cve_id stringlengths 13 16 | cve_published stringdate 2019-01-01 16:29:00 2025-02-25 20:15:37 | cve_descriptions stringlengths 34 2.6k | cve_metrics dict | cve_references listlengths 1 281 | cve_configurations listlengths 1 70 | cve_cwe_list listlengths 1 1 | cve_primary_cwe stringclasses 164
values | url stringlengths 36 97 | cve_tags listlengths 1 5 ⌀ | domain stringclasses 1
value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 198k ⌀ | issue_title stringlengths 1 335 | issue_comments_url stringlengths 55 116 | issue_comments_count int64 0 338 | issue_created_at stringdate 2012-06-06 09:34:24 2025-04-02 09:37:20 | issue_updated_at stringdate 2014-04-01 20:16:21 2025-06-16 12:26:58 | issue_html_url stringlengths 36 97 | issue_github_id int64 4.93M 2.97B | issue_number int64 1 199k | __index_level_0__ int64 0 6.55k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2019-20063 | 2019-12-29T20:15:28.080 | hdf/dataobject.c in libmysofa before 0.8 has an uninitialized use of memory, as demonstrated by mysofa2json. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/hoene/libmysofa/compare/v0.7...v0.8"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:symonics:libmysofa:*:*:*:*:*:*:*:*",
"matchCriteriaId": "06D58760-D7CA-4E2A-A94B-43E49DCA63C4",
"versionEndExcluding": "0.8",
"versionEndIncluding": null,
"versionStartExclud... | [
"665"
] | 665 | https://github.com/hoene/libmysofa/issues/67 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"hoene",
"libmysofa"
] | There is an uninitialized use in mysofa2json, the bug is found in git commit 3dba53f9c14795b109577519a0df2e25e15fcd6a.
To trigger the bug, after compiling the target:
valgrind ./mysofa2json test-input.
PoC input is attached(I have to change the suffix of input to zip because of github's upload regulation, but th... | Uninitialized use found in mysofa2json[bug] | https://api.github.com/repos/hoene/libmysofa/issues/67/comments | 2 | 2019-08-24T08:52:47Z | 2019-08-29T16:49:47Z | https://github.com/hoene/libmysofa/issues/67 | 484,795,542 | 67 | 943 |
CVE-2019-20086 | 2019-12-30T04:15:10.750 | GoPro GPMF-parser 1.2.3 has a heap-based buffer over-read in GPMF_Next in GPMF_parser.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gopro/gpmf-parser/issues/74"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third P... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gopro:gpmf-parser:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C4628685-F6D8-4FF2-9868-1CA7572DD943",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"125"
] | 125 | https://github.com/gopro/gpmf-parser/issues/74 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gopro",
"gpmf-parser"
] | Tested in Ubuntu 19.04, 64bit, master(ceb3815)
compiled by gcc -g -fsanitize=address
Triggered by
$ gpmf-parse $POC
POC file
[poc0.zip](https://github.com/gopro/gpmf-parser/files/3727762/poc0.zip)
```
root@ubuntu:/home/tim/gpmf-parser-asan/build# ./gpmf-parser ../crashes/karma.mp4-out_of_bound-idx\:0x24-0x0
... | heap overflow in GPMF_Next GPMF_parser.c:300 | https://api.github.com/repos/gopro/gpmf-parser/issues/74/comments | 5 | 2019-10-15T07:06:48Z | 2019-11-18T23:37:17Z | https://github.com/gopro/gpmf-parser/issues/74 | 507,049,927 | 74 | 944 |
CVE-2019-20087 | 2019-12-30T04:15:10.813 | GoPro GPMF-parser 1.2.3 has a heap-based buffer over-read in GPMF_seekToSamples in GPMF-parse.c for the "matching tags" feature. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gopro/gpmf-parser/issues/76"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third P... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gopro:gpmf-parser:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C4628685-F6D8-4FF2-9868-1CA7572DD943",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"125"
] | 125 | https://github.com/gopro/gpmf-parser/issues/76 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gopro",
"gpmf-parser"
] | Tested in Ubuntu 19.04, 64bit, master(ceb3815)
compiled by gcc -g -fsanitize=address
Triggered by
$ gpmf-parse $POC
POC
[poc2.zip](https://github.com/gopro/gpmf-parser/files/3727794/poc2.zip)
```
root@ubuntu:/home/tim/gpmf-parser-asan/build# ./gpmf-parser crashes/karma.mp4-out_of_bound-idx\:0x38-0x2
STRM ... | heapoverflow in GPMF_seekToSamples GPMF-parse.c:477 | https://api.github.com/repos/gopro/gpmf-parser/issues/76/comments | 3 | 2019-10-15T07:16:17Z | 2019-11-18T23:37:59Z | https://github.com/gopro/gpmf-parser/issues/76 | 507,054,018 | 76 | 945 |
CVE-2019-20088 | 2019-12-30T04:15:10.890 | GoPro GPMF-parser 1.2.3 has a heap-based buffer over-read in GetPayload in GPMF_mp4reader.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gopro/gpmf-parser/issues/77"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third P... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gopro:gpmf-parser:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C4628685-F6D8-4FF2-9868-1CA7572DD943",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"125"
] | 125 | https://github.com/gopro/gpmf-parser/issues/77 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gopro",
"gpmf-parser"
] | Tested in Ubuntu 19.04, 64bit, master(ceb3815)
compiled by gcc -g -fsanitize=address
Triggered by
$ gpmf-parse $POC
POC
[poc3.zip](https://github.com/gopro/gpmf-parser/files/3727813/poc3.zip)
```
root@ubuntu:/home/tim/gpmf-parser-asan/build# ./gpmf-parser crashes/karma.mp4-out_of_bound-idx\:0x749-0x3
STRM... | heap overflow in GetPayload GPMF_mp4reader.c:62 | https://api.github.com/repos/gopro/gpmf-parser/issues/77/comments | 3 | 2019-10-15T07:21:55Z | 2019-11-18T23:38:23Z | https://github.com/gopro/gpmf-parser/issues/77 | 507,056,444 | 77 | 946 |
CVE-2019-20089 | 2019-12-30T04:15:10.967 | GoPro GPMF-parser 1.2.3 has an heap-based buffer over-read in GPMF_SeekToSamples in GPMF_parse.c for the size calculation. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gopro/gpmf-parser/issues/75"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third P... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gopro:gpmf-parser:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C4628685-F6D8-4FF2-9868-1CA7572DD943",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"125"
] | 125 | https://github.com/gopro/gpmf-parser/issues/75 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gopro",
"gpmf-parser"
] | Tested in Ubuntu 19.04, 64bit, master(ceb3815)
compiled by gcc -g -fsanitize=address
Triggered by
$ gpmf-parse $POC
[poc1.zip](https://github.com/gopro/gpmf-parser/files/3727770/poc1.zip)
POC
```
root@ubuntu:/home/tim/gpmf-parser-asan/build# ./gpmf-parser crashes/karma.mp4-out_of_bound-idx\:0x32-0x1
STR... | heapoverflow in GPMF_SeekToSamples GPMF_parse.c:452 | https://api.github.com/repos/gopro/gpmf-parser/issues/75/comments | 3 | 2019-10-15T07:11:52Z | 2019-11-18T23:37:40Z | https://github.com/gopro/gpmf-parser/issues/75 | 507,052,169 | 75 | 947 |
CVE-2019-20090 | 2019-12-30T04:15:11.030 | An issue was discovered in Bento4 1.5.1.0. There is a use-after-free in AP4_Sample::GetOffset in Core/Ap4Sample.h when called from Ap4LinearReader.cpp. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/461"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"416"
] | 416 | https://github.com/axiomatic-systems/Bento4/issues/461 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | ./mp42ts $poc out
poc
[test-002.zip](https://github.com/axiomatic-systems/Bento4/files/3938643/test-002.zip)
asan output
```
root@ubuntu:/home/tim/Bento4/cmakebuild# ../../Bento4-asan/cmakebuild/mp42ts overflows/test-002.mp4-double_free-idx\:0xffffffff-0x0 out
=====================================================... | use after free in Ap4Sample.h | https://api.github.com/repos/axiomatic-systems/Bento4/issues/461/comments | 0 | 2019-12-09T08:53:39Z | 2019-12-09T08:53:39Z | https://github.com/axiomatic-systems/Bento4/issues/461 | 534,780,352 | 461 | 948 |
CVE-2019-20091 | 2019-12-30T04:15:11.123 | An issue was discovered in Bento4 1.5.1.0. There is a NULL pointer dereference in AP4_Descriptor::GetTag in mp42ts when called from AP4_DecoderConfigDescriptor::GetDecoderSpecificInfoDescriptor in Ap4DecoderConfigDescriptor.cpp. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/462"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"476"
] | 476 | https://github.com/axiomatic-systems/Bento4/issues/462 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | ./mp42ts $poc out
poc
[poc1.zip](https://github.com/axiomatic-systems/Bento4/files/3938679/poc1.zip)
[poc2.zip](https://github.com/axiomatic-systems/Bento4/files/3938680/poc2.zip)
asan output
1
```
root@ubuntu:/home/tim/Bento4/cmakebuild# ../../Bento4-asan/cmakebuild/mp42ts crashes/test-001.mp4-signalb-0x0 out
... | 2 segv in mp42ts | https://api.github.com/repos/axiomatic-systems/Bento4/issues/462/comments | 0 | 2019-12-09T09:00:42Z | 2019-12-09T09:00:42Z | https://github.com/axiomatic-systems/Bento4/issues/462 | 534,783,741 | 462 | 949 |
CVE-2019-20094 | 2019-12-30T04:15:11.327 | An issue was discovered in libsixel 1.8.4. There is a heap-based buffer overflow in the function gif_init_frame at fromgif.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/saitoha/libsixel/issues/125"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third P... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "EB0720EA-8C4F-44BB-91C1-3098DA288118",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"787"
] | 787 | https://github.com/saitoha/libsixel/issues/125 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"saitoha",
"libsixel"
] | img2sixel -I $POC
[smile.zip](https://github.com/saitoha/libsixel/files/3999231/smile.zip)
asan output
```
root@ubuntu:/home/tim/libsixel/converters# ../../libsixel-asan/converters/img2sixel -I overflows/smile.gif-out_of_bound-idx\:0xa34-0x0
=================================================================
... | heap overflow in fromgif.c:250 | https://api.github.com/repos/saitoha/libsixel/issues/125/comments | 4 | 2019-12-25T00:03:38Z | 2020-01-03T01:32:47Z | https://github.com/saitoha/libsixel/issues/125 | 542,223,529 | 125 | 950 |
CVE-2019-20140 | 2019-12-30T17:15:20.560 | An issue was discovered in libsixel 1.8.4. There is a heap-based buffer overflow in the function gif_out_code at fromgif.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/saitoha/libsixel/issues/122"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "EB0720EA-8C4F-44BB-91C1-3098DA288118",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"787"
] | 787 | https://github.com/saitoha/libsixel/issues/122 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"saitoha",
"libsixel"
] | version : img2sixel 1.8.4
OS : Ubuntu 18.04
configured with:
libcurl: yes
libpng: yes
libjpeg: yes
gdk-pixbuf2: no
GD: no
There is a heap-buffer-overflow in gif_out_code at fromgif.c:278
please run following cmd to reproduce it.
```
img2sixel --high-color $PoC
```
[poc](https://drive.google.com... | heap-buffer-overflow in gif_out_code at fromgif.c:278 | https://api.github.com/repos/saitoha/libsixel/issues/122/comments | 5 | 2019-12-22T13:23:47Z | 2020-01-03T01:33:42Z | https://github.com/saitoha/libsixel/issues/122 | 541,450,421 | 122 | 951 |
CVE-2019-13445 | 2019-12-30T18:15:14.057 | An issue was discovered in the ROS communications-related packages (aka ros_comm or ros-melodic-ros-comm) through 1.14.3. parseOptions() in tools/rosbag/src/record.cpp has an integer overflow when a crafted split option can be entered on the command line. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ros/ros_comm/blob/melodic-devel/tools/rosbag/src/record.cpp#L129"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ros:ros-comm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D0EBCB1B-9EB9-4FDC-B3FB-8ED23B84BC71",
"versionEndExcluding": null,
"versionEndIncluding": "1.14.3",
"versionStartExcluding... | [
"190"
] | 190 | https://github.com/ros/ros_comm/issues/1738 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ros",
"ros_comm"
] | Potentially overflowing expression "1048576 * S" with type "int" (32 bits, signed) is evaluated using 32-bit arithmetic, and then used in a context that expects an expression of type "uint64_t" (64 bits, unsigned).
https://github.com/ros/ros_comm/blob/29053c4832229efa7160fb944c05e3bc82e11540/tools/rosbag/src/record.cp... | CVE-2019-13445: potential integer overflow | https://api.github.com/repos/ros/ros_comm/issues/1738/comments | 0 | 2019-07-02T21:42:17Z | 2019-07-16T18:43:40Z | https://github.com/ros/ros_comm/issues/1738 | 463,448,919 | 1,738 | 952 |
CVE-2019-20149 | 2019-12-30T19:15:11.910 | ctorName in index.js in kind-of v6.0.2 allows external user input to overwrite certain internal attributes via a conflicting name, as demonstrated by 'constructor': {'name':'Symbol'}. Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jonschlinkert/kind-of/issues/30"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://git... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kind-of_project:kind-of:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "83563B75-503D-4746-8779-5FBAA4436F4D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"668"
] | 668 | https://github.com/jonschlinkert/kind-of/issues/30 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jonschlinkert",
"kind-of"
] | We found that a maliciously crafted user-input object can type checking result of kind-of module.
The vulnerability is from the following code: kind-of leverages the built-in constructor of unsafe user-input to detect type information. However, a crafted payload can overwrite this builtin attribute to manipulate the t... | type checking | https://api.github.com/repos/jonschlinkert/kind-of/issues/30/comments | 4 | 2019-12-16T01:04:23Z | 2020-01-16T17:02:05Z | https://github.com/jonschlinkert/kind-of/issues/30 | 538,136,244 | 30 | 953 |
CVE-2019-20159 | 2019-12-31T00:15:12.243 | An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a memory leak in dinf_New() in isomedia/box_code_base.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1321"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"401"
] | 401 | https://github.com/gpac/gpac/issues/1321 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (master 6ada10e)
Compile Command:
```
$ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box
$ make
```
Run Command:
```
$ MP4Box -diso -out /dev/null $POC-memory-leak
```
POC file:
https://github.com/Clingto/P... | AddressSanitizer: a memory leak of dinf_New() | https://api.github.com/repos/gpac/gpac/issues/1321/comments | 2 | 2019-10-28T16:03:11Z | 2020-01-08T12:43:28Z | https://github.com/gpac/gpac/issues/1321 | 513,400,465 | 1,321 | 954 |
CVE-2019-20160 | 2019-12-31T00:15:12.337 | An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a stack-based buffer overflow in the function av1_parse_tile_group() in media_tools/av_parsers.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1334"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"787"
] | 787 | https://github.com/gpac/gpac/issues/1334 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93)
Compile Command:
```
$ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box
$ make
```
Run Command:
```
$ MP4Box -diso -out /dev/null $POC-new-av1_parse_tile_group
```
POC file:
https://... | AddressSanitizer: stack-buffer-overflow in av1_parse_tile_group media_tools/av_parsers.c:3845 | https://api.github.com/repos/gpac/gpac/issues/1334/comments | 2 | 2019-11-09T11:22:06Z | 2020-01-08T12:45:14Z | https://github.com/gpac/gpac/issues/1334 | 520,394,957 | 1,334 | 955 |
CVE-2019-20161 | 2019-12-31T00:15:12.417 | An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is heap-based buffer overflow in the function ReadGF_IPMPX_WatermarkingInit() in odf/ipmpx_code.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1320"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-an... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"787"
] | 787 | https://github.com/gpac/gpac/issues/1320 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (master 6ada10e)
Compile Command:
```
$ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box
$ make
```
Run Command:
```
$ MP4Box -diso -out /dev/null $POC-ReadGF_IPMPX_WatermarkingInit
```
POC file:
https://gi... | AddressSanitizer: heap-buffer-overflow in ReadGF_IPMPX_WatermarkingInit at ipmpx_code.c:1517 | https://api.github.com/repos/gpac/gpac/issues/1320/comments | 2 | 2019-10-28T15:50:52Z | 2020-01-08T12:43:16Z | https://github.com/gpac/gpac/issues/1320 | 513,392,746 | 1,320 | 956 |
CVE-2019-20162 | 2019-12-31T00:15:12.507 | An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is heap-based buffer overflow in the function gf_isom_box_parse_ex() in isomedia/box_funcs.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1327"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-an... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"787"
] | 787 | https://github.com/gpac/gpac/issues/1327 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93)
Compile Command:
```
$ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box
$ make
```
Run Command:
```
$ MP4Box -diso -out /dev/null $POC-new-gf_isom_box_parse_ex
```
POC file:
https://... | ERROR: AddressSanitizer: heap-buffer-overflow in gf_isom_box_parse_ex isomedia/box_funcs.c:189 | https://api.github.com/repos/gpac/gpac/issues/1327/comments | 2 | 2019-11-09T11:12:14Z | 2020-01-08T12:43:37Z | https://github.com/gpac/gpac/issues/1327 | 520,392,881 | 1,327 | 957 |
CVE-2019-20163 | 2019-12-31T00:15:12.587 | An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a NULL pointer dereference in the function gf_odf_avc_cfg_write_bs() in odf/descriptors.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1335"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-an... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"476"
] | 476 | https://github.com/gpac/gpac/issues/1335 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93)
Compile Command:
```
$ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box
$ make
```
Run Command:
```
$ MP4Box -diso -out /dev/null $POC-new-gf_odf_avc_cfg_write_bs
```
POC file:
https... | AddressSanitizer: NULL pointer dereference in gf_odf_avc_cfg_write_bs odf/descriptors.c:567 | https://api.github.com/repos/gpac/gpac/issues/1335/comments | 2 | 2019-11-09T11:23:01Z | 2020-01-08T12:45:23Z | https://github.com/gpac/gpac/issues/1335 | 520,395,160 | 1,335 | 958 |
CVE-2019-20164 | 2019-12-31T00:15:12.667 | An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a NULL pointer dereference in the function gf_isom_box_del() in isomedia/box_funcs.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1332"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"476"
] | 476 | https://github.com/gpac/gpac/issues/1332 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93)
Compile Command:
```
$ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box
$ make
```
Run Command:
```
$ MP4Box -diso -out /dev/null $POC-new-gf_isom_box_del
```
POC file:
https://githu... | AddressSanitizer: NULL pointer dereference (use-after-free ) in gf_isom_box_del isomedia/box_funcs.c:1500 | https://api.github.com/repos/gpac/gpac/issues/1332/comments | 2 | 2019-11-09T11:19:52Z | 2022-01-26T08:36:22Z | https://github.com/gpac/gpac/issues/1332 | 520,394,510 | 1,332 | 959 |
CVE-2019-20165 | 2019-12-31T00:15:12.743 | An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a NULL pointer dereference in the function ilst_item_Read() in isomedia/box_code_apple.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1338"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-an... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"476"
] | 476 | https://github.com/gpac/gpac/issues/1338 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Hello, I found a similar issue but I am not sure they are the same.
https://github.com/gpac/gpac/issues/1263
System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93)
Compile Command:
```
$ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box
$ make... | ERROR: AddressSanitizer: NULL pointer dereference in ilst_item_Read isomedia/box_code_apple.c:119 | https://api.github.com/repos/gpac/gpac/issues/1338/comments | 4 | 2019-11-09T12:06:24Z | 2020-01-08T12:45:38Z | https://github.com/gpac/gpac/issues/1338 | 520,405,629 | 1,338 | 960 |
CVE-2019-20166 | 2019-12-31T00:15:12.837 | An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a NULL pointer dereference in the function gf_isom_dump() in isomedia/box_dump.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1331"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"476"
] | 476 | https://github.com/gpac/gpac/issues/1331 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93)
Compile Command:
```
$ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box
$ make
```
Run Command:
```
$ MP4Box -diso -out /dev/null $POC-new-gf_isom_dump
```
POC file:
https://github.c... | AddressSanitizer: NULL pointer dereference in gf_isom_dump isomedia/box_dump.c:133 | https://api.github.com/repos/gpac/gpac/issues/1331/comments | 2 | 2019-11-09T11:18:44Z | 2020-01-08T12:44:45Z | https://github.com/gpac/gpac/issues/1331 | 520,394,250 | 1,331 | 961 |
CVE-2019-20167 | 2019-12-31T00:15:12.930 | An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a NULL pointer dereference in the function senc_Parse() in isomedia/box_code_drm.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1330"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"476"
] | 476 | https://github.com/gpac/gpac/issues/1330 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93)
Compile Command:
```
$ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box
$ make
```
Run Command:
```
$ MP4Box -diso -out /dev/null $POC-new-senc_Parse
```
POC file:
https://github.com... | AddressSanitizer: NULL pointer dereference in senc_Parse isomedia/box_code_drm.c:1378 | https://api.github.com/repos/gpac/gpac/issues/1330/comments | 2 | 2019-11-09T11:17:12Z | 2020-01-08T12:44:20Z | https://github.com/gpac/gpac/issues/1330 | 520,393,923 | 1,330 | 962 |
CVE-2019-20168 | 2019-12-31T00:15:13.007 | An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a use-after-free in the function gf_isom_box_dump_ex() in isomedia/box_funcs.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1333"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"416"
] | 416 | https://github.com/gpac/gpac/issues/1333 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93)
Compile Command:
```
$ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box
$ make
```
Run Command:
```
$ MP4Box -diso -out /dev/null $POC-new-gf_isom_box_dump_ex
```
POC file:
https://g... | AddressSanitizer: heap-use-after-free in gf_isom_box_dump_ex isomedia/box_funcs.c:1734 | https://api.github.com/repos/gpac/gpac/issues/1333/comments | 4 | 2019-11-09T11:21:05Z | 2020-01-16T22:33:39Z | https://github.com/gpac/gpac/issues/1333 | 520,394,786 | 1,333 | 963 |
CVE-2019-20169 | 2019-12-31T00:15:13.087 | An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a use-after-free in the function trak_Read() in isomedia/box_code_base.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1329"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"416"
] | 416 | https://github.com/gpac/gpac/issues/1329 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93)
Compile Command:
```
$ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box
$ make
```
Run Command:
```
$ MP4Box -diso -out /dev/null $POC-new-trak_Read
```
POC file:
https://github.com/... | AddressSanitizer: heap-use-after-free in trak_Read isomedia/box_code_base.c:7153 | https://api.github.com/repos/gpac/gpac/issues/1329/comments | 2 | 2019-11-09T11:15:44Z | 2020-01-08T12:44:04Z | https://github.com/gpac/gpac/issues/1329 | 520,393,655 | 1,329 | 964 |
CVE-2019-20170 | 2019-12-31T00:15:13.213 | An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is an invalid pointer dereference in the function GF_IPMPX_AUTH_Delete() in odf/ipmpx_code.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1328"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-an... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"763"
] | 763 | https://github.com/gpac/gpac/issues/1328 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93)
Compile Command:
```
$ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box
$ make
```
Run Command:
```
$ MP4Box -diso -out /dev/null $POC-new-GF_IPMPX_AUTH_Delete
```
POC file:
https://... | AddressSanitizer: heap-use-after-free in GF_IPMPX_AUTH_Delete odf/ipmpx_code.c:115 | https://api.github.com/repos/gpac/gpac/issues/1328/comments | 2 | 2019-11-09T11:14:15Z | 2020-01-08T12:43:51Z | https://github.com/gpac/gpac/issues/1328 | 520,393,299 | 1,328 | 965 |
CVE-2019-20171 | 2019-12-31T00:15:13.307 | An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There are memory leaks in metx_New in isomedia/box_code_base.c and abst_Read in isomedia/box_code_adobe.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1337"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"401"
] | 401 | https://github.com/gpac/gpac/issues/1337 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93)
Compile Command:
```
$ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box
$ make
```
Run Command:
```
$ MP4Box -diso -out /dev/null $POC-new-memory-leak
```
POC file:
https://github.co... | AddressSanitizer: 2 memory leaks of metx_New(), abst_Read() | https://api.github.com/repos/gpac/gpac/issues/1337/comments | 3 | 2019-11-09T12:00:28Z | 2020-01-08T13:26:12Z | https://github.com/gpac/gpac/issues/1337 | 520,403,921 | 1,337 | 966 |
CVE-2018-14476 | 2019-12-31T16:15:11.103 | GeniXCMS 1.1.5 has XSS via the dbuser or dbhost parameter during step 1 of installation. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/151006/GeniXCMS-1.1.5-Cross-Site-Scripting.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:metalgenix:genixcms:1.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "09684074-6DDD-46CF-873A-A2066E443085",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"79"
] | 79 | https://github.com/semplon/GeniXCMS/issues/88 | [
"Third Party Advisory"
] | github.com | [
"semplon",
"GeniXCMS"
] | Hello,
While testing the Netsparker web application security scanner we identified a vulnerability in GeniXCMS 1.1.5. Can you please advise whom shall we contact to disclose the vulnerability details so it can be fixed?
Please email me: daniel at netsparker dot com
Looking forward to hearing from you.
Rega... | Advisory from Netsparker - GeniXCMS 1.1.5 vulnerability | https://api.github.com/repos/GeniXCMS/GeniXCMS/issues/88/comments | 3 | 2017-11-23T11:19:21Z | 2019-12-15T05:00:02Z | https://github.com/GeniXCMS/GeniXCMS/issues/88 | 276,339,738 | 88 | 967 |
CVE-2019-20205 | 2020-01-02T14:16:36.253 | libsixel 1.8.4 has an integer overflow in sixel_frame_resize in frame.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/saitoha/libsixel/issues/127"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third P... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "EB0720EA-8C4F-44BB-91C1-3098DA288118",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"190"
] | 190 | https://github.com/saitoha/libsixel/issues/127 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"saitoha",
"libsixel"
] | In function `sixel_frame_resize`, `width` and `height` can be specified by user. Line 503 has an integer overflow. If `width` and `height` are very large numbers, allocation will fail.
` raises unexpected exceptions and in some cases does not raise any exception.
`UnexpectedDER`, `IndexError` and `AssertionError` are raised in addition to `BadSignatureError`, at the same time flipping the 4th or 6th least signifi... | Inconsistent handling of malformed DER signatures | https://api.github.com/repos/tlsfuzzer/python-ecdsa/issues/114/comments | 3 | 2019-09-25T19:03:04Z | 2019-10-11T14:01:51Z | https://github.com/tlsfuzzer/python-ecdsa/issues/114 | 498,467,334 | 114 | 970 |
CVE-2019-20219 | 2020-01-02T15:15:12.520 | ngiflib 0.4 has a heap-based buffer over-read in GifIndexToTrueColor in ngiflib.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/miniupnp/ngiflib/issues/15"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:miniupnp_project:ngiflib:0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5BE2BAA9-5D76-4039-A655-3F478ED5D601",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"125"
] | 125 | https://github.com/miniupnp/ngiflib/issues/15 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"miniupnp",
"ngiflib"
] | Tested in Ubuntu 19.04, 64bit, ngiflib(master 2bef2a0)
Triggered by
gif2tga $POC
POC file:
[poc.zip](https://github.com/miniupnp/ngiflib/files/3723825/poc.zip)
asan
```
root@ubuntu:/home/tim/ngiflib-normal# ./gif2tga mr_gland.gif-out_of_bound-idx\:0xf3-0x0.gif
==========================================... | heap-buffer-overflow at WritePixels() in ngiflib.c:226 | https://api.github.com/repos/miniupnp/ngiflib/issues/15/comments | 2 | 2019-10-14T09:40:20Z | 2020-01-05T08:51:16Z | https://github.com/miniupnp/ngiflib/issues/15 | 506,545,294 | 15 | 972 |
CVE-2013-7351 | 2020-01-02T20:15:15.130 | Multiple cross-site scripting (XSS) vulnerabilities in index.php in Shaarli allow remote attackers to inject arbitrary web script or HTML via the URL to the (1) showRSS, (2) showATOM, or (3) showDailyRSS function; a (4) file name to the importFile function; or (5) vectors related to bookmarks. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "security@debian.org",
"tags": [
"Exploit",
"Mailing List",
"Patch",
"Third Party Advisory"
],
"url": "http://seclists.org/oss-sec/2014/q2/1"
},
{
"source": "security@debian.org",
"tags": [
"Exploit",
"Mailing List",
"Patch",
"T... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:shaarli_project:shaarli:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D0345D4-5FA4-40FD-B35E-226B4EA356AE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"79"
] | 79 | https://github.com/sebsauvage/Shaarli/issues/134 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"sebsauvage",
"Shaarli"
] | Line 945:
```
echo '</channel></rss><!-- Cached version of ' . pageurl () . ' -->';
```
Line 1030:
```
$feed .= '</feed><!-- Cached version of ' . pageurl () . ' -->';
echo $feed;
```
Line 1107:
```
echo '</channel></rss><!-- Cached version of ' . pageurl () . ' -->';
```
Line 1614:
```
echo <<<HTML <!DOCTYPE... | Multiples XSS in index.php | https://api.github.com/repos/sebsauvage/Shaarli/issues/134/comments | 3 | 2013-10-22T12:44:52Z | 2014-04-01T20:16:21Z | https://github.com/sebsauvage/Shaarli/issues/134 | 21,379,195 | 134 | 973 |
CVE-2016-1000027 | 2020-01-02T23:15:11.857 | Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrus... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000027"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0CCA2DB9-D481-4326-8B97-09197B2D6966",
"versionEndExcluding": "6.0.0",
"versionEndIncluding": null,
"versionStar... | [
"502"
] | 502 | https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-579669626 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"spring-projects",
"spring-framework"
] | **Affects:** \5.2.3.RELEASE
Issue Title : Sonartype vulnerability CVE-2016-1000027 in Spring-web project
Description
Description from CVE
Pivotal Spring Framework 4.1.4 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is ... | Sonatype vulnerability CVE-2016-1000027 in Spring-web project | https://api.github.com/repos/spring-projects/spring-framework/issues/24434/comments | 85 | 2020-01-27T06:46:04Z | 2025-03-12T16:51:10Z | https://github.com/spring-projects/spring-framework/issues/24434 | 555,385,999 | 24,434 | 974 |
CVE-2016-1000027 | 2020-01-02T23:15:11.857 | Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrus... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000027"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0CCA2DB9-D481-4326-8B97-09197B2D6966",
"versionEndExcluding": "6.0.0",
"versionEndIncluding": null,
"versionStar... | [
"502"
] | 502 | https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-582313417 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"spring-projects",
"spring-framework"
] | **Affects:** \5.2.3.RELEASE
Issue Title : Sonartype vulnerability CVE-2016-1000027 in Spring-web project
Description
Description from CVE
Pivotal Spring Framework 4.1.4 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is ... | Sonatype vulnerability CVE-2016-1000027 in Spring-web project | https://api.github.com/repos/spring-projects/spring-framework/issues/24434/comments | 85 | 2020-01-27T06:46:04Z | 2025-03-12T16:51:10Z | https://github.com/spring-projects/spring-framework/issues/24434 | 555,385,999 | 24,434 | 975 |
CVE-2016-1000027 | 2020-01-02T23:15:11.857 | Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrus... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000027"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0CCA2DB9-D481-4326-8B97-09197B2D6966",
"versionEndExcluding": "6.0.0",
"versionEndIncluding": null,
"versionStar... | [
"502"
] | 502 | https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-744519525 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"spring-projects",
"spring-framework"
] | **Affects:** \5.2.3.RELEASE
Issue Title : Sonartype vulnerability CVE-2016-1000027 in Spring-web project
Description
Description from CVE
Pivotal Spring Framework 4.1.4 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is ... | Sonatype vulnerability CVE-2016-1000027 in Spring-web project | https://api.github.com/repos/spring-projects/spring-framework/issues/24434/comments | 85 | 2020-01-27T06:46:04Z | 2025-03-12T16:51:10Z | https://github.com/spring-projects/spring-framework/issues/24434 | 555,385,999 | 24,434 | 976 |
CVE-2019-20329 | 2020-01-03T00:15:11.097 | OpenLambda 2019-09-10 allows DNS rebinding attacks against the OL server for the REST API on TCP port 5000. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/open-lambda/open-lambda/blob/9f7f935195ca74700c60ebc1ecfdaefad40d144b/src/common/config.go#L135"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlambda_project:openlambda:2019-09-10:*:*:*:*:*:*:*",
"matchCriteriaId": "05536DF9-2EE9-4821-BB1D-2CF74282B6C9",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"346"
] | 346 | https://github.com/open-lambda/open-lambda/issues/92 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"open-lambda",
"open-lambda"
] | The Rest API spawned on port 5000 isn't validating the Host header , as such the server is vulnerable to DNS Rebinding attacks.
Impact :
By tricking users into visiting a website, it will be possible to perform all Rest Calls on behalf of user from the attackers website, bypassing the same origin policy using DNS... | OL-Server vulnerable to DNS Rebinding attacks. | https://api.github.com/repos/open-lambda/open-lambda/issues/92/comments | 4 | 2019-12-16T06:22:47Z | 2022-04-19T23:02:57Z | https://github.com/open-lambda/open-lambda/issues/92 | 538,210,224 | 92 | 977 |
CVE-2019-20330 | 2020-01-03T04:15:12.137 | FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/FasterXML/jackson-databind/compare/jackson-databind-2.9.10.1...jackson-databind-2.9.10.2"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2F87CF67-6994-43F1-BEC3-DD7D122D0146",
"versionEndExcluding": "2.7.9.7",
"versionEndIncluding": null,
"versio... | [
"502"
] | 502 | https://github.com/FasterXML/jackson-databind/issues/2526 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"FasterXML",
"jackson-databind"
] | Another 2 gadget (*) types reported related to JNDI access.
See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem.
Mitre id: CVE-2019-20330
Original discoverer: UltramanGaia
Fixed in:
* 2.9.10.2 (`jackson-bom` version... | Block two more gadget types (ehcache/JNDI - CVE-2019-20330) | https://api.github.com/repos/FasterXML/jackson-databind/issues/2526/comments | 3 | 2019-10-25T20:55:07Z | 2020-03-10T17:49:23Z | https://github.com/FasterXML/jackson-databind/issues/2526 | 512,716,891 | 2,526 | 978 |
CVE-2019-5064 | 2020-01-03T17:15:12.257 | An exploitable heap buffer overflow vulnerability exists in the data structure persistence functionality of OpenCV, before version 4.2.0. A specially crafted JSON file can cause a buffer overflow, resulting in multiple heap corruptions and potentially code execution. An attacker can provide a specially crafted file to ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "talos-cna@cisco.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/opencv/opencv/issues/15857"
},
{
"source": "talos-cna@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://talosintelligence.com/vulnerability... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:opencv:opencv:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BE654103-94F6-44DF-A86F-47DED6FB9117",
"versionEndExcluding": "4.2.0",
"versionEndIncluding": null,
"versionStartExcluding... | [
"787"
] | 787 | https://github.com/opencv/opencv/issues/15857 | [
"Third Party Advisory"
] | github.com | [
"opencv",
"opencv"
] | The Cisco Talos team found two security vulnerabilities affecting Opencv OpenCV 4.1.0. As this is a sensitive security issue, this message is to request a point of contact to report the detailed report.
Email requests to admin at opencv.org were also sent.
| Talos security advisory for Opencv (TALOS-2019-0852, 0853) | https://api.github.com/repos/opencv/opencv/issues/15857/comments | 7 | 2019-11-06T16:00:12Z | 2020-01-02T20:22:41Z | https://github.com/opencv/opencv/issues/15857 | 518,566,952 | 15,857 | 979 |
CVE-2020-5395 | 2020-01-03T20:15:12.653 | FontForge 20190801 has a use-after-free in SFD_GetFontMetaData in sfd.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00041.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://git... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fontforge:fontforge:20190801:*:*:*:*:*:*:*",
"matchCriteriaId": "B87AF8DA-5CBE-4497-A0EF-779E168C2381",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"416"
] | 416 | https://github.com/fontforge/fontforge/issues/4084 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"fontforge",
"fontforge"
] | Hi,
While fuzzing FontForge with AFL, I found a heap use-after-free in the SFD_GetFontMetaData() function, in sfd.c.
Attaching a reproducer (gzipped so GitHub accepts it): [test01.sfd.gz](https://github.com/fontforge/fontforge/files/4019970/test01.sfd.gz)
Issue can be reproduced in FontForge 20190801 and wit... | Use-after-free (heap) in the SFD_GetFontMetaData() function | https://api.github.com/repos/fontforge/fontforge/issues/4084/comments | 9 | 2020-01-03T16:46:57Z | 2020-01-06T11:35:56Z | https://github.com/fontforge/fontforge/issues/4084 | 545,070,041 | 4,084 | 980 |
CVE-2020-5496 | 2020-01-03T22:15:13.333 | FontForge 20190801 has a heap-based buffer overflow in the Type2NotDefSplines() function in splinesave.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00041.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "ht... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fontforge:fontforge:20190801:*:*:*:*:*:*:*",
"matchCriteriaId": "B87AF8DA-5CBE-4497-A0EF-779E168C2381",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"787"
] | 787 | https://github.com/fontforge/fontforge/issues/4085 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"fontforge",
"fontforge"
] | Hi,
While fuzzing FontForge with AFL, I found a heap-based buffer overflow in the Type2NotDefSplines() function, in splinesave.c.
Attaching a reproducer (gzipped so GitHub accepts it): [test02.sfd.gz](https://github.com/fontforge/fontforge/files/4020930/test02.sfd.gz)
Issue can be reproduced in FontForge 201... | Heap-based buffer overflow in the Type2NotDefSplines() function | https://api.github.com/repos/fontforge/fontforge/issues/4085/comments | 5 | 2020-01-03T21:15:18Z | 2020-01-07T13:16:27Z | https://github.com/fontforge/fontforge/issues/4085 | 545,166,682 | 4,085 | 981 |
CVE-2020-5497 | 2020-01-04T03:15:10.630 | The OpenID Connect reference implementation for MITREid Connect through 1.3.3 allows XSS due to userInfoJson being included in the page unsanitized. This is related to header.tag. The issue can be exploited to execute arbitrary JavaScript. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/156574/MITREid-1.3.3-Cross-Site-Scripting.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advis... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mitreid:connect:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FC637AA4-26EF-4FB8-8608-6B658EBEDFF9",
"versionEndExcluding": null,
"versionEndIncluding": "1.3.3",
"versionStartExcludi... | [
"79"
] | 79 | https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/issues/1521 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"mitreid-connect",
"OpenID-Connect-Java-Spring-Server"
] | `header.tag` appears to be vulnerable to XSS here:
~~~
// get the info of the current user, if available (null otherwise)
function getUserInfo() {
return ${userInfoJson};
}
~~~
**userInfoJson** is included in the page and is not encoded so malicious elements could be created. If the string... | Cross-Site Scripting header.tag | https://api.github.com/repos/mitreid-connect/OpenID-Connect-Java-Spring-Server/issues/1521/comments | 10 | 2020-01-03T18:59:15Z | 2020-11-30T09:31:20Z | https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/issues/1521 | 545,116,200 | 1,521 | 982 |
CVE-2019-20354 | 2020-01-06T06:15:10.970 | The web application component of piSignage before 2.6.4 allows a remote attacker (authenticated as a low-privilege user) to download arbitrary files from the Raspberry Pi via api/settings/log?file=../ path traversal. In other words, this issue is in the player API for log download. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/155864/piSignage-2.6.4-Directory-Traversal.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes"
],
"url": "http... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pisignage:pisignage:*:*:*:*:*:*:*:*",
"matchCriteriaId": "685B46F6-D976-4C06-A7D8-58CD6806D11A",
"versionEndExcluding": "2.6.4",
"versionEndIncluding": null,
"versionStartExc... | [
"22"
] | 22 | https://github.com/colloqi/piSignage/issues/97 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"colloqi",
"piSignage"
] | # Describe the bug
### Suggested description of the vulnerability
: A path traversal vulnerability in the web application component of piSignage 2.6 allows a remote attacker authenticated as a low privilege user to download arbitrary files from the Raspberry Pi.
### Attack vector(s)
. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.9.3.2564:*:*:*:*:*:*:*",
"matchCriteriaId": "6292F71C-4D80-4570-A07D-C790FEEE9B2B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"476"
] | 476 | https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447223 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hi,
After fuzzing libredwg, I found the following bugs on the latest commit on master.
Command: ./dwg2svg2 $PoC
**1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007**
POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_0.9.3.2564/id:000239%2Csig:06%2Csrc:007083%2Cop:havoc%2Crep:4
... | Several bugs found by fuzzing | https://api.github.com/repos/LibreDWG/libredwg/issues/179/comments | 7 | 2020-01-03T03:19:25Z | 2020-01-16T12:12:04Z | https://github.com/LibreDWG/libredwg/issues/179 | 544,834,443 | 179 | 990 |
CVE-2020-6617 | 2020-01-08T23:15:10.410 | stb stb_truetype.h through 1.22 has an assertion failure in stbtt__cff_int. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nothings/stb/issues/864"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nothings:stb_truetype.h:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1CD78C93-4049-4174-B364-1D3843DE443F",
"versionEndExcluding": null,
"versionEndIncluding": "1.22",
"versionStart... | [
"617"
] | 617 | https://github.com/nothings/stb/issues/864 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"nothings",
"stb"
] | assertion failure in `stbtt__cff_int` can be triggered by user supplied font file.
<img width="679" alt="source" src="https://user-images.githubusercontent.com/20929895/71815033-1eada180-30b9-11ea-9420-97f3dc3bda43.png">
poc:
[poc.zip](https://github.com/nothings/stb/files/4025824/poc.zip)
result:
```
#0 ... | assertion failure in stbtt__cff_int in stb_truetype.h | https://api.github.com/repos/nothings/stb/issues/864/comments | 2 | 2020-01-06T11:18:26Z | 2021-07-04T10:08:08Z | https://github.com/nothings/stb/issues/864 | 545,675,704 | 864 | 991 |
CVE-2020-6618 | 2020-01-08T23:15:10.487 | stb stb_truetype.h through 1.22 has a heap-based buffer over-read in stbtt__find_table. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nothings/stb/issues/866"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nothings:stb_truetype.h:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1CD78C93-4049-4174-B364-1D3843DE443F",
"versionEndExcluding": null,
"versionEndIncluding": "1.22",
"versionStart... | [
"125"
] | 125 | https://github.com/nothings/stb/issues/866 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"nothings",
"stb"
] | heap overflow in line 1281. `stbtt__find_table` doesn't check any out of bound access, so heap overflow can be triggered here.
<img width="740" alt="poc" src="https://user-images.githubusercontent.com/20929895/71815229-c6c36a80-30b9-11ea-8d7a-89df9d788188.png">
poc:
[poc.zip](https://github.com/nothings/stb/files/... | heap overflow in stbtt__find_table in stb_truetype.h | https://api.github.com/repos/nothings/stb/issues/866/comments | 4 | 2020-01-06T11:24:48Z | 2021-07-04T10:07:59Z | https://github.com/nothings/stb/issues/866 | 545,678,527 | 866 | 992 |
CVE-2020-6619 | 2020-01-08T23:15:10.567 | stb stb_truetype.h through 1.22 has an assertion failure in stbtt__buf_seek. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nothings/stb/issues/863"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nothings:stb_truetype.h:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1CD78C93-4049-4174-B364-1D3843DE443F",
"versionEndExcluding": null,
"versionEndIncluding": "1.22",
"versionStart... | [
"617"
] | 617 | https://github.com/nothings/stb/issues/863 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"nothings",
"stb"
] | assertion failure in `stbtt__buf_seek` can be triggered by user supplied font file.
<img width="483" alt="source" src="https://user-images.githubusercontent.com/20929895/71814539-b01c1400-30b7-11ea-9ca5-f57cca5d3870.png">
poc:
[poc.zip](https://github.com/nothings/stb/files/4025802/poc.zip)
result:
```
gdb-... | assertion failure in stbtt__buf_seek in stb_truetype.h | https://api.github.com/repos/nothings/stb/issues/863/comments | 2 | 2020-01-06T11:15:45Z | 2021-07-04T10:08:13Z | https://github.com/nothings/stb/issues/863 | 545,674,533 | 863 | 993 |
CVE-2020-6620 | 2020-01-08T23:15:10.627 | stb stb_truetype.h through 1.22 has a heap-based buffer over-read in stbtt__buf_get8. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nothings/stb/issues/868"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nothings:stb_truetype.h:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1CD78C93-4049-4174-B364-1D3843DE443F",
"versionEndExcluding": null,
"versionEndIncluding": "1.22",
"versionStart... | [
"125"
] | 125 | https://github.com/nothings/stb/issues/868 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"nothings",
"stb"
] | `stbtt__buf_get8` has heap overflow vulnerability.
<img width="447" alt="source" src="https://user-images.githubusercontent.com/20929895/71815524-b52e9280-30ba-11ea-9864-da5063e978ef.png">
poc:
[poc.zip](https://github.com/nothings/stb/files/4025840/poc.zip)
result:
```
=================================... | heap overflow in stbtt__buf_get8 in stb_truetype.h | https://api.github.com/repos/nothings/stb/issues/868/comments | 2 | 2020-01-06T11:29:19Z | 2021-07-04T10:07:29Z | https://github.com/nothings/stb/issues/868 | 545,680,359 | 868 | 994 |
CVE-2020-6621 | 2020-01-08T23:15:10.677 | stb stb_truetype.h through 1.22 has a heap-based buffer over-read in ttUSHORT. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nothings/stb/issues/867"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nothings:stb_truetype.h:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1CD78C93-4049-4174-B364-1D3843DE443F",
"versionEndExcluding": null,
"versionEndIncluding": "1.22",
"versionStart... | [
"125"
] | 125 | https://github.com/nothings/stb/issues/867 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"nothings",
"stb"
] | `ttUSHORT` don't have any bound check, so heap overflow can be triggered.
<img width="772" alt="souce0" src="https://user-images.githubusercontent.com/20929895/71815428-654fcb80-30ba-11ea-82f1-9749f205bc7b.png">
<img width="613" alt="source1" src="https://user-images.githubusercontent.com/20929895/71815431-67198f00... | heap overflow in ttUSHORT in stb_truetype.h | https://api.github.com/repos/nothings/stb/issues/867/comments | 2 | 2020-01-06T11:27:04Z | 2021-07-04T10:07:36Z | https://github.com/nothings/stb/issues/867 | 545,679,506 | 867 | 995 |
CVE-2020-6622 | 2020-01-08T23:15:10.737 | stb stb_truetype.h through 1.22 has a heap-based buffer over-read in stbtt__buf_peek8. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nothings/stb/issues/869"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nothings:stb_truetype.h:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1CD78C93-4049-4174-B364-1D3843DE443F",
"versionEndExcluding": null,
"versionEndIncluding": "1.22",
"versionStart... | [
"125"
] | 125 | https://github.com/nothings/stb/issues/869 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"nothings",
"stb"
] | heap overflow in `stbtt__buf_peek8`.
<img width="427" alt="source" src="https://user-images.githubusercontent.com/20929895/71815599-f9219780-30ba-11ea-8b1c-249e637f5aed.png">
poc:
[poc.zip](https://github.com/nothings/stb/files/4025847/poc.zip)
result:
```
===================================================... | heap overflow in stbtt__buf_peek8 in stb_truetype.h | https://api.github.com/repos/nothings/stb/issues/869/comments | 2 | 2020-01-06T11:31:13Z | 2021-07-04T10:07:23Z | https://github.com/nothings/stb/issues/869 | 545,681,061 | 869 | 996 |
CVE-2020-6623 | 2020-01-08T23:15:10.800 | stb stb_truetype.h through 1.22 has an assertion failure in stbtt__cff_get_index. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nothings/stb/issues/865"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nothings:stb_truetype.h:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1CD78C93-4049-4174-B364-1D3843DE443F",
"versionEndExcluding": null,
"versionEndIncluding": "1.22",
"versionStart... | [
"617"
] | 617 | https://github.com/nothings/stb/issues/865 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"nothings",
"stb"
] | assertion failure in stbtt__cff_get_index can be triggered by user supplied file.
<img width="513" alt="source" src="https://user-images.githubusercontent.com/20929895/71815151-8106a200-30b9-11ea-9946-07171227db42.png">
poc:
[poc.zip](https://github.com/nothings/stb/files/4025825/poc.zip)
result:
```
#0 ... | assertion failure in stbtt__cff_get_index in stb_truetype.h | https://api.github.com/repos/nothings/stb/issues/865/comments | 2 | 2020-01-06T11:20:15Z | 2021-07-04T10:08:04Z | https://github.com/nothings/stb/issues/865 | 545,676,449 | 865 | 997 |
CVE-2020-6628 | 2020-01-09T02:15:13.433 | Ming (aka libming) 0.4.8 has a heap-based buffer over-read in the function decompile_SWITCH() in decompile.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/191"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"125"
] | 125 | https://github.com/libming/libming/issues/191 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | export ASAN_OPTIONS=allocator_may_return_null=1
./swftopython $poc
[segmentaion_fault_decompile_569-use_after_free-idx:0x1365-0x2.zip](https://github.com/libming/libming/files/4028582/segmentaion_fault_decompile_569-use_after_free-idx.0x1365-0x2.zip)
asan output
```
root@ubuntu:/home/tim/libming/util# export ASA... | heap overflow in decompile_SWITCH | https://api.github.com/repos/libming/libming/issues/191/comments | 0 | 2020-01-07T01:51:41Z | 2020-01-07T01:51:41Z | https://github.com/libming/libming/issues/191 | 546,033,507 | 191 | 998 |
CVE-2020-6629 | 2020-01-09T02:15:13.527 | Ming (aka libming) 0.4.8 has z NULL pointer dereference in the function decompileGETURL2() in decompile.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/190"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"476"
] | 476 | https://github.com/libming/libming/issues/190 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | swftophp $poc
[libming_decompile762poc-out_of_mem-idx:0xfcd-0x0.zip](https://github.com/libming/libming/files/4028435/libming_decompile762poc-out_of_mem-idx.0xfcd-0x0.zip)
asan output
```
root@ubuntu:/home/tim/libming/util# ../../asan/libming/util/swftophp overflows/libming_decompile762poc-out_of_mem-idx\:0xf... | null pointer reference in decompileGETURL2 | https://api.github.com/repos/libming/libming/issues/190/comments | 0 | 2020-01-07T00:53:16Z | 2020-01-07T00:53:16Z | https://github.com/libming/libming/issues/190 | 546,016,991 | 190 | 999 |
CVE-2020-6630 | 2020-01-09T02:15:13.590 | An issue was discovered in GPAC version 0.8.0. There is a NULL pointer dereference in the function gf_isom_get_media_data_size() in isomedia/isom_read.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1377"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party A... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"476"
] | 476 | https://github.com/gpac/gpac/issues/1377 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [ yes] I looked for a similar issue and couldn't find any.
- [ yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [ yes] I give en... | null pointer reference in gf_isom_get_media_data_size | https://api.github.com/repos/gpac/gpac/issues/1377/comments | 1 | 2020-01-02T00:45:04Z | 2020-01-08T15:42:17Z | https://github.com/gpac/gpac/issues/1377 | 544,416,874 | 1,377 | 1,000 |
CVE-2020-6631 | 2020-01-09T02:15:13.653 | An issue was discovered in GPAC version 0.8.0. There is a NULL pointer dereference in the function gf_m2ts_stream_process_pmt() in media_tools/m2ts_mux.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1378"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party A... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"476"
] | 476 | https://github.com/gpac/gpac/issues/1378 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [ yes] I looked for a similar issue and couldn't find any.
- [ yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [ yes] I give en... | null pointer reference in gf_m2ts_stream_process_pmt | https://api.github.com/repos/gpac/gpac/issues/1378/comments | 2 | 2020-01-02T00:49:55Z | 2020-01-17T15:09:51Z | https://github.com/gpac/gpac/issues/1378 | 544,417,280 | 1,378 | 1,001 |
CVE-2019-20374 | 2020-01-09T23:15:10.367 | A mutation cross-site scripting (XSS) issue in Typora through 0.9.9.31.2 on macOS and through 0.9.81 on Linux leads to Remote Code Execution through Mermaid code blocks. To exploit this vulnerability, one must open a file in Typora. The XSS vulnerability is then triggered due to improper HTML sanitization. Given that t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cure53/DOMPurify/commit/4e8af7b2c4a159b683d317e02c5cbddb86dc4a0e"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:typora:typora:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E150220E-EC72-4C16-A3A7-B22F8092F693",
"versionEndExcluding": null,
"versionEndIncluding": "0.9.81",
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/typora/typora-issues/issues/3124 | [
"Third Party Advisory"
] | github.com | [
"typora",
"typora-issues"
] | # Summary
A mXSS in Typora leads to remote code execution. The vector is Mermaid code blocks (HTML labels) however other spots where Typora attempts to clean up HTML using DOMPurify could be prone to the same.
# Steps to reproduce / PoC
1. Create an .md with the following contents:
~~~
```mermaid
graph T... | Typora RCE via mXSS | https://api.github.com/repos/typora/typora-issues/issues/3124/comments | 2 | 2019-12-27T22:37:51Z | 2020-02-25T15:36:23Z | https://github.com/typora/typora-issues/issues/3124 | 543,010,305 | 3,124 | 1,002 |
CVE-2019-20378 | 2020-01-11T03:15:10.730 | ganglia-web (aka Ganglia Web Frontend) through 3.7.5 allows XSS via the header.php ce parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ganglia/ganglia-web/issues/351"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://git... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ganglia:ganglia-web:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EE611052-8336-4023-AA79-AEB5D33DFCB9",
"versionEndExcluding": null,
"versionEndIncluding": "3.7.5",
"versionStartExc... | [
"79"
] | 79 | https://github.com/ganglia/ganglia-web/issues/351 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ganglia",
"ganglia-web"
] | When I visited the installed web page , I found this version has 2 Reflect Cross-site scripting (XSS) in the page. I found the apt-get installed the version 3.6.1 of ganglia-webfrontend default, maybe there are many ganglia users used apt-get to installed this ganglia-webfrontend version.
header.php
411 $custom... | Two XSS issue found in 3.6.1 | https://api.github.com/repos/ganglia/ganglia-web/issues/351/comments | 4 | 2019-12-17T01:38:44Z | 2024-02-16T04:44:29Z | https://github.com/ganglia/ganglia-web/issues/351 | 538,781,783 | 351 | 1,003 |
CVE-2020-6838 | 2020-01-11T03:15:10.950 | In mruby 2.1.0, there is a use-after-free in hash_values_at in mrbgems/mruby-hash-ext/src/hash-ext.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/mruby/mruby/issues/4926"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mruby:mruby:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "853BAA9F-67B8-40FB-95CC-C23CF1FAA31E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"416"
] | 416 | https://github.com/mruby/mruby/issues/4926 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"mruby",
"mruby"
] | compile mruby in ubuntu18.04 64 bit with ASAN.
poc:
```
a=0
b="asdfasdfasdf adaf asdf asdfa sdf asdfasdfasdfa sdf"
c={1=>1, 2=>"foo", "foo"=>nil, nil=> nil}
d=[1,nil," sdfg"]
srand(1337)
a = c.values_at(b,a,b,d,c,a,d,d,c,d,b,b,b,b,d,c,a,c,a,d,d,b,a,c,d,c,c,b,c,a,a,b,d,b,d,c,c,a,a,b,c,a,d,c,b,b,c,c,d,a,c,d,d... | heap use after free in hash_values_at in mrbgems/mruby-hash-ext/src/hash-ext.c:33 | https://api.github.com/repos/mruby/mruby/issues/4926/comments | 2 | 2020-01-10T08:47:38Z | 2020-01-27T22:04:00Z | https://github.com/mruby/mruby/issues/4926 | 547,943,851 | 4,926 | 1,004 |
CVE-2020-6839 | 2020-01-11T03:15:11.027 | In mruby 2.1.0, there is a stack-based buffer overflow in mrb_str_len_to_dbl in string.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/mruby/mruby/issues/4929"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mruby:mruby:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "853BAA9F-67B8-40FB-95CC-C23CF1FAA31E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"787"
] | 787 | https://github.com/mruby/mruby/issues/4929 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"mruby",
"mruby"
] | build mruby in ubuntu18.04 64 bit with ASAN
poc:
```
a=0
b="asdfasdfasdf adaf asdf asdfa sdf asdfasdfasdfa sdf"
c={1=>1, 2=>"foo", "foo"=>nil, nil=> nil}
d=[1,nil," sdfg"]
srand(1337)
a = d.prepend(c,c,){|| }
d = d.reverse(){|| }
b = b.rstrip(){|| }
a = d.join(){|| }
a = d.Float(a,){|| }
```
resu... | stack overflow in mrb_str_len_to_dbl in src/string.c:2542 | https://api.github.com/repos/mruby/mruby/issues/4929/comments | 3 | 2020-01-10T08:51:54Z | 2020-01-27T21:56:59Z | https://github.com/mruby/mruby/issues/4929 | 547,945,726 | 4,929 | 1,005 |
CVE-2020-6840 | 2020-01-11T03:15:11.090 | In mruby 2.1.0, there is a use-after-free in hash_slice in mrbgems/mruby-hash-ext/src/hash-ext.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/mruby/mruby/issues/4927"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mruby:mruby:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "853BAA9F-67B8-40FB-95CC-C23CF1FAA31E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"416"
] | 416 | https://github.com/mruby/mruby/issues/4927 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"mruby",
"mruby"
] | build mruby in ubuntu18.04 64 bit with ASAN
poc:
```
a=0
b="asdfasdfasdf adaf asdf asdfa sdf asdfasdfasdfa sdf"
c={1=>1, 2=>"foo", "foo"=>nil, nil=> nil}
d=[1,nil," sdfg"]
srand(1337)
a = d.instance_eval(){|| }
a = c.slice(c,c,a,c,c,d,d,c,c,a,a,c,b,a,c,c,a,d,d,b,a,a,a,c,d,b,a,d,a,a,d,d,c,c,a,d,a,a,b,d,b,c,c... | heap use after free in hash_slice in mrbgems/mruby-hash-ext/src/hash-ext.c:61 | https://api.github.com/repos/mruby/mruby/issues/4927/comments | 3 | 2020-01-10T08:49:02Z | 2020-01-27T21:53:27Z | https://github.com/mruby/mruby/issues/4927 | 547,944,492 | 4,927 | 1,006 |
CVE-2019-20377 | 2020-01-11T04:15:10.927 | TopList before 2019-09-03 allows XSS via a title. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/tophubs/TopList/issues/32"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/tophubs/TopList/issues/32"
}
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tophub:toplist:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7BD8724C-4223-4B99-9694-B2C98152AF61",
"versionEndExcluding": "2019-09-03",
"versionEndIncluding": null,
"versionStartExc... | [
"79"
] | 79 | https://github.com/tophubs/TopList/issues/32 | [
"Third Party Advisory"
] | github.com | [
"tophubs",
"TopList"
] | I watched a odd title when I visited your website
| There is a Cross Site Scripting(XSS) Vulnerability | https://api.github.com/repos/tophubs/TopList/issues/32/comments | 4 | 2019-09-03T08:37:33Z | 2020-01-12T08:40:36Z | https://github.com/tophubs/TopList/issues/32 | 488,467,484 | 32 | 1,007 |
CVE-2020-6851 | 2020-01-13T06:15:10.957 | OpenJPEG through 2.3.1 has a heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c because of lack of opj_j2k_update_image_dimensions validation. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0262"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0274"
},
{
"source"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0142BF7B-EBFC-4EAD-87C8-7D0FFF7E9486",
"versionEndExcluding": null,
"versionEndIncluding": "2.3.1",
"versionStartExcl... | [
"787"
] | 787 | https://github.com/uclouvain/openjpeg/issues/1228 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"uclouvain",
"openjpeg"
] | Hi,
I found a heap buffer overflow that affects at least version 2.3.1 and current master (ac3737372a00b8778b528094dd5bd58a74f67d42). On a regular build of openjpeg (in my case, the one shipped by Arch Linux), it leads to a crash; when building the project with address sanitizer, I get the following report:
```
... | Heap buffer overflow in libopenjp2 | https://api.github.com/repos/uclouvain/openjpeg/issues/1228/comments | 3 | 2020-01-10T13:00:24Z | 2020-01-18T10:11:49Z | https://github.com/uclouvain/openjpeg/issues/1228 | 548,066,919 | 1,228 | 1,008 |
CVE-2020-6860 | 2020-01-13T07:15:10.557 | libmysofa 0.9.1 has a stack-based buffer overflow in readDataVar in hdf/dataobject.c during the reading of a header message attribute. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/hoene/libmysofa/issues/96"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:symonics:libmysofa:0.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CD74AEE2-5219-4872-94D2-F63C8459CAC4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"787"
] | 787 | https://github.com/hoene/libmysofa/issues/96 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"hoene",
"libmysofa"
] | We found Stack Buffer Overflow in mysofa2json binary and mysofa2json is complied with clang enabling ASAN.
**Machine Setup**
```
Machine : Ubuntu 16.04.3 LTS
gcc version 5.4.0 20160609 (Ubuntu 5.4.0-6ubuntu1~16.04.11)
Commit : be7ac15
Command : mysofa2json POC
```
**POC** : [POC.zip](https://github.com/hoene/... | Stack Buffer Overflow in mysofa2json | https://api.github.com/repos/hoene/libmysofa/issues/96/comments | 9 | 2020-01-10T09:56:42Z | 2020-01-11T21:36:10Z | https://github.com/hoene/libmysofa/issues/96 | 547,977,105 | 96 | 1,009 |
CVE-2020-6948 | 2020-01-13T19:15:12.850 | A remote code execution issue was discovered in HashBrown CMS through 1.3.3. Server/Entity/Deployer/GitDeployer.js has a Service.AppService.exec call that mishandles the URL, repository, username, and password. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/HashBrownCMS/hashbrown-cms/issues/326"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hashbrowncms:hashbrown_cms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F17E18B3-CD08-499E-B6EA-B6B26AEC76EB",
"versionEndExcluding": null,
"versionEndIncluding": "1.3.3",
"versionS... | [
"78"
] | 78 | https://github.com/HashBrownCMS/hashbrown-cms/issues/326 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"HashBrownCMS",
"hashbrown-cms"
] | In file src/Server/Entity/Deployer/GitDeployer.js: await HashBrown.Service.AppService.exec('git clone \'' + url + '\' \'' + repoPath + '\'');
The url, username, password and other parameters accept value without proper security check. If I set the git url to something like "10.154.159.166/git' $(bash -c ... | remote code execution vulnerability | https://api.github.com/repos/HashBrownCMS/hashbrown-cms/issues/326/comments | 8 | 2020-01-12T08:00:45Z | 2020-01-14T10:20:22Z | https://github.com/HashBrownCMS/hashbrown-cms/issues/326 | 548,535,998 | 326 | 1,010 |
CVE-2020-6949 | 2020-01-13T19:15:12.930 | A privilege escalation issue was discovered in the postUser function in HashBrown CMS through 1.3.3. An editor user can change the password hash of an admin user's account, or otherwise reconfigure that account. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/HashBrownCMS/hashbrown-cms/issues/327"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hashbrowncms:hashbrown_cms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F17E18B3-CD08-499E-B6EA-B6B26AEC76EB",
"versionEndExcluding": null,
"versionEndIncluding": "1.3.3",
"versionS... | [
"269"
] | 269 | https://github.com/HashBrownCMS/hashbrown-cms/issues/327 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"HashBrownCMS",
"hashbrown-cms"
] | editor role user can change admin user's properties including password hash, salt and token.
let's say you have 2 users in db
id name isadmin hash
1111 admin true aaaaaa
2222 editor false bbbbbb
editor user can use the postuser function to change his password. Attacker can use this func... | vulnerability that editor user can change admin user's password | https://api.github.com/repos/HashBrownCMS/hashbrown-cms/issues/327/comments | 7 | 2020-01-12T08:14:48Z | 2020-01-13T17:02:26Z | https://github.com/HashBrownCMS/hashbrown-cms/issues/327 | 548,537,289 | 327 | 1,011 |
CVE-2020-6958 | 2020-01-14T00:15:11.410 | An XXE vulnerability in JnlpSupport in Yet Another Java Service Wrapper (YAJSW) 12.14, as used in NSA Ghidra and other products, allows attackers to exfiltrate data from remote hosts and potentially cause denial-of-service. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/NationalSecurityAgency/ghidra/issues/943"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/purpleracc00n/Exploits... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yet_another_java_service_wrapper_project:yet_another_java_service_wrapper:12.14:*:*:*:*:*:*:*",
"matchCriteriaId": "79AF9ACB-D0C6-4843-92AD-666753567434",
"versionEndExcluding": null,
"v... | [
"611"
] | 611 | https://github.com/NationalSecurityAgency/ghidra/issues/943 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"NationalSecurityAgency",
"ghidra"
] | **Describe the bug**
XXE vulnerability in YAJSW’s JnlpSupport affects Ghidra Server.
An insecure way to parse XML input was found in JnlpSupport class from Yet Another Java Service Wrapper used by Ghidra (up to latest version).
**To Reproduce**
Steps to reproduce the behavior:
1. Create an XXE payload file ... | XXE Vulnerability in JnlpSupport of YAJSW affects Ghidra Server | https://api.github.com/repos/NationalSecurityAgency/ghidra/issues/943/comments | 2 | 2019-08-27T14:21:52Z | 2021-12-22T10:34:15Z | https://github.com/NationalSecurityAgency/ghidra/issues/943 | 485,841,948 | 943 | 1,012 |
CVE-2020-6173 | 2020-01-14T19:15:13.797 | TUF (aka The Update Framework) 0.7.2 through 0.12.1 allows Uncontrolled Resource Consumption. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/theupdateframework/tuf/commits/develop"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:linuxfoundation:the_update_framework:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A88741B4-0593-41A4-BD46-9EE4E3905DBA",
"versionEndExcluding": null,
"versionEndIncluding": "0.12.1",
... | [
"400"
] | 400 | https://github.com/theupdateframework/tuf/issues/973 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"theupdateframework",
"tuf"
] | We received the report below about an attacker that can create many invalid signatures on a metadata file, delaying the moment when the client will determine the signature is not valid. This delay may be for at least a few minutes, but possibly could be longer especially if multiple files are impacted.
Possible rem... | Potential DoS for attacker that can create metadata files... | https://api.github.com/repos/theupdateframework/python-tuf/issues/973/comments | 2 | 2020-01-08T17:09:34Z | 2020-09-10T10:46:46Z | https://github.com/theupdateframework/python-tuf/issues/973 | 546,990,659 | 973 | 1,013 |
CVE-2020-7054 | 2020-01-14T21:15:16.707 | MmsValue_decodeMmsData in mms/iso_mms/server/mms_access_result.c in libIEC61850 through 1.4.0 has a heap-based buffer overflow when parsing the MMS_BIT_STRING data type. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/mz-automation/libiec61850/issues/200"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mz-automation:libiec61850:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9889D0B1-2E87-4FA4-A80B-AA481308ECDE",
"versionEndExcluding": null,
"versionEndIncluding": "1.4.0",
"versionSt... | [
"787"
] | 787 | https://github.com/mz-automation/libiec61850/issues/200 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"mz-automation",
"libiec61850"
] | When libiec61850 parsing type `MMS_BIT_STRING`, it doesn't check variable `bufPos`. So we can provide a larger number for `bufPos`, then memory copy from `buffer` + `bufPos` + 1 lead to heap overflow.
<img width="631" alt="Screen Shot 2020-01-13 at 1 18 25 AM" src="https://user-images.githubusercontent.com/20929895/72... | heap overflow when parsing `MMS_BIT_STRING` in MmsValue_decodeMmsData in mms/iso_mms/server/mms_access_result.c | https://api.github.com/repos/mz-automation/libiec61850/issues/200/comments | 3 | 2020-01-12T17:21:08Z | 2020-01-15T07:07:07Z | https://github.com/mz-automation/libiec61850/issues/200 | 548,600,159 | 200 | 1,014 |
CVE-2020-7058 | 2020-01-15T07:15:12.927 | data_input.php in Cacti 1.2.8 allows remote code execution via a crafted Input String to Data Collection -> Data Input Methods -> Unix -> Ping Host. NOTE: the vendor has stated "This is a false alarm. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Cacti/cacti/issues/3186"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cacti:cacti:1.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2D05824B-4E66-44CA-A862-0DDDB23C8C88",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"20"
] | 20 | https://github.com/Cacti/cacti/issues/3186 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Cacti",
"cacti"
] | **Describe the bug**
Input validation error in data_input.php leads to Remote Code Execution via Input String (Script/Command) edit actions. By default, Cacti was installed with several Data Input Methods. Some of them was created using Script/Command input type. An attacker will be able to edit the Input String to in... | Critical vulnerability: Remote Code Execution via string/command type Input String | https://api.github.com/repos/Cacti/cacti/issues/3186/comments | 19 | 2020-01-14T22:53:20Z | 2020-08-23T00:04:30Z | https://github.com/Cacti/cacti/issues/3186 | 549,865,124 | 3,186 | 1,015 |
CVE-2020-7105 | 2020-01-16T04:15:11.617 | async.c and dict.c in libhiredis.a in hiredis through 0.14.0 allow a NULL pointer dereference because malloc return values are unchecked. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/redis/hiredis/issues/747"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redislabs:hiredis:*:*:*:*:*:*:*:*",
"matchCriteriaId": "485B9377-2288-48C5-9B4F-2DF0DB0E2C44",
"versionEndExcluding": null,
"versionEndIncluding": "0.14.0",
"versionStartExcl... | [
"476"
] | 476 | https://github.com/redis/hiredis/issues/747 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"redis",
"hiredis"
] | The following code never aborts when `malloc` is unsuccessful, causing dereferencing of null pointers.
async.c:61
```C
redisCallback *dup = malloc(sizeof(*dup));
memcpy(dup,src,sizeof(*dup)); // dup may be null
return dup;
```
dict.c:75
```C
dict *ht = malloc(sizeof(*ht));
_dictInit(ht,type,privDataPtr); ... | Null pointer dereferencing in dict.c and async.c | https://api.github.com/repos/redis/hiredis/issues/747/comments | 6 | 2020-01-09T21:34:41Z | 2020-01-22T18:59:34Z | https://github.com/redis/hiredis/issues/747 | 547,736,563 | 747 | 1,016 |
CVE-2020-7106 | 2020-01-16T04:15:11.697 | Cacti 1.2.8 has stored XSS in data_sources.php, color_templates_item.php, graphs.php, graph_items.php, lib/api_automation.php, user_admin.php, and user_group_admin.php, as demonstrated by the description parameter in data_sources.php (a raw string from the database that is displayed by $header to trigger the XSS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CB72E0C8-BC84-4F75-A844-9D9D41031118",
"versionEndExcluding": "1.2.9",
"versionEndIncluding": null,
"versionStartExcluding":... | [
"79"
] | 79 | https://github.com/Cacti/cacti/issues/3191 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Cacti",
"cacti"
] | **Describe the bug**
Data source input validation error leads to Stored XSS within Description after creating a device with Malicious code embedded in Description field.
**To Reproduce**
Steps to reproduce the behavior:
1. Navigate to Console -> Create -> New Device
2. In Description field, input script payload:... | Lack of escaping on some pages can lead to XSS exposure (CVE-2020-7106) | https://api.github.com/repos/Cacti/cacti/issues/3191/comments | 21 | 2020-01-15T19:15:24Z | 2020-06-30T12:34:01Z | https://github.com/Cacti/cacti/issues/3191 | 550,377,486 | 3,191 | 1,017 |
CVE-2020-7237 | 2020-01-20T05:15:11.687 | Cacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. OS commands are executed when a new poller cycle begins. The attacker must be authenticated, and must have access to modify the Performance Settings of the product. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9,
"confidentialityImpact": "COMPLETE... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html"
},
{
"source": "cve@mit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cacti:cacti:1.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2D05824B-4E66-44CA-A862-0DDDB23C8C88",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"78"
] | 78 | https://github.com/Cacti/cacti/issues/3201 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Cacti",
"cacti"
] | **Describe the bug**
An input validation error found in Boost Debug Log field leads to Remote Code Execution.
**To Reproduce**
Steps to reproduce the behavior:
1. Navigate to Console -> Configuration -> Settings -> Performance
2. In Boost Debug Log field, type in the payload:
`--verbose; cat /etc/passwd > rce.t... | Remote Code Execution due to input validation failure in Performance Boost Debug Log (CVE-2020-7237) | https://api.github.com/repos/Cacti/cacti/issues/3201/comments | 2 | 2020-01-19T06:04:29Z | 2020-06-30T12:34:01Z | https://github.com/Cacti/cacti/issues/3201 | 551,872,554 | 3,201 | 1,018 |
CVE-2020-7229 | 2020-01-21T17:15:12.863 | An issue was discovered in Simplejobscript.com SJS before 1.65. There is unauthenticated SQL injection via the search engine. The parameter is landing_location. The function is countSearchedJobs(). The file is _lib/class.Job.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/niteosoft/simplejobscript/issues/7"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory",
"URL Repurposed"
],
"url": "https://simplejobscript.com"
},
{
"so... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:simplejobscript:simplejobscript:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BB5C84B9-3990-499E-ACFF-1E8F990A4691",
"versionEndExcluding": "1.65",
"versionEndIncluding": null,
"vers... | [
"89"
] | 89 | https://github.com/niteosoft/simplejobscript/issues/7 | [
"Third Party Advisory"
] | github.com | [
"niteosoft",
"simplejobscript"
] | **Description:** An issue was discovered in Simplejobscript.com SJS before 1.65. There is
unauthenticated SQL injection via the search engine. The parameter is `landing_location`. The function is `countSearchedJobs()`. The file is `_lib/class.Job.php`.
**Environment:**
- Version: 1.64
- OS: Ubuntu 16.10
- Web se... | [security] CVE-2020-7229, SQL injection in search function | https://api.github.com/repos/niteosoft/simplejobscript/issues/7/comments | 5 | 2020-01-10T14:55:41Z | 2020-01-19T11:12:18Z | https://github.com/niteosoft/simplejobscript/issues/7 | 548,124,219 | 7 | 1,019 |
CVE-2019-17357 | 2020-01-21T19:15:13.067 | Cacti through 1.2.7 is affected by a graphs.php?template_id= SQL injection vulnerability affecting how template identifiers are handled when a string and id composite value are used to identify the template type and id. An authenticated attacker can exploit this to extract data from the database, or an unauthenticated ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html"
},
{
"source": "cve@mit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A4F5AE29-35EB-4B0E-8304-F5520AAE998B",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.7",
"versionStartExcluding":... | [
"89"
] | 89 | https://github.com/Cacti/cacti/issues/3025 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"Cacti",
"cacti"
] | **Describe the bug**
As reported by Eldar Marcussen of xen1thLabs there is a SQL injection vulnerability in Cacti's graphs.php.
**Expected behavior**
Cacti should be not contain SQL vunderabilities | When viewing graphs, some input variables are not properly checked (SQL injection possible) | https://api.github.com/repos/Cacti/cacti/issues/3025/comments | 4 | 2019-10-12T19:46:24Z | 2020-06-30T12:49:01Z | https://github.com/Cacti/cacti/issues/3025 | 506,229,820 | 3,025 | 1,020 |
CVE-2019-20391 | 2020-01-22T22:15:10.080 | An invalid memory access flaw is present in libyang before v1.0-r3 in the function resolve_feature_value() when an if-feature statement is used inside a bit. Applications that use libyang to parse untrusted input yang files may crash. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793934"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesnet:libyang:0.11:r1:*:*:*:*:*:*",
"matchCriteriaId": "65E91322-5F67-43C2-8112-5ECAEC2A3C12",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"119"
] | 119 | https://github.com/CESNET/libyang/issues/772 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CESNET",
"libyang"
] | Hi,
here is another file that crashes yangfuzz and yanglint.
```
module all {
yang-version 1.1;
namespace "urn:all";
prefix all_mod;
grouping t1 {
uses group1 {
}
leaf leaf12 {
type bits {
bit flag0 {
position 0;
if-feature "feat1";
... | Segmentation fault in yangfuzz and yanglint | https://api.github.com/repos/CESNET/libyang/issues/772/comments | 1 | 2019-04-26T17:01:20Z | 2020-01-23T09:16:54Z | https://github.com/CESNET/libyang/issues/772 | 437,762,832 | 772 | 1,021 |
CVE-2019-20392 | 2020-01-22T22:15:10.143 | An invalid memory access flaw is present in libyang before v1.0-r1 in the function resolve_feature_value() when an if-feature statement is used inside a list key node, and the feature used is not defined. Applications that use libyang to parse untrusted input yang files may crash. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793922"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesnet:libyang:0.11:r1:*:*:*:*:*:*",
"matchCriteriaId": "65E91322-5F67-43C2-8112-5ECAEC2A3C12",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"119"
] | 119 | https://github.com/CESNET/libyang/issues/723 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CESNET",
"libyang"
] | If an if-feature statement is used inside a list key node, and the feature used is not defined, yanglint and yangfuzz segfault in lys_parse_path.
Here is an example of a yang file that crashes the parser:
```
module links {
namespace "urn:module2";
prefix mod2;
list list-for-augment {
key "keyleaf"... | Segmentation fault when if-feature is used in list key node, with a non existing feature | https://api.github.com/repos/CESNET/libyang/issues/723/comments | 7 | 2019-03-07T19:25:40Z | 2020-01-23T15:30:39Z | https://github.com/CESNET/libyang/issues/723 | 418,474,100 | 723 | 1,022 |
CVE-2019-20393 | 2020-01-22T22:15:10.237 | A double-free is present in libyang before v1.0-r1 in the function yyparse() when an empty description is used. Applications that use libyang to parse untrusted input yang files may be vulnerable to this flaw, which would cause a crash or potentially code execution. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793930"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesnet:libyang:0.11:r1:*:*:*:*:*:*",
"matchCriteriaId": "65E91322-5F67-43C2-8112-5ECAEC2A3C12",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"415"
] | 415 | https://github.com/CESNET/libyang/issues/742 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CESNET",
"libyang"
] | Hi,
this file crashes lys_parse_path:
```
module links {
yang-version 1.1;
namespace "urn:mo:1";
prefix yang;
import ietf-yang-metadata {
prefix md;
revision-date 2016-08-05;
}
md:annotation value {
reference "RFC7950 section 7.7.9.";
description;
}
}
``` | Heap corruption in yyparse | https://api.github.com/repos/CESNET/libyang/issues/742/comments | 1 | 2019-03-29T11:16:03Z | 2020-01-23T09:16:30Z | https://github.com/CESNET/libyang/issues/742 | 426,937,550 | 742 | 1,023 |
CVE-2019-20394 | 2020-01-22T22:15:10.330 | A double-free is present in libyang before v1.0-r3 in the function yyparse() when a type statement in used in a notification statement. Applications that use libyang to parse untrusted input yang files may be vulnerable to this flaw, which would cause a crash or potentially code execution. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793932"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesnet:libyang:0.11:r1:*:*:*:*:*:*",
"matchCriteriaId": "65E91322-5F67-43C2-8112-5ECAEC2A3C12",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"415"
] | 415 | https://github.com/CESNET/libyang/issues/769 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CESNET",
"libyang"
] | Hi,
this file causes heap corruption and crashes lys_parse_path
```
module mod6 {
prefix abc;
namespace "http://www.example.c;
yang-version 1.1;
container cont1 {
//x" {
}
augment "/aug-cont" {
list list2 {
key "ke... | Heap corruption in lys_parse_path due to type statement in notification statement | https://api.github.com/repos/CESNET/libyang/issues/769/comments | 1 | 2019-04-26T09:14:19Z | 2020-01-23T09:16:42Z | https://github.com/CESNET/libyang/issues/769 | 437,576,729 | 769 | 1,024 |
CVE-2019-20395 | 2020-01-22T22:15:10.423 | A stack consumption issue is present in libyang before v1.0-r1 due to the self-referential union type containing leafrefs. Applications that use libyang to parse untrusted input yang files may crash. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793924"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/CESNET/libyang/commit/4... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesnet:libyang:0.11:r1:*:*:*:*:*:*",
"matchCriteriaId": "65E91322-5F67-43C2-8112-5ECAEC2A3C12",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"674"
] | 674 | https://github.com/CESNET/libyang/issues/724 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CESNET",
"libyang"
] | Hi,
the following yang file causes a segmentation fault in lys_parse_path, caused by a stack overflow due to too many function calls.
```
module mod1 {
namespace "urn:all";
prefix av;
yang-version 1.1;
leaf l1 {
type union-type;
}
leaf-list list5 {
type string;... | Segmentation fault due to self-refential union type containing leafrefs | https://api.github.com/repos/CESNET/libyang/issues/724/comments | 4 | 2019-03-08T10:26:25Z | 2020-01-23T09:15:53Z | https://github.com/CESNET/libyang/issues/724 | 418,726,165 | 724 | 1,025 |
CVE-2019-20396 | 2020-01-22T22:15:10.470 | A segmentation fault is present in yyparse in libyang before v1.0-r1 due to a malformed pattern statement value during lys_parse_path parsing. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/CESNET/libyang/commit/a1f17693904ed6fecc8902c747fc50a8f20e6af8"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/CE... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesnet:libyang:0.11:r1:*:*:*:*:*:*",
"matchCriteriaId": "65E91322-5F67-43C2-8112-5ECAEC2A3C12",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"119"
] | 119 | https://github.com/CESNET/libyang/issues/740 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CESNET",
"libyang"
] | Hello,
this file crashes libyang when it is parsed with lys_parse_path:
```
module xpath-1.1 {
namespace "urn:xpath-1.1";
prefix xp;
container top {
leaf identref {
type mdentityref {
base:iwo;
pattern '[A-Z]+';
patter... | Segmentation fault in yyparse due to malformed pattern statement value | https://api.github.com/repos/CESNET/libyang/issues/740/comments | 1 | 2019-03-29T10:38:30Z | 2020-01-23T09:16:18Z | https://github.com/CESNET/libyang/issues/740 | 426,922,796 | 740 | 1,026 |
CVE-2019-20397 | 2020-01-22T22:15:10.550 | A double-free is present in libyang before v1.0-r1 in the function yyparse() when an organization field is not terminated. Applications that use libyang to parse untrusted input yang files may be vulnerable to this flaw, which would cause a crash or potentially code execution. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793928"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesnet:libyang:0.11:r1:*:*:*:*:*:*",
"matchCriteriaId": "65E91322-5F67-43C2-8112-5ECAEC2A3C12",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"415"
] | 415 | https://github.com/CESNET/libyang/issues/739 | [
"Third Party Advisory"
] | github.com | [
"CESNET",
"libyang"
] | Hello,
this file crashes lys_parse_path:
```
module ietf-datastores {
yang-version 1.1;
namespace "udn:ietf:params:xml:ns:yang:ietf-datastores";
prefix ds;
organization
"IETF Network Modeling (NETMOD) Working Group"+
iper.net>
}
```
Regards,
Juraj | Heap corruption due to invalid unterminated organization field in YANG file | https://api.github.com/repos/CESNET/libyang/issues/739/comments | 1 | 2019-03-28T09:31:50Z | 2020-01-23T09:16:06Z | https://github.com/CESNET/libyang/issues/739 | 426,387,403 | 739 | 1,027 |
CVE-2019-20398 | 2020-01-22T22:15:10.627 | A NULL pointer dereference is present in libyang before v1.0-r3 in the function lys_extension_instances_free() due to a copy of unresolved extensions in lys_restr_dup(). Applications that use libyang to parse untrusted input yang files may crash. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793935"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/CESNET/libyang/commit/7... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesnet:libyang:0.11:r1:*:*:*:*:*:*",
"matchCriteriaId": "65E91322-5F67-43C2-8112-5ECAEC2A3C12",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"476"
] | 476 | https://github.com/CESNET/libyang/issues/773 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CESNET",
"libyang"
] | Hi,
this file crashes yanglint due to unprintable characters at the end of the file. Shortening the error message string removes the crash too, so I guess both issues are relevant.
```
module n00 {
yang-version 1.1;
namespace "urn:all";
prefix all_mod;
container cont1 {
... | Segmentation fault in yanglint and yangfuzz due to unprintable characters | https://api.github.com/repos/CESNET/libyang/issues/773/comments | 1 | 2019-04-29T13:21:12Z | 2020-01-23T09:17:06Z | https://github.com/CESNET/libyang/issues/773 | 438,312,481 | 773 | 1,028 |
CVE-2020-5223 | 2020-01-23T02:15:13.423 | In PrivateBin versions 1.2.0 before 1.2.2, and 1.3.0 before 1.3.2, a persistent XSS attack is possible. Under certain conditions, a user provided attachment file name can inject HTML leading to a persistent Cross-site scripting (XSS) vulnerability. The vulnerability has been fixed in PrivateBin v1.3.2 & v1.2.2. Admins ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/PrivateBin/PrivateBin/commit/8d0ac336d23cd8c98e71d5f21cdadcae9c8a26e6"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://gi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:privatebin:privatebin:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F1889EB9-8FB8-467F-B66C-4649A5B9373E",
"versionEndExcluding": "1.2.2",
"versionEndIncluding": null,
"versionStartE... | [
"79"
] | 79 | https://github.com/PrivateBin/PrivateBin/issues/554 | [
"Third Party Advisory"
] | github.com | [
"PrivateBin",
"PrivateBin"
] | I investigated the error condition found in the [property based unit test](https://github.com/PrivateBin/PrivateBin/blob/master/tst/README.md#property-based-unit-testing) with [RNG state 8b8f0d4ec2a67139b5](https://travis-ci.org/PrivateBin/PrivateBin/jobs/629180605#L782) for the `AttachmentViewer` class in an unrelated... | HTML injection via unescaped attachment filename | https://api.github.com/repos/PrivateBin/PrivateBin/issues/554/comments | 3 | 2019-12-25T08:12:19Z | 2020-01-11T12:08:54Z | https://github.com/PrivateBin/PrivateBin/issues/554 | 542,288,595 | 554 | 1,029 |
CVE-2020-5217 | 2020-01-23T03:15:10.793 | In Secure Headers (RubyGem secure_headers), a directive injection vulnerability is present in versions before 3.8.0, 5.1.0, and 6.2.0. If user-supplied input was passed into append/override_content_security_policy_directives, a semicolon could be injected leading to directive injection. This could be used to e.g. overr... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/twitter/secure_headers/commit/936a160e3e9659737a9f9eafce13eea36b5c9fa3"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:twitter:secure_headers:*:*:*:*:*:ruby:*:*",
"matchCriteriaId": "F0F5AB6F-E584-4640-A497-3BC81A4171C8",
"versionEndExcluding": "3.8.0",
"versionEndIncluding": null,
"versionSt... | [
"74"
] | 74 | https://github.com/twitter/secure_headers/issues/418 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"twitter",
"secure_headers"
] | Consider the following Rails controller action which overwrites the frame ancestors based on some user input:
```ruby
def show
user_input_domain1 = URI.parse "https://google.com;script-src"
user_input_domain2 = URI.parse "https://*;.;"
user_input_domains = [user_input_domain1, user_input_domain2]
over... | Filtering CSP entries to prevent bypassing rules | https://api.github.com/repos/github/secure_headers/issues/418/comments | 8 | 2020-01-21T16:25:57Z | 2020-01-22T09:51:06Z | https://github.com/github/secure_headers/issues/418 | 552,986,063 | 418 | 1,030 |
CVE-2020-7226 | 2020-01-24T15:15:14.093 | CiphertextHeader.java in Cryptacular 1.2.3, as used in Apereo CAS and other products, allows attackers to trigger excessive memory allocation during a decode operation, because the nonce array length associated with "new byte" may depend on untrusted input within the header of encoded data. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/apereo/cas/commit/8810f2b6c71d73341d4dde6b09a18eb46cfd6d45"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://gi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vt:cryptacular:*:*:*:*:*:*:*:*",
"matchCriteriaId": "40E7BD9E-6868-4BDF-B686-7E018458ABF5",
"versionEndExcluding": "1.1.4",
"versionEndIncluding": null,
"versionStartExcludin... | [
"770"
] | 770 | https://github.com/vt-middleware/cryptacular/issues/52 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"vt-middleware",
"cryptacular"
] | Please confirm if it is vulnerable.
Mitre id: CVE-2020-7226
Reporter: findneo
> [Suggested description]
> CiphertextHeader.java in
> Cryptacular 1.2.3, as used in Apereo CAS and other products, allows
> attackers to trigger excessive memory allocation during a decode
> operation, because the nonce array length... | Denial of Service in latest version [1.2.3] | https://api.github.com/repos/vt-middleware/cryptacular/issues/52/comments | 7 | 2020-01-19T15:37:20Z | 2020-02-27T14:58:50Z | https://github.com/vt-middleware/cryptacular/issues/52 | 551,940,473 | 52 | 1,031 |
CVE-2019-20421 | 2020-01-27T05:15:10.453 | In Jp2Image::readMetadata() in jp2image.cpp in Exiv2 0.27.2, an input file can result in an infinite loop and hang, with high CPU consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Exiv2/exiv2/commit/a82098f4f90cd86297131b5663c3dec6a34470e8"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:exiv2:exiv2:0.27.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7E9A8822-0F6F-4561-81B3-38235F52116E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"835"
] | 835 | https://github.com/Exiv2/exiv2/issues/1011 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"Exiv2",
"exiv2"
] | **Describe the bug**
An input file can result in an infinite loop and hang, with high CPU consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.
**To Reproduce**
Steps to reproduce the behaviour:
excute 'build/bin/exiv2 Jp2Image_readMetadata_loop.poc'
*... | An infinite loop and hang in Exiv2::Jp2Image::readMetadata() | https://api.github.com/repos/Exiv2/exiv2/issues/1011/comments | 3 | 2019-09-30T12:02:01Z | 2020-03-29T11:43:49Z | https://github.com/Exiv2/exiv2/issues/1011 | 500,231,156 | 1,011 | 1,032 |
CVE-2020-7238 | 2020-01-27T17:15:12.277 | Netty 4.1.43.Final allows HTTP Request Smuggling because it mishandles Transfer-Encoding whitespace (such as a [space]Transfer-Encoding:chunked line) and a later Content-Length header. This issue exists because of an incomplete fix for CVE-2019-16869. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0497"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0567"
},
{
"source"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netty:netty:4.1.43:*:*:*:*:*:*:*",
"matchCriteriaId": "61DFEEC7-2603-4815-AF13-179125C16222",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"444"
] | 444 | https://github.com/jdordonezn/CVE-2020-72381/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"jdordonezn",
"CVE-2020-72381"
] | Netty 4.1.43.Final allows HTTP Request Smuggling because it mishandles Transfer-Encoding whitespace (such as a [space]Transfer-Encoding:chunked line) and a later Content-Length header.
**Steps to reproduce the vulnerability**
1. The hacker send a request with both "[space]Transfer-Encoding: chunked" header and "... | HTTP Request Smuggling in Netty - 4.1.43.Final | https://api.github.com/repos/jdordonezn/CVE-2020-72381/issues/1/comments | 1 | 2020-01-26T19:58:20Z | 2020-02-21T20:06:55Z | https://github.com/jdordonezn/CVE-2020-72381/issues/1 | 555,279,227 | 1 | 1,033 |
CVE-2019-20440 | 2020-01-28T00:15:10.823 | An issue was discovered in WSO2 API Manager 2.6.0. A potential Reflected Cross-Site Scripting (XSS) vulnerability has been identified in the update API documentation feature of the API Publisher. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://cybersecurityworks.com/zerodays/cve-2019-20440-wso2.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://docs.wso2.com/display/Security/Se... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"79"
] | 79 | https://github.com/cybersecurityworks/Disclosed/issues/24 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"cybersecurityworks",
"Disclosed"
] | # Details:
WSO2 Product Bug Report
Bug Name: Multiple reflected <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a>
Product Name: <a href="https://wso2.com/">WSO2</a>
Server: <a href="https://docs.wso2.com/display/AM260/WSO2+API+Manage... | Multiple Reflected Cross Site Scripting (XSS) in ''docName', 'version' and 'apiName' of created API document using XSS payload' | WSO2 API Manager version 2.6.0 | WSO2 Product | https://api.github.com/repos/cybersecurityworks/Disclosed/issues/24/comments | 0 | 2020-01-20T09:44:04Z | 2020-01-20T11:52:18Z | https://github.com/cybersecurityworks/Disclosed/issues/24 | 552,183,556 | 24 | 1,034 |
CVE-2019-20441 | 2020-01-28T00:15:10.883 | An issue was discovered in WSO2 API Manager 2.6.0. A potential Stored Cross-Site Scripting (XSS) vulnerability has been identified in the 'implement phase' of the API Publisher. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://cybersecurityworks.com/zerodays/cve-2019-20441-wso2.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://docs.wso2.com/display/Security/Se... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"79"
] | 79 | https://github.com/cybersecurityworks/Disclosed/issues/23 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"cybersecurityworks",
"Disclosed"
] | # Details:
WSO2 Product Bug Report
Bug Name: Stored <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a>
Product Name: <a href="https://wso2.com/">WSO2</a>
Server: <a href="https://docs.wso2.com/display/AM260/WSO2+API+Manager+Documentat... | Stored Cross Site Scripting (XSS) in ' HTTP POST request with a harmful request parameter for context' | WSO2 API Manager version 2.6.0 | WSO2 Product | https://api.github.com/repos/cybersecurityworks/Disclosed/issues/23/comments | 0 | 2020-01-20T07:37:31Z | 2020-01-20T09:42:10Z | https://github.com/cybersecurityworks/Disclosed/issues/23 | 552,119,549 | 23 | 1,035 |
CVE-2019-20442 | 2020-01-28T00:15:10.930 | An issue was discovered in WSO2 API Manager 2.6.0, WSO2 Enterprise Integrator 6.5.0, WSO2 IS as Key Manager 5.7.0, and WSO2 Identity Server 5.8.0. A potential stored Cross-Site Scripting (XSS) vulnerability in roleToAuthorize has been identified in the registry UI. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://cybersecurityworks.com/zerodays/cve-2019-20442-wso2.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://docs.wso2.com/display/Security/Se... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"79"
] | 79 | https://github.com/cybersecurityworks/Disclosed/issues/25 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cybersecurityworks",
"Disclosed"
] | # Details:
WSO2 Product Bug Report
Bug Name: Stored <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a>
Product Name: <a href="https://wso2.com/">WSO2</a>
Server: <a href="https://wso2.com/identity-and-access-management/#">WSO2 Identit... | Stored Cross Site Scripting (XSS) in 'roleToAuthorize' variable | WSO2 Product (WSO2 Identity Server version 5.7.0) | https://api.github.com/repos/cybersecurityworks/Disclosed/issues/25/comments | 0 | 2020-01-20T11:16:47Z | 2020-01-20T11:16:47Z | https://github.com/cybersecurityworks/Disclosed/issues/25 | 552,235,262 | 25 | 1,036 |
CVE-2019-20443 | 2020-01-28T00:15:10.993 | An issue was discovered in WSO2 API Manager 2.6.0, WSO2 Enterprise Integrator 6.5.0, WSO2 IS as Key Manager 5.7.0, and WSO2 Identity Server 5.8.0. A potential stored Cross-Site Scripting (XSS) vulnerability in mediaType has been identified in the registry UI. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://cybersecurityworks.com/zerodays/cve-2019-20443-wso2.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://docs.wso2.com/display/Security/Se... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"79"
] | 79 | https://github.com/cybersecurityworks/Disclosed/issues/26 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"cybersecurityworks",
"Disclosed"
] | # Details:
WSO2 Product Bug Report
Bug Name: Stored <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a>
Product Name: <a href="https://wso2.com/">WSO2</a>
Server: <a href="https://wso2.com/identity-and-access-management/#">WSO2 Identit... | Stored Cross Site Scripting (XSS) in 'mediaType' variable | WSO2 Product (WSO2 Identity Server version 5.7.0) | https://api.github.com/repos/cybersecurityworks/Disclosed/issues/26/comments | 0 | 2020-01-20T11:30:13Z | 2020-01-20T11:30:13Z | https://github.com/cybersecurityworks/Disclosed/issues/26 | 552,242,400 | 26 | 1,037 |
CVE-2019-20434 | 2020-01-28T01:15:11.783 | An issue was discovered in WSO2 API Manager 2.6.0. A potential Reflected Cross-Site Scripting (XSS) vulnerability has been identified in the Datasource creation page of the Management Console. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://cybersecurityworks.com/zerodays/cve-2019-20434-wso2.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://docs.wso2.com/display/Security/Se... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"79"
] | 79 | https://github.com/cybersecurityworks/Disclosed/issues/17 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cybersecurityworks",
"Disclosed"
] | # Details:
WSO2 Product Bug Report
Bug Name: Multiple <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a>
Product Name: <a href="https://wso2.com/">WSO2</a>
Server: <a href="https://docs.wso2.com/display/DAS320/WSO2+Data+Analytics+Serv... | Multiple Reflected Cross Site Scripting (XSS) in WSO2 Product (Data Analytics Server Version 3.2.0) | https://api.github.com/repos/cybersecurityworks/Disclosed/issues/17/comments | 0 | 2019-11-27T10:43:00Z | 2019-11-27T10:43:00Z | https://github.com/cybersecurityworks/Disclosed/issues/17 | 529,263,538 | 17 | 1,038 |
CVE-2019-20435 | 2020-01-28T01:15:11.877 | An issue was discovered in WSO2 API Manager 2.6.0. A reflected XSS attack could be performed in the inline API documentation editor page of the API Publisher by sending an HTTP GET request with a harmful docName request parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://cybersecurityworks.com/zerodays/cve-2019-20435-wso2.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://docs.wso2.com/display/Security/Se... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"79"
] | 79 | https://github.com/cybersecurityworks/Disclosed/issues/18 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cybersecurityworks",
"Disclosed"
] | # Details:
WSO2 Product Bug Report
Bug Name: <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a>
Product Name: <a href="https://wso2.com/">WSO2</a>
Server: <a href="https://docs.wso2.com/display/AM260/Installing+via+the+Installer#Insta... | Reflected Cross Site Scripting (XSS) in WSO2 Product (WSO2 API Manager version 2.6.0) | https://api.github.com/repos/cybersecurityworks/Disclosed/issues/18/comments | 0 | 2019-11-27T12:00:44Z | 2019-11-29T10:45:12Z | https://github.com/cybersecurityworks/Disclosed/issues/18 | 529,302,954 | 18 | 1,039 |
CVE-2019-20436 | 2020-01-28T01:15:11.957 | An issue was discovered in WSO2 API Manager 2.6.0, WSO2 IS as Key Manager 5.7.0, and WSO2 Identity Server 5.8.0. If there is a claim dialect configured with an XSS payload in the dialect URI, and a user picks up this dialect's URI and adds it as the service provider claim dialect while configuring the service provider,... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://cybersecurityworks.com/zerodays/cve-2019-20436-wso2.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://docs.wso2.com/display/Security/Se... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"79"
] | 79 | https://github.com/cybersecurityworks/Disclosed/issues/19 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"cybersecurityworks",
"Disclosed"
] | # Details:
WSO2 Product Bug Report
Bug Name: Stored <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a>
Product Name: <a href="https://wso2.com/">WSO2</a>
Server: <a href="https://wso2.com/identity-and-access-management/#">WSO2 Identit... | Stored Cross Site Scripting (XSS) in WSO2 Product (WSO2 Identity Server version 5.7.0) | https://api.github.com/repos/cybersecurityworks/Disclosed/issues/19/comments | 0 | 2019-11-29T10:51:10Z | 2020-01-20T11:01:12Z | https://github.com/cybersecurityworks/Disclosed/issues/19 | 530,281,451 | 19 | 1,040 |
CVE-2019-20437 | 2020-01-28T01:15:12.037 | An issue was discovered in WSO2 API Manager 2.6.0, WSO2 IS as Key Manager 5.7.0, and WSO2 Identity Server 5.8.0. When a custom claim dialect with an XSS payload is configured in the identity provider basic claim configuration, that payload gets executed, if a user picks up that dialect's URI as the provisioning claim i... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://cybersecurityworks.com/zerodays/cve-2019-20437-wso2.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://docs.wso2.com/display/Security/Se... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"79"
] | 79 | https://github.com/cybersecurityworks/Disclosed/issues/20 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"cybersecurityworks",
"Disclosed"
] | # Details:
WSO2 Product Bug Report
Bug Name: Stored <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a>
Product Name: <a href="https://wso2.com/">WSO2</a>
Server: <a href="https://wso2.com/identity-and-access-management/#">WSO2 Identit... | Stored Cross Site Scripting (XSS) in "malicious dialect URI" on WSO2 Product - (WSO2 Identity Server version 5.7.0) | https://api.github.com/repos/cybersecurityworks/Disclosed/issues/20/comments | 0 | 2019-11-29T11:09:28Z | 2019-11-29T12:08:12Z | https://github.com/cybersecurityworks/Disclosed/issues/20 | 530,289,708 | 20 | 1,041 |
CVE-2019-20438 | 2020-01-28T01:15:12.113 | An issue was discovered in WSO2 API Manager 2.6.0. A potential stored Cross-Site Scripting (XSS) vulnerability has been identified in the inline API documentation editor page of the API Publisher. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://cybersecurityworks.com/zerodays/cve-2019-20438-wso2.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://docs.wso2.com/display/Security/Se... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"79"
] | 79 | https://github.com/cybersecurityworks/Disclosed/issues/22 | [
"Third Party Advisory"
] | github.com | [
"cybersecurityworks",
"Disclosed"
] |
# Details:
WSO2 Product Bug Report
Bug Name: Stored <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a>
Product Name: <a href="https://wso2.com/">WSO2</a>
Server: <a href="https://docs.wso2.com/display/AM260/WSO2+API+Manager+Document... | Stored Cross Site Scripting (XSS) in 'inline API documentation editor page' | WSO2 API Manager version 2.6.0 | WSO2 Product | https://api.github.com/repos/cybersecurityworks/Disclosed/issues/22/comments | 0 | 2020-01-17T12:35:46Z | 2020-01-17T12:35:46Z | https://github.com/cybersecurityworks/Disclosed/issues/22 | 551,391,114 | 22 | 1,042 |
CVE-2019-20439 | 2020-01-28T01:15:12.190 | An issue was discovered in WSO2 API Manager 2.6.0. A potential Reflected Cross-Site Scripting (XSS) vulnerability has been identified in defining a scope in the "manage the API" page of the API Publisher. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://cybersecurityworks.com/zerodays/cve-2019-20439-wso2.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://docs.wso2.com/display/Security/Se... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"79"
] | 79 | https://github.com/cybersecurityworks/Disclosed/issues/21 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"cybersecurityworks",
"Disclosed"
] | # Details:
WSO2 Product Bug Report
Bug Name: Reflected <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a>
Product Name: <a href="https://wso2.com/">WSO2</a>
Server: <a href="https://docs.wso2.com/display/AM260/WSO2+API+Manager+Documen... | Reflected Cross Site Scripting (XSS) in 'roles' | WSO2 API Manager version 2.6.0 | WSO2 Product | https://api.github.com/repos/cybersecurityworks/Disclosed/issues/21/comments | 0 | 2019-12-24T10:37:12Z | 2020-01-17T12:17:16Z | https://github.com/cybersecurityworks/Disclosed/issues/21 | 542,083,754 | 21 | 1,043 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.