cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2019-20063
2019-12-29T20:15:28.080
hdf/dataobject.c in libmysofa before 0.8 has an uninitialized use of memory, as demonstrated by mysofa2json.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/hoene/libmysofa/compare/v0.7...v0.8" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symonics:libmysofa:*:*:*:*:*:*:*:*", "matchCriteriaId": "06D58760-D7CA-4E2A-A94B-43E49DCA63C4", "versionEndExcluding": "0.8", "versionEndIncluding": null, "versionStartExclud...
[ "665" ]
665
https://github.com/hoene/libmysofa/issues/67
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "hoene", "libmysofa" ]
There is an uninitialized use in mysofa2json, the bug is found in git commit 3dba53f9c14795b109577519a0df2e25e15fcd6a. To trigger the bug, after compiling the target: valgrind ./mysofa2json test-input. PoC input is attached(I have to change the suffix of input to zip because of github's upload regulation, but th...
Uninitialized use found in mysofa2json[bug]
https://api.github.com/repos/hoene/libmysofa/issues/67/comments
2
2019-08-24T08:52:47Z
2019-08-29T16:49:47Z
https://github.com/hoene/libmysofa/issues/67
484,795,542
67
943
CVE-2019-20086
2019-12-30T04:15:10.750
GoPro GPMF-parser 1.2.3 has a heap-based buffer over-read in GPMF_Next in GPMF_parser.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gopro/gpmf-parser/issues/74" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gopro:gpmf-parser:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C4628685-F6D8-4FF2-9868-1CA7572DD943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "125" ]
125
https://github.com/gopro/gpmf-parser/issues/74
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gopro", "gpmf-parser" ]
Tested in Ubuntu 19.04, 64bit, master(ceb3815) compiled by gcc -g -fsanitize=address Triggered by $ gpmf-parse $POC POC file [poc0.zip](https://github.com/gopro/gpmf-parser/files/3727762/poc0.zip) ``` root@ubuntu:/home/tim/gpmf-parser-asan/build# ./gpmf-parser ../crashes/karma.mp4-out_of_bound-idx\:0x24-0x0 ...
heap overflow in GPMF_Next GPMF_parser.c:300
https://api.github.com/repos/gopro/gpmf-parser/issues/74/comments
5
2019-10-15T07:06:48Z
2019-11-18T23:37:17Z
https://github.com/gopro/gpmf-parser/issues/74
507,049,927
74
944
CVE-2019-20087
2019-12-30T04:15:10.813
GoPro GPMF-parser 1.2.3 has a heap-based buffer over-read in GPMF_seekToSamples in GPMF-parse.c for the "matching tags" feature.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gopro/gpmf-parser/issues/76" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gopro:gpmf-parser:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C4628685-F6D8-4FF2-9868-1CA7572DD943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "125" ]
125
https://github.com/gopro/gpmf-parser/issues/76
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gopro", "gpmf-parser" ]
Tested in Ubuntu 19.04, 64bit, master(ceb3815) compiled by gcc -g -fsanitize=address Triggered by $ gpmf-parse $POC POC [poc2.zip](https://github.com/gopro/gpmf-parser/files/3727794/poc2.zip) ``` root@ubuntu:/home/tim/gpmf-parser-asan/build# ./gpmf-parser crashes/karma.mp4-out_of_bound-idx\:0x38-0x2 STRM ...
heapoverflow in GPMF_seekToSamples GPMF-parse.c:477
https://api.github.com/repos/gopro/gpmf-parser/issues/76/comments
3
2019-10-15T07:16:17Z
2019-11-18T23:37:59Z
https://github.com/gopro/gpmf-parser/issues/76
507,054,018
76
945
CVE-2019-20088
2019-12-30T04:15:10.890
GoPro GPMF-parser 1.2.3 has a heap-based buffer over-read in GetPayload in GPMF_mp4reader.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gopro/gpmf-parser/issues/77" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gopro:gpmf-parser:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C4628685-F6D8-4FF2-9868-1CA7572DD943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "125" ]
125
https://github.com/gopro/gpmf-parser/issues/77
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gopro", "gpmf-parser" ]
Tested in Ubuntu 19.04, 64bit, master(ceb3815) compiled by gcc -g -fsanitize=address Triggered by $ gpmf-parse $POC POC [poc3.zip](https://github.com/gopro/gpmf-parser/files/3727813/poc3.zip) ``` root@ubuntu:/home/tim/gpmf-parser-asan/build# ./gpmf-parser crashes/karma.mp4-out_of_bound-idx\:0x749-0x3 STRM...
heap overflow in GetPayload GPMF_mp4reader.c:62
https://api.github.com/repos/gopro/gpmf-parser/issues/77/comments
3
2019-10-15T07:21:55Z
2019-11-18T23:38:23Z
https://github.com/gopro/gpmf-parser/issues/77
507,056,444
77
946
CVE-2019-20089
2019-12-30T04:15:10.967
GoPro GPMF-parser 1.2.3 has an heap-based buffer over-read in GPMF_SeekToSamples in GPMF_parse.c for the size calculation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gopro/gpmf-parser/issues/75" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gopro:gpmf-parser:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C4628685-F6D8-4FF2-9868-1CA7572DD943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "125" ]
125
https://github.com/gopro/gpmf-parser/issues/75
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gopro", "gpmf-parser" ]
Tested in Ubuntu 19.04, 64bit, master(ceb3815) compiled by gcc -g -fsanitize=address Triggered by $ gpmf-parse $POC [poc1.zip](https://github.com/gopro/gpmf-parser/files/3727770/poc1.zip) POC ``` root@ubuntu:/home/tim/gpmf-parser-asan/build# ./gpmf-parser crashes/karma.mp4-out_of_bound-idx\:0x32-0x1 STR...
heapoverflow in GPMF_SeekToSamples GPMF_parse.c:452
https://api.github.com/repos/gopro/gpmf-parser/issues/75/comments
3
2019-10-15T07:11:52Z
2019-11-18T23:37:40Z
https://github.com/gopro/gpmf-parser/issues/75
507,052,169
75
947
CVE-2019-20090
2019-12-30T04:15:11.030
An issue was discovered in Bento4 1.5.1.0. There is a use-after-free in AP4_Sample::GetOffset in Core/Ap4Sample.h when called from Ap4LinearReader.cpp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/461" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "416" ]
416
https://github.com/axiomatic-systems/Bento4/issues/461
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
./mp42ts $poc out poc [test-002.zip](https://github.com/axiomatic-systems/Bento4/files/3938643/test-002.zip) asan output ``` root@ubuntu:/home/tim/Bento4/cmakebuild# ../../Bento4-asan/cmakebuild/mp42ts overflows/test-002.mp4-double_free-idx\:0xffffffff-0x0 out =====================================================...
use after free in Ap4Sample.h
https://api.github.com/repos/axiomatic-systems/Bento4/issues/461/comments
0
2019-12-09T08:53:39Z
2019-12-09T08:53:39Z
https://github.com/axiomatic-systems/Bento4/issues/461
534,780,352
461
948
CVE-2019-20091
2019-12-30T04:15:11.123
An issue was discovered in Bento4 1.5.1.0. There is a NULL pointer dereference in AP4_Descriptor::GetTag in mp42ts when called from AP4_DecoderConfigDescriptor::GetDecoderSpecificInfoDescriptor in Ap4DecoderConfigDescriptor.cpp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/462" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "476" ]
476
https://github.com/axiomatic-systems/Bento4/issues/462
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
./mp42ts $poc out poc [poc1.zip](https://github.com/axiomatic-systems/Bento4/files/3938679/poc1.zip) [poc2.zip](https://github.com/axiomatic-systems/Bento4/files/3938680/poc2.zip) asan output 1 ``` root@ubuntu:/home/tim/Bento4/cmakebuild# ../../Bento4-asan/cmakebuild/mp42ts crashes/test-001.mp4-signalb-0x0 out ...
2 segv in mp42ts
https://api.github.com/repos/axiomatic-systems/Bento4/issues/462/comments
0
2019-12-09T09:00:42Z
2019-12-09T09:00:42Z
https://github.com/axiomatic-systems/Bento4/issues/462
534,783,741
462
949
CVE-2019-20094
2019-12-30T04:15:11.327
An issue was discovered in libsixel 1.8.4. There is a heap-based buffer overflow in the function gif_init_frame at fromgif.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/125" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "EB0720EA-8C4F-44BB-91C1-3098DA288118", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "787" ]
787
https://github.com/saitoha/libsixel/issues/125
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
img2sixel -I $POC [smile.zip](https://github.com/saitoha/libsixel/files/3999231/smile.zip) asan output ``` root@ubuntu:/home/tim/libsixel/converters# ../../libsixel-asan/converters/img2sixel -I overflows/smile.gif-out_of_bound-idx\:0xa34-0x0 ================================================================= ...
heap overflow in fromgif.c:250
https://api.github.com/repos/saitoha/libsixel/issues/125/comments
4
2019-12-25T00:03:38Z
2020-01-03T01:32:47Z
https://github.com/saitoha/libsixel/issues/125
542,223,529
125
950
CVE-2019-20140
2019-12-30T17:15:20.560
An issue was discovered in libsixel 1.8.4. There is a heap-based buffer overflow in the function gif_out_code at fromgif.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/122" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "EB0720EA-8C4F-44BB-91C1-3098DA288118", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "787" ]
787
https://github.com/saitoha/libsixel/issues/122
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
version : img2sixel 1.8.4 OS : Ubuntu 18.04 configured with: libcurl: yes libpng: yes libjpeg: yes gdk-pixbuf2: no GD: no There is a heap-buffer-overflow in gif_out_code at fromgif.c:278 please run following cmd to reproduce it. ``` img2sixel --high-color $PoC ``` [poc](https://drive.google.com...
heap-buffer-overflow in gif_out_code at fromgif.c:278
https://api.github.com/repos/saitoha/libsixel/issues/122/comments
5
2019-12-22T13:23:47Z
2020-01-03T01:33:42Z
https://github.com/saitoha/libsixel/issues/122
541,450,421
122
951
CVE-2019-13445
2019-12-30T18:15:14.057
An issue was discovered in the ROS communications-related packages (aka ros_comm or ros-melodic-ros-comm) through 1.14.3. parseOptions() in tools/rosbag/src/record.cpp has an integer overflow when a crafted split option can be entered on the command line.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ros/ros_comm/blob/melodic-devel/tools/rosbag/src/record.cpp#L129" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ros:ros-comm:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0EBCB1B-9EB9-4FDC-B3FB-8ED23B84BC71", "versionEndExcluding": null, "versionEndIncluding": "1.14.3", "versionStartExcluding...
[ "190" ]
190
https://github.com/ros/ros_comm/issues/1738
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ros", "ros_comm" ]
Potentially overflowing expression "1048576 * S" with type "int" (32 bits, signed) is evaluated using 32-bit arithmetic, and then used in a context that expects an expression of type "uint64_t" (64 bits, unsigned). https://github.com/ros/ros_comm/blob/29053c4832229efa7160fb944c05e3bc82e11540/tools/rosbag/src/record.cp...
CVE-2019-13445: potential integer overflow
https://api.github.com/repos/ros/ros_comm/issues/1738/comments
0
2019-07-02T21:42:17Z
2019-07-16T18:43:40Z
https://github.com/ros/ros_comm/issues/1738
463,448,919
1,738
952
CVE-2019-20149
2019-12-30T19:15:11.910
ctorName in index.js in kind-of v6.0.2 allows external user input to overwrite certain internal attributes via a conflicting name, as demonstrated by 'constructor': {'name':'Symbol'}. Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jonschlinkert/kind-of/issues/30" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://git...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kind-of_project:kind-of:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "83563B75-503D-4746-8779-5FBAA4436F4D", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "668" ]
668
https://github.com/jonschlinkert/kind-of/issues/30
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jonschlinkert", "kind-of" ]
We found that a maliciously crafted user-input object can type checking result of kind-of module. The vulnerability is from the following code: kind-of leverages the built-in constructor of unsafe user-input to detect type information. However, a crafted payload can overwrite this builtin attribute to manipulate the t...
type checking
https://api.github.com/repos/jonschlinkert/kind-of/issues/30/comments
4
2019-12-16T01:04:23Z
2020-01-16T17:02:05Z
https://github.com/jonschlinkert/kind-of/issues/30
538,136,244
30
953
CVE-2019-20159
2019-12-31T00:15:12.243
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a memory leak in dinf_New() in isomedia/box_code_base.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1321" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "401" ]
401
https://github.com/gpac/gpac/issues/1321
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (master 6ada10e) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-memory-leak ``` POC file: https://github.com/Clingto/P...
AddressSanitizer: a memory leak of dinf_New()
https://api.github.com/repos/gpac/gpac/issues/1321/comments
2
2019-10-28T16:03:11Z
2020-01-08T12:43:28Z
https://github.com/gpac/gpac/issues/1321
513,400,465
1,321
954
CVE-2019-20160
2019-12-31T00:15:12.337
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a stack-based buffer overflow in the function av1_parse_tile_group() in media_tools/av_parsers.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1334" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "787" ]
787
https://github.com/gpac/gpac/issues/1334
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-new-av1_parse_tile_group ``` POC file: https://...
AddressSanitizer: stack-buffer-overflow in av1_parse_tile_group media_tools/av_parsers.c:3845
https://api.github.com/repos/gpac/gpac/issues/1334/comments
2
2019-11-09T11:22:06Z
2020-01-08T12:45:14Z
https://github.com/gpac/gpac/issues/1334
520,394,957
1,334
955
CVE-2019-20161
2019-12-31T00:15:12.417
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is heap-based buffer overflow in the function ReadGF_IPMPX_WatermarkingInit() in odf/ipmpx_code.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1320" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-an...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "787" ]
787
https://github.com/gpac/gpac/issues/1320
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (master 6ada10e) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-ReadGF_IPMPX_WatermarkingInit ``` POC file: https://gi...
AddressSanitizer: heap-buffer-overflow in ReadGF_IPMPX_WatermarkingInit at ipmpx_code.c:1517
https://api.github.com/repos/gpac/gpac/issues/1320/comments
2
2019-10-28T15:50:52Z
2020-01-08T12:43:16Z
https://github.com/gpac/gpac/issues/1320
513,392,746
1,320
956
CVE-2019-20162
2019-12-31T00:15:12.507
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is heap-based buffer overflow in the function gf_isom_box_parse_ex() in isomedia/box_funcs.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1327" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-an...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "787" ]
787
https://github.com/gpac/gpac/issues/1327
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-new-gf_isom_box_parse_ex ``` POC file: https://...
ERROR: AddressSanitizer: heap-buffer-overflow in gf_isom_box_parse_ex isomedia/box_funcs.c:189
https://api.github.com/repos/gpac/gpac/issues/1327/comments
2
2019-11-09T11:12:14Z
2020-01-08T12:43:37Z
https://github.com/gpac/gpac/issues/1327
520,392,881
1,327
957
CVE-2019-20163
2019-12-31T00:15:12.587
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a NULL pointer dereference in the function gf_odf_avc_cfg_write_bs() in odf/descriptors.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1335" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-an...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/1335
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-new-gf_odf_avc_cfg_write_bs ``` POC file: https...
AddressSanitizer: NULL pointer dereference in gf_odf_avc_cfg_write_bs odf/descriptors.c:567
https://api.github.com/repos/gpac/gpac/issues/1335/comments
2
2019-11-09T11:23:01Z
2020-01-08T12:45:23Z
https://github.com/gpac/gpac/issues/1335
520,395,160
1,335
958
CVE-2019-20164
2019-12-31T00:15:12.667
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a NULL pointer dereference in the function gf_isom_box_del() in isomedia/box_funcs.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1332" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/1332
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-new-gf_isom_box_del ``` POC file: https://githu...
AddressSanitizer: NULL pointer dereference (use-after-free ) in gf_isom_box_del isomedia/box_funcs.c:1500
https://api.github.com/repos/gpac/gpac/issues/1332/comments
2
2019-11-09T11:19:52Z
2022-01-26T08:36:22Z
https://github.com/gpac/gpac/issues/1332
520,394,510
1,332
959
CVE-2019-20165
2019-12-31T00:15:12.743
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a NULL pointer dereference in the function ilst_item_Read() in isomedia/box_code_apple.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1338" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-an...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/1338
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Hello, I found a similar issue but I am not sure they are the same. https://github.com/gpac/gpac/issues/1263 System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make...
ERROR: AddressSanitizer: NULL pointer dereference in ilst_item_Read isomedia/box_code_apple.c:119
https://api.github.com/repos/gpac/gpac/issues/1338/comments
4
2019-11-09T12:06:24Z
2020-01-08T12:45:38Z
https://github.com/gpac/gpac/issues/1338
520,405,629
1,338
960
CVE-2019-20166
2019-12-31T00:15:12.837
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a NULL pointer dereference in the function gf_isom_dump() in isomedia/box_dump.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1331" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/1331
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-new-gf_isom_dump ``` POC file: https://github.c...
AddressSanitizer: NULL pointer dereference in gf_isom_dump isomedia/box_dump.c:133
https://api.github.com/repos/gpac/gpac/issues/1331/comments
2
2019-11-09T11:18:44Z
2020-01-08T12:44:45Z
https://github.com/gpac/gpac/issues/1331
520,394,250
1,331
961
CVE-2019-20167
2019-12-31T00:15:12.930
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a NULL pointer dereference in the function senc_Parse() in isomedia/box_code_drm.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1330" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/1330
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-new-senc_Parse ``` POC file: https://github.com...
AddressSanitizer: NULL pointer dereference in senc_Parse isomedia/box_code_drm.c:1378
https://api.github.com/repos/gpac/gpac/issues/1330/comments
2
2019-11-09T11:17:12Z
2020-01-08T12:44:20Z
https://github.com/gpac/gpac/issues/1330
520,393,923
1,330
962
CVE-2019-20168
2019-12-31T00:15:13.007
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a use-after-free in the function gf_isom_box_dump_ex() in isomedia/box_funcs.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1333" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "416" ]
416
https://github.com/gpac/gpac/issues/1333
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-new-gf_isom_box_dump_ex ``` POC file: https://g...
AddressSanitizer: heap-use-after-free in gf_isom_box_dump_ex isomedia/box_funcs.c:1734
https://api.github.com/repos/gpac/gpac/issues/1333/comments
4
2019-11-09T11:21:05Z
2020-01-16T22:33:39Z
https://github.com/gpac/gpac/issues/1333
520,394,786
1,333
963
CVE-2019-20169
2019-12-31T00:15:13.087
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a use-after-free in the function trak_Read() in isomedia/box_code_base.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1329" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "416" ]
416
https://github.com/gpac/gpac/issues/1329
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-new-trak_Read ``` POC file: https://github.com/...
AddressSanitizer: heap-use-after-free in trak_Read isomedia/box_code_base.c:7153
https://api.github.com/repos/gpac/gpac/issues/1329/comments
2
2019-11-09T11:15:44Z
2020-01-08T12:44:04Z
https://github.com/gpac/gpac/issues/1329
520,393,655
1,329
964
CVE-2019-20170
2019-12-31T00:15:13.213
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is an invalid pointer dereference in the function GF_IPMPX_AUTH_Delete() in odf/ipmpx_code.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1328" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-an...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "763" ]
763
https://github.com/gpac/gpac/issues/1328
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-new-GF_IPMPX_AUTH_Delete ``` POC file: https://...
AddressSanitizer: heap-use-after-free in GF_IPMPX_AUTH_Delete odf/ipmpx_code.c:115
https://api.github.com/repos/gpac/gpac/issues/1328/comments
2
2019-11-09T11:14:15Z
2020-01-08T12:43:51Z
https://github.com/gpac/gpac/issues/1328
520,393,299
1,328
965
CVE-2019-20171
2019-12-31T00:15:13.307
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There are memory leaks in metx_New in isomedia/box_code_base.c and abst_Read in isomedia/box_code_adobe.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1337" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "401" ]
401
https://github.com/gpac/gpac/issues/1337
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-new-memory-leak ``` POC file: https://github.co...
AddressSanitizer: 2 memory leaks of metx_New(), abst_Read()
https://api.github.com/repos/gpac/gpac/issues/1337/comments
3
2019-11-09T12:00:28Z
2020-01-08T13:26:12Z
https://github.com/gpac/gpac/issues/1337
520,403,921
1,337
966
CVE-2018-14476
2019-12-31T16:15:11.103
GeniXCMS 1.1.5 has XSS via the dbuser or dbhost parameter during step 1 of installation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/151006/GeniXCMS-1.1.5-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:metalgenix:genixcms:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "09684074-6DDD-46CF-873A-A2066E443085", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "79" ]
79
https://github.com/semplon/GeniXCMS/issues/88
[ "Third Party Advisory" ]
github.com
[ "semplon", "GeniXCMS" ]
Hello, While testing the Netsparker web application security scanner we identified a vulnerability in GeniXCMS 1.1.5. Can you please advise whom shall we contact to disclose the vulnerability details so it can be fixed? Please email me: daniel at netsparker dot com Looking forward to hearing from you. Rega...
Advisory from Netsparker - GeniXCMS 1.1.5 vulnerability
https://api.github.com/repos/GeniXCMS/GeniXCMS/issues/88/comments
3
2017-11-23T11:19:21Z
2019-12-15T05:00:02Z
https://github.com/GeniXCMS/GeniXCMS/issues/88
276,339,738
88
967
CVE-2019-20205
2020-01-02T14:16:36.253
libsixel 1.8.4 has an integer overflow in sixel_frame_resize in frame.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/127" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "EB0720EA-8C4F-44BB-91C1-3098DA288118", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "190" ]
190
https://github.com/saitoha/libsixel/issues/127
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
In function `sixel_frame_resize`, `width` and `height` can be specified by user. Line 503 has an integer overflow. If `width` and `height` are very large numbers, allocation will fail. ![Screen Shot 2019-12-31 at 3 52 58 PM](https://user-images.githubusercontent.com/20929895/71614439-96c22600-2be6-11ea-94d1-ca094257...
integer overflow in sixel_frame_resize in frame.c
https://api.github.com/repos/saitoha/libsixel/issues/127/comments
2
2019-12-31T08:03:38Z
2020-01-03T01:32:26Z
https://github.com/saitoha/libsixel/issues/127
544,120,874
127
968
CVE-2019-20208
2020-01-02T14:16:36.363
dimC_Read in isomedia/box_code_3gpp.c in GPAC 0.8.0 has a stack-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1348" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-an...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "787" ]
787
https://github.com/gpac/gpac/issues/1348
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! [ √] I looked for a similar issue and couldn't find any. [ √] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ [ √] I give enough informa...
There is a stack-buffer-overflow in the dimC_Read function of box_code_3gpp.c:1000
https://api.github.com/repos/gpac/gpac/issues/1348/comments
2
2019-11-13T07:25:13Z
2020-01-08T12:45:44Z
https://github.com/gpac/gpac/issues/1348
522,010,451
1,348
969
CVE-2019-14859
2020-01-02T15:15:11.960
A flaw was found in all python-ecdsa versions before 0.13.3, where it did not correctly verify whether signatures used DER encoding. Without this verification, a malformed signature could be accepted, making the signature malleable. Without proper verification, an attacker could use a malleable signature to create fals...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14859" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Adv...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:python-ecdsa_project:python-ecdsa:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7B0A174-35C3-4CBC-95FD-1359971CAE7E", "versionEndExcluding": "0.13.3", "versionEndIncluding": null, "...
[ "347" ]
347
https://github.com/warner/python-ecdsa/issues/114
[ "Exploit", "Third Party Advisory" ]
github.com
[ "warner", "python-ecdsa" ]
When the DER signature is malformed, the `VerifyingKey.verify(sigdecode=sigdecode_der)` raises unexpected exceptions and in some cases does not raise any exception. `UnexpectedDER`, `IndexError` and `AssertionError` are raised in addition to `BadSignatureError`, at the same time flipping the 4th or 6th least signifi...
Inconsistent handling of malformed DER signatures
https://api.github.com/repos/tlsfuzzer/python-ecdsa/issues/114/comments
3
2019-09-25T19:03:04Z
2019-10-11T14:01:51Z
https://github.com/tlsfuzzer/python-ecdsa/issues/114
498,467,334
114
970
CVE-2019-20219
2020-01-02T15:15:12.520
ngiflib 0.4 has a heap-based buffer over-read in GifIndexToTrueColor in ngiflib.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/miniupnp/ngiflib/issues/15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:miniupnp_project:ngiflib:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5BE2BAA9-5D76-4039-A655-3F478ED5D601", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "125" ]
125
https://github.com/miniupnp/ngiflib/issues/15
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "miniupnp", "ngiflib" ]
Tested in Ubuntu 19.04, 64bit, ngiflib(master 2bef2a0) Triggered by gif2tga $POC POC file: [poc.zip](https://github.com/miniupnp/ngiflib/files/3723825/poc.zip) asan ``` root@ubuntu:/home/tim/ngiflib-normal# ./gif2tga mr_gland.gif-out_of_bound-idx\:0xf3-0x0.gif ==========================================...
heap-buffer-overflow at WritePixels() in ngiflib.c:226
https://api.github.com/repos/miniupnp/ngiflib/issues/15/comments
2
2019-10-14T09:40:20Z
2020-01-05T08:51:16Z
https://github.com/miniupnp/ngiflib/issues/15
506,545,294
15
972
CVE-2013-7351
2020-01-02T20:15:15.130
Multiple cross-site scripting (XSS) vulnerabilities in index.php in Shaarli allow remote attackers to inject arbitrary web script or HTML via the URL to the (1) showRSS, (2) showATOM, or (3) showDailyRSS function; a (4) file name to the importFile function; or (5) vectors related to bookmarks.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "security@debian.org", "tags": [ "Exploit", "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://seclists.org/oss-sec/2014/q2/1" }, { "source": "security@debian.org", "tags": [ "Exploit", "Mailing List", "Patch", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:shaarli_project:shaarli:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D0345D4-5FA4-40FD-B35E-226B4EA356AE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "79" ]
79
https://github.com/sebsauvage/Shaarli/issues/134
[ "Exploit", "Third Party Advisory" ]
github.com
[ "sebsauvage", "Shaarli" ]
Line 945: ``` echo '</channel></rss><!-- Cached version of ' . pageurl () . ' -->'; ``` Line 1030: ``` $feed .= '</feed><!-- Cached version of ' . pageurl () . ' -->'; echo $feed; ``` Line 1107: ``` echo '</channel></rss><!-- Cached version of ' . pageurl () . ' -->'; ``` Line 1614: ``` echo <<<HTML <!DOCTYPE...
Multiples XSS in index.php
https://api.github.com/repos/sebsauvage/Shaarli/issues/134/comments
3
2013-10-22T12:44:52Z
2014-04-01T20:16:21Z
https://github.com/sebsauvage/Shaarli/issues/134
21,379,195
134
973
CVE-2016-1000027
2020-01-02T23:15:11.857
Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrus...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000027" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*", "matchCriteriaId": "0CCA2DB9-D481-4326-8B97-09197B2D6966", "versionEndExcluding": "6.0.0", "versionEndIncluding": null, "versionStar...
[ "502" ]
502
https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-579669626
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "spring-projects", "spring-framework" ]
**Affects:** \5.2.3.RELEASE Issue Title : Sonartype vulnerability CVE-2016-1000027 in Spring-web project Description Description from CVE Pivotal Spring Framework 4.1.4 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is ...
Sonatype vulnerability CVE-2016-1000027 in Spring-web project
https://api.github.com/repos/spring-projects/spring-framework/issues/24434/comments
85
2020-01-27T06:46:04Z
2025-03-12T16:51:10Z
https://github.com/spring-projects/spring-framework/issues/24434
555,385,999
24,434
974
CVE-2016-1000027
2020-01-02T23:15:11.857
Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrus...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000027" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*", "matchCriteriaId": "0CCA2DB9-D481-4326-8B97-09197B2D6966", "versionEndExcluding": "6.0.0", "versionEndIncluding": null, "versionStar...
[ "502" ]
502
https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-582313417
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "spring-projects", "spring-framework" ]
**Affects:** \5.2.3.RELEASE Issue Title : Sonartype vulnerability CVE-2016-1000027 in Spring-web project Description Description from CVE Pivotal Spring Framework 4.1.4 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is ...
Sonatype vulnerability CVE-2016-1000027 in Spring-web project
https://api.github.com/repos/spring-projects/spring-framework/issues/24434/comments
85
2020-01-27T06:46:04Z
2025-03-12T16:51:10Z
https://github.com/spring-projects/spring-framework/issues/24434
555,385,999
24,434
975
CVE-2016-1000027
2020-01-02T23:15:11.857
Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrus...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000027" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*", "matchCriteriaId": "0CCA2DB9-D481-4326-8B97-09197B2D6966", "versionEndExcluding": "6.0.0", "versionEndIncluding": null, "versionStar...
[ "502" ]
502
https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-744519525
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "spring-projects", "spring-framework" ]
**Affects:** \5.2.3.RELEASE Issue Title : Sonartype vulnerability CVE-2016-1000027 in Spring-web project Description Description from CVE Pivotal Spring Framework 4.1.4 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is ...
Sonatype vulnerability CVE-2016-1000027 in Spring-web project
https://api.github.com/repos/spring-projects/spring-framework/issues/24434/comments
85
2020-01-27T06:46:04Z
2025-03-12T16:51:10Z
https://github.com/spring-projects/spring-framework/issues/24434
555,385,999
24,434
976
CVE-2019-20329
2020-01-03T00:15:11.097
OpenLambda 2019-09-10 allows DNS rebinding attacks against the OL server for the REST API on TCP port 5000.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/open-lambda/open-lambda/blob/9f7f935195ca74700c60ebc1ecfdaefad40d144b/src/common/config.go#L135" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlambda_project:openlambda:2019-09-10:*:*:*:*:*:*:*", "matchCriteriaId": "05536DF9-2EE9-4821-BB1D-2CF74282B6C9", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "346" ]
346
https://github.com/open-lambda/open-lambda/issues/92
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "open-lambda", "open-lambda" ]
The Rest API spawned on port 5000 isn't validating the Host header , as such the server is vulnerable to DNS Rebinding attacks. Impact : By tricking users into visiting a website, it will be possible to perform all Rest Calls on behalf of user from the attackers website, bypassing the same origin policy using DNS...
OL-Server vulnerable to DNS Rebinding attacks.
https://api.github.com/repos/open-lambda/open-lambda/issues/92/comments
4
2019-12-16T06:22:47Z
2022-04-19T23:02:57Z
https://github.com/open-lambda/open-lambda/issues/92
538,210,224
92
977
CVE-2019-20330
2020-01-03T04:15:12.137
FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/compare/jackson-databind-2.9.10.1...jackson-databind-2.9.10.2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F87CF67-6994-43F1-BEC3-DD7D122D0146", "versionEndExcluding": "2.7.9.7", "versionEndIncluding": null, "versio...
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2526
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another 2 gadget (*) types reported related to JNDI access. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2019-20330 Original discoverer: UltramanGaia Fixed in: * 2.9.10.2 (`jackson-bom` version...
Block two more gadget types (ehcache/JNDI - CVE-2019-20330)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2526/comments
3
2019-10-25T20:55:07Z
2020-03-10T17:49:23Z
https://github.com/FasterXML/jackson-databind/issues/2526
512,716,891
2,526
978
CVE-2019-5064
2020-01-03T17:15:12.257
An exploitable heap buffer overflow vulnerability exists in the data structure persistence functionality of OpenCV, before version 4.2.0. A specially crafted JSON file can cause a buffer overflow, resulting in multiple heap corruptions and potentially code execution. An attacker can provide a specially crafted file to ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "talos-cna@cisco.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/opencv/opencv/issues/15857" }, { "source": "talos-cna@cisco.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://talosintelligence.com/vulnerability...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opencv:opencv:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE654103-94F6-44DF-A86F-47DED6FB9117", "versionEndExcluding": "4.2.0", "versionEndIncluding": null, "versionStartExcluding...
[ "787" ]
787
https://github.com/opencv/opencv/issues/15857
[ "Third Party Advisory" ]
github.com
[ "opencv", "opencv" ]
The Cisco Talos team found two security vulnerabilities affecting Opencv OpenCV 4.1.0. As this is a sensitive security issue, this message is to request a point of contact to report the detailed report. Email requests to admin at opencv.org were also sent.
Talos security advisory for Opencv (TALOS-2019-0852, 0853)
https://api.github.com/repos/opencv/opencv/issues/15857/comments
7
2019-11-06T16:00:12Z
2020-01-02T20:22:41Z
https://github.com/opencv/opencv/issues/15857
518,566,952
15,857
979
CVE-2020-5395
2020-01-03T20:15:12.653
FontForge 20190801 has a use-after-free in SFD_GetFontMetaData in sfd.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00041.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://git...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fontforge:fontforge:20190801:*:*:*:*:*:*:*", "matchCriteriaId": "B87AF8DA-5CBE-4497-A0EF-779E168C2381", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "416" ]
416
https://github.com/fontforge/fontforge/issues/4084
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "fontforge", "fontforge" ]
Hi, While fuzzing FontForge with AFL, I found a heap use-after-free in the SFD_GetFontMetaData() function, in sfd.c. Attaching a reproducer (gzipped so GitHub accepts it): [test01.sfd.gz](https://github.com/fontforge/fontforge/files/4019970/test01.sfd.gz) Issue can be reproduced in FontForge 20190801 and wit...
Use-after-free (heap) in the SFD_GetFontMetaData() function
https://api.github.com/repos/fontforge/fontforge/issues/4084/comments
9
2020-01-03T16:46:57Z
2020-01-06T11:35:56Z
https://github.com/fontforge/fontforge/issues/4084
545,070,041
4,084
980
CVE-2020-5496
2020-01-03T22:15:13.333
FontForge 20190801 has a heap-based buffer overflow in the Type2NotDefSplines() function in splinesave.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00041.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "ht...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fontforge:fontforge:20190801:*:*:*:*:*:*:*", "matchCriteriaId": "B87AF8DA-5CBE-4497-A0EF-779E168C2381", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "787" ]
787
https://github.com/fontforge/fontforge/issues/4085
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "fontforge", "fontforge" ]
Hi, While fuzzing FontForge with AFL, I found a heap-based buffer overflow in the Type2NotDefSplines() function, in splinesave.c. Attaching a reproducer (gzipped so GitHub accepts it): [test02.sfd.gz](https://github.com/fontforge/fontforge/files/4020930/test02.sfd.gz) Issue can be reproduced in FontForge 201...
Heap-based buffer overflow in the Type2NotDefSplines() function
https://api.github.com/repos/fontforge/fontforge/issues/4085/comments
5
2020-01-03T21:15:18Z
2020-01-07T13:16:27Z
https://github.com/fontforge/fontforge/issues/4085
545,166,682
4,085
981
CVE-2020-5497
2020-01-04T03:15:10.630
The OpenID Connect reference implementation for MITREid Connect through 1.3.3 allows XSS due to userInfoJson being included in the page unsanitized. This is related to header.tag. The issue can be exploited to execute arbitrary JavaScript.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156574/MITREid-1.3.3-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advis...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mitreid:connect:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC637AA4-26EF-4FB8-8608-6B658EBEDFF9", "versionEndExcluding": null, "versionEndIncluding": "1.3.3", "versionStartExcludi...
[ "79" ]
79
https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/issues/1521
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "mitreid-connect", "OpenID-Connect-Java-Spring-Server" ]
`header.tag` appears to be vulnerable to XSS here: ~~~ // get the info of the current user, if available (null otherwise) function getUserInfo() { return ${userInfoJson}; } ~~~ **userInfoJson** is included in the page and is not encoded so malicious elements could be created. If the string...
Cross-Site Scripting header.tag
https://api.github.com/repos/mitreid-connect/OpenID-Connect-Java-Spring-Server/issues/1521/comments
10
2020-01-03T18:59:15Z
2020-11-30T09:31:20Z
https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/issues/1521
545,116,200
1,521
982
CVE-2019-20354
2020-01-06T06:15:10.970
The web application component of piSignage before 2.6.4 allows a remote attacker (authenticated as a low-privilege user) to download arbitrary files from the Raspberry Pi via api/settings/log?file=../ path traversal. In other words, this issue is in the player API for log download.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/155864/piSignage-2.6.4-Directory-Traversal.html" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "http...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pisignage:pisignage:*:*:*:*:*:*:*:*", "matchCriteriaId": "685B46F6-D976-4C06-A7D8-58CD6806D11A", "versionEndExcluding": "2.6.4", "versionEndIncluding": null, "versionStartExc...
[ "22" ]
22
https://github.com/colloqi/piSignage/issues/97
[ "Exploit", "Third Party Advisory" ]
github.com
[ "colloqi", "piSignage" ]
# Describe the bug ### Suggested description of the vulnerability : A path traversal vulnerability in the web application component of piSignage 2.6 allows a remote attacker authenticated as a low privilege user to download arbitrary files from the Raspberry Pi. ### Attack vector(s) ![66](https://user-images.gith...
Path Traversal vulnerability
https://api.github.com/repos/colloqi/piSignage/issues/97/comments
4
2019-11-13T02:19:31Z
2020-01-05T00:38:13Z
https://github.com/colloqi/piSignage/issues/97
521,915,514
97
983
CVE-2020-6609
2020-01-08T21:15:11.193
GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in read_pages_map in decode_r2007.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.9.3.2564:*:*:*:*:*:*:*", "matchCriteriaId": "6292F71C-4D80-4570-A07D-C790FEEE9B2B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "125" ]
125
https://github.com/LibreDWG/libredwg/issues/179#issue-544834443
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2svg2 $PoC **1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_0.9.3.2564/id:000239%2Csig:06%2Csrc:007083%2Cop:havoc%2Crep:4 ...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/179/comments
7
2020-01-03T03:19:25Z
2020-01-16T12:12:04Z
https://github.com/LibreDWG/libredwg/issues/179
544,834,443
179
984
CVE-2020-6610
2020-01-08T21:15:11.287
GNU LibreDWG 0.9.3.2564 has an attempted excessive memory allocation in read_sections_map in decode_r2007.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.9.3.2564:*:*:*:*:*:*:*", "matchCriteriaId": "6292F71C-4D80-4570-A07D-C790FEEE9B2B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "770" ]
770
https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447120
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2svg2 $PoC **1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_0.9.3.2564/id:000239%2Csig:06%2Csrc:007083%2Cop:havoc%2Crep:4 ...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/179/comments
7
2020-01-03T03:19:25Z
2020-01-16T12:12:04Z
https://github.com/LibreDWG/libredwg/issues/179
544,834,443
179
985
CVE-2020-6611
2020-01-08T21:15:11.367
GNU LibreDWG 0.9.3.2564 has a NULL pointer dereference in get_next_owned_entity in dwg.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.9.3.2564:*:*:*:*:*:*:*", "matchCriteriaId": "6292F71C-4D80-4570-A07D-C790FEEE9B2B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "476" ]
476
https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447190
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2svg2 $PoC **1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_0.9.3.2564/id:000239%2Csig:06%2Csrc:007083%2Cop:havoc%2Crep:4 ...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/179/comments
7
2020-01-03T03:19:25Z
2020-01-16T12:12:04Z
https://github.com/LibreDWG/libredwg/issues/179
544,834,443
179
986
CVE-2020-6612
2020-01-08T21:15:11.457
GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in copy_compressed_bytes in decode_r2007.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.9.3.2564:*:*:*:*:*:*:*", "matchCriteriaId": "6292F71C-4D80-4570-A07D-C790FEEE9B2B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "125" ]
125
https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447169
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2svg2 $PoC **1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_0.9.3.2564/id:000239%2Csig:06%2Csrc:007083%2Cop:havoc%2Crep:4 ...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/179/comments
7
2020-01-03T03:19:25Z
2020-01-16T12:12:04Z
https://github.com/LibreDWG/libredwg/issues/179
544,834,443
179
987
CVE-2020-6613
2020-01-08T21:15:11.537
GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in bit_search_sentinel in bits.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.9.3.2564:*:*:*:*:*:*:*", "matchCriteriaId": "6292F71C-4D80-4570-A07D-C790FEEE9B2B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "125" ]
125
https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447025
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2svg2 $PoC **1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_0.9.3.2564/id:000239%2Csig:06%2Csrc:007083%2Cop:havoc%2Crep:4 ...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/179/comments
7
2020-01-03T03:19:25Z
2020-01-16T12:12:04Z
https://github.com/LibreDWG/libredwg/issues/179
544,834,443
179
988
CVE-2020-6614
2020-01-08T21:15:11.630
GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in bfr_read in decode.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.9.3.2564:*:*:*:*:*:*:*", "matchCriteriaId": "6292F71C-4D80-4570-A07D-C790FEEE9B2B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "125" ]
125
https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447068
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2svg2 $PoC **1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_0.9.3.2564/id:000239%2Csig:06%2Csrc:007083%2Cop:havoc%2Crep:4 ...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/179/comments
7
2020-01-03T03:19:25Z
2020-01-16T12:12:04Z
https://github.com/LibreDWG/libredwg/issues/179
544,834,443
179
989
CVE-2020-6615
2020-01-08T21:15:11.693
GNU LibreDWG 0.9.3.2564 has an invalid pointer dereference in dwg_dynapi_entity_value in dynapi.c (dynapi.c is generated by gen-dynapi.pl).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.9.3.2564:*:*:*:*:*:*:*", "matchCriteriaId": "6292F71C-4D80-4570-A07D-C790FEEE9B2B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "476" ]
476
https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447223
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2svg2 $PoC **1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_0.9.3.2564/id:000239%2Csig:06%2Csrc:007083%2Cop:havoc%2Crep:4 ...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/179/comments
7
2020-01-03T03:19:25Z
2020-01-16T12:12:04Z
https://github.com/LibreDWG/libredwg/issues/179
544,834,443
179
990
CVE-2020-6617
2020-01-08T23:15:10.410
stb stb_truetype.h through 1.22 has an assertion failure in stbtt__cff_int.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/864" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_truetype.h:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CD78C93-4049-4174-B364-1D3843DE443F", "versionEndExcluding": null, "versionEndIncluding": "1.22", "versionStart...
[ "617" ]
617
https://github.com/nothings/stb/issues/864
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
assertion failure in `stbtt__cff_int` can be triggered by user supplied font file. <img width="679" alt="source" src="https://user-images.githubusercontent.com/20929895/71815033-1eada180-30b9-11ea-9420-97f3dc3bda43.png"> poc: [poc.zip](https://github.com/nothings/stb/files/4025824/poc.zip) result: ``` #0 ...
assertion failure in stbtt__cff_int in stb_truetype.h
https://api.github.com/repos/nothings/stb/issues/864/comments
2
2020-01-06T11:18:26Z
2021-07-04T10:08:08Z
https://github.com/nothings/stb/issues/864
545,675,704
864
991
CVE-2020-6618
2020-01-08T23:15:10.487
stb stb_truetype.h through 1.22 has a heap-based buffer over-read in stbtt__find_table.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/866" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_truetype.h:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CD78C93-4049-4174-B364-1D3843DE443F", "versionEndExcluding": null, "versionEndIncluding": "1.22", "versionStart...
[ "125" ]
125
https://github.com/nothings/stb/issues/866
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
heap overflow in line 1281. `stbtt__find_table` doesn't check any out of bound access, so heap overflow can be triggered here. <img width="740" alt="poc" src="https://user-images.githubusercontent.com/20929895/71815229-c6c36a80-30b9-11ea-8d7a-89df9d788188.png"> poc: [poc.zip](https://github.com/nothings/stb/files/...
heap overflow in stbtt__find_table in stb_truetype.h
https://api.github.com/repos/nothings/stb/issues/866/comments
4
2020-01-06T11:24:48Z
2021-07-04T10:07:59Z
https://github.com/nothings/stb/issues/866
545,678,527
866
992
CVE-2020-6619
2020-01-08T23:15:10.567
stb stb_truetype.h through 1.22 has an assertion failure in stbtt__buf_seek.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/863" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_truetype.h:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CD78C93-4049-4174-B364-1D3843DE443F", "versionEndExcluding": null, "versionEndIncluding": "1.22", "versionStart...
[ "617" ]
617
https://github.com/nothings/stb/issues/863
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
assertion failure in `stbtt__buf_seek` can be triggered by user supplied font file. <img width="483" alt="source" src="https://user-images.githubusercontent.com/20929895/71814539-b01c1400-30b7-11ea-9ca5-f57cca5d3870.png"> poc: [poc.zip](https://github.com/nothings/stb/files/4025802/poc.zip) result: ``` gdb-...
assertion failure in stbtt__buf_seek in stb_truetype.h
https://api.github.com/repos/nothings/stb/issues/863/comments
2
2020-01-06T11:15:45Z
2021-07-04T10:08:13Z
https://github.com/nothings/stb/issues/863
545,674,533
863
993
CVE-2020-6620
2020-01-08T23:15:10.627
stb stb_truetype.h through 1.22 has a heap-based buffer over-read in stbtt__buf_get8.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/868" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_truetype.h:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CD78C93-4049-4174-B364-1D3843DE443F", "versionEndExcluding": null, "versionEndIncluding": "1.22", "versionStart...
[ "125" ]
125
https://github.com/nothings/stb/issues/868
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
`stbtt__buf_get8` has heap overflow vulnerability. <img width="447" alt="source" src="https://user-images.githubusercontent.com/20929895/71815524-b52e9280-30ba-11ea-9864-da5063e978ef.png"> poc: [poc.zip](https://github.com/nothings/stb/files/4025840/poc.zip) result: ``` =================================...
heap overflow in stbtt__buf_get8 in stb_truetype.h
https://api.github.com/repos/nothings/stb/issues/868/comments
2
2020-01-06T11:29:19Z
2021-07-04T10:07:29Z
https://github.com/nothings/stb/issues/868
545,680,359
868
994
CVE-2020-6621
2020-01-08T23:15:10.677
stb stb_truetype.h through 1.22 has a heap-based buffer over-read in ttUSHORT.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/867" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_truetype.h:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CD78C93-4049-4174-B364-1D3843DE443F", "versionEndExcluding": null, "versionEndIncluding": "1.22", "versionStart...
[ "125" ]
125
https://github.com/nothings/stb/issues/867
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
`ttUSHORT` don't have any bound check, so heap overflow can be triggered. <img width="772" alt="souce0" src="https://user-images.githubusercontent.com/20929895/71815428-654fcb80-30ba-11ea-82f1-9749f205bc7b.png"> <img width="613" alt="source1" src="https://user-images.githubusercontent.com/20929895/71815431-67198f00...
heap overflow in ttUSHORT in stb_truetype.h
https://api.github.com/repos/nothings/stb/issues/867/comments
2
2020-01-06T11:27:04Z
2021-07-04T10:07:36Z
https://github.com/nothings/stb/issues/867
545,679,506
867
995
CVE-2020-6622
2020-01-08T23:15:10.737
stb stb_truetype.h through 1.22 has a heap-based buffer over-read in stbtt__buf_peek8.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/869" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_truetype.h:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CD78C93-4049-4174-B364-1D3843DE443F", "versionEndExcluding": null, "versionEndIncluding": "1.22", "versionStart...
[ "125" ]
125
https://github.com/nothings/stb/issues/869
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
heap overflow in `stbtt__buf_peek8`. <img width="427" alt="source" src="https://user-images.githubusercontent.com/20929895/71815599-f9219780-30ba-11ea-8b1c-249e637f5aed.png"> poc: [poc.zip](https://github.com/nothings/stb/files/4025847/poc.zip) result: ``` ===================================================...
heap overflow in stbtt__buf_peek8 in stb_truetype.h
https://api.github.com/repos/nothings/stb/issues/869/comments
2
2020-01-06T11:31:13Z
2021-07-04T10:07:23Z
https://github.com/nothings/stb/issues/869
545,681,061
869
996
CVE-2020-6623
2020-01-08T23:15:10.800
stb stb_truetype.h through 1.22 has an assertion failure in stbtt__cff_get_index.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/865" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_truetype.h:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CD78C93-4049-4174-B364-1D3843DE443F", "versionEndExcluding": null, "versionEndIncluding": "1.22", "versionStart...
[ "617" ]
617
https://github.com/nothings/stb/issues/865
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
assertion failure in stbtt__cff_get_index can be triggered by user supplied file. <img width="513" alt="source" src="https://user-images.githubusercontent.com/20929895/71815151-8106a200-30b9-11ea-9946-07171227db42.png"> poc: [poc.zip](https://github.com/nothings/stb/files/4025825/poc.zip) result: ``` #0 ...
assertion failure in stbtt__cff_get_index in stb_truetype.h
https://api.github.com/repos/nothings/stb/issues/865/comments
2
2020-01-06T11:20:15Z
2021-07-04T10:08:04Z
https://github.com/nothings/stb/issues/865
545,676,449
865
997
CVE-2020-6628
2020-01-09T02:15:13.433
Ming (aka libming) 0.4.8 has a heap-based buffer over-read in the function decompile_SWITCH() in decompile.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/191" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "125" ]
125
https://github.com/libming/libming/issues/191
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
export ASAN_OPTIONS=allocator_may_return_null=1 ./swftopython $poc [segmentaion_fault_decompile_569-use_after_free-idx:0x1365-0x2.zip](https://github.com/libming/libming/files/4028582/segmentaion_fault_decompile_569-use_after_free-idx.0x1365-0x2.zip) asan output ``` root@ubuntu:/home/tim/libming/util# export ASA...
heap overflow in decompile_SWITCH
https://api.github.com/repos/libming/libming/issues/191/comments
0
2020-01-07T01:51:41Z
2020-01-07T01:51:41Z
https://github.com/libming/libming/issues/191
546,033,507
191
998
CVE-2020-6629
2020-01-09T02:15:13.527
Ming (aka libming) 0.4.8 has z NULL pointer dereference in the function decompileGETURL2() in decompile.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/190" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "476" ]
476
https://github.com/libming/libming/issues/190
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
swftophp $poc [libming_decompile762poc-out_of_mem-idx:0xfcd-0x0.zip](https://github.com/libming/libming/files/4028435/libming_decompile762poc-out_of_mem-idx.0xfcd-0x0.zip) asan output ``` root@ubuntu:/home/tim/libming/util# ../../asan/libming/util/swftophp overflows/libming_decompile762poc-out_of_mem-idx\:0xf...
null pointer reference in decompileGETURL2
https://api.github.com/repos/libming/libming/issues/190/comments
0
2020-01-07T00:53:16Z
2020-01-07T00:53:16Z
https://github.com/libming/libming/issues/190
546,016,991
190
999
CVE-2020-6630
2020-01-09T02:15:13.590
An issue was discovered in GPAC version 0.8.0. There is a NULL pointer dereference in the function gf_isom_get_media_data_size() in isomedia/isom_read.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1377" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/1377
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [ yes] I looked for a similar issue and couldn't find any. - [ yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ yes] I give en...
null pointer reference in gf_isom_get_media_data_size
https://api.github.com/repos/gpac/gpac/issues/1377/comments
1
2020-01-02T00:45:04Z
2020-01-08T15:42:17Z
https://github.com/gpac/gpac/issues/1377
544,416,874
1,377
1,000
CVE-2020-6631
2020-01-09T02:15:13.653
An issue was discovered in GPAC version 0.8.0. There is a NULL pointer dereference in the function gf_m2ts_stream_process_pmt() in media_tools/m2ts_mux.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1378" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/1378
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [ yes] I looked for a similar issue and couldn't find any. - [ yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ yes] I give en...
null pointer reference in gf_m2ts_stream_process_pmt
https://api.github.com/repos/gpac/gpac/issues/1378/comments
2
2020-01-02T00:49:55Z
2020-01-17T15:09:51Z
https://github.com/gpac/gpac/issues/1378
544,417,280
1,378
1,001
CVE-2019-20374
2020-01-09T23:15:10.367
A mutation cross-site scripting (XSS) issue in Typora through 0.9.9.31.2 on macOS and through 0.9.81 on Linux leads to Remote Code Execution through Mermaid code blocks. To exploit this vulnerability, one must open a file in Typora. The XSS vulnerability is then triggered due to improper HTML sanitization. Given that t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/cure53/DOMPurify/commit/4e8af7b2c4a159b683d317e02c5cbddb86dc4a0e" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:typora:typora:*:*:*:*:*:*:*:*", "matchCriteriaId": "E150220E-EC72-4C16-A3A7-B22F8092F693", "versionEndExcluding": null, "versionEndIncluding": "0.9.81", "versionStartExcludin...
[ "79" ]
79
https://github.com/typora/typora-issues/issues/3124
[ "Third Party Advisory" ]
github.com
[ "typora", "typora-issues" ]
# Summary A mXSS in Typora leads to remote code execution. The vector is Mermaid code blocks (HTML labels) however other spots where Typora attempts to clean up HTML using DOMPurify could be prone to the same. # Steps to reproduce / PoC 1. Create an .md with the following contents: ~~~ ```mermaid graph T...
Typora RCE via mXSS
https://api.github.com/repos/typora/typora-issues/issues/3124/comments
2
2019-12-27T22:37:51Z
2020-02-25T15:36:23Z
https://github.com/typora/typora-issues/issues/3124
543,010,305
3,124
1,002
CVE-2019-20378
2020-01-11T03:15:10.730
ganglia-web (aka Ganglia Web Frontend) through 3.7.5 allows XSS via the header.php ce parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ganglia/ganglia-web/issues/351" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://git...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ganglia:ganglia-web:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE611052-8336-4023-AA79-AEB5D33DFCB9", "versionEndExcluding": null, "versionEndIncluding": "3.7.5", "versionStartExc...
[ "79" ]
79
https://github.com/ganglia/ganglia-web/issues/351
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ganglia", "ganglia-web" ]
When I visited the installed web page , I found this version has 2 Reflect Cross-site scripting (XSS) in the page. I found the apt-get installed the version 3.6.1 of ganglia-webfrontend default, maybe there are many ganglia users used apt-get to installed this ganglia-webfrontend version. header.php 411 $custom...
Two XSS issue found in 3.6.1
https://api.github.com/repos/ganglia/ganglia-web/issues/351/comments
4
2019-12-17T01:38:44Z
2024-02-16T04:44:29Z
https://github.com/ganglia/ganglia-web/issues/351
538,781,783
351
1,003
CVE-2020-6838
2020-01-11T03:15:10.950
In mruby 2.1.0, there is a use-after-free in hash_values_at in mrbgems/mruby-hash-ext/src/hash-ext.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mruby/mruby/issues/4926" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mruby:mruby:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "853BAA9F-67B8-40FB-95CC-C23CF1FAA31E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "416" ]
416
https://github.com/mruby/mruby/issues/4926
[ "Exploit", "Third Party Advisory" ]
github.com
[ "mruby", "mruby" ]
compile mruby in ubuntu18.04 64 bit with ASAN. poc: ``` a=0 b="asdfasdfasdf adaf asdf asdfa sdf asdfasdfasdfa sdf" c={1=>1, 2=>"foo", "foo"=>nil, nil=> nil} d=[1,nil," sdfg"] srand(1337) a = c.values_at(b,a,b,d,c,a,d,d,c,d,b,b,b,b,d,c,a,c,a,d,d,b,a,c,d,c,c,b,c,a,a,b,d,b,d,c,c,a,a,b,c,a,d,c,b,b,c,c,d,a,c,d,d...
heap use after free in hash_values_at in mrbgems/mruby-hash-ext/src/hash-ext.c:33
https://api.github.com/repos/mruby/mruby/issues/4926/comments
2
2020-01-10T08:47:38Z
2020-01-27T22:04:00Z
https://github.com/mruby/mruby/issues/4926
547,943,851
4,926
1,004
CVE-2020-6839
2020-01-11T03:15:11.027
In mruby 2.1.0, there is a stack-based buffer overflow in mrb_str_len_to_dbl in string.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mruby/mruby/issues/4929" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mruby:mruby:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "853BAA9F-67B8-40FB-95CC-C23CF1FAA31E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "787" ]
787
https://github.com/mruby/mruby/issues/4929
[ "Exploit", "Third Party Advisory" ]
github.com
[ "mruby", "mruby" ]
build mruby in ubuntu18.04 64 bit with ASAN poc: ``` a=0 b="asdfasdfasdf adaf asdf asdfa sdf asdfasdfasdfa sdf" c={1=>1, 2=>"foo", "foo"=>nil, nil=> nil} d=[1,nil," sdfg"] srand(1337) a = d.prepend(c,c,){|| } d = d.reverse(){|| } b = b.rstrip(){|| } a = d.join(){|| } a = d.Float(a,){|| } ``` resu...
stack overflow in mrb_str_len_to_dbl in src/string.c:2542
https://api.github.com/repos/mruby/mruby/issues/4929/comments
3
2020-01-10T08:51:54Z
2020-01-27T21:56:59Z
https://github.com/mruby/mruby/issues/4929
547,945,726
4,929
1,005
CVE-2020-6840
2020-01-11T03:15:11.090
In mruby 2.1.0, there is a use-after-free in hash_slice in mrbgems/mruby-hash-ext/src/hash-ext.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/mruby/mruby/issues/4927" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mruby:mruby:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "853BAA9F-67B8-40FB-95CC-C23CF1FAA31E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "416" ]
416
https://github.com/mruby/mruby/issues/4927
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "mruby", "mruby" ]
build mruby in ubuntu18.04 64 bit with ASAN poc: ``` a=0 b="asdfasdfasdf adaf asdf asdfa sdf asdfasdfasdfa sdf" c={1=>1, 2=>"foo", "foo"=>nil, nil=> nil} d=[1,nil," sdfg"] srand(1337) a = d.instance_eval(){|| } a = c.slice(c,c,a,c,c,d,d,c,c,a,a,c,b,a,c,c,a,d,d,b,a,a,a,c,d,b,a,d,a,a,d,d,c,c,a,d,a,a,b,d,b,c,c...
heap use after free in hash_slice in mrbgems/mruby-hash-ext/src/hash-ext.c:61
https://api.github.com/repos/mruby/mruby/issues/4927/comments
3
2020-01-10T08:49:02Z
2020-01-27T21:53:27Z
https://github.com/mruby/mruby/issues/4927
547,944,492
4,927
1,006
CVE-2019-20377
2020-01-11T04:15:10.927
TopList before 2019-09-03 allows XSS via a title.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/tophubs/TopList/issues/32" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/tophubs/TopList/issues/32" } ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tophub:toplist:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BD8724C-4223-4B99-9694-B2C98152AF61", "versionEndExcluding": "2019-09-03", "versionEndIncluding": null, "versionStartExc...
[ "79" ]
79
https://github.com/tophubs/TopList/issues/32
[ "Third Party Advisory" ]
github.com
[ "tophubs", "TopList" ]
I watched a odd title when I visited your website
There is a Cross Site Scripting(XSS) Vulnerability
https://api.github.com/repos/tophubs/TopList/issues/32/comments
4
2019-09-03T08:37:33Z
2020-01-12T08:40:36Z
https://github.com/tophubs/TopList/issues/32
488,467,484
32
1,007
CVE-2020-6851
2020-01-13T06:15:10.957
OpenJPEG through 2.3.1 has a heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c because of lack of opj_j2k_update_image_dimensions validation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0262" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0274" }, { "source"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "0142BF7B-EBFC-4EAD-87C8-7D0FFF7E9486", "versionEndExcluding": null, "versionEndIncluding": "2.3.1", "versionStartExcl...
[ "787" ]
787
https://github.com/uclouvain/openjpeg/issues/1228
[ "Exploit", "Third Party Advisory" ]
github.com
[ "uclouvain", "openjpeg" ]
Hi, I found a heap buffer overflow that affects at least version 2.3.1 and current master (ac3737372a00b8778b528094dd5bd58a74f67d42). On a regular build of openjpeg (in my case, the one shipped by Arch Linux), it leads to a crash; when building the project with address sanitizer, I get the following report: ``` ...
Heap buffer overflow in libopenjp2
https://api.github.com/repos/uclouvain/openjpeg/issues/1228/comments
3
2020-01-10T13:00:24Z
2020-01-18T10:11:49Z
https://github.com/uclouvain/openjpeg/issues/1228
548,066,919
1,228
1,008
CVE-2020-6860
2020-01-13T07:15:10.557
libmysofa 0.9.1 has a stack-based buffer overflow in readDataVar in hdf/dataobject.c during the reading of a header message attribute.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hoene/libmysofa/issues/96" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symonics:libmysofa:0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "CD74AEE2-5219-4872-94D2-F63C8459CAC4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "787" ]
787
https://github.com/hoene/libmysofa/issues/96
[ "Exploit", "Third Party Advisory" ]
github.com
[ "hoene", "libmysofa" ]
We found Stack Buffer Overflow in mysofa2json binary and mysofa2json is complied with clang enabling ASAN. **Machine Setup** ``` Machine : Ubuntu 16.04.3 LTS gcc version 5.4.0 20160609 (Ubuntu 5.4.0-6ubuntu1~16.04.11) Commit : be7ac15 Command : mysofa2json POC ``` **POC** : [POC.zip](https://github.com/hoene/...
Stack Buffer Overflow in mysofa2json
https://api.github.com/repos/hoene/libmysofa/issues/96/comments
9
2020-01-10T09:56:42Z
2020-01-11T21:36:10Z
https://github.com/hoene/libmysofa/issues/96
547,977,105
96
1,009
CVE-2020-6948
2020-01-13T19:15:12.850
A remote code execution issue was discovered in HashBrown CMS through 1.3.3. Server/Entity/Deployer/GitDeployer.js has a Service.AppService.exec call that mishandles the URL, repository, username, and password.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/HashBrownCMS/hashbrown-cms/issues/326" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hashbrowncms:hashbrown_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "F17E18B3-CD08-499E-B6EA-B6B26AEC76EB", "versionEndExcluding": null, "versionEndIncluding": "1.3.3", "versionS...
[ "78" ]
78
https://github.com/HashBrownCMS/hashbrown-cms/issues/326
[ "Exploit", "Third Party Advisory" ]
github.com
[ "HashBrownCMS", "hashbrown-cms" ]
In file src/Server/Entity/Deployer/GitDeployer.js: await HashBrown.Service.AppService.exec('git clone \'' + url + '\' \'' + repoPath + '\''); The url, username, password and other parameters accept value without proper security check. If I set the git url to something like "10.154.159.166/git' $(bash -c ...
remote code execution vulnerability
https://api.github.com/repos/HashBrownCMS/hashbrown-cms/issues/326/comments
8
2020-01-12T08:00:45Z
2020-01-14T10:20:22Z
https://github.com/HashBrownCMS/hashbrown-cms/issues/326
548,535,998
326
1,010
CVE-2020-6949
2020-01-13T19:15:12.930
A privilege escalation issue was discovered in the postUser function in HashBrown CMS through 1.3.3. An editor user can change the password hash of an admin user's account, or otherwise reconfigure that account.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/HashBrownCMS/hashbrown-cms/issues/327" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hashbrowncms:hashbrown_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "F17E18B3-CD08-499E-B6EA-B6B26AEC76EB", "versionEndExcluding": null, "versionEndIncluding": "1.3.3", "versionS...
[ "269" ]
269
https://github.com/HashBrownCMS/hashbrown-cms/issues/327
[ "Exploit", "Third Party Advisory" ]
github.com
[ "HashBrownCMS", "hashbrown-cms" ]
editor role user can change admin user's properties including password hash, salt and token. let's say you have 2 users in db id name isadmin hash 1111 admin true aaaaaa 2222 editor false bbbbbb editor user can use the postuser function to change his password. Attacker can use this func...
vulnerability that editor user can change admin user's password
https://api.github.com/repos/HashBrownCMS/hashbrown-cms/issues/327/comments
7
2020-01-12T08:14:48Z
2020-01-13T17:02:26Z
https://github.com/HashBrownCMS/hashbrown-cms/issues/327
548,537,289
327
1,011
CVE-2020-6958
2020-01-14T00:15:11.410
An XXE vulnerability in JnlpSupport in Yet Another Java Service Wrapper (YAJSW) 12.14, as used in NSA Ghidra and other products, allows attackers to exfiltrate data from remote hosts and potentially cause denial-of-service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/NationalSecurityAgency/ghidra/issues/943" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/purpleracc00n/Exploits...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yet_another_java_service_wrapper_project:yet_another_java_service_wrapper:12.14:*:*:*:*:*:*:*", "matchCriteriaId": "79AF9ACB-D0C6-4843-92AD-666753567434", "versionEndExcluding": null, "v...
[ "611" ]
611
https://github.com/NationalSecurityAgency/ghidra/issues/943
[ "Exploit", "Third Party Advisory" ]
github.com
[ "NationalSecurityAgency", "ghidra" ]
**Describe the bug** XXE vulnerability in YAJSW’s JnlpSupport affects Ghidra Server. An insecure way to parse XML input was found in JnlpSupport class from Yet Another Java Service Wrapper used by Ghidra (up to latest version). **To Reproduce** Steps to reproduce the behavior: 1. Create an XXE payload file ...
XXE Vulnerability in JnlpSupport of YAJSW affects Ghidra Server
https://api.github.com/repos/NationalSecurityAgency/ghidra/issues/943/comments
2
2019-08-27T14:21:52Z
2021-12-22T10:34:15Z
https://github.com/NationalSecurityAgency/ghidra/issues/943
485,841,948
943
1,012
CVE-2020-6173
2020-01-14T19:15:13.797
TUF (aka The Update Framework) 0.7.2 through 0.12.1 allows Uncontrolled Resource Consumption.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/theupdateframework/tuf/commits/develop" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:linuxfoundation:the_update_framework:*:*:*:*:*:*:*:*", "matchCriteriaId": "A88741B4-0593-41A4-BD46-9EE4E3905DBA", "versionEndExcluding": null, "versionEndIncluding": "0.12.1", ...
[ "400" ]
400
https://github.com/theupdateframework/tuf/issues/973
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "theupdateframework", "tuf" ]
We received the report below about an attacker that can create many invalid signatures on a metadata file, delaying the moment when the client will determine the signature is not valid. This delay may be for at least a few minutes, but possibly could be longer especially if multiple files are impacted. Possible rem...
Potential DoS for attacker that can create metadata files...
https://api.github.com/repos/theupdateframework/python-tuf/issues/973/comments
2
2020-01-08T17:09:34Z
2020-09-10T10:46:46Z
https://github.com/theupdateframework/python-tuf/issues/973
546,990,659
973
1,013
CVE-2020-7054
2020-01-14T21:15:16.707
MmsValue_decodeMmsData in mms/iso_mms/server/mms_access_result.c in libIEC61850 through 1.4.0 has a heap-based buffer overflow when parsing the MMS_BIT_STRING data type.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mz-automation/libiec61850/issues/200" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mz-automation:libiec61850:*:*:*:*:*:*:*:*", "matchCriteriaId": "9889D0B1-2E87-4FA4-A80B-AA481308ECDE", "versionEndExcluding": null, "versionEndIncluding": "1.4.0", "versionSt...
[ "787" ]
787
https://github.com/mz-automation/libiec61850/issues/200
[ "Exploit", "Third Party Advisory" ]
github.com
[ "mz-automation", "libiec61850" ]
When libiec61850 parsing type `MMS_BIT_STRING`, it doesn't check variable `bufPos`. So we can provide a larger number for `bufPos`, then memory copy from `buffer` + `bufPos` + 1 lead to heap overflow. <img width="631" alt="Screen Shot 2020-01-13 at 1 18 25 AM" src="https://user-images.githubusercontent.com/20929895/72...
heap overflow when parsing `MMS_BIT_STRING` in MmsValue_decodeMmsData in mms/iso_mms/server/mms_access_result.c
https://api.github.com/repos/mz-automation/libiec61850/issues/200/comments
3
2020-01-12T17:21:08Z
2020-01-15T07:07:07Z
https://github.com/mz-automation/libiec61850/issues/200
548,600,159
200
1,014
CVE-2020-7058
2020-01-15T07:15:12.927
data_input.php in Cacti 1.2.8 allows remote code execution via a crafted Input String to Data Collection -> Data Input Methods -> Unix -> Ping Host. NOTE: the vendor has stated "This is a false alarm.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Cacti/cacti/issues/3186" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cacti:cacti:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "2D05824B-4E66-44CA-A862-0DDDB23C8C88", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "20" ]
20
https://github.com/Cacti/cacti/issues/3186
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Cacti", "cacti" ]
**Describe the bug** Input validation error in data_input.php leads to Remote Code Execution via Input String (Script/Command) edit actions. By default, Cacti was installed with several Data Input Methods. Some of them was created using Script/Command input type. An attacker will be able to edit the Input String to in...
Critical vulnerability: Remote Code Execution via string/command type Input String
https://api.github.com/repos/Cacti/cacti/issues/3186/comments
19
2020-01-14T22:53:20Z
2020-08-23T00:04:30Z
https://github.com/Cacti/cacti/issues/3186
549,865,124
3,186
1,015
CVE-2020-7105
2020-01-16T04:15:11.617
async.c and dict.c in libhiredis.a in hiredis through 0.14.0 allow a NULL pointer dereference because malloc return values are unchecked.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/redis/hiredis/issues/747" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redislabs:hiredis:*:*:*:*:*:*:*:*", "matchCriteriaId": "485B9377-2288-48C5-9B4F-2DF0DB0E2C44", "versionEndExcluding": null, "versionEndIncluding": "0.14.0", "versionStartExcl...
[ "476" ]
476
https://github.com/redis/hiredis/issues/747
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "redis", "hiredis" ]
The following code never aborts when `malloc` is unsuccessful, causing dereferencing of null pointers. async.c:61 ```C redisCallback *dup = malloc(sizeof(*dup)); memcpy(dup,src,sizeof(*dup)); // dup may be null return dup; ``` dict.c:75 ```C dict *ht = malloc(sizeof(*ht)); _dictInit(ht,type,privDataPtr); ...
Null pointer dereferencing in dict.c and async.c
https://api.github.com/repos/redis/hiredis/issues/747/comments
6
2020-01-09T21:34:41Z
2020-01-22T18:59:34Z
https://github.com/redis/hiredis/issues/747
547,736,563
747
1,016
CVE-2020-7106
2020-01-16T04:15:11.697
Cacti 1.2.8 has stored XSS in data_sources.php, color_templates_item.php, graphs.php, graph_items.php, lib/api_automation.php, user_admin.php, and user_group_admin.php, as demonstrated by the description parameter in data_sources.php (a raw string from the database that is displayed by $header to trigger the XSS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB72E0C8-BC84-4F75-A844-9D9D41031118", "versionEndExcluding": "1.2.9", "versionEndIncluding": null, "versionStartExcluding":...
[ "79" ]
79
https://github.com/Cacti/cacti/issues/3191
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Cacti", "cacti" ]
**Describe the bug** Data source input validation error leads to Stored XSS within Description after creating a device with Malicious code embedded in Description field. **To Reproduce** Steps to reproduce the behavior: 1. Navigate to Console -> Create -> New Device 2. In Description field, input script payload:...
Lack of escaping on some pages can lead to XSS exposure (CVE-2020-7106)
https://api.github.com/repos/Cacti/cacti/issues/3191/comments
21
2020-01-15T19:15:24Z
2020-06-30T12:34:01Z
https://github.com/Cacti/cacti/issues/3191
550,377,486
3,191
1,017
CVE-2020-7237
2020-01-20T05:15:11.687
Cacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. OS commands are executed when a new poller cycle begins. The attacker must be authenticated, and must have access to modify the Performance Settings of the product.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cacti:cacti:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "2D05824B-4E66-44CA-A862-0DDDB23C8C88", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "78" ]
78
https://github.com/Cacti/cacti/issues/3201
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Cacti", "cacti" ]
**Describe the bug** An input validation error found in Boost Debug Log field leads to Remote Code Execution. **To Reproduce** Steps to reproduce the behavior: 1. Navigate to Console -> Configuration -> Settings -> Performance 2. In Boost Debug Log field, type in the payload: `--verbose; cat /etc/passwd > rce.t...
Remote Code Execution due to input validation failure in Performance Boost Debug Log (CVE-2020-7237)
https://api.github.com/repos/Cacti/cacti/issues/3201/comments
2
2020-01-19T06:04:29Z
2020-06-30T12:34:01Z
https://github.com/Cacti/cacti/issues/3201
551,872,554
3,201
1,018
CVE-2020-7229
2020-01-21T17:15:12.863
An issue was discovered in Simplejobscript.com SJS before 1.65. There is unauthenticated SQL injection via the search engine. The parameter is landing_location. The function is countSearchedJobs(). The file is _lib/class.Job.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/niteosoft/simplejobscript/issues/7" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory", "URL Repurposed" ], "url": "https://simplejobscript.com" }, { "so...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:simplejobscript:simplejobscript:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB5C84B9-3990-499E-ACFF-1E8F990A4691", "versionEndExcluding": "1.65", "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/niteosoft/simplejobscript/issues/7
[ "Third Party Advisory" ]
github.com
[ "niteosoft", "simplejobscript" ]
**Description:** An issue was discovered in Simplejobscript.com SJS before 1.65. There is unauthenticated SQL injection via the search engine. The parameter is `landing_location`. The function is `countSearchedJobs()`. The file is `_lib/class.Job.php`. **Environment:** - Version: 1.64 - OS: Ubuntu 16.10 - Web se...
[security] CVE-2020-7229, SQL injection in search function
https://api.github.com/repos/niteosoft/simplejobscript/issues/7/comments
5
2020-01-10T14:55:41Z
2020-01-19T11:12:18Z
https://github.com/niteosoft/simplejobscript/issues/7
548,124,219
7
1,019
CVE-2019-17357
2020-01-21T19:15:13.067
Cacti through 1.2.7 is affected by a graphs.php?template_id= SQL injection vulnerability affecting how template identifiers are handled when a string and id composite value are used to identify the template type and id. An authenticated attacker can exploit this to extract data from the database, or an unauthenticated ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4F5AE29-35EB-4B0E-8304-F5520AAE998B", "versionEndExcluding": null, "versionEndIncluding": "1.2.7", "versionStartExcluding":...
[ "89" ]
89
https://github.com/Cacti/cacti/issues/3025
[ "Patch", "Third Party Advisory" ]
github.com
[ "Cacti", "cacti" ]
**Describe the bug** As reported by Eldar Marcussen of xen1thLabs there is a SQL injection vulnerability in Cacti's graphs.php. **Expected behavior** Cacti should be not contain SQL vunderabilities
When viewing graphs, some input variables are not properly checked (SQL injection possible)
https://api.github.com/repos/Cacti/cacti/issues/3025/comments
4
2019-10-12T19:46:24Z
2020-06-30T12:49:01Z
https://github.com/Cacti/cacti/issues/3025
506,229,820
3,025
1,020
CVE-2019-20391
2020-01-22T22:15:10.080
An invalid memory access flaw is present in libyang before v1.0-r3 in the function resolve_feature_value() when an if-feature statement is used inside a bit. Applications that use libyang to parse untrusted input yang files may crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793934" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesnet:libyang:0.11:r1:*:*:*:*:*:*", "matchCriteriaId": "65E91322-5F67-43C2-8112-5ECAEC2A3C12", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "119" ]
119
https://github.com/CESNET/libyang/issues/772
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CESNET", "libyang" ]
Hi, here is another file that crashes yangfuzz and yanglint. ``` module all { yang-version 1.1; namespace "urn:all"; prefix all_mod; grouping t1 { uses group1 { } leaf leaf12 { type bits { bit flag0 { position 0; if-feature "feat1"; ...
Segmentation fault in yangfuzz and yanglint
https://api.github.com/repos/CESNET/libyang/issues/772/comments
1
2019-04-26T17:01:20Z
2020-01-23T09:16:54Z
https://github.com/CESNET/libyang/issues/772
437,762,832
772
1,021
CVE-2019-20392
2020-01-22T22:15:10.143
An invalid memory access flaw is present in libyang before v1.0-r1 in the function resolve_feature_value() when an if-feature statement is used inside a list key node, and the feature used is not defined. Applications that use libyang to parse untrusted input yang files may crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793922" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesnet:libyang:0.11:r1:*:*:*:*:*:*", "matchCriteriaId": "65E91322-5F67-43C2-8112-5ECAEC2A3C12", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "119" ]
119
https://github.com/CESNET/libyang/issues/723
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CESNET", "libyang" ]
If an if-feature statement is used inside a list key node, and the feature used is not defined, yanglint and yangfuzz segfault in lys_parse_path. Here is an example of a yang file that crashes the parser: ``` module links { namespace "urn:module2"; prefix mod2; list list-for-augment { key "keyleaf"...
Segmentation fault when if-feature is used in list key node, with a non existing feature
https://api.github.com/repos/CESNET/libyang/issues/723/comments
7
2019-03-07T19:25:40Z
2020-01-23T15:30:39Z
https://github.com/CESNET/libyang/issues/723
418,474,100
723
1,022
CVE-2019-20393
2020-01-22T22:15:10.237
A double-free is present in libyang before v1.0-r1 in the function yyparse() when an empty description is used. Applications that use libyang to parse untrusted input yang files may be vulnerable to this flaw, which would cause a crash or potentially code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793930" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesnet:libyang:0.11:r1:*:*:*:*:*:*", "matchCriteriaId": "65E91322-5F67-43C2-8112-5ECAEC2A3C12", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "415" ]
415
https://github.com/CESNET/libyang/issues/742
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CESNET", "libyang" ]
Hi, this file crashes lys_parse_path: ``` module links { yang-version 1.1; namespace "urn:mo:1"; prefix yang; import ietf-yang-metadata { prefix md; revision-date 2016-08-05; } md:annotation value { reference "RFC7950 section 7.7.9."; description; } } ```
Heap corruption in yyparse
https://api.github.com/repos/CESNET/libyang/issues/742/comments
1
2019-03-29T11:16:03Z
2020-01-23T09:16:30Z
https://github.com/CESNET/libyang/issues/742
426,937,550
742
1,023
CVE-2019-20394
2020-01-22T22:15:10.330
A double-free is present in libyang before v1.0-r3 in the function yyparse() when a type statement in used in a notification statement. Applications that use libyang to parse untrusted input yang files may be vulnerable to this flaw, which would cause a crash or potentially code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793932" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesnet:libyang:0.11:r1:*:*:*:*:*:*", "matchCriteriaId": "65E91322-5F67-43C2-8112-5ECAEC2A3C12", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "415" ]
415
https://github.com/CESNET/libyang/issues/769
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CESNET", "libyang" ]
Hi, this file causes heap corruption and crashes lys_parse_path ``` module mod6 { prefix abc; namespace "http://www.example.c; yang-version 1.1; container cont1 { //x" { } augment "/aug-cont" { list list2 { key "ke...
Heap corruption in lys_parse_path due to type statement in notification statement
https://api.github.com/repos/CESNET/libyang/issues/769/comments
1
2019-04-26T09:14:19Z
2020-01-23T09:16:42Z
https://github.com/CESNET/libyang/issues/769
437,576,729
769
1,024
CVE-2019-20395
2020-01-22T22:15:10.423
A stack consumption issue is present in libyang before v1.0-r1 due to the self-referential union type containing leafrefs. Applications that use libyang to parse untrusted input yang files may crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793924" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/commit/4...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesnet:libyang:0.11:r1:*:*:*:*:*:*", "matchCriteriaId": "65E91322-5F67-43C2-8112-5ECAEC2A3C12", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "674" ]
674
https://github.com/CESNET/libyang/issues/724
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CESNET", "libyang" ]
Hi, the following yang file causes a segmentation fault in lys_parse_path, caused by a stack overflow due to too many function calls. ``` module mod1 { namespace "urn:all"; prefix av; yang-version 1.1; leaf l1 { type union-type; } leaf-list list5 { type string;...
Segmentation fault due to self-refential union type containing leafrefs
https://api.github.com/repos/CESNET/libyang/issues/724/comments
4
2019-03-08T10:26:25Z
2020-01-23T09:15:53Z
https://github.com/CESNET/libyang/issues/724
418,726,165
724
1,025
CVE-2019-20396
2020-01-22T22:15:10.470
A segmentation fault is present in yyparse in libyang before v1.0-r1 due to a malformed pattern statement value during lys_parse_path parsing.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/commit/a1f17693904ed6fecc8902c747fc50a8f20e6af8" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/CE...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesnet:libyang:0.11:r1:*:*:*:*:*:*", "matchCriteriaId": "65E91322-5F67-43C2-8112-5ECAEC2A3C12", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "119" ]
119
https://github.com/CESNET/libyang/issues/740
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CESNET", "libyang" ]
Hello, this file crashes libyang when it is parsed with lys_parse_path: ``` module xpath-1.1 { namespace "urn:xpath-1.1"; prefix xp; container top { leaf identref { type mdentityref { base:iwo; pattern '[A-Z]+'; patter...
Segmentation fault in yyparse due to malformed pattern statement value
https://api.github.com/repos/CESNET/libyang/issues/740/comments
1
2019-03-29T10:38:30Z
2020-01-23T09:16:18Z
https://github.com/CESNET/libyang/issues/740
426,922,796
740
1,026
CVE-2019-20397
2020-01-22T22:15:10.550
A double-free is present in libyang before v1.0-r1 in the function yyparse() when an organization field is not terminated. Applications that use libyang to parse untrusted input yang files may be vulnerable to this flaw, which would cause a crash or potentially code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793928" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesnet:libyang:0.11:r1:*:*:*:*:*:*", "matchCriteriaId": "65E91322-5F67-43C2-8112-5ECAEC2A3C12", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "415" ]
415
https://github.com/CESNET/libyang/issues/739
[ "Third Party Advisory" ]
github.com
[ "CESNET", "libyang" ]
Hello, this file crashes lys_parse_path: ``` module ietf-datastores { yang-version 1.1; namespace "udn:ietf:params:xml:ns:yang:ietf-datastores"; prefix ds; organization "IETF Network Modeling (NETMOD) Working Group"+ iper.net> } ``` Regards, Juraj
Heap corruption due to invalid unterminated organization field in YANG file
https://api.github.com/repos/CESNET/libyang/issues/739/comments
1
2019-03-28T09:31:50Z
2020-01-23T09:16:06Z
https://github.com/CESNET/libyang/issues/739
426,387,403
739
1,027
CVE-2019-20398
2020-01-22T22:15:10.627
A NULL pointer dereference is present in libyang before v1.0-r3 in the function lys_extension_instances_free() due to a copy of unresolved extensions in lys_restr_dup(). Applications that use libyang to parse untrusted input yang files may crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793935" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/CESNET/libyang/commit/7...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesnet:libyang:0.11:r1:*:*:*:*:*:*", "matchCriteriaId": "65E91322-5F67-43C2-8112-5ECAEC2A3C12", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "476" ]
476
https://github.com/CESNET/libyang/issues/773
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CESNET", "libyang" ]
Hi, this file crashes yanglint due to unprintable characters at the end of the file. Shortening the error message string removes the crash too, so I guess both issues are relevant. ``` module n00 { yang-version 1.1; namespace "urn:all"; prefix all_mod; container cont1 { ...
Segmentation fault in yanglint and yangfuzz due to unprintable characters
https://api.github.com/repos/CESNET/libyang/issues/773/comments
1
2019-04-29T13:21:12Z
2020-01-23T09:17:06Z
https://github.com/CESNET/libyang/issues/773
438,312,481
773
1,028
CVE-2020-5223
2020-01-23T02:15:13.423
In PrivateBin versions 1.2.0 before 1.2.2, and 1.3.0 before 1.3.2, a persistent XSS attack is possible. Under certain conditions, a user provided attachment file name can inject HTML leading to a persistent Cross-site scripting (XSS) vulnerability. The vulnerability has been fixed in PrivateBin v1.3.2 & v1.2.2. Admins ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", ...
[ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/PrivateBin/PrivateBin/commit/8d0ac336d23cd8c98e71d5f21cdadcae9c8a26e6" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://gi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:privatebin:privatebin:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1889EB9-8FB8-467F-B66C-4649A5B9373E", "versionEndExcluding": "1.2.2", "versionEndIncluding": null, "versionStartE...
[ "79" ]
79
https://github.com/PrivateBin/PrivateBin/issues/554
[ "Third Party Advisory" ]
github.com
[ "PrivateBin", "PrivateBin" ]
I investigated the error condition found in the [property based unit test](https://github.com/PrivateBin/PrivateBin/blob/master/tst/README.md#property-based-unit-testing) with [RNG state 8b8f0d4ec2a67139b5](https://travis-ci.org/PrivateBin/PrivateBin/jobs/629180605#L782) for the `AttachmentViewer` class in an unrelated...
HTML injection via unescaped attachment filename
https://api.github.com/repos/PrivateBin/PrivateBin/issues/554/comments
3
2019-12-25T08:12:19Z
2020-01-11T12:08:54Z
https://github.com/PrivateBin/PrivateBin/issues/554
542,288,595
554
1,029
CVE-2020-5217
2020-01-23T03:15:10.793
In Secure Headers (RubyGem secure_headers), a directive injection vulnerability is present in versions before 3.8.0, 5.1.0, and 6.2.0. If user-supplied input was passed into append/override_content_security_policy_directives, a semicolon could be injected leading to directive injection. This could be used to e.g. overr...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/twitter/secure_headers/commit/936a160e3e9659737a9f9eafce13eea36b5c9fa3" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:twitter:secure_headers:*:*:*:*:*:ruby:*:*", "matchCriteriaId": "F0F5AB6F-E584-4640-A497-3BC81A4171C8", "versionEndExcluding": "3.8.0", "versionEndIncluding": null, "versionSt...
[ "74" ]
74
https://github.com/twitter/secure_headers/issues/418
[ "Exploit", "Third Party Advisory" ]
github.com
[ "twitter", "secure_headers" ]
Consider the following Rails controller action which overwrites the frame ancestors based on some user input: ```ruby def show user_input_domain1 = URI.parse "https://google.com;script-src" user_input_domain2 = URI.parse "https://*;.;" user_input_domains = [user_input_domain1, user_input_domain2] over...
Filtering CSP entries to prevent bypassing rules
https://api.github.com/repos/github/secure_headers/issues/418/comments
8
2020-01-21T16:25:57Z
2020-01-22T09:51:06Z
https://github.com/github/secure_headers/issues/418
552,986,063
418
1,030
CVE-2020-7226
2020-01-24T15:15:14.093
CiphertextHeader.java in Cryptacular 1.2.3, as used in Apereo CAS and other products, allows attackers to trigger excessive memory allocation during a decode operation, because the nonce array length associated with "new byte" may depend on untrusted input within the header of encoded data.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/apereo/cas/commit/8810f2b6c71d73341d4dde6b09a18eb46cfd6d45" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://gi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vt:cryptacular:*:*:*:*:*:*:*:*", "matchCriteriaId": "40E7BD9E-6868-4BDF-B686-7E018458ABF5", "versionEndExcluding": "1.1.4", "versionEndIncluding": null, "versionStartExcludin...
[ "770" ]
770
https://github.com/vt-middleware/cryptacular/issues/52
[ "Exploit", "Third Party Advisory" ]
github.com
[ "vt-middleware", "cryptacular" ]
Please confirm if it is vulnerable. Mitre id: CVE-2020-7226 Reporter: findneo > [Suggested description] > CiphertextHeader.java in > Cryptacular 1.2.3, as used in Apereo CAS and other products, allows > attackers to trigger excessive memory allocation during a decode > operation, because the nonce array length...
Denial of Service in latest version [1.2.3]
https://api.github.com/repos/vt-middleware/cryptacular/issues/52/comments
7
2020-01-19T15:37:20Z
2020-02-27T14:58:50Z
https://github.com/vt-middleware/cryptacular/issues/52
551,940,473
52
1,031
CVE-2019-20421
2020-01-27T05:15:10.453
In Jp2Image::readMetadata() in jp2image.cpp in Exiv2 0.27.2, an input file can result in an infinite loop and hang, with high CPU consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/commit/a82098f4f90cd86297131b5663c3dec6a34470e8" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:0.27.2:*:*:*:*:*:*:*", "matchCriteriaId": "7E9A8822-0F6F-4561-81B3-38235F52116E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "835" ]
835
https://github.com/Exiv2/exiv2/issues/1011
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "Exiv2", "exiv2" ]
**Describe the bug** An input file can result in an infinite loop and hang, with high CPU consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file. **To Reproduce** Steps to reproduce the behaviour: excute 'build/bin/exiv2 Jp2Image_readMetadata_loop.poc' *...
An infinite loop and hang in Exiv2::Jp2Image::readMetadata()
https://api.github.com/repos/Exiv2/exiv2/issues/1011/comments
3
2019-09-30T12:02:01Z
2020-03-29T11:43:49Z
https://github.com/Exiv2/exiv2/issues/1011
500,231,156
1,011
1,032
CVE-2020-7238
2020-01-27T17:15:12.277
Netty 4.1.43.Final allows HTTP Request Smuggling because it mishandles Transfer-Encoding whitespace (such as a [space]Transfer-Encoding:chunked line) and a later Content-Length header. This issue exists because of an incomplete fix for CVE-2019-16869.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0497" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0567" }, { "source"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netty:netty:4.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "61DFEEC7-2603-4815-AF13-179125C16222", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "444" ]
444
https://github.com/jdordonezn/CVE-2020-72381/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jdordonezn", "CVE-2020-72381" ]
Netty 4.1.43.Final allows HTTP Request Smuggling because it mishandles Transfer-Encoding whitespace (such as a [space]Transfer-Encoding:chunked line) and a later Content-Length header. **Steps to reproduce the vulnerability** 1. The hacker send a request with both "[space]Transfer-Encoding: chunked" header and "...
HTTP Request Smuggling in Netty - 4.1.43.Final
https://api.github.com/repos/jdordonezn/CVE-2020-72381/issues/1/comments
1
2020-01-26T19:58:20Z
2020-02-21T20:06:55Z
https://github.com/jdordonezn/CVE-2020-72381/issues/1
555,279,227
1
1,033
CVE-2019-20440
2020-01-28T00:15:10.823
An issue was discovered in WSO2 API Manager 2.6.0. A potential Reflected Cross-Site Scripting (XSS) vulnerability has been identified in the update API documentation feature of the API Publisher.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20440-wso2.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Se...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "79" ]
79
https://github.com/cybersecurityworks/Disclosed/issues/24
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details: WSO2 Product Bug Report Bug Name: Multiple reflected <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a> Product Name: <a href="https://wso2.com/">WSO2</a> Server: <a href="https://docs.wso2.com/display/AM260/WSO2+API+Manage...
Multiple Reflected Cross Site Scripting (XSS) in ''docName', 'version' and 'apiName' of created API document using XSS payload' | WSO2 API Manager version 2.6.0 | WSO2 Product
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/24/comments
0
2020-01-20T09:44:04Z
2020-01-20T11:52:18Z
https://github.com/cybersecurityworks/Disclosed/issues/24
552,183,556
24
1,034
CVE-2019-20441
2020-01-28T00:15:10.883
An issue was discovered in WSO2 API Manager 2.6.0. A potential Stored Cross-Site Scripting (XSS) vulnerability has been identified in the 'implement phase' of the API Publisher.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20441-wso2.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Se...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "79" ]
79
https://github.com/cybersecurityworks/Disclosed/issues/23
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details: WSO2 Product Bug Report Bug Name: Stored <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a> Product Name: <a href="https://wso2.com/">WSO2</a> Server: <a href="https://docs.wso2.com/display/AM260/WSO2+API+Manager+Documentat...
Stored Cross Site Scripting (XSS) in ' HTTP POST request with a harmful request parameter for context' | WSO2 API Manager version 2.6.0 | WSO2 Product
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/23/comments
0
2020-01-20T07:37:31Z
2020-01-20T09:42:10Z
https://github.com/cybersecurityworks/Disclosed/issues/23
552,119,549
23
1,035
CVE-2019-20442
2020-01-28T00:15:10.930
An issue was discovered in WSO2 API Manager 2.6.0, WSO2 Enterprise Integrator 6.5.0, WSO2 IS as Key Manager 5.7.0, and WSO2 Identity Server 5.8.0. A potential stored Cross-Site Scripting (XSS) vulnerability in roleToAuthorize has been identified in the registry UI.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20442-wso2.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Se...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "79" ]
79
https://github.com/cybersecurityworks/Disclosed/issues/25
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details: WSO2 Product Bug Report Bug Name: Stored <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a> Product Name: <a href="https://wso2.com/">WSO2</a> Server: <a href="https://wso2.com/identity-and-access-management/#">WSO2 Identit...
Stored Cross Site Scripting (XSS) in 'roleToAuthorize' variable | WSO2 Product (WSO2 Identity Server version 5.7.0)
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/25/comments
0
2020-01-20T11:16:47Z
2020-01-20T11:16:47Z
https://github.com/cybersecurityworks/Disclosed/issues/25
552,235,262
25
1,036
CVE-2019-20443
2020-01-28T00:15:10.993
An issue was discovered in WSO2 API Manager 2.6.0, WSO2 Enterprise Integrator 6.5.0, WSO2 IS as Key Manager 5.7.0, and WSO2 Identity Server 5.8.0. A potential stored Cross-Site Scripting (XSS) vulnerability in mediaType has been identified in the registry UI.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20443-wso2.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Se...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "79" ]
79
https://github.com/cybersecurityworks/Disclosed/issues/26
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details: WSO2 Product Bug Report Bug Name: Stored <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a> Product Name: <a href="https://wso2.com/">WSO2</a> Server: <a href="https://wso2.com/identity-and-access-management/#">WSO2 Identit...
Stored Cross Site Scripting (XSS) in 'mediaType' variable | WSO2 Product (WSO2 Identity Server version 5.7.0)
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/26/comments
0
2020-01-20T11:30:13Z
2020-01-20T11:30:13Z
https://github.com/cybersecurityworks/Disclosed/issues/26
552,242,400
26
1,037
CVE-2019-20434
2020-01-28T01:15:11.783
An issue was discovered in WSO2 API Manager 2.6.0. A potential Reflected Cross-Site Scripting (XSS) vulnerability has been identified in the Datasource creation page of the Management Console.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20434-wso2.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Se...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "79" ]
79
https://github.com/cybersecurityworks/Disclosed/issues/17
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details: WSO2 Product Bug Report Bug Name: Multiple <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a> Product Name: <a href="https://wso2.com/">WSO2</a> Server: <a href="https://docs.wso2.com/display/DAS320/WSO2+Data+Analytics+Serv...
Multiple Reflected Cross Site Scripting (XSS) in WSO2 Product (Data Analytics Server Version 3.2.0)
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/17/comments
0
2019-11-27T10:43:00Z
2019-11-27T10:43:00Z
https://github.com/cybersecurityworks/Disclosed/issues/17
529,263,538
17
1,038
CVE-2019-20435
2020-01-28T01:15:11.877
An issue was discovered in WSO2 API Manager 2.6.0. A reflected XSS attack could be performed in the inline API documentation editor page of the API Publisher by sending an HTTP GET request with a harmful docName request parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20435-wso2.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Se...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "79" ]
79
https://github.com/cybersecurityworks/Disclosed/issues/18
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details: WSO2 Product Bug Report Bug Name: <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a> Product Name: <a href="https://wso2.com/">WSO2</a> Server: <a href="https://docs.wso2.com/display/AM260/Installing+via+the+Installer#Insta...
Reflected Cross Site Scripting (XSS) in WSO2 Product (WSO2 API Manager version 2.6.0)
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/18/comments
0
2019-11-27T12:00:44Z
2019-11-29T10:45:12Z
https://github.com/cybersecurityworks/Disclosed/issues/18
529,302,954
18
1,039
CVE-2019-20436
2020-01-28T01:15:11.957
An issue was discovered in WSO2 API Manager 2.6.0, WSO2 IS as Key Manager 5.7.0, and WSO2 Identity Server 5.8.0. If there is a claim dialect configured with an XSS payload in the dialect URI, and a user picks up this dialect's URI and adds it as the service provider claim dialect while configuring the service provider,...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20436-wso2.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Se...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "79" ]
79
https://github.com/cybersecurityworks/Disclosed/issues/19
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details: WSO2 Product Bug Report Bug Name: Stored <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a> Product Name: <a href="https://wso2.com/">WSO2</a> Server: <a href="https://wso2.com/identity-and-access-management/#">WSO2 Identit...
Stored Cross Site Scripting (XSS) in WSO2 Product (WSO2 Identity Server version 5.7.0)
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/19/comments
0
2019-11-29T10:51:10Z
2020-01-20T11:01:12Z
https://github.com/cybersecurityworks/Disclosed/issues/19
530,281,451
19
1,040
CVE-2019-20437
2020-01-28T01:15:12.037
An issue was discovered in WSO2 API Manager 2.6.0, WSO2 IS as Key Manager 5.7.0, and WSO2 Identity Server 5.8.0. When a custom claim dialect with an XSS payload is configured in the identity provider basic claim configuration, that payload gets executed, if a user picks up that dialect's URI as the provisioning claim i...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20437-wso2.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Se...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "79" ]
79
https://github.com/cybersecurityworks/Disclosed/issues/20
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details: WSO2 Product Bug Report Bug Name: Stored <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a> Product Name: <a href="https://wso2.com/">WSO2</a> Server: <a href="https://wso2.com/identity-and-access-management/#">WSO2 Identit...
Stored Cross Site Scripting (XSS) in "malicious dialect URI" on WSO2 Product - (WSO2 Identity Server version 5.7.0)
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/20/comments
0
2019-11-29T11:09:28Z
2019-11-29T12:08:12Z
https://github.com/cybersecurityworks/Disclosed/issues/20
530,289,708
20
1,041
CVE-2019-20438
2020-01-28T01:15:12.113
An issue was discovered in WSO2 API Manager 2.6.0. A potential stored Cross-Site Scripting (XSS) vulnerability has been identified in the inline API documentation editor page of the API Publisher.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20438-wso2.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Se...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "79" ]
79
https://github.com/cybersecurityworks/Disclosed/issues/22
[ "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details: WSO2 Product Bug Report Bug Name: Stored <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a> Product Name: <a href="https://wso2.com/">WSO2</a> Server: <a href="https://docs.wso2.com/display/AM260/WSO2+API+Manager+Document...
Stored Cross Site Scripting (XSS) in 'inline API documentation editor page' | WSO2 API Manager version 2.6.0 | WSO2 Product
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/22/comments
0
2020-01-17T12:35:46Z
2020-01-17T12:35:46Z
https://github.com/cybersecurityworks/Disclosed/issues/22
551,391,114
22
1,042
CVE-2019-20439
2020-01-28T01:15:12.190
An issue was discovered in WSO2 API Manager 2.6.0. A potential Reflected Cross-Site Scripting (XSS) vulnerability has been identified in defining a scope in the "manage the API" page of the API Publisher.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20439-wso2.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Se...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "79" ]
79
https://github.com/cybersecurityworks/Disclosed/issues/21
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details: WSO2 Product Bug Report Bug Name: Reflected <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a> Product Name: <a href="https://wso2.com/">WSO2</a> Server: <a href="https://docs.wso2.com/display/AM260/WSO2+API+Manager+Documen...
Reflected Cross Site Scripting (XSS) in 'roles' | WSO2 API Manager version 2.6.0 | WSO2 Product
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/21/comments
0
2019-12-24T10:37:12Z
2020-01-17T12:17:16Z
https://github.com/cybersecurityworks/Disclosed/issues/21
542,083,754
21
1,043