:05Z | 2019-12-02T09:14:57Z | https://github.com/manvel-khnkoyan/jpv/issues/6 | 530,087,847 | 6 | 863 |
CVE-2019-19588 | 2019-12-05T01:15:14.317 | The validators package 0.12.2 through 0.12.5 for Python enters an infinite loop when validators.domain is called with a crafted domain string. This is fixed in 0.12.6. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/kvesteri/validators/issues/86"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:validators_project:validators:*:*:*:*:*:python:*:*",
"matchCriteriaId": "30573335-BFF9-4B00-8F4F-9C0186ED3170",
"versionEndExcluding": null,
"versionEndIncluding": "0.12.5",
... | [
"835"
] | 835 | https://github.com/kvesteri/validators/issues/86 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"kvesteri",
"validators"
] | The following string makes validators 0.12.2 get lock at 100% CPU forever.
```
crazy_string='p.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.wo.'
```
Logs:
```
root@db8fc13972fc:/myapp# pip list | grep validators
validators 0.12.2
ro... | Text string that causes validators.domain to lock at 100% CPU usage | https://api.github.com/repos/python-validators/validators/issues/86/comments | 1 | 2018-06-06T23:00:03Z | 2019-12-04T13:13:21Z | https://github.com/python-validators/validators/issues/86 | 330,061,628 | 86 | 865 |
CVE-2019-19601 | 2019-12-05T13:15:11.970 | OpenDetex 2.8.5 has a Buffer Overflow in TexOpen in detex.l because of an incorrect sprintf. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/pkubowicz/opendetex/issues/60"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:opendetex_project:opendetex:2.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5AC0793B-C54B-4A0B-8CBC-4D401D990E7A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | [
"119"
] | 119 | https://github.com/pkubowicz/opendetex/issues/60 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"pkubowicz",
"opendetex"
] | Hi,
While fuzzing OpenDetex with Honggfuzz, I found a buffer overflow in the TexOpen() function, in detex.l.
Attaching a reproducer (gzipped so GitHub accepts it): [test01.gz](https://github.com/pkubowicz/opendetex/files/3925690/test01.gz)
Issue can be reproduced by running:
```
detex test01
```
```
=... | Buffer overflow in the TexOpen() function | https://api.github.com/repos/pkubowicz/opendetex/issues/60/comments | 2 | 2019-12-05T08:11:30Z | 2020-01-25T12:56:16Z | https://github.com/pkubowicz/opendetex/issues/60 | 533,191,085 | 60 | 867 |
CVE-2019-19602 | 2019-12-05T14:15:09.257 | fpregs_state_valid in arch/x86/include/asm/fpu/internal.h in the Linux kernel before 5.4.2, when GCC 9 is used, allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact because of incorrect fpu_fpregs_owner_ctx caching, as demonstrated by mishandling ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.4,
"confidentialityImpact": "COMPLE... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.kernel.org/show_bug.cgi?id=205663"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://cdn.kernel.org/pu... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EDA2DEC6-C9B1-4CBB-99ED-EF1EB2832A99",
"versionEndExcluding": "5.4.2",
"versionEndIncluding": null,
"versionStartExcl... | [
"119"
] | 119 | https://github.com/golang/go/issues/35777#issuecomment-561935388 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"golang",
"go"
] | We've had several reports of memory corruption on Linux 5.3.x (or later) kernels from people running tip since asynchronous preemption was committed. This is a super-bug to track these issues. I suspect they all have one root cause.
Typically these are "runtime error: invalid memory address or nil pointer dereferenc... | runtime: memory corruption on Linux 5.2+ | https://api.github.com/repos/golang/go/issues/35777/comments | 93 | 2019-11-22T15:24:36Z | 2024-09-13T15:13:41Z | https://github.com/golang/go/issues/35777 | 527,259,718 | 35,777 | 868 |
CVE-2018-1002102 | 2019-12-05T16:15:10.427 | Improper validation of URL redirection in the Kubernetes API server in versions prior to v1.14.0 allows an attacker-controlled Kubelet to redirect API server requests from streaming endpoints to arbitrary hosts. Impacted API servers will follow the redirect as a GET request with client-certificate credentials for authe... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/85867"
},
{
"source": "jordan@liggitt.net",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/l... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1774C3E1-5BE8-4DC0-8A61-39B183C36F96",
"versionEndExcluding": null,
"versionEndIncluding": "1.13.13",
"versionStar... | [
"601"
] | 601 | https://github.com/kubernetes/kubernetes/issues/85867 | [
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: [CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:N/E:F (Low)](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:N/E:F)
An attacker-controlled Kubelet can return an arbitrary redirect when responding to certain apiserver requests. Impacted kube-apiservers will follow the red... | CVE-2018-1002102: Unvalidated redirect | https://api.github.com/repos/kubernetes/kubernetes/issues/85867/comments | 3 | 2019-12-03T22:58:37Z | 2021-12-02T22:56:35Z | https://github.com/kubernetes/kubernetes/issues/85867 | 532,323,568 | 85,867 | 869 |
CVE-2019-11255 | 2019-12-05T16:15:10.567 | Improper input validation in Kubernetes CSI sidecar containers for external-provisioner (<v0.4.3, <v1.0.2, v1.1, <v1.2.2, <v1.3.1), external-snapshotter (<v0.4.2, <v1.0.2, v1.1, <1.2.2), and external-resizer (v0.1, v0.2) could result in unauthorized PersistentVolume data access or volume mutation during snapshot, resto... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"confidentialityImpact": "PARTIAL"... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:4054"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:4096"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:external-provisioner:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A78A50B-5286-400D-A54A-49F1023D97D6",
"versionEndExcluding": null,
"versionEndIncluding": "0.4.2",
"ver... | [
"20"
] | 20 | https://github.com/kubernetes/kubernetes/issues/85233 | [
"Mitigation",
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | <!-- Please use this template while reporting a bug and provide as much info as possible. Not doing so may result in your bug not being addressed in a timely manner. Thanks!
If the matter is security related, please disclose it privately via https://kubernetes.io/security/
-->
**Am I vulnerable?**
CSI snapsho... | CVE-2019-11255: CSI volume snapshot, cloning and resizing features can result in unauthorized volume data access or mutation | https://api.github.com/repos/kubernetes/kubernetes/issues/85233/comments | 5 | 2019-11-13T20:57:31Z | 2022-10-14T02:00:55Z | https://github.com/kubernetes/kubernetes/issues/85233 | 522,468,661 | 85,233 | 870 |
CVE-2019-19624 | 2019-12-06T15:15:10.330 | An out-of-bounds read was discovered in OpenCV before 4.1.1. Specifically, variable coarsest_scale is assumed to be greater than or equal to finest_scale within the calc()/ocl_calc() functions in dis_flow.cpp. However, this is not true when dealing with small images, leading to an out-of-bounds read of the heap-allocat... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/opencv/opencv/commit/d1615ba11a93062b1429fce9f0f638d1572d3418"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:opencv:opencv:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B00DAA9A-1738-491E-9220-BFFB8580CAB4",
"versionEndExcluding": "4.1.1",
"versionEndIncluding": null,
"versionStartExcluding... | [
"125"
] | 125 | https://github.com/opencv/opencv/issues/14554 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"opencv",
"opencv"
] | ##### System information (version)
<!-- Example
- OpenCV => 4.0
- Operating System / Platform => Windows 64 Bit
- Compiler => Visual Studio 2015
-->
- OpenCV => 4.0
- Operating System / Platform => Any
- Compiler => Any
##### Detailed description
DISOpticalFlow segfaults for small images.
The problem i... | DISOpticalFlow: segfault for small images | https://api.github.com/repos/opencv/opencv/issues/14554/comments | 2 | 2019-05-14T13:24:09Z | 2024-05-10T02:57:12Z | https://github.com/opencv/opencv/issues/14554 | 443,913,502 | 14,554 | 871 |
CVE-2019-19625 | 2019-12-06T16:15:11.247 | SROS 2 0.8.1 (which provides the tools that generate and distribute keys for Robot Operating System 2 and uses the underlying security plugins of DDS from ROS 2) leaks node information due to a leaky default configuration as indicated in the policy/defaults/dds/governance.xml document. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/issues/922"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ros2/sros2/pull/171"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ros:sros2:0.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E2332494-1342-4DDB-8C8F-FC27B3292728",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"200"
] | 200 | https://github.com/aliasrobotics/RVD/issues/922 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"aliasrobotics",
"RVD"
] | ```yaml
cve: CVE-2019-19625
cwe: CWE-200 (Information Exposure)
description: We found that SROS 2, the tools to generate and distribute keys for ROS
2 and use the underlying security plugins of DDS from ROS 2 leak node information
due to a leaky default configuration as inidicated at https://github.com/ros2/sr... | RVD#922: SROS2 leaks node information | https://api.github.com/repos/aliasrobotics/RVD/issues/922/comments | 2 | 2019-12-05T21:44:23Z | 2020-06-23T14:25:37Z | https://github.com/aliasrobotics/RVD/issues/922 | 533,616,302 | 922 | 872 |
CVE-2019-19627 | 2019-12-06T16:15:11.357 | SROS 2 0.8.1 (after CVE-2019-19625 is mitigated) leaks ROS 2 node-related information regardless of the rtps_protection_kind configuration. (SROS2 provides the tools to generate and distribute keys for Robot Operating System 2 and uses the underlying security plugins of DDS from ROS 2.) | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://asciinema.org/a/yuGkBlaPC33wqL4qABRlgxBkd"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/issues/922"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ros:sros2:0.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E2332494-1342-4DDB-8C8F-FC27B3292728",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"200"
] | 200 | https://github.com/ros2/sros2/issues/172 | [
"Third Party Advisory"
] | github.com | [
"ros2",
"sros2"
] | ## Bug report
Connected to https://github.com/ros2/sros2/pull/171/files. After this patch one wold expect that node information isn't disclosed anymore but testing led to a different result. I'm not that experienced with `sros2` at this point so I might be missing something? Ping to @mikaelarguedas and @ruffsl.
... | SROS2 leaks node information, regardless of rtps_protection_kind setup | https://api.github.com/repos/ros2/sros2/issues/172/comments | 4 | 2019-12-06T10:08:16Z | 2020-02-13T22:26:42Z | https://github.com/ros2/sros2/issues/172 | 533,865,650 | 172 | 873 |
CVE-2019-19630 | 2019-12-08T02:15:10.030 | HTMLDOC 1.9.7 allows a stack-based buffer overflow in the hd_strlcpy() function in string.c (when called from render_contents in ps-pdf.cxx) via a crafted HTML document. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/michaelrsweet/htmldoc/issues/370"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "htt... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:htmldoc_project:htmldoc:1.9.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FB9F993E-D4F5-4ED1-B93C-71EAEFFFF408",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"787"
] | 787 | https://github.com/michaelrsweet/htmldoc/issues/370 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"michaelrsweet",
"htmldoc"
] | Hi,
While fuzzing htmldoc with Honggfuzz, I found a stack-based buffer overflow in the hd_strlcpy() function, in string.c.
Attaching a reproducer (gzipped so GitHub accepts it): [test01.html.gz](https://github.com/michaelrsweet/htmldoc/files/3933370/test01.html.gz)
Issue can be reproduced by running:
```
... | Stack-based buffer overflow in the hd_strlcpy() function | https://api.github.com/repos/michaelrsweet/htmldoc/issues/370/comments | 4 | 2019-12-06T17:57:51Z | 2019-12-08T19:02:42Z | https://github.com/michaelrsweet/htmldoc/issues/370 | 534,181,098 | 370 | 874 |
CVE-2019-19635 | 2019-12-08T03:15:10.897 | An issue was discovered in libsixel 1.8.2. There is a heap-based buffer overflow in the function sixel_decode_raw_impl at fromsixel.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/saitoha/libsixel/issues/103"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/saitoha/libsixel/issues/103"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"787"
] | 787 | https://github.com/saitoha/libsixel/issues/103 | [
"Third Party Advisory"
] | github.com | [
"saitoha",
"libsixel"
] | # libsixel
## version
libsixel 1.8.2
## description
```txt
None
```
## download link
None
## others
please send email to teamseri0us360@gmail.com if you have any questions.
---------------------
## sixel_decode_raw_impl@fromsixel.c:608-41___heap-buffer-overflow
### descr... | A heap-buffer-overflow in function sixel_decode_raw_impl at fromsixel.c:608-4, due to integer overflow | https://api.github.com/repos/saitoha/libsixel/issues/103/comments | 2 | 2019-12-02T10:49:48Z | 2019-12-17T12:05:50Z | https://github.com/saitoha/libsixel/issues/103 | 531,046,092 | 103 | 875 |
CVE-2019-19636 | 2019-12-08T03:15:10.973 | An issue was discovered in libsixel 1.8.2. There is an integer overflow in the function sixel_encode_body at tosixel.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/saitoha/libsixel/issues/104"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/saitoha/libsixel/issues/104"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"190"
] | 190 | https://github.com/saitoha/libsixel/issues/104 | [
"Third Party Advisory"
] | github.com | [
"saitoha",
"libsixel"
] | # libsixel
## version
libsixel 1.8.2
## description
```txt
None
```
## download link
None
## others
please send email to teamseri0us360@gmail.com if you have any questions.
---------------------
## sixel_encode_body@tosixel.c:562-38___SEGV_UNKNOW
### description
An ... | An integer overflow in function sixel_encode_body at tosixel.c:562-38 | https://api.github.com/repos/saitoha/libsixel/issues/104/comments | 2 | 2019-12-02T10:51:14Z | 2019-12-17T12:05:34Z | https://github.com/saitoha/libsixel/issues/104 | 531,046,886 | 104 | 876 |
CVE-2019-19637 | 2019-12-08T03:15:11.020 | An issue was discovered in libsixel 1.8.2. There is an integer overflow in the function sixel_decode_raw_impl at fromsixel.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/saitoha/libsixel/issues/105"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/saitoha/libsixel/issues/105"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"190"
] | 190 | https://github.com/saitoha/libsixel/issues/105 | [
"Third Party Advisory"
] | github.com | [
"saitoha",
"libsixel"
] | # libsixel
## version
libsixel 1.8.2
## description
```txt
None
```
## download link
None
## others
please send email to teamseri0us360@gmail.com if you have any questions.
---------------------
## sixel_decode_raw_impl@fromsixel.c:650_integer_overflow
### description
... | An integer overflow in function sixel_decode_raw_impl at fromsixel.c:650 | https://api.github.com/repos/saitoha/libsixel/issues/105/comments | 2 | 2019-12-02T10:52:00Z | 2019-12-17T12:05:12Z | https://github.com/saitoha/libsixel/issues/105 | 531,047,331 | 105 | 877 |
CVE-2019-19647 | 2019-12-09T01:15:10.280 | radare2 through 4.0.0 lacks validation of the content variable in the function r_asm_pseudo_incbin at libr/asm/asm.c, ultimately leading to an arbitrary write. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted input. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/radareorg/radare2/issues/15545"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraprojec... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6F2CC41D-F155-4528-AB57-DD94A54A0CE4",
"versionEndExcluding": null,
"versionEndIncluding": "4.0.0",
"versionStartExcludin... | [
"476"
] | 476 | https://github.com/radareorg/radare2/issues/15545 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"radareorg",
"radare2"
] | ### Work environment
| Questions | Answers
|------------------------------------------------------|--------------------
| OS/arch/bits (mandatory) | Ubuntu x86 64
| File format of the file you reverse (mandatory) | None
| Architecture/bi... | Lack of Validation Check for `r_asm_pseudo_incbin` at `libr/asm/asm.c` | https://api.github.com/repos/radareorg/radare2/issues/15545/comments | 1 | 2019-12-06T07:49:36Z | 2019-12-15T22:38:41Z | https://github.com/radareorg/radare2/issues/15545 | 533,802,860 | 15,545 | 879 |
CVE-2019-19648 | 2019-12-09T01:15:10.357 | In the macho_parse_file functionality in macho/macho.c of YARA 3.11.0, command_size may be inconsistent with the real size. A specially crafted MachO file can cause an out-of-bounds memory access, resulting in Denial of Service (application crash) or potential code execution. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/VirusTotal/yara/issues/1178"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.o... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:virustotal:yara:3.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "632E7FAC-875C-4A8F-8629-FDE518400BF0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"125"
] | 125 | https://github.com/VirusTotal/yara/issues/1178 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"VirusTotal",
"yara"
] | In [libyara/modules/macho/macho.c](https://github.com/VirusTotal/yara/blob/master/libyara/modules/macho/macho.c), yara doesn't check whether the variable [command_size](https://github.com/VirusTotal/yara/blob/master/libyara/modules/macho/macho.c#L370) is consistent with the command's real size. A crafted MachO file wil... | Out-of-Bounds Memory Access in macho module | https://api.github.com/repos/VirusTotal/yara/issues/1178/comments | 5 | 2019-12-08T08:50:29Z | 2021-12-22T21:11:54Z | https://github.com/VirusTotal/yara/issues/1178 | 534,511,077 | 1,178 | 880 |
CVE-2019-19698 | 2019-12-10T07:15:11.210 | marc-q libwav through 2017-04-20 has a NULL pointer dereference in wav_content_read() at libwav.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/marc-q/libwav/issues/25"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/xiaoxiongwang/security... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libwav_project:libwav:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0B1ADCA2-142E-4BE6-997F-4549F987C0E1",
"versionEndExcluding": null,
"versionEndIncluding": "2017-04-20",
"versionS... | [
"476"
] | 476 | https://github.com/marc-q/libwav/issues/25 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"marc-q",
"libwav"
] | # SEGV in function wav_content_read in libwav.c
Tested in Ubuntu 14.04, 32bit
I use the [file](https://github.com/xiaoxiongwang/security/blob/master/libwav/wav_gain_crash_SEGV_wav_content_read.wav) and the following command:
```shell
./wav_gain wav_gain_crash_SEGV_wav_content_read.wav test.wav
```
and get... | SEGV in function wav_content_read in libwav.c | https://api.github.com/repos/marc-q/libwav/issues/25/comments | 1 | 2019-10-24T07:14:38Z | 2020-03-06T16:21:50Z | https://github.com/marc-q/libwav/issues/25 | 511,754,019 | 25 | 881 |
CVE-2019-19702 | 2019-12-10T20:15:17.497 | The modoboa-dmarc plugin 1.1.0 for Modoboa is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this to perform a denial of service against the DMARC reporting functionality, such as by referencing the /dev/random file within XML documents that are ema... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/modoboa/modoboa-dmarc/issues/38"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:modoboa:modoboa-dmarc:1.1.0:*:*:*:*:modoboa:*:*",
"matchCriteriaId": "18B12094-EDD2-4119-AB3A-ED7F2980E88A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | [
"611"
] | 611 | https://github.com/modoboa/modoboa-dmarc/issues/38 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"modoboa",
"modoboa-dmarc"
] | <h2>Background</h2>
XXE Injection is a type of attack against an application that parses XML input. By default, many XML processors allow specification of an external entity, a URI that is dereferenced
and evaluated during XML processing. When an XML document is being parsed, the parser can make a request and inc... | XML External Entity (XXE) Injection during import of aggregated report | https://api.github.com/repos/modoboa/modoboa-dmarc/issues/38/comments | 3 | 2019-11-25T22:32:21Z | 2020-03-02T08:35:57Z | https://github.com/modoboa/modoboa-dmarc/issues/38 | 528,376,022 | 38 | 882 |
CVE-2019-19703 | 2019-12-10T20:15:17.577 | In Ktor through 1.2.6, the client resends data from the HTTP Authorization header to a redirect location. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ktorio/ktor/issues/1467"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jetbrains:ktor:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AFA330B1-67DD-4292-A909-1A6373D9D0EE",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.6",
"versionStartExcludin... | [
"601"
] | 601 | https://github.com/ktorio/ktor/issues/1467 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ktorio",
"ktor"
] | **Ktor Version and Engine Used**
Ktor HTTP client 1.2.5 with Apache engine.
**Describe the bug**
Enable `followRedirects` for http client and send request with auth data to the host `https://foo/redirect` which redirects to the host `https://bar` with auth data from host `foo`.
**To Reproduce**
Steps to repr... | Ktor client resends auth data to redirect location | https://api.github.com/repos/ktorio/ktor/issues/1467/comments | 1 | 2019-11-29T11:37:32Z | 2019-12-11T13:09:36Z | https://github.com/ktorio/ktor/issues/1467 | 530,301,344 | 1,467 | 883 |
CVE-2019-19720 | 2019-12-11T04:15:10.667 | Yabasic 2.86.1 has a heap-based buffer overflow in the yylex() function in flex.c via a crafted BASIC source file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "http://www.yabasic.de/whatsnew.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/marcIhm/yabasic/issues/36"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yabasic:yabasic:2.86.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4D67B1F9-F159-487B-B234-1DDE353D7013",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"787"
] | 787 | https://github.com/marcIhm/yabasic/issues/36 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"marcIhm",
"yabasic"
] | Hi,
While fuzzing yabasic 2.86.1 with Honggfuzz, I found a heap-based buffer overflow in the yylex() function, in flex.c.
Attaching a reproducer (gzipped so GitHub accepts it): [test01.yab.gz](https://github.com/marcIhm/yabasic/files/3944942/test01.yab.gz)
Issue can be reproduced by running:
```
yabasic te... | Heap-based buffer overflow in the yylex() function | https://api.github.com/repos/marcIhm/yabasic/issues/36/comments | 5 | 2019-12-10T13:08:41Z | 2019-12-15T18:10:35Z | https://github.com/marcIhm/yabasic/issues/36 | 535,719,373 | 36 | 884 |
CVE-2019-18960 | 2019-12-11T13:15:11.827 | Firecracker vsock implementation buffer overflow in versions 0.18.0 and 0.19.0. This can result in potentially exploitable crashes. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2019/12/10/1"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwal... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:amazon:firecracker:0.18.0:*:*:*:*:*:*:*",
"matchCriteriaId": "27A5DF1A-483D-4FD6-BA01-8E96052DBD35",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"120"
] | 120 | https://github.com/firecracker-microvm/firecracker/issues/1462 | [
"Third Party Advisory"
] | github.com | [
"firecracker-microvm",
"firecracker"
] | We have identified an issue in the Firecracker v0.18.0 and v0.19.0 vsock implementation.
### Issue Description
A logical error in bounds checking performed on vsock virtio descriptors can be used by a malicious guest to read from and write to a segment of the host-side Firecracker process' heap address space, direc... | Firecracker vsock implementation buffer overflow in versions v0.18.0 and v0.19.0 that can result in potentially exploitable crashes. | https://api.github.com/repos/firecracker-microvm/firecracker/issues/1462/comments | 1 | 2019-12-09T22:22:37Z | 2019-12-12T11:07:18Z | https://github.com/firecracker-microvm/firecracker/issues/1462 | 535,373,916 | 1,462 | 885 |
CVE-2019-19725 | 2019-12-11T18:16:20.053 | sysstat through 12.2.0 has a double free in check_file_actlst in sa_common.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/sysstat/sysstat/issues/242"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://l... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sysstat_project:sysstat:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B526E161-4710-45B6-A241-FC3D68E30BD3",
"versionEndExcluding": null,
"versionEndIncluding": "12.2.0",
"versionSta... | [
"415"
] | 415 | https://github.com/sysstat/sysstat/issues/242 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"sysstat",
"sysstat"
] | When I run a sadf utility with [the stat file](https://gist.github.com/RKX1209/b962907a46d5f8b11d456b69008d0118/raw/89d4b9c53a9248bf5dad71d8fff21c1306d9145c/dfree_sysstat.in), it leads double free bug in check_file_actlst().
```
$ ./sadf dfree_sysstat.in
skip_extra_struct: extra_size=0 types=0,16777216,128
======... | Double free in check_file_actlst() | https://api.github.com/repos/sysstat/sysstat/issues/242/comments | 1 | 2019-12-09T09:54:32Z | 2019-12-09T16:55:34Z | https://github.com/sysstat/sysstat/issues/242 | 534,812,824 | 242 | 886 |
CVE-2019-19729 | 2019-12-11T20:15:11.100 | An issue was discovered in the BSON ObjectID (aka bson-objectid) package 1.3.0 for Node.js. ObjectID() allows an attacker to generate a malformed objectid by inserting an additional property to the user-input, because bson-objectid will return early if it detects _bsontype==ObjectID in the user-input object. As a resul... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/williamkapke/bson-objectid/issues/30"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://www.npmjs.com/package/bson-objectid"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bson-objectid_project:bson-objectid:1.3.0:*:*:*:*:node.js:*:*",
"matchCriteriaId": "B520A955-921F-4EA4-9E4D-DC9ED042DBED",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"670"
] | 670 | https://github.com/williamkapke/bson-objectid/issues/30 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"williamkapke",
"bson-objectid"
] | We found that ObjectID() allows an attacker to generate a malformed objectid by inserting an additional property to his user-input.
The vulnerable code is as follows: bson-objectid will return early if it detects _bsontype == ObjectID in user-input object. As a result, objects in arbitrary forms can bypass formatti... | A vulnerability in ObjectID() | https://api.github.com/repos/cabinjs/bson-objectid/issues/30/comments | 11 | 2019-12-07T21:03:35Z | 2020-11-23T14:22:38Z | https://github.com/cabinjs/bson-objectid/issues/30 | 534,452,549 | 30 | 887 |
CVE-2019-19766 | 2019-12-12T19:15:21.030 | The Bitwarden server through 1.32.0 has a potentially unwanted KDF. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/bitwarden/jslib/issues/52"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/bitwarden/server/issues/589"
},
{
"source": "a... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bitwarden:server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AF9E422B-8B9D-4EFE-B242-1312807280F9",
"versionEndExcluding": null,
"versionEndIncluding": "1.32.0",
"versionStartExclu... | [
"916"
] | 916 | https://github.com/bitwarden/jslib/issues/52 | [
"Third Party Advisory"
] | github.com | [
"bitwarden",
"jslib"
] | https://github.com/bitwarden/jslib/blob/cd46f64993545a1cb772e2f6a2137a675554f3c3/src/enums/kdfType.ts
It looks like the only supported choice for a PBKDF is SHA256. This is possibly the worst choice available for a password-based KDF, as a PBKDF should be relatively slow, and SHA256 is perhaps practically the faste... | SHA256 is a terrible choice for a PBKDF in 2019. | https://api.github.com/repos/bitwarden/jslib/issues/52/comments | 34 | 2019-10-31T14:31:41Z | 2022-04-12T19:52:10Z | https://github.com/bitwarden/jslib/issues/52 | 515,480,136 | 52 | 889 |
CVE-2019-19766 | 2019-12-12T19:15:21.030 | The Bitwarden server through 1.32.0 has a potentially unwanted KDF. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/bitwarden/jslib/issues/52"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/bitwarden/server/issues/589"
},
{
"source": "a... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bitwarden:server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AF9E422B-8B9D-4EFE-B242-1312807280F9",
"versionEndExcluding": null,
"versionEndIncluding": "1.32.0",
"versionStartExclu... | [
"916"
] | 916 | https://github.com/bitwarden/server/issues/589 | [
"Third Party Advisory"
] | github.com | [
"bitwarden",
"server"
] | https://github.com/bitwarden/server/blob/da5c385d4af3cb6707b473cf89963c190a6e44f9/src/Core/Models/Api/Request/Accounts/KdfRequestModel.cs#L22
From https://github.com/bitwarden/jslib/issues/52 :
> However, that workaround is specifically prohibited by Bitwarden, restricting it to 2M iterations. Modern SHA256 hardw... | Security Issue: KDF max iterations is too low | https://api.github.com/repos/bitwarden/server/issues/589/comments | 31 | 2019-11-01T13:55:38Z | 2023-01-31T08:01:13Z | https://github.com/bitwarden/server/issues/589 | 516,127,468 | 589 | 890 |
CVE-2019-19777 | 2019-12-13T02:15:10.893 | stb_image.h (aka the stb image loader) 2.23, as used in libsixel and other products, has a heap-based buffer over-read in stbi__load_main. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/saitoha/libsixel/issues/109"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"125"
] | 125 | https://github.com/saitoha/libsixel/issues/109 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"saitoha",
"libsixel"
] | version : img2sixel 1.8.2
There is a heap-buffer-overflow in stbi__load_main at stb_image.h:5580
please run following cmd to reproduce it.
```
img2sixel --monochrome $PoC
```
[poc](https://drive.google.com/file/d/1KHIYy8gfuMFHKVyb_dpOPVKSpPVeikUK/view?usp=sharing)
ASAN LOG
```
==9030==ERROR: AddressSanitize... | heap-buffer-overflow in stbi__load_main at stb_image.h:5580 | https://api.github.com/repos/saitoha/libsixel/issues/109/comments | 3 | 2019-12-12T14:03:22Z | 2019-12-18T05:20:36Z | https://github.com/saitoha/libsixel/issues/109 | 536,997,354 | 109 | 891 |
CVE-2019-19778 | 2019-12-13T02:15:10.940 | An issue was discovered in libsixel 1.8.2. There is a heap-based buffer over-read in the function load_sixel at loader.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/saitoha/libsixel/issues/110"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"125"
] | 125 | https://github.com/saitoha/libsixel/issues/110 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"saitoha",
"libsixel"
] | version : img2sixel 1.8.2
There is a heap-buffer-overflow in load_sixel at loader.c:629
please run following cmd to reproduce it.
```
img2sixel --high-color $PoC
```
[poc](https://drive.google.com/file/d/1siMEF20AcBJhV_RDuNrgnHZz5EvYlGMT/view?usp=sharing)
ASAN LOG
```
==36913==ERROR: AddressSanitizer: heap-b... | heap-buffer-overflow in load_sixel at loader.c:629 | https://api.github.com/repos/saitoha/libsixel/issues/110/comments | 2 | 2019-12-12T15:11:41Z | 2019-12-15T15:40:23Z | https://github.com/saitoha/libsixel/issues/110 | 537,037,845 | 110 | 892 |
CVE-2019-17599 | 2019-12-13T14:15:12.297 | The quiz-master-next (aka Quiz And Survey Master) plugin before 6.3.5 for WordPress is affected by: Cross Site Scripting (XSS). The impact is: Allows an attacker to execute arbitrary HTML and JavaScript code via the from or till parameter (and/or the quiz_id parameter). The component is: admin/quiz-options-page.php. Th... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/QuizandSurveyMaster/quiz_master_next/issues/795"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/QuizandSurveyMa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:expresstech:quiz_and_survey_master:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "2B1BF849-9385-4CBF-9209-21A237DBF005",
"versionEndExcluding": "6.3.5",
"versionEndIncluding": null,
... | [
"79"
] | 79 | https://github.com/QuizandSurveyMaster/quiz_master_next/issues/795 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"QuizandSurveyMaster",
"quiz_master_next"
] | **IF YOU DO NOT FOLLOW THIS TEMPLATE, YOUR ISSUE MAY BE CLOSED!!**
Please provide the following information when creating your issues:
## Site Info
WordPress Version: Latest
QSM Version: 6.3.3 and 6.3.4
Browser: chrome 78.0.3904.87
## General description
Quiz And Survey Master – Best Quiz Plugin for WordPr... | report reflected xss vulnerability | https://api.github.com/repos/QuizandSurveyMaster/quiz_master_next/issues/795/comments | 4 | 2019-11-13T07:45:25Z | 2019-11-21T08:42:20Z | https://github.com/QuizandSurveyMaster/quiz_master_next/issues/795 | 522,018,302 | 795 | 893 |
CVE-2019-19794 | 2019-12-13T22:15:11.357 | The miekg Go DNS package before 1.1.25, as used in CoreDNS before 1.6.6 and other products, improperly generates random numbers because math/rand is used. The TXID becomes predictable, leading to response forgeries. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/coredns/coredns/issues/3519"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/coredns/coredns/issues/3547"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:miekg-dns_project:miekg-dns:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0F0F7709-230B-4274-AF38-B3704AD451AB",
"versionEndExcluding": "1.1.25",
"versionEndIncluding": null,
"versio... | [
"338"
] | 338 | https://github.com/coredns/coredns/issues/3519 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"coredns",
"coredns"
] | This issue is to keep track of 1.6.6 release. Specifically we want to update the https://github.com/miekg/dns that carries https://github.com/miekg/dns/pull/1044
/cc @miekg | CoreDNS 1.6.6 Release Tracking | https://api.github.com/repos/coredns/coredns/issues/3519/comments | 11 | 2019-12-08T16:31:44Z | 2019-12-13T11:28:31Z | https://github.com/coredns/coredns/issues/3519 | 534,566,228 | 3,519 | 894 |
CVE-2019-19794 | 2019-12-13T22:15:11.357 | The miekg Go DNS package before 1.1.25, as used in CoreDNS before 1.6.6 and other products, improperly generates random numbers because math/rand is used. The TXID becomes predictable, leading to response forgeries. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/coredns/coredns/issues/3519"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/coredns/coredns/issues/3547"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:miekg-dns_project:miekg-dns:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0F0F7709-230B-4274-AF38-B3704AD451AB",
"versionEndExcluding": "1.1.25",
"versionEndIncluding": null,
"versio... | [
"338"
] | 338 | https://github.com/coredns/coredns/issues/3547 | [
"Third Party Advisory"
] | github.com | [
"coredns",
"coredns"
] | This is a public announcement of a security vulnerability discovered in earlier versions of CoreDNS before v1.6.6:
https://nvd.nist.gov/vuln/detail/CVE-2019-19794
As was mentioned in CVE-2019-19794, one of the upstream library miekg/dns used Golang's `math/rand`. This causes predictable TXID and may allow cache ... | [Security] CVE-2019-19794 | https://api.github.com/repos/coredns/coredns/issues/3547/comments | 9 | 2019-12-16T21:18:11Z | 2020-01-03T22:00:35Z | https://github.com/coredns/coredns/issues/3547 | 538,665,274 | 3,547 | 895 |
CVE-2019-19794 | 2019-12-13T22:15:11.357 | The miekg Go DNS package before 1.1.25, as used in CoreDNS before 1.6.6 and other products, improperly generates random numbers because math/rand is used. The TXID becomes predictable, leading to response forgeries. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/coredns/coredns/issues/3519"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/coredns/coredns/issues/3547"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:miekg-dns_project:miekg-dns:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0F0F7709-230B-4274-AF38-B3704AD451AB",
"versionEndExcluding": "1.1.25",
"versionEndIncluding": null,
"versio... | [
"338"
] | 338 | https://github.com/miekg/dns/issues/1043 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"miekg",
"dns"
] | The default `Id` function uses math/rand, meaning the outputs are predictable, and an attacker might be able to use this to forge responses without being on path.
Seeding math/rand from crypto/rand is pointless, as the math/rand algorithm is invertible: given a sequence of outputs it's possible to reconstruct the `R... | [security] Predictable TXID can lead to response forgeries | https://api.github.com/repos/miekg/dns/issues/1043/comments | 1 | 2019-12-05T19:08:46Z | 2019-12-11T07:31:10Z | https://github.com/miekg/dns/issues/1043 | 533,538,848 | 1,043 | 896 |
CVE-2019-19795 | 2019-12-13T22:15:11.437 | samurai 0.7 has a heap-based buffer overflow in canonpath in util.c via a crafted build file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/michaelforney/samurai/issues/29"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Thi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:samurai_project:samurai:0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "154461A0-FE5B-41BF-B22E-FCE41E3A4827",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"787"
] | 787 | https://github.com/michaelforney/samurai/issues/29 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"michaelforney",
"samurai"
] | Hi,
While fuzzing samurai 0.7 with American Fuzzy Lop, I found a heap-based buffer overflow in the canonpath() function, in util.c.
Attaching a reproducer (gzipped so GitHub accepts it): [test01.gz](https://github.com/michaelforney/samurai/files/3962091/test01.gz)
Issue can be reproduced by running:
```
... | Heap-based buffer overflow in the canonpath() function | https://api.github.com/repos/michaelforney/samurai/issues/29/comments | 5 | 2019-12-13T18:05:45Z | 2019-12-14T10:08:38Z | https://github.com/michaelforney/samurai/issues/29 | 537,691,130 | 29 | 897 |
CVE-2019-19796 | 2019-12-13T22:15:11.497 | Yabasic 2.86.2 has a heap-based buffer overflow in myformat in function.c via a crafted BASIC source file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/marcIhm/yabasic/issues/37"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Par... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yabasic:yabasic:2.86.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DD965673-7B4A-40E1-BEF2-D1CB8DCDF35F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"787"
] | 787 | https://github.com/marcIhm/yabasic/issues/37 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"marcIhm",
"yabasic"
] | Hi,
While fuzzing yabasic 2.86.2 with Honggfuzz, I found a heap-based buffer overflow in the myformat() function, in function.c.
Attaching a reproducer (gzipped so GitHub accepts it): [test02.yab.gz](https://github.com/marcIhm/yabasic/files/3962433/test02.yab.gz)
Issue can be reproduced by running:
```
y... | Heap-based buffer overflow in the myformat() function | https://api.github.com/repos/marcIhm/yabasic/issues/37/comments | 2 | 2019-12-13T19:41:08Z | 2019-12-17T10:37:35Z | https://github.com/marcIhm/yabasic/issues/37 | 537,739,601 | 37 | 898 |
CVE-2019-10773 | 2019-12-16T20:15:14.477 | In Yarn before 1.21.1, the package install functionality can be abused to generate arbitrary symlinks on the host filesystem by using specially crafted "bin" keys. Existing files could be overwritten depending on the current user permission set. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "report@snyk.io",
"tags": null,
"url": "https://access.redhat.com/errata/RHSA-2020:0475"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://blog.daniel-ruf.de/critical-design-flaw-npm-pnpm-yarn/"
},
{
"sourc... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yarnpkg:yarn:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6AD33651-1103-4375-8BCF-983DBCDF6470",
"versionEndExcluding": "1.21.1",
"versionEndIncluding": null,
"versionStartExcluding... | [
"59"
] | 59 | https://github.com/yarnpkg/yarn/issues/7761#issuecomment-565493023 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"yarnpkg",
"yarn"
] | <!-- *Before creating an issue please make sure you are using the latest version of yarn.* -->
npm has announced vulnerabilities that npm has been fixed.
https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli
One of the vulnerabilities has been fixed at yarn v1.12.1. Thank you! 👏👏👏
But ... | globally-installed package overwrites an existing binary in the target install location | https://api.github.com/repos/yarnpkg/yarn/issues/7761/comments | 9 | 2019-12-12T08:13:35Z | 2020-09-04T18:06:48Z | https://github.com/yarnpkg/yarn/issues/7761 | 536,820,897 | 7,761 | 899 |
CVE-2019-19847 | 2019-12-17T16:15:14.733 | Libspiro through 20190731 has a stack-based buffer overflow in the spiro_to_bpath0() function in spiro.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/fontforge/libspiro/issues/21"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libspiro_project:libspiro:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A1535676-284B-419A-AAAF-C0433F730B51",
"versionEndExcluding": null,
"versionEndIncluding": "20190731",
"versio... | [
"787"
] | 787 | https://github.com/fontforge/libspiro/issues/21 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"fontforge",
"libspiro"
] | Hi,
When building libspiro 20190731 with AddressSanitizer enabled and running the test suite, I found a stack-based buffer overflow in spiro_to_bpath0() in spiro.c.
In the test suite, `call-test14` to `call-test19` all trigger the same issue.
The issue can be triggered as follow:
```
./configure CFLAGS="-f... | Stack-based buffer overflow in the spiro_to_bpath0() function | https://api.github.com/repos/fontforge/libspiro/issues/21/comments | 12 | 2019-12-17T10:19:54Z | 2020-05-05T08:20:03Z | https://github.com/fontforge/libspiro/issues/21 | 538,970,632 | 21 | 900 |
CVE-2019-19887 | 2019-12-18T19:15:11.843 | bitstr_tell at bitstr.c in ffjpeg through 2019-08-21 has a NULL pointer dereference related to jfif_encode. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/rockcarry/ffjpeg/issues/14"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D9E7EB6-DB1F-4806-AFFE-531905453943",
"versionEndExcluding": null,
"versionEndIncluding": "2019-08-21",
"versionStartE... | [
"476"
] | 476 | https://github.com/rockcarry/ffjpeg/issues/14 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"rockcarry",
"ffjpeg"
] | run `ffjpeg -e poc.bmp` in linux
result in gdb.
```
Stopped reason: SIGSEGV
0x0000000000401968 in bitstr_tell (stream=0x0) at bitstr.c:221
221 int type = *(int*)stream;
gdb-peda$
```
steam is a pointer which is null in this case. Dereferencing null pointer cause segment fault.
fix:
```
long bitstr... | SegmentFault in jfif_encode at jfif.c:842 | https://api.github.com/repos/rockcarry/ffjpeg/issues/14/comments | 1 | 2019-12-17T15:58:08Z | 2020-02-24T07:35:00Z | https://github.com/rockcarry/ffjpeg/issues/14 | 539,157,799 | 14 | 901 |
CVE-2019-19888 | 2019-12-18T19:15:11.937 | jfif_decode in jfif.c in ffjpeg through 2019-08-21 has a divide-by-zero error. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/rockcarry/ffjpeg/issues/13"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D9E7EB6-DB1F-4806-AFFE-531905453943",
"versionEndExcluding": null,
"versionEndIncluding": "2019-08-21",
"versionStartE... | [
"369"
] | 369 | https://github.com/rockcarry/ffjpeg/issues/13 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"rockcarry",
"ffjpeg"
] | file: jfif.c function: jfif_decode line: 425
mcuw = sfh_max * 8;
mcuh = sfv_max * 8;
jw = ALIGN(jfif->width , mcuw);
jh = ALIGN(jfif->height, mcuh);
mcuc = jw / mcuw; <------- mcuw can be zero
mcur = jh / mcuh;
//-- calculate mcu info | Deny of Service caused by dividing zero without sanity check in jfif.c | https://api.github.com/repos/rockcarry/ffjpeg/issues/13/comments | 3 | 2019-12-17T06:48:47Z | 2020-07-27T06:47:58Z | https://github.com/rockcarry/ffjpeg/issues/13 | 538,872,327 | 13 | 902 |
CVE-2019-19899 | 2019-12-19T00:15:12.767 | Pebble Templates 3.1.2 allows attackers to bypass a protection mechanism (intended to block access to instances of java.lang.Class) because getClass is accessible via the public static java.lang.Class java.lang.Class.forName(java.lang.Module,java.lang.String) signature. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/PebbleTemplates/pebble/issues/493"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pebbletemplates:pebble_templates:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "37E9F48E-5A34-4BC3-9171-32EA356B1D9B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"v... | [
"862"
] | 862 | https://github.com/PebbleTemplates/pebble/issues/493 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"PebbleTemplates",
"pebble"
] | I was reading about https://research.securitum.com/server-side-template-injection-on-the-example-of-pebble/ and found a bypass to the fix in [454](https://github.com/PebbleTemplates/pebble/issues/454).
The following code will throw a security exception after the fix in 454:
`{{(1).TYPE.getClass()}}`
However y... | Unsafe Methods Bypass | https://api.github.com/repos/PebbleTemplates/pebble/issues/493/comments | 2 | 2019-12-18T21:59:56Z | 2020-05-21T00:20:42Z | https://github.com/PebbleTemplates/pebble/issues/493 | 539,947,665 | 493 | 903 |
CVE-2019-11780 | 2019-12-19T16:16:42.370 | Improper access control in the computed fields system of the framework of Odoo Community 13.0 and Odoo Enterprise 13.0 allows remote authenticated attackers to access sensitive information via crafted RPC requests, which could lead to privilege escalation. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"confidentialityImpact": "PARTIAL"... | [
{
"source": "security@odoo.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/42196"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:13.0:*:*:*:community:*:*:*",
"matchCriteriaId": "4CE8B4A3-0EA3-4813-A511-16FB7D2B06AF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"284"
] | 284 | https://github.com/odoo/odoo/issues/42196 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2019-10-25-1
Improper access control in the computed fields system of the framework of Odoo Community 13.0 and Odoo Enterprise 13.0 allows remote authenticated attackers to access sensitive information via crafted RPC requests, which could lead to privilege escalation.
**Affects**: Odoo ... | [SEC] ODOO-SA-2019-10-25-1 (CVE-2019-11780) - Improper access control in the computed fiel... | https://api.github.com/repos/odoo/odoo/issues/42196/comments | 0 | 2019-12-19T15:42:28Z | 2019-12-19T15:42:29Z | https://github.com/odoo/odoo/issues/42196 | 540,393,344 | 42,196 | 904 |
CVE-2019-19922 | 2019-12-22T20:15:10.823 | kernel/sched/fair.c in the Linux kernel before 5.3.9, when cpu.cfs_quota_us is used (e.g., with Kubernetes), allows attackers to cause a denial of service against non-cpu-bound applications by generating a workload that triggers unwanted slice expiration, aka CID-de53fd7aedb1. (In other words, although this slice expir... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "72AC7518-B872-42E3-A43B-F2D010211A8D",
"versionEndExcluding": "5.3.9",
"versionEndIncluding": null,
"versionStartExcl... | [
"400"
] | 400 | https://github.com/kubernetes/kubernetes/issues/67577 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | > /kind bug
This is not a bug in Kubernets per se, it's more of a heads-up.
I've read this great blog post:
* https://kubernetes.io/blog/2018/07/24/feature-highlight-cpu-manager/
From the blog post I learned that k8s is using cfs quotas to enforce CPU limits. Unfortunately, those can lead to unnecessary thr... | CFS quotas can lead to unnecessary throttling | https://api.github.com/repos/kubernetes/kubernetes/issues/67577/comments | 146 | 2018-08-20T04:06:20Z | 2023-01-16T14:53:22Z | https://github.com/kubernetes/kubernetes/issues/67577 | 351,978,078 | 67,577 | 907 |
CVE-2019-19930 | 2019-12-23T03:15:12.070 | In libIEC61850 1.4.0, MmsValue_newOctetString in mms/iso_mms/common/mms_value.c has an integer signedness error that can lead to an attempted excessive memory allocation. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/mz-automation/libiec61850/issues/193"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mz-automation:libiec61850:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6F82EDC5-C42C-4EED-A04D-D27F75F61D21",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"190"
] | 190 | https://github.com/mz-automation/libiec61850/issues/193 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"mz-automation",
"libiec61850"
] | Function `MmsValue_newOctetString` didn't check argument maxSize if it's negative. If it is a negative number, then argument which malloc will use later is a huge number. For example -1 would be interpreted as 0xffffffff on 32 bit arch or 0xffffffffffffffff on 64 bit arch.
<img width="629" alt="Screen Shot 2019-12-20 ... | Deny of Service, caused by integer overflow in function MmsValue_newOctetString mms/iso_mms/common/mms_value.c:1324 | https://api.github.com/repos/mz-automation/libiec61850/issues/193/comments | 1 | 2019-12-20T13:37:27Z | 2020-01-04T15:29:36Z | https://github.com/mz-automation/libiec61850/issues/193 | 540,998,941 | 193 | 908 |
CVE-2019-19931 | 2019-12-23T03:15:12.147 | In libIEC61850 1.4.0, MmsValue_decodeMmsData in mms/iso_mms/server/mms_access_result.c has a heap-based buffer overflow. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/mz-automation/libiec61850/issues/194"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mz-automation:libiec61850:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6F82EDC5-C42C-4EED-A04D-D27F75F61D21",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"787"
] | 787 | https://github.com/mz-automation/libiec61850/issues/194 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"mz-automation",
"libiec61850"
] | Function `MmsValue_decodeMmsData` has heap overflow vulnerability in file mms/iso_mms/server/mms_access_result.c.
<img width="639" alt="Screen Shot 2019-12-20 at 9 48 22 PM" src="https://user-images.githubusercontent.com/20929895/71259266-04fb2300-2373-11ea-8086-8389fc3e4d6f.png">
poc:
[poc.zip](https://github.c... | Heap overflow in function MmsValue_decodeMmsData mms/iso_mms/server/mms_access_result.c:238 | https://api.github.com/repos/mz-automation/libiec61850/issues/194/comments | 0 | 2019-12-20T13:55:52Z | 2020-01-04T15:00:40Z | https://github.com/mz-automation/libiec61850/issues/194 | 541,007,177 | 194 | 909 |
CVE-2019-19944 | 2019-12-23T19:15:11.497 | In libIEC61850 1.4.0, BerDecoder_decodeUint32 in mms/asn1/ber_decode.c has an out-of-bounds read, related to intLen and bufPos. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/mz-automation/libiec61850/issues/196"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mz-automation:libiec61850:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6F82EDC5-C42C-4EED-A04D-D27F75F61D21",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"125"
] | 125 | https://github.com/mz-automation/libiec61850/issues/196 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"mz-automation",
"libiec61850"
] | BerDecoder_decodeUint32 in src/mms/asn1/ber_decode.c doesn't check passed arguments.
`intLen` and `bufPos` can be large number, so following memory access `buffer[bufPos+i]` would segment fault.
<img width="540" alt="Screen Shot 2019-12-23 at 3 11 34 PM" src="https://user-images.githubusercontent.com/20929895/7134... | Deny of service caused in function BerDecoder_decodeUint32 in src/mms/asn1/ber_decode.c | https://api.github.com/repos/mz-automation/libiec61850/issues/196/comments | 2 | 2019-12-23T07:20:53Z | 2020-03-03T15:01:49Z | https://github.com/mz-automation/libiec61850/issues/196 | 541,616,205 | 196 | 910 |
CVE-2019-19948 | 2019-12-24T01:15:11.247 | In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer overflow in the function WriteSGIImage of coders/sgi.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00006.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-43:q16:*:*:*:*:*:*",
"matchCriteriaId": "2EDF50C4-9FFE-4EBF-A5BE-44AF7E6988D9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | [
"787"
] | 787 | https://github.com/ImageMagick/ImageMagick/issues/1562 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [X] I have written a descriptive issue title
- [X] I have verified that I am using the latest version of ImageMagick
- [X] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | heap-buffer-overflow in WriteSGIImage of coders/sgi.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1562/comments | 2 | 2019-04-29T03:08:25Z | 2020-02-07T01:34:56Z | https://github.com/ImageMagick/ImageMagick/issues/1562 | 438,134,907 | 1,562 | 911 |
CVE-2019-19949 | 2019-12-24T01:15:11.327 | In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WritePNGImage of coders/png.c, related to Magick_png_write_raw_profile and LocaleNCompare. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00006.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "78819D62-25B5-4F9E-8291-2C1FD9803531",
"versionEndExcluding": "6.9.10-43",
"versionEndIncluding": null,
"version... | [
"125"
] | 125 | https://github.com/ImageMagick/ImageMagick/issues/1561 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [X] I have verified that I am using the latest version of ImageMagick
- [X] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | heap-buffer-overflow in WritePNGImage of png.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1561/comments | 3 | 2019-04-29T02:55:44Z | 2019-12-26T12:39:58Z | https://github.com/ImageMagick/ImageMagick/issues/1561 | 438,133,289 | 1,561 | 912 |
CVE-2019-19952 | 2019-12-24T01:15:11.527 | In ImageMagick 7.0.9-7 Q16, there is a use-after-free in the function MngInfoDiscardObject of coders/png.c, related to ReadOneMNGImage. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1791"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advis... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "857D548F-3DED-4D35-B2AD-4003378032DA",
"versionEndExcluding": "7.0.9-7",
"versionEndIncluding": null,
"versionSt... | [
"416"
] | 416 | https://github.com/ImageMagick/ImageMagick/issues/1791 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [X] I have written a descriptive issue title
- [X] I have verified that I am using the latest version of ImageMagick
- [X] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | heap-use-after-free in MngInfoDiscardObject of coders/png.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1791/comments | 8 | 2019-11-27T06:48:11Z | 2020-03-08T20:06:50Z | https://github.com/ImageMagick/ImageMagick/issues/1791 | 529,151,827 | 1,791 | 913 |
CVE-2019-19957 | 2019-12-24T22:15:11.247 | In libIEC61850 1.4.0, getNumberOfElements in mms/iso_mms/server/mms_access_result.c has an out-of-bounds read vulnerability, related to bufPos and elementLength. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/mz-automation/libiec61850/issues/197"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mz-automation:libiec61850:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6F82EDC5-C42C-4EED-A04D-D27F75F61D21",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"125"
] | 125 | https://github.com/mz-automation/libiec61850/issues/197 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"mz-automation",
"libiec61850"
] | There is a out bound read vulnerability in `getNumberOfElements` because `getNumberOfElements` doesn't check `bufPos`, `elementLength` arguments. So `bufPos` and `elementLength` can be very large number.
<img width="689" alt="Screen Shot 2019-12-24 at 4 45 03 PM" src="https://user-images.githubusercontent.com/209298... | SegmentFault in getNumberOfElements in src/mms/iso_mms/server/mms_access_result.c | https://api.github.com/repos/mz-automation/libiec61850/issues/197/comments | 2 | 2019-12-24T08:51:15Z | 2020-03-03T15:02:51Z | https://github.com/mz-automation/libiec61850/issues/197 | 542,050,001 | 197 | 914 |
CVE-2019-19999 | 2019-12-26T04:15:10.923 | Halo before 1.2.0-beta.1 allows Server Side Template Injection (SSTI) because TemplateClassResolver.SAFER_RESOLVER is not used in the FreeMarker configuration. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/halo-dev/halo/compare/v1.1.3-beta.2...v1.2.0-beta.1"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:halo:halo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DD55ABB0-278F-4658-A126-C9D20F58B59E",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.1",
"versionStartExcluding": n... | [
"918"
] | 918 | https://github.com/halo-dev/halo/issues/419 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"halo-dev",
"halo"
] | <!--
如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。
提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way
-->
**I am sure I have checked**
- [x] [Halo User Guide Documentation ](https://halo.run/docs)
- [x] [Halo BBS](https://bbs.halo.run)
- [x] [Github Wiki ](https://github.com/halo-dev/halo/wiki/4.-%... | A Server-Side Freemarker template injection vulnerability could cause remote command execution | https://api.github.com/repos/halo-dev/halo/issues/419/comments | 1 | 2019-12-11T10:44:41Z | 2019-12-12T17:27:08Z | https://github.com/halo-dev/halo/issues/419 | 536,287,817 | 419 | 916 |
CVE-2019-19999 | 2019-12-26T04:15:10.923 | Halo before 1.2.0-beta.1 allows Server Side Template Injection (SSTI) because TemplateClassResolver.SAFER_RESOLVER is not used in the FreeMarker configuration. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/halo-dev/halo/compare/v1.1.3-beta.2...v1.2.0-beta.1"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:halo:halo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DD55ABB0-278F-4658-A126-C9D20F58B59E",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.1",
"versionStartExcluding": n... | [
"918"
] | 918 | https://github.com/halo-dev/halo/issues/440 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"halo-dev",
"halo"
] | <!--
如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。
提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way
-->
**我确定我已经查看了** (标注`[ ]`为`[x]`)
- [ ] [Halo 使用文档](https://halo.run/docs)
- [ ] [Halo 论坛](https://bbs.halo.run)
- [ ] [Github Wiki 常见问题](https://github.com/halo-dev/halo/wiki/4.-%E5%B8%B8%E8%A7%8... | unsafe template file permissions edit cause Server Side Template Injection(SSTI) | https://api.github.com/repos/halo-dev/halo/issues/440/comments | 6 | 2019-12-24T15:49:53Z | 2019-12-25T13:37:00Z | https://github.com/halo-dev/halo/issues/440 | 542,163,626 | 440 | 917 |
CVE-2019-20008 | 2019-12-26T23:15:11.303 | In Archery before 1.3, inserting an XSS payload into a project name (either by creating a new project or editing an existing one) will result in stored XSS on the vulnerability-scan scheduling page. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/archerysec/archerysec/compare/archerysec-v1.2...v1.3"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:archerysec:archery:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B0271FCA-9224-4601-984B-195AB0539496",
"versionEndExcluding": "1.3",
"versionEndIncluding": null,
"versionStartExclud... | [
"79"
] | 79 | https://github.com/archerysec/archerysec/issues/338 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"archerysec",
"archerysec"
] | Upon a security analysis of the platform, a stored cross site scripting vulnerability was identified on the Web and Infrastructure Scan Scheduler's project dropdown selection.
The payload is present on the project name attribute, but it is only executed upon javascript interaction by the Select2 library utilized on ... | Stored XSS on the scheduler projects list | https://api.github.com/repos/archerysec/archerysec/issues/338/comments | 4 | 2019-12-03T02:59:59Z | 2019-12-29T13:04:49Z | https://github.com/archerysec/archerysec/issues/338 | 531,680,066 | 338 | 918 |
CVE-2019-20009 | 2019-12-27T01:15:13.257 | An issue was discovered in GNU LibreDWG before 0.93. Crafted input will lead to an attempted excessive memory allocation in dwg_decode_SPLINE_private in dwg.spec. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "09B5D2C4-D4B2-4226-AA34-A346E6064FA2",
"versionEndExcluding": "0.9.3",
"versionEndIncluding": null,
"versionStartExcluding"... | [
"770"
] | 770 | https://github.com/LibreDWG/libredwg/issues/176 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hi,
After fuzzing libredwg, I found the following bugs on the latest commit on master.
Command: dwg2dxf $PoC
**1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (src/dwg.spec:1639)**
PoC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG/id:000000%2Csig:06%2Csrc:000000%2... | Several bugs found by fuzzing | https://api.github.com/repos/LibreDWG/libredwg/issues/176/comments | 24 | 2019-12-24T03:44:32Z | 2020-01-16T12:12:03Z | https://github.com/LibreDWG/libredwg/issues/176 | 541,977,765 | 176 | 919 |
CVE-2019-20009 | 2019-12-27T01:15:13.257 | An issue was discovered in GNU LibreDWG before 0.93. Crafted input will lead to an attempted excessive memory allocation in dwg_decode_SPLINE_private in dwg.spec. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "09B5D2C4-D4B2-4226-AA34-A346E6064FA2",
"versionEndExcluding": "0.9.3",
"versionEndIncluding": null,
"versionStartExcluding"... | [
"770"
] | 770 | https://github.com/LibreDWG/libredwg/issues/176#issue-541977765 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hi,
After fuzzing libredwg, I found the following bugs on the latest commit on master.
Command: dwg2dxf $PoC
**1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (src/dwg.spec:1639)**
PoC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG/id:000000%2Csig:06%2Csrc:000000%2... | Several bugs found by fuzzing | https://api.github.com/repos/LibreDWG/libredwg/issues/176/comments | 24 | 2019-12-24T03:44:32Z | 2020-01-16T12:12:03Z | https://github.com/LibreDWG/libredwg/issues/176 | 541,977,765 | 176 | 920 |
CVE-2019-20010 | 2019-12-27T01:15:13.320 | An issue was discovered in GNU LibreDWG 0.92. There is a use-after-free in resolve_objectref_vector in decode.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6967607-F26E-477A-8D60-8B0D55594EC9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"416"
] | 416 | https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643383 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hi,
After fuzzing libredwg, I found the following bugs on the latest commit on master.
Command: dwg2dxf $PoC
**1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (src/dwg.spec:1639)**
PoC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG/id:000000%2Csig:06%2Csrc:000000%2... | Several bugs found by fuzzing | https://api.github.com/repos/LibreDWG/libredwg/issues/176/comments | 24 | 2019-12-24T03:44:32Z | 2020-01-16T12:12:03Z | https://github.com/LibreDWG/libredwg/issues/176 | 541,977,765 | 176 | 921 |
CVE-2019-20011 | 2019-12-27T01:15:13.383 | An issue was discovered in GNU LibreDWG 0.92. There is a heap-based buffer over-read in decode_R13_R2000 in decode.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6967607-F26E-477A-8D60-8B0D55594EC9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"125"
] | 125 | https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643439 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hi,
After fuzzing libredwg, I found the following bugs on the latest commit on master.
Command: dwg2dxf $PoC
**1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (src/dwg.spec:1639)**
PoC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG/id:000000%2Csig:06%2Csrc:000000%2... | Several bugs found by fuzzing | https://api.github.com/repos/LibreDWG/libredwg/issues/176/comments | 24 | 2019-12-24T03:44:32Z | 2020-01-16T12:12:03Z | https://github.com/LibreDWG/libredwg/issues/176 | 541,977,765 | 176 | 922 |
CVE-2019-20012 | 2019-12-27T01:15:13.460 | An issue was discovered in GNU LibreDWG 0.92. Crafted input will lead to an attempted excessive memory allocation in dwg_decode_HATCH_private in dwg.spec. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6967607-F26E-477A-8D60-8B0D55594EC9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"770"
] | 770 | https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643088 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hi,
After fuzzing libredwg, I found the following bugs on the latest commit on master.
Command: dwg2dxf $PoC
**1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (src/dwg.spec:1639)**
PoC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG/id:000000%2Csig:06%2Csrc:000000%2... | Several bugs found by fuzzing | https://api.github.com/repos/LibreDWG/libredwg/issues/176/comments | 24 | 2019-12-24T03:44:32Z | 2020-01-16T12:12:03Z | https://github.com/LibreDWG/libredwg/issues/176 | 541,977,765 | 176 | 923 |
CVE-2019-20013 | 2019-12-27T01:15:13.523 | An issue was discovered in GNU LibreDWG before 0.93. Crafted input will lead to an attempted excessive memory allocation in decode_3dsolid in dwg.spec. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "09B5D2C4-D4B2-4226-AA34-A346E6064FA2",
"versionEndExcluding": "0.9.3",
"versionEndIncluding": null,
"versionStartExcluding"... | [
"770"
] | 770 | https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643060 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hi,
After fuzzing libredwg, I found the following bugs on the latest commit on master.
Command: dwg2dxf $PoC
**1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (src/dwg.spec:1639)**
PoC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG/id:000000%2Csig:06%2Csrc:000000%2... | Several bugs found by fuzzing | https://api.github.com/repos/LibreDWG/libredwg/issues/176/comments | 24 | 2019-12-24T03:44:32Z | 2020-01-16T12:12:03Z | https://github.com/LibreDWG/libredwg/issues/176 | 541,977,765 | 176 | 924 |
CVE-2019-20014 | 2019-12-27T01:15:13.587 | An issue was discovered in GNU LibreDWG before 0.93. There is a double-free in dwg_free in free.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "09B5D2C4-D4B2-4226-AA34-A346E6064FA2",
"versionEndExcluding": "0.9.3",
"versionEndIncluding": null,
"versionStartExcluding"... | [
"415"
] | 415 | https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643172 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hi,
After fuzzing libredwg, I found the following bugs on the latest commit on master.
Command: dwg2dxf $PoC
**1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (src/dwg.spec:1639)**
PoC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG/id:000000%2Csig:06%2Csrc:000000%2... | Several bugs found by fuzzing | https://api.github.com/repos/LibreDWG/libredwg/issues/176/comments | 24 | 2019-12-24T03:44:32Z | 2020-01-16T12:12:03Z | https://github.com/LibreDWG/libredwg/issues/176 | 541,977,765 | 176 | 925 |
CVE-2019-20015 | 2019-12-27T01:15:13.647 | An issue was discovered in GNU LibreDWG 0.92. Crafted input will lead to an attempted excessive memory allocation in dwg_decode_LWPOLYLINE_private in dwg.spec. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6967607-F26E-477A-8D60-8B0D55594EC9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"770"
] | 770 | https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643028 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hi,
After fuzzing libredwg, I found the following bugs on the latest commit on master.
Command: dwg2dxf $PoC
**1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (src/dwg.spec:1639)**
PoC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG/id:000000%2Csig:06%2Csrc:000000%2... | Several bugs found by fuzzing | https://api.github.com/repos/LibreDWG/libredwg/issues/176/comments | 24 | 2019-12-24T03:44:32Z | 2020-01-16T12:12:03Z | https://github.com/LibreDWG/libredwg/issues/176 | 541,977,765 | 176 | 926 |
CVE-2019-20016 | 2019-12-27T02:15:10.467 | libmysofa before 2019-11-24 does not properly restrict recursive function calls, as demonstrated by reports of stack consumption in readOHDRHeaderMessageDatatype in dataobject.c and directblockRead in fractalhead.c. NOTE: a download of v0.9 after 2019-12-06 should fully remediate this issue. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/hoene/libmysofa/commit/2e6fac6ab6156dae8e8c6f417741388084b70d6f"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "htt... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:symonics:libmysofa:*:*:*:*:*:*:*:*",
"matchCriteriaId": "433A645E-4A6E-4B59-BD0E-DCC5AFA7AB9E",
"versionEndExcluding": "0.9",
"versionEndIncluding": null,
"versionStartExclud... | [
"787"
] | 787 | https://github.com/hoene/libmysofa/issues/83 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"hoene",
"libmysofa"
] | A crafted input will lead to crash in fractalhead.c at libmysofa v0.8.
Triggered by
./mysofa2json POC
Poc
[overflow-libmysofa1](https://github.com/gutiniao/afltest/blob/master/overflow-libmysofa1)
The ASAN information is as follows:
```
./mysofa2json overflow-libmysofa1
ASAN:SIGSEGV
================... | There is a stack-based buffer overflow in the directblockRead function of fractalhead.c(at 172) | https://api.github.com/repos/hoene/libmysofa/issues/83/comments | 1 | 2019-10-31T07:21:20Z | 2019-11-24T10:07:23Z | https://github.com/hoene/libmysofa/issues/83 | 515,219,307 | 83 | 927 |
CVE-2019-20016 | 2019-12-27T02:15:10.467 | libmysofa before 2019-11-24 does not properly restrict recursive function calls, as demonstrated by reports of stack consumption in readOHDRHeaderMessageDatatype in dataobject.c and directblockRead in fractalhead.c. NOTE: a download of v0.9 after 2019-12-06 should fully remediate this issue. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/hoene/libmysofa/commit/2e6fac6ab6156dae8e8c6f417741388084b70d6f"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "htt... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:symonics:libmysofa:*:*:*:*:*:*:*:*",
"matchCriteriaId": "433A645E-4A6E-4B59-BD0E-DCC5AFA7AB9E",
"versionEndExcluding": "0.9",
"versionEndIncluding": null,
"versionStartExclud... | [
"787"
] | 787 | https://github.com/hoene/libmysofa/issues/84 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"hoene",
"libmysofa"
] | A crafted input will lead to crash in dataobject.c at libmysofa v0.8.
Triggered by
./mysofa2json POC
Poc
[overflow-libmysofa2](https://github.com/gutiniao/afltest/blob/master/overflow-libmysofa2)
The ASAN information is as follows:
```
./mysofa2json overflow-libmysofa2
ASAN:SIGSEGV
===================... | There is a stack-based buffer overflow in the readOHDRHeaderMessageDatatype function of dataobject.c(at 216) | https://api.github.com/repos/hoene/libmysofa/issues/84/comments | 1 | 2019-10-31T07:31:18Z | 2019-11-24T09:45:24Z | https://github.com/hoene/libmysofa/issues/84 | 515,223,744 | 84 | 928 |
CVE-2019-20017 | 2019-12-27T02:15:10.547 | A stack-based buffer over-read was discovered in Mat_VarReadNextInfo5 in mat5.c in matio 1.5.17. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/tbeu/matio/issues/127"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party A... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:matio_project:matio:1.5.17:*:*:*:*:*:*:*",
"matchCriteriaId": "BA202CA9-93FA-4D2E-8968-0A2748AC055D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | [
"125"
] | 125 | https://github.com/tbeu/matio/issues/127 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"tbeu",
"matio"
] | A crafted input will lead to crash in mat5.c at matio 1.5.17.
Triggered by
./matdump POC
Poc
[001-stackover-Mat_VarReadNextInfo5_mat54915](https://github.com/gutiniao/afltest/blob/master/001-stackover-Mat_VarReadNextInfo5_mat54915)
The ASAN information is as follows:
```
./matdump 001-stackover-Mat_VarRead... | There is a stack-based buffer overflow in the Mat_VarReadNextInfo5 function of mat5.c(at 4915) | https://api.github.com/repos/tbeu/matio/issues/127/comments | 5 | 2019-11-07T03:14:45Z | 2019-12-27T08:42:46Z | https://github.com/tbeu/matio/issues/127 | 519,013,678 | 127 | 929 |
CVE-2019-20018 | 2019-12-27T02:15:10.610 | A stack-based buffer over-read was discovered in ReadNextCell in mat5.c in matio 1.5.17. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/tbeu/matio/issues/129"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party A... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:matio_project:matio:1.5.17:*:*:*:*:*:*:*",
"matchCriteriaId": "BA202CA9-93FA-4D2E-8968-0A2748AC055D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | [
"125"
] | 125 | https://github.com/tbeu/matio/issues/129 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"tbeu",
"matio"
] | A crafted input will lead to crash in mat5.c at matio 1.5.17.
Triggered by
./matdump POC
Poc
[003-stackoverflow-ReadNextCell-mat51001](https://github.com/gutiniao/afltest/blob/master/003-stackoverflow-ReadNextCell-mat51001)
The ASAN information is as follows:
```
./matdump 003-stackoverflow-ReadNextCell-ma... | There is a stack-based buffer overflow in the ReadNextCell function of mat5.c(at 1001) | https://api.github.com/repos/tbeu/matio/issues/129/comments | 4 | 2019-11-07T03:27:18Z | 2019-12-27T08:42:16Z | https://github.com/tbeu/matio/issues/129 | 519,017,135 | 129 | 930 |
CVE-2019-20019 | 2019-12-27T02:15:10.657 | An attempted excessive memory allocation was discovered in Mat_VarRead5 in mat5.c in matio 1.5.17. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/tbeu/matio/issues/130"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party A... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:matio_project:matio:1.5.17:*:*:*:*:*:*:*",
"matchCriteriaId": "BA202CA9-93FA-4D2E-8968-0A2748AC055D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | [
"770"
] | 770 | https://github.com/tbeu/matio/issues/130 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"tbeu",
"matio"
] | A crafted input will lead to crash in mat5.c at matio 1.5.17.
Triggered by
./matdump POC
Poc
[004Mat_VarRead53574](https://github.com/gutiniao/afltest/blob/master/004Mat_VarRead53574)
The ASAN information is as follows:
```
./matdump 004Mat_VarRead53574
==22145==ERROR: AddressSanitizer failed to allocate... | it is a memory exhaustion issue in Mat_VarRead5 (mat5.c:3574) | https://api.github.com/repos/tbeu/matio/issues/130/comments | 4 | 2019-11-07T03:44:40Z | 2019-12-27T08:41:32Z | https://github.com/tbeu/matio/issues/130 | 519,022,065 | 130 | 931 |
CVE-2019-20020 | 2019-12-27T02:15:10.733 | A stack-based buffer over-read was discovered in ReadNextStructField in mat5.c in matio 1.5.17. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/tbeu/matio/issues/128"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party A... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:matio_project:matio:1.5.17:*:*:*:*:*:*:*",
"matchCriteriaId": "BA202CA9-93FA-4D2E-8968-0A2748AC055D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | [
"125"
] | 125 | https://github.com/tbeu/matio/issues/128 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"tbeu",
"matio"
] | A crafted input will lead to crash in mat5.c at matio 1.5.17.
Triggered by
./matdump POC
Poc
[002-stackover-ReadNextStructField-mat51393](https://github.com/gutiniao/afltest/blob/master/002-stackover-ReadNextStructField-mat51393)
The ASAN information is as follows:
```
./matdump 002-stackover-ReadNextStruc... | There is a stack-based buffer overflow in the ReadNextStructField function of mat5.c(at 1393) | https://api.github.com/repos/tbeu/matio/issues/128/comments | 5 | 2019-11-07T03:23:25Z | 2019-12-27T11:10:26Z | https://github.com/tbeu/matio/issues/128 | 519,016,046 | 128 | 932 |
CVE-2019-20021 | 2019-12-27T02:15:10.797 | A heap-based buffer over-read was discovered in canUnpack in p_mach.cpp in UPX 3.95 via a crafted Mach-O file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00003.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:upx_project:upx:3.95:*:*:*:*:*:*:*",
"matchCriteriaId": "7986910F-E5B0-488F-813B-D6B4367F16F4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"125"
] | 125 | https://github.com/upx/upx/issues/315 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"upx",
"upx"
] | A crafted input will lead to crash in p_mach.cpp at UPX 3.95(latest version,git clone from branch devel)
Triggered by
./upx.out -d -f POC
OS: Ubuntu 18.04.3 LTS
CPU architecture: x86_64
Poc
[002](https://github.com/gutiniao/afltest/blob/master/002)
The ASAN information is as follows:
```
./upx.out ... | There is a heap-buffer-overflow in the canUnpack function of p_mach.cpp:1539 | https://api.github.com/repos/upx/upx/issues/315/comments | 4 | 2019-11-14T03:04:37Z | 2021-09-12T01:45:32Z | https://github.com/upx/upx/issues/315 | 522,594,596 | 315 | 933 |
CVE-2019-20022 | 2019-12-27T02:15:10.873 | An invalid memory address dereference was discovered in load_pnm in frompnm.c in libsixel before 1.8.3. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/saitoha/libsixel/issues/108"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third P... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libsixel_project:libsixel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3A5CB650-56E4-4DF9-9310-080C174E1528",
"versionEndExcluding": "1.8.3",
"versionEndIncluding": null,
"versionSt... | [
"672"
] | 672 | https://github.com/saitoha/libsixel/issues/108 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"saitoha",
"libsixel"
] | A crafted input will lead to crash in frompnm.c at libsixel 1.8.2.
Triggered by:
./img2sixel 004-SEGV-load-pnm288
Poc:
[004-SEGV-load-pnm288](https://github.com/gutiniao/afltest/blob/master/004-SEGV-load-pnm288)
The gdb debug info:
```
# gdb ./img2sixel
\GNU gdb (Ubuntu 8.1-0ubuntu3.2) 8.1.0.20180409-g... | Segmentation fault (ASAN: SEGV on unknown address) in the load_pnm function of frompnm.c:288 | https://api.github.com/repos/saitoha/libsixel/issues/108/comments | 2 | 2019-12-11T08:22:08Z | 2019-12-27T08:22:37Z | https://github.com/saitoha/libsixel/issues/108 | 536,213,002 | 108 | 934 |
CVE-2019-20023 | 2019-12-27T02:15:10.920 | A memory leak was discovered in image_buffer_resize in fromsixel.c in libsixel 1.8.4. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/saitoha/libsixel/issues/120"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third P... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libsixel_project:libsixel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF1F3897-870A-4F82-896A-EBE9581C656A",
"versionEndExcluding": "1.8.4",
"versionEndIncluding": null,
"versionSt... | [
"401"
] | 401 | https://github.com/saitoha/libsixel/issues/120 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"saitoha",
"libsixel"
] | A crafted input will lead to crash in frompnm.c at libsixel 1.8.3.(git from the [branch](https://github.com/saitoha/libsixel/tree/release-1.8) )
Triggered by:
./img2sixel 000-memleak-rpl_malloc
Poc:
[000-memleak-rpl_malloc](https://github.com/gutiniao/afltest/blob/master/000-memleak-rpl_malloc)
The ASAN in... | A memory leaks issue in image_buffer_resize at fromsixel.c:293 | https://api.github.com/repos/saitoha/libsixel/issues/120/comments | 5 | 2019-12-18T05:03:40Z | 2020-01-03T01:33:53Z | https://github.com/saitoha/libsixel/issues/120 | 539,453,569 | 120 | 935 |
CVE-2019-20024 | 2019-12-27T02:15:11.000 | A heap-based buffer overflow was discovered in image_buffer_resize in fromsixel.c in libsixel before 1.8.4. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/saitoha/libsixel/issues/121"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third P... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libsixel_project:libsixel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF1F3897-870A-4F82-896A-EBE9581C656A",
"versionEndExcluding": "1.8.4",
"versionEndIncluding": null,
"versionSt... | [
"787"
] | 787 | https://github.com/saitoha/libsixel/issues/121 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"saitoha",
"libsixel"
] | A crafted input will lead to crash in frompnm.c at libsixel 1.8.3.(git from the [branch](https://github.com/saitoha/libsixel/tree/release-1.8))
Triggered by:
./img2sixel 001-heap--
Poc:
[001-heap--](https://github.com/gutiniao/afltest/blob/master/001-heap--)
The ASAN info:
```
# ./img2sixel 001-heap--
... | A heap-buffer-overflow in image_buffer_resize at fromsixel.c:308 | https://api.github.com/repos/saitoha/libsixel/issues/121/comments | 3 | 2019-12-18T05:10:27Z | 2019-12-27T08:19:23Z | https://github.com/saitoha/libsixel/issues/121 | 539,455,360 | 121 | 936 |
CVE-2019-20051 | 2019-12-27T22:15:11.347 | A floating-point exception was discovered in PackLinuxElf::elf_hash in p_lx_elf.cpp in UPX 3.95. The vulnerability causes an application crash, which leads to denial of service. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/upx/upx/issues/313"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:upx_project:upx:3.95:*:*:*:*:*:*:*",
"matchCriteriaId": "7986910F-E5B0-488F-813B-D6B4367F16F4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"682"
] | 682 | https://github.com/upx/upx/issues/313 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"upx",
"upx"
] | A crafted input will lead to crash in p_lx_elf.cpp.cpp at UPX 3.95(latest version,git clone from master)
Triggered by
./upx.out -d -f POC
OS: Ubuntu 18.04.3 LTS
CPU architecture: x86_64
Poc
[004](https://github.com/gutiniao/afltest/blob/master/004)
The ASAN information is as follows:
```
./upx.out ... | Floating-point exception abort (DoS) in PackLinuxElf::elf_hash() of p_lx_elf.cpp:4569 | https://api.github.com/repos/upx/upx/issues/313/comments | 3 | 2019-11-13T10:02:39Z | 2020-01-16T11:40:04Z | https://github.com/upx/upx/issues/313 | 522,091,065 | 313 | 937 |
CVE-2019-20052 | 2019-12-27T22:15:11.800 | A memory leak was discovered in Mat_VarCalloc in mat.c in matio 1.5.17 because SafeMulDims does not consider the rank==0 case. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/tbeu/matio/issues/131"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party A... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:matio_project:matio:1.5.17:*:*:*:*:*:*:*",
"matchCriteriaId": "BA202CA9-93FA-4D2E-8968-0A2748AC055D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | [
"401"
] | 401 | https://github.com/tbeu/matio/issues/131 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"tbeu",
"matio"
] | A crafted input will lead to crash in mat.c at matio 1.5.17.
Triggered by
./matdump POC
Poc
[006-memleak](https://github.com/gutiniao/afltest/blob/master/006-memleak)
The ASAN information is as follows:
```
./matdump /usr/local/matio_asan/bin/006-memleak
InflateRankDims: inflate returned data error
Infl... | it is a memory leaks issue in Mat_VarCalloc (mat.c:807) | https://api.github.com/repos/tbeu/matio/issues/131/comments | 9 | 2019-11-12T05:36:29Z | 2021-11-27T17:38:54Z | https://github.com/tbeu/matio/issues/131 | 521,339,404 | 131 | 938 |
CVE-2019-20053 | 2019-12-27T22:15:11.923 | An invalid memory address dereference was discovered in the canUnpack function in p_mach.cpp in UPX 3.95 via a crafted Mach-O file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00003.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:upx_project:upx:3.95:*:*:*:*:*:*:*",
"matchCriteriaId": "7986910F-E5B0-488F-813B-D6B4367F16F4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"119"
] | 119 | https://github.com/upx/upx/issues/314 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"upx",
"upx"
] | A crafted input will lead to crash in p_mach.cpp at UPX 3.95(latest version,git clone from branch devel)
Triggered by
./upx.out -d -f POC
OS: Ubuntu 18.04.3 LTS
CPU architecture: x86_64
Poc
[001](https://github.com/gutiniao/afltest/blob/master/001)
The ASAN information is as follows:
```
./upx.out ... | Segmentation fault (ASAN: SEGV on unknown address) in the PackMachBase<N_Mach::MachClass_64<N_BELE_CTP::LEPolicy> >::canUnpack() function of p_mach.cpp:1539 | https://api.github.com/repos/upx/upx/issues/314/comments | 2 | 2019-11-14T01:57:00Z | 2020-01-16T11:39:42Z | https://github.com/upx/upx/issues/314 | 522,576,017 | 314 | 939 |
CVE-2019-20056 | 2019-12-29T19:15:11.167 | stb_image.h (aka the stb image loader) 2.23, as used in libsixel and other products, has an assertion failure in stbi__shiftsigned. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/saitoha/libsixel/issues/126"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nothings:stb_image.h:2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "62B321FB-09DA-46F1-B7BE-4B8AAE636D18",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"617"
] | 617 | https://github.com/saitoha/libsixel/issues/126 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"saitoha",
"libsixel"
] | stbi__shiftsigned has assertion which can be triggered by user supplied image file.

poc:
[poc.zip](https://github.com/saitoha/libsixel/files/4008085/poc.zip)
result:
... | assertion failure in stbi__shiftsigned in stb_image.h | https://api.github.com/repos/saitoha/libsixel/issues/126/comments | 2 | 2019-12-29T13:43:51Z | 2020-01-03T01:32:36Z | https://github.com/saitoha/libsixel/issues/126 | 543,403,783 | 126 | 940 |
CVE-2019-20057 | 2019-12-29T19:15:11.637 | com.proxyman.NSProxy.HelperTool in Privileged Helper Tool in Proxyman for macOS 1.11.0 and earlier allows an attacker to change the System Proxy and redirect all traffic to an attacker-controlled computer, enabling MITM attacks. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ProxymanApp/Proxyman/issues/364"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ProxymanApp/Proxyman/issu... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:proxyman:proxyman:*:*:*:*:*:macos:*:*",
"matchCriteriaId": "A88B9038-B2DA-4113-AE3F-D4F58F2195A4",
"versionEndExcluding": null,
"versionEndIncluding": "1.11.0",
"versionStart... | [
"345"
] | 345 | https://github.com/ProxymanApp/Proxyman/issues/364 | [
"Third Party Advisory"
] | github.com | [
"ProxymanApp",
"Proxyman"
] | ## 🐶 Brief
There is a report from a dedicated user that Proxyman Helper Tool (PrivilegedHelperTools)could be exploited to change the System Proxy from unsigned apps.
Basically, it's the same issue with [Little Snitch CVE-2019-13013](https://blog.obdev.at/what-we-have-learned-from-a-vulnerability/) since Proxyman a... | Helper Tool: Security Vulnerability | https://api.github.com/repos/ProxymanApp/Proxyman/issues/364/comments | 1 | 2019-12-29T04:38:45Z | 2019-12-29T05:20:26Z | https://github.com/ProxymanApp/Proxyman/issues/364 | 543,316,658 | 364 | 941 |
CVE-2019-20058 | 2019-12-29T19:15:11.727 | Bolt 3.7.0, if Symfony Web Profiler is used, allows XSS because unsanitized search?search= input is shown on the _profiler page. NOTE: this is disputed because profiling was never intended for use in production. This is related to CVE-2018-12040 | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/bolt/bolt/issues/7830"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/b... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:boltcms:bolt:3.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0953D04C-A5F2-423D-919D-15CD4A43EA36",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"79"
] | 79 | https://github.com/bolt/bolt/issues/7830 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"bolt",
"bolt"
] | **1. **Bug Summary:****
**Stored Cross-Site Scripting:**
Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a brow... | Unauthenticated Stored Cross-Site Scripting (XSS) - Admin Account Takeover | https://api.github.com/repos/bolt/bolt/issues/7830/comments | 5 | 2019-12-17T13:13:09Z | 2020-02-24T06:29:29Z | https://github.com/bolt/bolt/issues/7830 | 539,057,977 | 7,830 | 942 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.