cve_id
stringlengths
13
16
cve_published
stringlengths
23
23
cve_descriptions
stringlengths
48
2.08k
cve_metrics
dict
cve_references
listlengths
1
138
cve_configurations
listlengths
1
39
url
stringlengths
37
77
cve_tags
listlengths
1
4
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
88.6k
issue_title
stringlengths
3
335
issue_comments_url
stringlengths
56
81
issue_comments_count
int64
0
146
issue_created_at
stringlengths
20
20
issue_updated_at
stringlengths
20
20
issue_html_url
stringlengths
37
62
issue_github_id
int64
104M
2.09B
issue_number
int64
1
122k
CVE-2022-27985
2022-04-26T14:15:41.763
CuppaCMS v1.0 was discovered to contain a SQL injection vulnerability via /administrator/alerts/alertLightbox.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://cuppa.com" }, { "source": "nvd@nist.gov", "tags": [ "Product" ], "url": "http://www.cuppacms.com/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/CuppaCMS/CuppaCMS/issues/31
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
* VULNERABLE: SQL injection vulnerability exists in CuppaCMS. An attacker can inject query in “/administrator/alerts/alertLightbox.php" via the "params%5Bgroup%5D=2" parameters. * Github: https://github.com/JiuBanSec * Product: CuppaCMS * Impact: Allow attacker inject query and access , disclosure of all data on th...
SQL injection vulnerability exists in CuppaCMS /administrator/alerts/alertLightbox.php
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/31/comments
0
2022-03-22T16:24:01Z
2022-03-22T16:24:01Z
https://github.com/CuppaCMS/CuppaCMS/issues/31
1,177,004,325
31
CVE-2022-28085
2022-04-27T03:15:39.650
A flaw was found in htmldoc commit 31f7804. A heap buffer overflow in the function pdf_write_names in ps-pdf.cxx may lead to arbitrary code execution and Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/46c8ec2b9bccb8ccabff52d998c5eee77a228348" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Ad...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*", "matchCriteriaId": "F787F29F-1158-45BF-861E-34694739EDD6", "versionEndExcluding": "2022-03-24", "versionEndIncluding": null, "versio...
https://github.com/michaelrsweet/htmldoc/issues/480
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
# Description Whilst experimenting with `htmldoc`, built from commit [31f7804](https://github.com/michaelrsweet/htmldoc/tree/31f780487e5ddc426888638786cdc47631687275), we are able to induce a vulnerability in function `pdf_write_names` , using a harness compiled from `htmldoc/htmldoc.cxx`. Because there is no bo...
AddressSanitizer: heap-buffer-overflow in function pdf_write_names
https://api.github.com/repos/michaelrsweet/htmldoc/issues/480/comments
7
2022-03-24T12:44:48Z
2022-05-19T16:24:33Z
https://github.com/michaelrsweet/htmldoc/issues/480
1,179,466,461
480
CVE-2021-41959
2022-05-03T11:15:07.130
JerryScript Git version 14ff5bf does not sufficiently track and release allocated memory via jerry-core/ecma/operations/ecma-regexp-object.c after RegExp, which causes a memory leak.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4781" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EB495C8-348F-4B04-B31F-1F4EE471CC22", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
https://github.com/jerryscript-project/jerryscript/issues/4781
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision 14ff5bf ###### Build platform Ubuntu 20.04.3 LTS (Linux 5.11.0-34-generic x86_64) ###### Build steps ```sh ./tools/build.py --profile=es2015-subset --lto=off --compile-flag=-g \ --clean --debug --strip=off --logging=on --error-messages=on \ --compile-flag=-fsanitize=address --sta...
Unfreed float causing memory leak in ecma-regexp-object
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4781/comments
2
2021-09-27T07:23:09Z
2021-10-04T11:12:53Z
https://github.com/jerryscript-project/jerryscript/issues/4781
1,007,794,199
4,781
CVE-2022-28505
2022-05-03T17:15:07.730
Jfinal_cms 5.1.0 is vulnerable to SQL Injection via com.jflyfox.system.log.LogController.java.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/33" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/jflyfox/jfinal_cms/issues/33
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jflyfox", "jfinal_cms" ]
# SQL injection vulnerability exists in JFinal CMS 5.1.0 # Analysis The vulnerability appears in lines 23-47 of the **com.jflyfox.system.log.LogController.java** ![image](https://user-images.githubusercontent.com/100123029/160562065-b3a28e66-c146-49b3-a3a6-4592d81257ab.png) Here call **SQLUtils** to query with th...
[CVE-2022-28505] SQL injection vulnerability exists in JFinal CMS 5.1.0
https://api.github.com/repos/jflyfox/jfinal_cms/issues/33/comments
0
2022-03-29T08:03:30Z
2022-05-03T17:07:15Z
https://github.com/jflyfox/jfinal_cms/issues/33
1,184,471,428
33
CVE-2022-28599
2022-05-03T18:15:08.983
A stored cross-site scripting (XSS) vulnerability exists in FUEL-CMS 1.5.1 that allows an authenticated user to upload a malicious .pdf file which acts as a stored XSS payload. If this stored XSS payload is triggered by an administrator it will trigger a XSS attack.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/595" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F3A806A2-582F-49B6-B9EC-C0FB4B13ED3D", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/daylightstudio/FUEL-CMS/issues/595
[ "Exploit", "Third Party Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
A stored cross-site scripting (XSS) vulnerability exists in FUEL-CMS-1.5.1 that allows an authenticated user authorized to upload a malicious .pdf file which acts as a stored XSS payload. If this stored XSS payload is triggered by an administrator it will trigger a XSS attack. 1、login as admin .in the Assets page ![i...
A stored cross-site scripting (XSS) vulnerability exists in FUEL-CMS-1.5.1
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/595/comments
0
2022-04-02T09:29:18Z
2022-04-02T09:38:57Z
https://github.com/daylightstudio/FUEL-CMS/issues/595
1,190,577,090
595
CVE-2022-27431
2022-05-04T03:15:07.367
Wuzhicms v4.1.0 was discovered to contain a SQL injection vulnerability via the groupid parameter at /coreframe/app/member/admin/group.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/200" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wuzhicms:wuzhi_cms:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4749403-9C42-40DF-A695-A9E31BD37D84", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/wuzhicms/wuzhicms/issues/200
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "wuzhicms", "wuzhicms" ]
Vulnerability file: --- /coreframe/app/member/admin/group.php:132-160 public function del() { if(isset($GLOBALS['groupid']) && $GLOBALS['groupid']) { if(is_array($GLOBALS['groupid'])) { $where = ' IN ('.implode(',', $GLOBALS['groupid']).')'; foreach($GLOBALS['groupid'] as $gid) { $this...
Wuzhicms v4.1.0 /coreframe/app/member/admin/group.php hava a SQL Injection Vulnerability
https://api.github.com/repos/wuzhicms/wuzhicms/issues/200/comments
0
2022-03-18T07:58:14Z
2022-03-18T07:58:14Z
https://github.com/wuzhicms/wuzhicms/issues/200
1,173,293,142
200
CVE-2022-28487
2022-05-04T15:15:12.863
Tcpreplay version 4.4.1 contains a memory leakage flaw in fix_ipv6_checksums() function. The highest threat from this vulnerability is to data confidentiality.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/appneta/tcpreplay/issues/723" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "820B7B7A-25F9-42C6-B0B0-0A2A34648477", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/appneta/tcpreplay/issues/723
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "appneta", "tcpreplay" ]
**Describe the bug** Tcpreplay version 4.4.1 contains a memory leakage flaw, CWE-134 vulnerability in fix_ipv6_checksums() function. The highest threat from this vulnerability is to data confidentiality. The inputs required to exploit the vulnerability is unknown. https://github.com/appneta/tcpreplay/blob/09f07748d...
[Bug] Format string vulnerability in fix_ipv6_checksums() function
https://api.github.com/repos/appneta/tcpreplay/issues/723/comments
1
2022-03-28T20:35:50Z
2022-08-01T20:27:50Z
https://github.com/appneta/tcpreplay/issues/723
1,183,961,497
723
CVE-2022-28552
2022-05-04T15:15:12.997
Cscms 4.1 is vulnerable to SQL Injection. Log into the background, open the song module, create a new song, delete it to the recycle bin, and SQL injection security problems will occur when emptying the recycle bin.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chshcms/cscms/issues/10" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chshcms:cscms:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DCFB098-04A8-43FE-AF93-0BE46815BAA3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/chshcms/cscms/issues/10
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chshcms", "cscms" ]
Log in to the background, open the song module, create a new song, delete it to the recycle bin, and SQL injection security problems will occur when emptying the recycle bin. ``` POST /admin.php/dance/admin/dance/save HTTP/1.1 Host: cscms.test Content-Length: 292 Accept: application/json, text/javascript, */*; q=0...
Cscms V4.1 has sqlinjection
https://api.github.com/repos/chshcms/cscms/issues/10/comments
0
2022-01-18T08:12:55Z
2022-01-18T08:12:55Z
https://github.com/chshcms/cscms/issues/10
1,106,596,877
10
CVE-2021-42242
2022-05-05T13:15:07.733
A command execution vulnerability exists in jfinal_cms 5.0.1 via com.jflyfox.component.controller.Ueditor.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/28" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B6DB5AB-BFDE-4433-AB8B-7C2479221D55", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/jflyfox/jfinal_cms/issues/28
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jflyfox", "jfinal_cms" ]
# Vulnerability summary A command execution vulnerability exists in jfinal_cms 5.0.1 JDK version requirements: - JDK version used based on RMI<=6u141, 7u131, 8u121 - JDK version used based on LDAP<=6u211, 7u201, 8u191. jfinal_cms version:5.0.1 fastjson version:1.2.28 ![image](https://user-images.gi...
Administrator Interface Command Execution Vulnerability
https://api.github.com/repos/jflyfox/jfinal_cms/issues/28/comments
0
2021-10-10T14:34:59Z
2021-10-10T14:34:59Z
https://github.com/jflyfox/jfinal_cms/issues/28
1,022,000,903
28
CVE-2022-28471
2022-05-05T13:15:07.877
In ffjpeg (commit hash: caade60), the function bmp_load() in bmp.c contains an integer overflow vulnerability, which eventually results in the heap overflow in jfif_encode() in jfif.c. This is due to the incomplete patch for issue 38
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/49" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:2021-12-06:*:*:*:*:*:*:*", "matchCriteriaId": "A3438805-CAF0-41AE-BC2A-3A11A252D8E6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
https://github.com/rockcarry/ffjpeg/issues/49
[ "Exploit", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
**version**: master (commit [caade60](https://github.com/rockcarry/ffjpeg/commit/caade60a69633d74100bd3c2528bddee0b6a1291)) **poc**: [poc](https://github.com/dandanxu96/PoC/blob/main/ffjpeg/ffjpeg-bmp_load-integer-overflow) **command**: ./ffjpeg -e $poc$ Here is the trace reported by ASAN: ``` user@c3ae4d510abb:...
Integer overflow in bmp_load() resulting in heap overflow in jfif_encode() at jfif.c:763
https://api.github.com/repos/rockcarry/ffjpeg/issues/49/comments
7
2022-03-25T10:42:12Z
2022-05-21T02:29:45Z
https://github.com/rockcarry/ffjpeg/issues/49
1,180,627,632
49
CVE-2022-29339
2022-05-05T13:15:07.927
In GPAC 2.1-DEV-rev87-g053aae8-master, function BS_ReadByte() in utils/bitstream.c has a failed assertion, which causes a Denial of Service. This vulnerability was fixed in commit 9ea93a2.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/9ea93a2ec8f555ceed1ee27294cf94822f14f10f" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "A97931ED-0014-4D2C-969E-5B41DDFF9DD2", "versionEndExcluding": "2022-04-12", "versionEndIncluding": null, "versionStartExcludin...
https://github.com/gpac/gpac/issues/2165
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
**version info:** ``` root@d8a714203f6e:# ./MP4Box -version MP4Box - GPAC version 2.1-DEV-rev87-g053aae8-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://do...
Assertion failed in BS_ReadByte, utils/bitstream.c:383
https://api.github.com/repos/gpac/gpac/issues/2165/comments
0
2022-04-08T08:28:19Z
2022-04-12T09:01:22Z
https://github.com/gpac/gpac/issues/2165
1,197,007,820
2,165
CVE-2022-29340
2022-05-05T13:15:07.967
GPAC 2.1-DEV-rev87-g053aae8-master. has a Null Pointer Dereference vulnerability in gf_isom_parse_movie_boxes_internal due to improper return value handling of GF_SKIP_BOX, which causes a Denial of Service. This vulnerability was fixed in commit 37592ad.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/37592ad86c6ca934d34740012213e467acc4a3b0" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "A97931ED-0014-4D2C-969E-5B41DDFF9DD2", "versionEndExcluding": "2022-04-12", "versionEndIncluding": null, "versionStartExcludin...
https://github.com/gpac/gpac/issues/2163
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
**version info:** ``` root@d8a714203f6e:# ./MP4Box -version MP4Box - GPAC version 2.1-DEV-rev87-g053aae8-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://do...
NULL Pointer Dereference still exists in gf_isom_parse_movie_boxes_internal
https://api.github.com/repos/gpac/gpac/issues/2163/comments
1
2022-04-01T12:17:54Z
2022-04-12T09:01:21Z
https://github.com/gpac/gpac/issues/2163
1,189,714,047
2,163
CVE-2020-19212
2022-05-06T14:15:08.217
SQL Injection vulnerability in admin/group_list.php in piwigo v2.9.5, via the group parameter to delete.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1009" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:2.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "4803EBB7-FB18-4FB3-A3B1-A476BB2E20AF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
https://github.com/Piwigo/Piwigo/issues/1009
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
An SQL injection has been discovered in the administration panel of Piwigo v2.9.5. The vulnerability allows remote attackers that are authenticated as administrator to inject SQL code into a query and display. This could result in full information disclosure. The vulnerability was found in the 'delete' method in adm...
SQL injection in group_list.php
https://api.github.com/repos/Piwigo/Piwigo/issues/1009/comments
1
2019-05-05T08:40:59Z
2019-08-12T12:26:39Z
https://github.com/Piwigo/Piwigo/issues/1009
440,418,682
1,009
CVE-2020-19213
2022-05-06T14:15:08.267
SQL Injection vulnerability in cat_move.php in piwigo v2.9.5, via the selection parameter to move_categories.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1010" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:2.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "4803EBB7-FB18-4FB3-A3B1-A476BB2E20AF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
https://github.com/Piwigo/Piwigo/issues/1010
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
Hi, I found a sql injection vulnerability in cat_move.php: The 'move_categories' method is called when moving the album in '/admin.php?page=cat_move', but the method does not validate and filter the 'selection' and 'parent' parameters, thus causing the vulnerability. **replace any of the following parameter in PO...
SQL injection in cat_move.php
https://api.github.com/repos/Piwigo/Piwigo/issues/1010/comments
2
2019-05-06T10:00:18Z
2019-08-12T14:24:47Z
https://github.com/Piwigo/Piwigo/issues/1010
440,625,122
1,010
CVE-2020-19215
2022-05-06T14:15:08.313
SQL Injection vulnerability in admin/user_perm.php in piwigo v2.9.5, via the cat_false parameter to admin.php?page=user_perm.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1011" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:2.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "4803EBB7-FB18-4FB3-A3B1-A476BB2E20AF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
https://github.com/Piwigo/Piwigo/issues/1011
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
hi, I found two new vulnerabilities in admin/user_perm.php and admin/group_perm.php 1 : request http://xx.xx.xx.xx/admin.php?page=user_perm&user_id=1 /Need to have a private album then move the album from the right to the left payload: ```1 and if(ascii(substr(database(),1,1))>97,1,sleep(5))``` or use 'sqlma...
SQL injection in user/group permissions manager
https://api.github.com/repos/Piwigo/Piwigo/issues/1011/comments
3
2019-05-07T10:09:41Z
2019-08-12T14:46:29Z
https://github.com/Piwigo/Piwigo/issues/1011
441,151,429
1,011
CVE-2020-19217
2022-05-06T14:15:08.407
SQL Injection vulnerability in admin/batch_manager.php in piwigo v2.9.5, via the filter_category parameter to admin.php?page=batch_manager.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1012" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:2.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "4803EBB7-FB18-4FB3-A3B1-A476BB2E20AF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
https://github.com/Piwigo/Piwigo/issues/1012
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
hi,There is a vulnerability in the admin/batch_manager.php. ![image](https://user-images.githubusercontent.com/34082644/57359656-d006db00-71aa-11e9-9f42-0509bafceed7.png) I didn't find the full trigger request in the browser, so I added the ‘&filter_category_use=on’ parameter to the request based on the code. ``...
SQL injection in admin/batch_manager.php
https://api.github.com/repos/Piwigo/Piwigo/issues/1012/comments
1
2019-05-08T08:06:27Z
2019-08-12T12:53:25Z
https://github.com/Piwigo/Piwigo/issues/1012
441,604,948
1,012
CVE-2022-28463
2022-05-08T23:15:17.820
ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/ca3654ebf7a439dc736f56f083c9aa98e4464b7f" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.1.0-27:*:*:*:*:*:*:*", "matchCriteriaId": "0B494258-E7BF-4584-800D-D2D893003E17", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/ImageMagick/ImageMagick/issues/4988
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### ImageMagick version 7.1.0-27 ### Operating system Linux ### Operating system, version and so on Linux d477f3580ae9 5.4.0-105-generic #119~18.04.1-Ubuntu SMP Tue Mar 8 11:21:24 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux ### Description Hello, We are currently working on fuzz testing feature, and w...
AddressSanitizer: heap-buffer-overflow /src/imagemagick/./MagickCore/quantum-private.h:256:27 in PushLongPixel
https://api.github.com/repos/ImageMagick/ImageMagick/issues/4988/comments
3
2022-03-25T05:27:23Z
2022-04-30T09:27:47Z
https://github.com/ImageMagick/ImageMagick/issues/4988
1,180,362,220
4,988
CVE-2022-27114
2022-05-09T17:15:09.130
There is a vulnerability in htmldoc 1.9.16. In image_load_jpeg function image.cxx when it calls malloc,'img->width' and 'img->height' they are large enough to cause an integer overflow. So, the malloc function may return a heap blosmaller than the expected size, and it will cause a buffer overflow/Address boundary erro...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/31f780487e5ddc426888638786cdc47631687275" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Ad...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:1.9.16:*:*:*:*:*:*:*", "matchCriteriaId": "9F8B9DF8-F081-4B99-B173-222A5BD2552E", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
https://github.com/michaelrsweet/htmldoc/issues/471
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
Hi, there is two integer overflow bugs in the latest version of htmldoc. They are similar to [CVE-2021-20308](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20308). os: ubuntu 20.04 version: 1.9.16(the latest) ### First First, in image_load_jpeg function, image.cxx. When it calls malloc,'img->width' ...
Two Integer Overflow bugs in image.cxx
https://api.github.com/repos/michaelrsweet/htmldoc/issues/471/comments
5
2022-03-10T05:57:25Z
2022-05-22T09:06:54Z
https://github.com/michaelrsweet/htmldoc/issues/471
1,164,787,186
471
CVE-2020-19228
2022-05-11T12:15:07.863
An issue was found in bludit v3.13.0, unsafe implementation of the backup plugin allows attackers to upload arbitrary files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE...
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://bludit.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bludit/bludit/issues/1242" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "2E7F9779-D5BF-41A2-82AC-6430E91D2B7B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/bludit/bludit/issues/1242
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "bludit", "bludit" ]
Bludit v3.13.0 has a file upload vulnerability in 'backup' plugin . It requires administrator privileges . 1 open http://10.150.10.170/admin/plugins Activate 'backup' plugin and click the Settings ![image](https://user-images.githubusercontent.com/34082644/88375038-6c77c600-cdcd-11ea-90c6-9e54c07f266e.png) 2 ...
File upload vulnerability
https://api.github.com/repos/bludit/bludit/issues/1242/comments
9
2020-07-24T09:06:36Z
2022-02-22T16:11:27Z
https://github.com/bludit/bludit/issues/1242
665,032,423
1,242
CVE-2022-29977
2022-05-11T14:15:08.157
There is an assertion failure error in stbi__jpeg_huff_decode, stb_image.h:1894 in libsixel img2sixel 1.8.6. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted JPEG file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/165" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "D78CB59C-7966-46E3-A325-A7508F0ED51D", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
https://github.com/saitoha/libsixel/issues/165
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
## Description ## There is an assertion failure error in stbi__jpeg_huff_decode, stb_image.h:1894. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted jpg file. ## Version ## img2sixel 1.8.6, commit id 6a5be8b72d84037b83a5ea838e17bcf372ab1d5f (Tue Jan 14 02:27:00 2020 +090...
Assertion failure in stbi__jpeg_huff_decode, stb_image.h:1894
https://api.github.com/repos/saitoha/libsixel/issues/165/comments
3
2022-04-23T16:47:52Z
2022-05-17T08:42:26Z
https://github.com/saitoha/libsixel/issues/165
1,213,359,590
165
CVE-2022-29978
2022-05-11T14:15:08.197
There is a floating point exception error in sixel_encoder_do_resize, encoder.c:633 in libsixel img2sixel 1.8.6. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted JPEG file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/166" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "D78CB59C-7966-46E3-A325-A7508F0ED51D", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
https://github.com/saitoha/libsixel/issues/166
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
## Description ## There is a floating point exception error in sixel_encoder_do_resize, encoder.c:633 in img2sixel 1.8.6. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted JPEG file. ## Version ## img2sixel 1.8.6, commit id https://github.com/saitoha/libsixel/commit/...
FPE in sixel_encoder_do_resize, encoder.c:633
https://api.github.com/repos/saitoha/libsixel/issues/166/comments
4
2022-04-25T06:12:49Z
2022-05-17T08:43:20Z
https://github.com/saitoha/libsixel/issues/166
1,214,020,987
166
CVE-2021-42863
2022-05-12T13:15:07.687
A buffer overflow in ecma_builtin_typedarray_prototype_filter() in JerryScript version fe3a5c0 allows an attacker to construct a fake object or a fake arraybuffer with unlimited size.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4793" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:*:*:*:*:*:*:*:*", "matchCriteriaId": "243328D8-E703-4355-9970-BB352D6E99B1", "versionEndExcluding": "2021-10-15", "versionEndIncluding": null, "versio...
https://github.com/jerryscript-project/jerryscript/issues/4793
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision d4231e7 ###### Build platform Ubuntu 20.04.3 LTS (Linux 5.11.0-34-generic x86_64) ###### Build steps ```sh ./tools/build.py --profile=es2015-subset --lto=off --compile-flag=-g \ --clean --debug --strip=off --logging=on --error-messages=on \ --compile-flag=-fsanitize=address --sta...
Buffer-overflow in ecma-builtin-typedarray-prototype.c
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4793/comments
0
2021-10-13T02:35:23Z
2022-12-31T04:40:51Z
https://github.com/jerryscript-project/jerryscript/issues/4793
1,024,703,352
4,793
CVE-2022-29368
2022-05-12T19:15:49.493
Moddable commit before 135aa9a4a6a9b49b60aa730ebc3bcc6247d75c45 was discovered to contain an out-of-bounds read via the function fxUint8Getter at /moddable/xs/sources/xsDataView.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Moddable-OpenSource/moddable/commit/135aa9a4a6a9b49b60aa730ebc3bcc6247d75c45" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:moddable:moddable:*:*:*:*:*:*:*:*", "matchCriteriaId": "4095912D-3ADA-4DF1-9254-03818D03B9C2", "versionEndExcluding": null, "versionEndIncluding": "os220330", "versionStartEx...
https://github.com/Moddable-OpenSource/moddable/issues/896
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Moddable-OpenSource", "moddable" ]
### Environment **Build environment:** Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux **Target device:** sdk **Commit:** e26597b9bf71e4d79f01cb329bd04f1562d32ddc ### Proof of concept poc.js ``` function main() { var a4 = [1111111111,11...
Out-of-bounds Read in fxUint8Getter
https://api.github.com/repos/Moddable-OpenSource/moddable/issues/896/comments
3
2022-04-08T06:18:36Z
2022-04-15T18:48:45Z
https://github.com/Moddable-OpenSource/moddable/issues/896
1,196,877,726
896
CVE-2022-29369
2022-05-12T19:15:49.533
Nginx NJS v0.7.2 was discovered to contain a segmentation violation via njs_lvlhsh_bucket_find at njs_lvlhsh.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/commit/222d6fdcf0c6485ec8e175f3a7b70d650c234b4e" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/nginx/n...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "C1858598-78C6-451F-81B4-57F6D636EBAC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nul...
https://github.com/nginx/njs/issues/467
[ "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
### Environment ``` OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : 7bd570b39297d3d91902c93a624c89b08be7a6fe Version : 0.7.2 Build : NJS_CFLAGS="$NJS_CFLAGS -fsanitize=address" NJS_CFLAGS="$NJS_CFLAGS -...
SEGV njs_lvlhsh.c:231:17 in njs_lvlhsh_bucket_find
https://api.github.com/repos/nginx/njs/issues/467/comments
0
2022-02-15T08:25:51Z
2022-04-05T03:03:07Z
https://github.com/nginx/njs/issues/467
1,138,345,452
467
CVE-2022-29017
2022-05-16T14:15:07.863
Bento4 v1.6.0.0 was discovered to contain a segmentation fault via the component /x86_64/multiarch/strlen-avx2.S.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/691" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "23A9C6DA-83D1-4248-B977-29C56C791132", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/axiomatic-systems/Bento4/issues/691
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
SUMMARY: AddressSanitizer: SEGV /build/glibc-sMfBJT/glibc-2.31/string/../sysdeps/x86_64/multiarch/strlen-avx2.S:65 - Version ``` ➜ mp42hls_test git:(master) ✗ ./mp42hls MP4 To HLS File Converter - Version 1.2 (Bento4 Version 1.6.0.0) (c) 2002-2018 Axiomatic Systems, LLC ``` branch 4d8e1fc - Platform ...
AddressSanitizer: SEGV /build/glibc-sMfBJT/glibc-2.31/string/../sysdeps/x86_64/multiarch/strlen-avx2.S:65
https://api.github.com/repos/axiomatic-systems/Bento4/issues/691/comments
1
2022-04-10T14:50:23Z
2022-05-17T06:24:00Z
https://github.com/axiomatic-systems/Bento4/issues/691
1,199,061,348
691
CVE-2022-30976
2022-05-18T11:15:15.460
GPAC 2.0.0 misuses a certain Unicode utf8_wcslen (renamed gf_utf8_wcslen) function in utils/utf.c, resulting in a heap-based buffer over-read, as demonstrated by MP4Box.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4, "confidentialityImpact": "PARTIAL"...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/blob/105d67985ff3c3f4b98a98f312e3d84ae77a4463/share/doc/man/gpac.1#L2226-L2229" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7AEE044-50E9-4230-B492-A5FF18653115", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/2179
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
[BUG] heap buffer overflow in gf_utf8_wcslen, utils/utf.c:442
https://api.github.com/repos/gpac/gpac/issues/2179/comments
4
2022-04-25T14:26:20Z
2023-03-07T12:37:47Z
https://github.com/gpac/gpac/issues/2179
1,214,594,854
2,179
CVE-2021-42585
2022-05-23T11:16:10.547
A heap buffer overflow was discovered in copy_compressed_bytes in decode_r2007.c in dwgread before 0.12.4 via a crafted dwg file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/351" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "030087DE-C04A-4AA0-864A-FD276745EB75", "versionEndExcluding": "0.12.4", "versionEndIncluding": null, "versionStartExcluding...
https://github.com/LibreDWG/libredwg/issues/351
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
## Affected version [the latest commit](https://github.com/LibreDWG/libredwg/commit/4c210bbae04957b7d4aba55aee8dca42337f8d47) and 0.12.4 ## What's the problem? A heap buffer overflow was discovered in copy_compressed_bytes in decode_r2007.c:332. ASAN report: ``` ./dwgread ./tests_64205 ERROR: Sectio...
Heap-buffer-overflow in copy_compressed_bytes in decode_r2007.c:332
https://api.github.com/repos/LibreDWG/libredwg/issues/351/comments
1
2021-06-07T07:50:57Z
2021-06-07T19:17:53Z
https://github.com/LibreDWG/libredwg/issues/351
913,238,141
351
CVE-2021-42586
2022-05-23T11:16:10.600
A heap buffer overflow was discovered in copy_bytes in decode_r2007.c in dwgread before 0.12.4 via a crafted dwg file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/350" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "030087DE-C04A-4AA0-864A-FD276745EB75", "versionEndExcluding": "0.12.4", "versionEndIncluding": null, "versionStartExcluding...
https://github.com/LibreDWG/libredwg/issues/350
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
## Affected version [the latest commit](https://github.com/LibreDWG/libredwg/commit/4c210bbae04957b7d4aba55aee8dca42337f8d47) and 0.12.4 ## What's the problem? A heap buffer overflow was discovered in copy_bytes in decode_r2007.c:228. ASAN report: ``` ./dwgread ./tests_64199 ========================...
Heap-buffer-overflow in copy_bytes in decode_r2007.c:228
https://api.github.com/repos/LibreDWG/libredwg/issues/350/comments
1
2021-06-07T07:46:30Z
2021-06-07T18:57:04Z
https://github.com/LibreDWG/libredwg/issues/350
913,233,568
350
CVE-2021-44975
2022-05-24T15:15:07.507
radareorg radare2 5.5.2 is vulnerable to Buffer Overflow via /libr/core/anal_objc.c mach-o parser.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/05/25/1" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://census-labs.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "1D488ADA-AA17-4EFD-A47C-D809EB9B7982", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/radareorg/radare2/issues/19476
[ "Exploit", "Issue Tracking", "Patch", "Tool Signature" ]
github.com
[ "radareorg", "radare2" ]
# Heap Buffer overflows in objc_build_refs I have discovered two heap buffer overflows while parsing mach-o executables. Please refer bellow for further information. ## Environment ```sh shad3@ubuntu:~/Desktop/$ uname -ms Linux x86_64 shad3@ubuntu:~/Desktop/$ r2 -v radare2 5.5.2 27243 @ linux-x86...
Heap buffer overflows in function objc_build_refs while parsing mach-o files.
https://api.github.com/repos/radareorg/radare2/issues/19476/comments
2
2021-12-07T21:05:25Z
2022-05-24T13:41:14Z
https://github.com/radareorg/radare2/issues/19476
1,073,754,519
19,476
CVE-2021-44974
2022-05-25T12:15:07.997
radareorg radare2 version 5.5.2 is vulnerable to NULL Pointer Dereference via libr/bin/p/bin_symbols.c binary symbol parser.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/05/25/1" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "matchCriteriaId": "28076B4E-2508-49E1-8807-9507B43F8A1E", "versionEndExcluding": "5.5.4", "versionEndIncluding": null, "versionStartExcludin...
https://github.com/radareorg/radare2/issues/19478
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "radareorg", "radare2" ]
# NULL pointer dereference in ``symbols()`` I have discovered a NULL / Invalid pointer dereference bug, that gets triggered while parsing the symbols of a binary. ## Environment ``` shad3@ubuntu:~/Desktop/$ uname -ms Linux x86_64 shad3@ubuntu:~/Desktop/$ r2 -v radare2 5.5.2 27243 @ linux-x86-64 git.5.5.0 ...
NULL pointer dereference in ``symbols()``
https://api.github.com/repos/radareorg/radare2/issues/19478/comments
1
2021-12-07T22:50:34Z
2022-05-24T13:43:06Z
https://github.com/radareorg/radare2/issues/19478
1,073,817,017
19,478
CVE-2022-29379
2022-05-25T13:15:07.837
Nginx NJS v0.7.3 was discovered to contain a stack overflow in the function njs_default_module_loader at /src/njs/src/njs_module.c. NOTE: multiple third parties dispute this report, e.g., the behavior is only found in unreleased development code that was not part of the 0.7.2, 0.7.3, or 0.7.4 release
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/commit/ab1702c7af9959366a5ddc4a75b4357d4e9ebdc1" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "ht...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "EDE9A3C3-1CA9-439E-ADC1-6B7411DC4324", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nul...
https://github.com/nginx/njs/issues/491
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
Hey there! I belong to an open source security research community, and a member (@salmonx) has found an issue, but doesn’t know the best way to disclose it. If not a hassle, might you kindly add a `SECURITY.md` file with an email, or another contact method? GitHub [recommends](https://docs.github.com/en/code-security...
Found a possible security concern
https://api.github.com/repos/nginx/njs/issues/491/comments
2
2022-04-08T08:53:47Z
2022-04-13T04:39:29Z
https://github.com/nginx/njs/issues/491
1,197,033,233
491
CVE-2022-29379
2022-05-25T13:15:07.837
Nginx NJS v0.7.3 was discovered to contain a stack overflow in the function njs_default_module_loader at /src/njs/src/njs_module.c. NOTE: multiple third parties dispute this report, e.g., the behavior is only found in unreleased development code that was not part of the 0.7.2, 0.7.3, or 0.7.4 release
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/commit/ab1702c7af9959366a5ddc4a75b4357d4e9ebdc1" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "ht...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "EDE9A3C3-1CA9-439E-ADC1-6B7411DC4324", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nul...
https://github.com/nginx/njs/issues/493
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
# Description njs 0.7.3, used in NGINX, was discovered to contain a stack-buffer-overflow in njs_default_module_loader (/src/njs/src/njs_module.c) # ENV - Version : 0.7.3 - Commit : 222d6fdcf0c6485ec8e175f3a7b70d650c234b4e - OS : Ubuntu 18.04 - Configure : CC=clang-14 ./configure --address-s...
[Fixed] njs 0.7.3 was discovered to contain a stack-buffer-overflow bug in njs_default_module_loader
https://api.github.com/repos/nginx/njs/issues/493/comments
1
2022-04-13T01:20:16Z
2022-04-13T03:46:55Z
https://github.com/nginx/njs/issues/493
1,202,634,880
493
CVE-2022-31620
2022-05-25T21:15:08.530
In libjpeg before 1.64, BitStream<false>::Get in bitstream.hpp has an assertion failure that may cause denial of service. This is related to out-of-bounds array access during arithmetically coded lossless scan or arithmetically coded sequential scan.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/commit/ef4a29a62ab48b8dc235f4af52cfd6319eda9a6a" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisor...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libjpeg_project:libjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C0D08AF-7C1C-4EFD-8252-E8BE092C1827", "versionEndExcluding": "1.64", "versionEndIncluding": null, "versionStart...
https://github.com/thorfdbg/libjpeg/issues/70
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "thorfdbg", "libjpeg" ]
There is an assert failure in `BitStream<false>::Get` in `bitstream.hpp`. Depending on the usage of this library, e.g., running on remote server as a service, this could cause Deny of Service attack. * reproduce steps: 1. unzip poc.zip 2. compile libjpeg with address sanitizer enabled 3. run `jpeg ./poc /dev/null...
Assert Failure in BitStream<false>::Get
https://api.github.com/repos/thorfdbg/libjpeg/issues/70/comments
1
2022-05-19T03:28:48Z
2022-05-23T06:01:03Z
https://github.com/thorfdbg/libjpeg/issues/70
1,241,136,016
70
CVE-2021-40317
2022-05-26T13:15:08.083
Piwigo 11.5.0 is affected by a SQL injection vulnerability via admin.php and the id parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1470" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:11.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B6BC6DF8-D938-4413-B4C7-132BCC938E68", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/Piwigo/Piwigo/issues/1470
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
The following is the detail about this vulnerability I found in Piwigo 11.5.0: First, visit URL/admin.php and login, then click Album-Move. On this page, click ORDER on the right side. ![1](https://user-images.githubusercontent.com/67731575/131251900-dd25e4e2-473c-41d0-b574-e037a0fd1711.png) Then we can see: ![...
[11.5.0]SQL Injection Vulnerability
https://api.github.com/repos/Piwigo/Piwigo/issues/1470/comments
1
2021-08-29T13:49:36Z
2022-09-28T13:26:54Z
https://github.com/Piwigo/Piwigo/issues/1470
982,104,453
1,470
CVE-2022-29660
2022-05-26T14:15:08.270
CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via the id parameter at /admin.php/pic/admin/pic/del.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chshcms/cscms/issues/25#issue-1207649017" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68", "versionEndExcluding": null, "versionEndIncluding": null, "ve...
https://github.com/chshcms/cscms/issues/25#issue-1207649017
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chshcms", "cscms" ]
#### Details There is a Injection vulnerability exists in pic_Pic.php_del First create an image and then delete it. When deleting an image, SQL injection is generated. The injection point is ID ``` POST /admin.php/pic/admin/pic/del?yid=3 HTTP/1.1 Host: cscms.test Content-Length: 21 Accept: application/json...
SQL injection vulnerability exists in Cscms music portal system v4.2
https://api.github.com/repos/chshcms/cscms/issues/25/comments
0
2022-04-19T02:48:07Z
2022-04-19T02:48:07Z
https://github.com/chshcms/cscms/issues/25
1,207,649,017
25
CVE-2022-29661
2022-05-26T14:15:08.310
CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerability via the id parameter at /admin.php/pic/admin/type/save.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chshcms/cscms/issues/21#issue-1207638326" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68", "versionEndExcluding": null, "versionEndIncluding": null, "ve...
https://github.com/chshcms/cscms/issues/21#issue-1207638326
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chshcms", "cscms" ]
#### Details There is a SQL blind injection vulnerability in pic_Type.php_del Add an album after the administrator logs in ![image](https://user-images.githubusercontent.com/96719328/163907563-1bae677a-eaec-4df0-9502-1ac08f53bca2.png) ``` POST /admin.php/pic/admin/type/save HTTP/1.1 Host: cscms.test Con...
SQL injection vulnerability exists in Cscms music portal system v4.2
https://api.github.com/repos/chshcms/cscms/issues/21/comments
0
2022-04-19T02:28:00Z
2022-04-19T02:28:00Z
https://github.com/chshcms/cscms/issues/21
1,207,638,326
21
CVE-2022-29662
2022-05-26T14:15:08.350
CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via the id parameter at /admin.php/news/admin/news/save.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chshcms/cscms/issues/17#issue-1207624107" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68", "versionEndExcluding": null, "versionEndIncluding": null, "ve...
https://github.com/chshcms/cscms/issues/17#issue-1207624107
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chshcms", "cscms" ]
#### Details SQL injection vulnerability exists in Cscms music portal system v4.2 (news_News.php_del) Administrators need to add another news after logging in.the following data package is constructed ![image](https://user-images.githubusercontent.com/96719328/163904627-a3cf0dd3-0955-40b0-b9e5-c10c2871061a.png...
SQL injection vulnerability exists in Cscms music portal system v4.2
https://api.github.com/repos/chshcms/cscms/issues/17/comments
0
2022-04-19T01:59:58Z
2022-04-19T01:59:58Z
https://github.com/chshcms/cscms/issues/17
1,207,624,107
17
CVE-2022-29663
2022-05-26T14:15:08.387
CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via the id parameter at /admin.php/pic/admin/type/hy.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chshcms/cscms/issues/22#issue-1207641519" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68", "versionEndExcluding": null, "versionEndIncluding": null, "ve...
https://github.com/chshcms/cscms/issues/22#issue-1207641519
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chshcms", "cscms" ]
#### Details There is a SQL blind injection vulnerability in pic_Type.php_hy Add an album after the administrator logs in ![image](https://user-images.githubusercontent.com/96719328/163908228-a9136830-87dc-4081-8ae5-1706550210b8.png) Then delete the album,When restoring the album in the recycle bin, constru...
SQL injection vulnerability exists in Cscms music portal system v4.2
https://api.github.com/repos/chshcms/cscms/issues/22/comments
0
2022-04-19T02:34:04Z
2022-04-19T02:34:04Z
https://github.com/chshcms/cscms/issues/22
1,207,641,519
22
CVE-2022-29664
2022-05-26T14:15:08.430
CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via the id parameter at /admin.php/pic/admin/type/pl_save.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chshcms/cscms/issues/23#issue-1207644525" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68", "versionEndExcluding": null, "versionEndIncluding": null, "ve...
https://github.com/chshcms/cscms/issues/23#issue-1207644525
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chshcms", "cscms" ]
#### Details There is a SQL blind injection vulnerability in pic_Type.php_pl_save There is an injection when adding an album to save, and the injection point is ID ``` POST /admin.php/pic/admin/type/pl_save HTTP/1.1 Host: cscms.test Content-Length: 38 Accept: application/json, text/javascript, */*; q=0.01 X...
SQL injection vulnerability exists in Cscms music portal system v4.2
https://api.github.com/repos/chshcms/cscms/issues/23/comments
0
2022-04-19T02:39:42Z
2022-04-19T02:39:42Z
https://github.com/chshcms/cscms/issues/23
1,207,644,525
23
CVE-2022-29665
2022-05-26T14:15:08.477
CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via the id parameter at /admin.php/news/admin/topic/save.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chshcms/cscms/issues/19#issue-1207631855" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68", "versionEndExcluding": null, "versionEndIncluding": null, "ve...
https://github.com/chshcms/cscms/issues/19#issue-1207631855
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chshcms", "cscms" ]
SQL injection vulnerability exists in Cscms music portal system v4.2 news_Topic.php_del #### Details Add a news topic after the administrator logs in ![image](https://user-images.githubusercontent.com/96719328/163906163-162ae58c-05d8-407e-9dbe-95ae9ca61cb8.png) ``` POST /admin.php/news/admin/topic/save HT...
SQL injection vulnerability exists in Cscms music portal system v4.2
https://api.github.com/repos/chshcms/cscms/issues/19/comments
0
2022-04-19T02:15:35Z
2022-04-19T02:15:35Z
https://github.com/chshcms/cscms/issues/19
1,207,631,855
19
CVE-2022-29666
2022-05-26T14:15:08.523
CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via the id parameter at /admin.php/pic/admin/lists/zhuan.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chshcms/cscms/issues/24#issue-1207646618" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68", "versionEndExcluding": null, "versionEndIncluding": null, "ve...
https://github.com/chshcms/cscms/issues/24#issue-1207646618
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chshcms", "cscms" ]
#### Details There is a Injection vulnerability exists in pic_Lists.php_zhuan The administrator needs to add a picture after logging in ![image](https://user-images.githubusercontent.com/96719328/163909518-21e8d5af-3c0d-4bae-95f3-c5627f8e85f7.png) construct payload ``` POST /admin.php/pic/admin/lists/zh...
SQL injection vulnerability exists in Cscms music portal system v4.2
https://api.github.com/repos/chshcms/cscms/issues/24/comments
0
2022-04-19T02:43:26Z
2022-04-19T02:43:26Z
https://github.com/chshcms/cscms/issues/24
1,207,646,618
24
CVE-2022-29667
2022-05-26T14:15:08.563
CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via /admin.php/pic/admin/pic/hy. This vulnerability is exploited via restoring deleted photos.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chshcms/cscms/issues/26#issue-1207651726" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68", "versionEndExcluding": null, "versionEndIncluding": null, "ve...
https://github.com/chshcms/cscms/issues/26#issue-1207651726
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chshcms", "cscms" ]
#### Details there is a Injection vulnerability exists in pic_Pic.php_hy Injection occurs when restoring deleted photos from the trash ``` GET /admin.php/pic/admin/pic/hy?id=3)and(sleep(5))--+ HTTP/1.1 Host: cscms.test Accept: application/json, text/javascript, */*; q=0.01 User-Agent: Mozilla/5.0 (Windows ...
SQL injection vulnerability exists in Cscms music portal system v4.2
https://api.github.com/repos/chshcms/cscms/issues/26/comments
0
2022-04-19T02:53:31Z
2022-04-19T02:53:31Z
https://github.com/chshcms/cscms/issues/26
1,207,651,726
26
CVE-2022-29669
2022-05-26T14:15:08.607
CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via the id parameter at /admin.php/news/admin/lists/zhuan.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chshcms/cscms/issues/20#issue-1207634969" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68", "versionEndExcluding": null, "versionEndIncluding": null, "ve...
https://github.com/chshcms/cscms/issues/20#issue-1207634969
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chshcms", "cscms" ]
#### Details Injection vulnerability exists in news_Lists.php_zhuan construct payload ``` POST /admin.php/news/admin/lists/zhuan HTTP/1.1 Host: cscms.test Content-Length: 21 Accept: application/json, text/javascript, */*; q=0.01 X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows NT 10.0...
SQL injection vulnerability exists in Cscms music portal system v4.2
https://api.github.com/repos/chshcms/cscms/issues/20/comments
0
2022-04-19T02:21:42Z
2022-04-19T02:21:42Z
https://github.com/chshcms/cscms/issues/20
1,207,634,969
20
CVE-2022-29680
2022-05-26T14:15:08.727
CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerability via the id parameter at /admin.php/user/zu_del.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chshcms/cscms/issues/31#issue-1209052957" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68", "versionEndExcluding": null, "versionEndIncluding": null, "ve...
https://github.com/chshcms/cscms/issues/31#issue-1209052957
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chshcms", "cscms" ]
#### Details there is a Injection vulnerability exists in sys_User.php_zu_del The administrator needs to add a user to the member list after logging in. SQL injection vulnerability is generated when deleting the user. The constructed malicious payload is as follows ![image](https://user-images.githubuserconten...
SQL injection vulnerability exists in Cscms music portal system v4.2
https://api.github.com/repos/chshcms/cscms/issues/31/comments
0
2022-04-20T01:27:59Z
2022-04-20T01:27:59Z
https://github.com/chshcms/cscms/issues/31
1,209,052,957
31
CVE-2022-29681
2022-05-26T14:15:08.767
CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerability via the id parameter at /admin.php/Links/del.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chshcms/cscms/issues/35#issue-1209058818" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68", "versionEndExcluding": null, "versionEndIncluding": null, "ve...
https://github.com/chshcms/cscms/issues/35#issue-1209058818
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chshcms", "cscms" ]
#### Details there is a Injection vulnerability exists in sys_Links.php_del After logging in, the administrator needs to add a friendship link first. SQL injection vulnerability occurs when deleting the friendship link. The constructed malicious payload is as follows ![image](https://user-images.githubusercont...
SQL injection vulnerability exists in Cscms music portal system v4.2
https://api.github.com/repos/chshcms/cscms/issues/35/comments
0
2022-04-20T01:40:45Z
2022-04-20T01:40:45Z
https://github.com/chshcms/cscms/issues/35
1,209,058,818
35
CVE-2022-29682
2022-05-26T14:15:08.807
CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerability via the id parameter at /admin.php/vod/admin/topic/del.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chshcms/cscms/issues/36#issue-1209060196" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68", "versionEndExcluding": null, "versionEndIncluding": null, "ve...
https://github.com/chshcms/cscms/issues/36#issue-1209060196
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chshcms", "cscms" ]
#### Details there is a Injection vulnerability exists in vod_Topic.php_del The administrator needs to add a video theme after logging in. SQL injection vulnerability is generated when deleting the video theme. The constructed malicious payload is as follows ![image](https://user-images.githubusercontent.com/9...
SQL injection vulnerability exists in Cscms music portal system v4.2
https://api.github.com/repos/chshcms/cscms/issues/36/comments
0
2022-04-20T01:43:49Z
2022-04-20T01:43:49Z
https://github.com/chshcms/cscms/issues/36
1,209,060,196
36
CVE-2022-29683
2022-05-26T14:15:08.847
CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerability via the id parameter at /admin.php/Label/page_del.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chshcms/cscms/issues/34#issue-1209056912" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68", "versionEndExcluding": null, "versionEndIncluding": null, "ve...
https://github.com/chshcms/cscms/issues/34#issue-1209056912
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chshcms", "cscms" ]
#### Details there is a Injection vulnerability exists in sys_Label.php_page_del ![image](https://user-images.githubusercontent.com/96719328/164129074-e744a273-b977-4f11-8832-6845e4df575c.png) ``` POST /admin.php/Label/page_del HTTP/1.1 Host: cscms.test Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 ...
SQL injection vulnerability exists in Cscms music portal system v4.2
https://api.github.com/repos/chshcms/cscms/issues/34/comments
0
2022-04-20T01:36:23Z
2022-04-20T01:36:23Z
https://github.com/chshcms/cscms/issues/34
1,209,056,912
34
CVE-2022-29684
2022-05-26T14:15:08.887
CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerability via the id parameter at /admin.php/Label/js_del.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chshcms/cscms/issues/33#issue-1209055493" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68", "versionEndExcluding": null, "versionEndIncluding": null, "ve...
https://github.com/chshcms/cscms/issues/33#issue-1209055493
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chshcms", "cscms" ]
#### Details there is a Injection vulnerability exists in sys_Label.php_js_del ![image](https://user-images.githubusercontent.com/96719328/164128869-606c042d-8426-41af-a029-0eb24abe342c.png) ``` POST /admin.php/Label/js_del HTTP/1.1 Host: cscms.test Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Win...
SQL injection vulnerability exists in Cscms music portal system v4.2
https://api.github.com/repos/chshcms/cscms/issues/33/comments
0
2022-04-20T01:33:15Z
2022-04-20T01:33:15Z
https://github.com/chshcms/cscms/issues/33
1,209,055,493
33
CVE-2022-29685
2022-05-26T14:15:08.927
CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerability via the id parameter at /admin.php/User/level_sort.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chshcms/cscms/issues/32#issue-1209054307" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68", "versionEndExcluding": null, "versionEndIncluding": null, "ve...
https://github.com/chshcms/cscms/issues/32#issue-1209054307
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chshcms", "cscms" ]
#### Details there is a Injection vulnerability exists in sys_User.php_level_sort ``` POST /admin.php/User/level_sort HTTP/1.1 Host: cscms.test Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36 Accept: t...
SQL injection vulnerability exists in Cscms music portal system v4.2
https://api.github.com/repos/chshcms/cscms/issues/32/comments
0
2022-04-20T01:30:48Z
2022-04-20T01:30:48Z
https://github.com/chshcms/cscms/issues/32
1,209,054,307
32
CVE-2022-29686
2022-05-26T14:15:08.963
CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerability via the id parameter at /admin.php/singer/admin/lists/zhuan.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chshcms/cscms/issues/29#issue-1209046027" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68", "versionEndExcluding": null, "versionEndIncluding": null, "ve...
https://github.com/chshcms/cscms/issues/29#issue-1209046027
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chshcms", "cscms" ]
#### Details there is a Injection vulnerability exists in singer_Lists.php_zhuan After logging in, the administrator needs to add a singer first. SQL injection vulnerability is generated when adding singers. The constructed malicious payload is as follows ``` POST /admin.php/singer/admin/lists/zhuan HTTP/1.1 ...
SQL injection vulnerability exists in Cscms music portal system v4.2
https://api.github.com/repos/chshcms/cscms/issues/29/comments
0
2022-04-20T01:14:41Z
2022-04-20T01:16:52Z
https://github.com/chshcms/cscms/issues/29
1,209,046,027
29
CVE-2022-29687
2022-05-26T14:15:09.000
CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerability via the id parameter at /admin.php/user/level_del.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chshcms/cscms/issues/30#issue-1209049714" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68", "versionEndExcluding": null, "versionEndIncluding": null, "ve...
https://github.com/chshcms/cscms/issues/30#issue-1209049714
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chshcms", "cscms" ]
#### Details there is a Injection vulnerability exists in sys_User.php_level_del The administrator needs to add a member after logging in. SQL injection vulnerability is generated when deleting the member. The constructed malicious payload is as follows ``` POST /admin.php/user/level_del HTTP/1.1 Host: cscms...
SQL injection vulnerability exists in Cscms music portal system v4.2 (Discovered by 星海Lab)
https://api.github.com/repos/chshcms/cscms/issues/30/comments
0
2022-04-20T01:21:31Z
2022-04-20T01:21:31Z
https://github.com/chshcms/cscms/issues/30
1,209,049,714
30
CVE-2022-29688
2022-05-26T14:15:09.037
CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerability via the id parameter at /admin.php/singer/admin/singer/hy.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chshcms/cscms/issues/27#issue-1209040138" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68", "versionEndExcluding": null, "versionEndIncluding": null, "ve...
https://github.com/chshcms/cscms/issues/27#issue-1209040138
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chshcms", "cscms" ]
#### Details There is a Injection vulnerability exists in singer_Singer.php_hy After logging in, the administrator needs to add a singer and then delete the singer. When the singer is recycled from the recycle bin, SQL injection vulnerability is generated. The injection point is ID, and the constructed malicious ...
SQL injection vulnerability exists in Cscms music portal system v4.2
https://api.github.com/repos/chshcms/cscms/issues/27/comments
0
2022-04-20T01:08:46Z
2022-04-20T01:09:36Z
https://github.com/chshcms/cscms/issues/27
1,209,040,138
27
CVE-2022-29689
2022-05-26T14:15:09.077
CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerability via the id parameter at /admin.php/singer/admin/singer/del.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chshcms/cscms/issues/28#issue-1209044410" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68", "versionEndExcluding": null, "versionEndIncluding": null, "ve...
https://github.com/chshcms/cscms/issues/28#issue-1209044410
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chshcms", "cscms" ]
#### Details there is a Injection vulnerability exists in singer_Singer.php_del After logging in, the administrator needs to add a singer first and then delete the singer. When deleting the singer, SQL injection vulnerability is generated. The injection point is ID, and the constructed malicious payload is as fol...
SQL injection vulnerability exists in Cscms music portal system v4.2
https://api.github.com/repos/chshcms/cscms/issues/28/comments
0
2022-04-20T01:12:49Z
2022-04-20T01:12:49Z
https://github.com/chshcms/cscms/issues/28
1,209,044,410
28
CVE-2022-30500
2022-05-26T16:15:08.727
Jfinal cms 5.1.0 is vulnerable to SQL Injection.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/35" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/jflyfox/jfinal_cms/issues/35
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jflyfox", "jfinal_cms" ]
There is a SQLI vul in background mode.The route is as following ![3](https://user-images.githubusercontent.com/94961254/167234987-2c327374-26ec-498a-b106-02564c1b3bf3.png) vulnerable argument passing is as following ![4](https://user-images.githubusercontent.com/94961254/167235013-0981d13e-e254-43ac-bc70-5181091d1...
SQLI vul1 in jfinal_cms 5.1.0
https://api.github.com/repos/jflyfox/jfinal_cms/issues/35/comments
1
2022-05-07T02:48:35Z
2022-05-07T02:57:24Z
https://github.com/jflyfox/jfinal_cms/issues/35
1,228,505,078
35
CVE-2021-42195
2022-06-02T14:15:29.733
An issue was discovered in swftools through 20201222. A heap-buffer-overflow exists in the function handleEditText() located in swfdump.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/174" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "903C4729-89F8-4583-AEFA-C1883FE61F59", "versionEndExcluding": null, "versionEndIncluding": "2020-12-22", "versionStart...
https://github.com/matthiaskramm/swftools/issues/174
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
### system info Ubuntu x86_64, clang 6.0, swfdump (latest master a9d5082) ### Command line ./src/swfdump -D @@ ### AddressSanitizer output ==44192==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60600000e8d3 at pc 0x000000410aca bp 0x7fffffffdee0 sp 0x7fffffffded0 READ of size 1 at 0x60600000e8d3 ...
heap-buffer-overflow exists in the function handleEditText in swfdump.c
https://api.github.com/repos/swftools/swftools/issues/174/comments
0
2021-10-07T13:17:16Z
2021-10-07T13:17:16Z
https://github.com/swftools/swftools/issues/174
1,020,034,970
174
CVE-2021-42196
2022-06-02T14:15:29.777
An issue was discovered in swftools through 20201222. A NULL pointer dereference exists in the function traits_parse() located in abc.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/172" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "903C4729-89F8-4583-AEFA-C1883FE61F59", "versionEndExcluding": null, "versionEndIncluding": "2020-12-22", "versionStart...
https://github.com/matthiaskramm/swftools/issues/172
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
### system info Ubuntu x86_64, clang 6.0, swfdump (latest master a9d5082) ### Command line ./src/swfdump -D @@ ### AddressSanitizer output ==47344==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000030 (pc 0x000000488d17 bp 0x000000000000 sp 0x7fffffffdd20 T0) #0 0x488d16 in traits_parse as3/abc...
A NULL pointer dereference exists in the function traits_parse in abc.c
https://api.github.com/repos/swftools/swftools/issues/172/comments
0
2021-10-07T13:11:09Z
2021-10-07T13:11:09Z
https://github.com/swftools/swftools/issues/172
1,020,028,404
172
CVE-2021-42197
2022-06-02T14:15:29.817
An issue was discovered in swftools through 20201222 through a memory leak in the swftools when swfdump is used. It allows an attacker to cause code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/177" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "903C4729-89F8-4583-AEFA-C1883FE61F59", "versionEndExcluding": null, "versionEndIncluding": "2020-12-22", "versionStart...
https://github.com/matthiaskramm/swftools/issues/177
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
### system info Ubuntu x86_64, clang 6.0, swfdump (latest master a9d5082) ### Command line ./src/swfdump -D @@ ### AddressSanitizer output ==43305==ERROR: LeakSanitizer: detected memory leaks Indirect leak of 63245 byte(s) in 2 object(s) allocated from: #0 0x7ffff6f02602 in malloc (/usr/lib/x86_64-linu...
memory leaks in swftools when we use swfdump
https://api.github.com/repos/swftools/swftools/issues/177/comments
0
2021-10-07T13:25:36Z
2021-10-07T13:25:36Z
https://github.com/swftools/swftools/issues/177
1,020,044,016
177
CVE-2021-42198
2022-06-02T14:15:29.860
An issue was discovered in swftools through 20201222. A NULL pointer dereference exists in the function swf_GetBits() located in rfxswf.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/168" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "903C4729-89F8-4583-AEFA-C1883FE61F59", "versionEndExcluding": null, "versionEndIncluding": "2020-12-22", "versionStart...
https://github.com/matthiaskramm/swftools/issues/168
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
### system info Ubuntu x86_64, clang 6.0, swfdump (latest master a9d5082) ### Command line ./src/swfdump -D @@ ### AddressSanitizer output ==41593==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x000000471fac bp 0x0ffffed896e0 sp 0x7fffffffdd30 T0) #0 0x471fab in swf_GetBits /test/sw...
A NULL pointer dereference exists in the function swf_GetBits in rfxswf.c
https://api.github.com/repos/swftools/swftools/issues/168/comments
0
2021-10-07T12:57:51Z
2021-10-07T12:58:43Z
https://github.com/swftools/swftools/issues/168
1,020,014,352
168
CVE-2021-42199
2022-06-02T14:15:29.900
An issue was discovered in swftools through 20201222. A heap buffer overflow exists in the function swf_FontExtract_DefineTextCallback() located in swftext.c. It allows an attacker to cause code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/173" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "903C4729-89F8-4583-AEFA-C1883FE61F59", "versionEndExcluding": null, "versionEndIncluding": "2020-12-22", "versionStart...
https://github.com/matthiaskramm/swftools/issues/173
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
### system info Ubuntu x86_64, clang 6.0, swfdump (latest master a9d5082) ### Command line ./src/swfdump -D @@ ### AddressSanitizer output ==29246==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61600000ffa0 at pc 0x00000044059d bp 0x7fffffffd270 sp 0x7fffffffd260 WRITE of size 2 at 0x61600000ffa0...
heap-buffer-overflow exists in the function swf_FontExtract_DefineTextCallback in swftext.c
https://api.github.com/repos/swftools/swftools/issues/173/comments
0
2021-10-07T13:13:41Z
2021-10-07T13:13:41Z
https://github.com/swftools/swftools/issues/173
1,020,030,975
173
CVE-2021-42200
2022-06-02T14:15:29.943
An issue was discovered in swftools through 20201222. A NULL pointer dereference exists in the function main() located in swfdump.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/170" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "903C4729-89F8-4583-AEFA-C1883FE61F59", "versionEndExcluding": null, "versionEndIncluding": "2020-12-22", "versionStart...
https://github.com/matthiaskramm/swftools/issues/170
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
### system info Ubuntu x86_64, clang 6.0, swfdump (latest master a9d5082) ### Command line ./src/swfdump -D @@ ### AddressSanitizer output ==1975==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x000000406f68 bp 0x7fffffffe3a0 sp 0x7fffffffdf30 T0) #0 0x406f67 in main /test/swftools-a...
A NULL pointer dereference exists in the function main in swfdump.c
https://api.github.com/repos/swftools/swftools/issues/170/comments
0
2021-10-07T13:06:05Z
2021-10-07T13:06:05Z
https://github.com/swftools/swftools/issues/170
1,020,023,108
170
CVE-2021-42201
2022-06-02T14:15:29.987
An issue was discovered in swftools through 20201222. A heap-buffer-overflow exists in the function swf_GetD64() located in rfxswf.c. It allows an attacker to cause code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/175" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "903C4729-89F8-4583-AEFA-C1883FE61F59", "versionEndExcluding": null, "versionEndIncluding": "2020-12-22", "versionStart...
https://github.com/matthiaskramm/swftools/issues/175
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
### system info Ubuntu x86_64, clang 6.0, swfdump (latest master a9d5082) ### Command line ./src/swfdump -D @@ ### AddressSanitizer output ==8687==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60b00000aff8 at pc 0x000000473b4e bp 0x7fffffffdc10 sp 0x7fffffffdc00 READ of size 8 at 0x60b00000aff8 t...
heap-buffer-overflow exists in the function swf_GetD64 in rfxswf.c
https://api.github.com/repos/swftools/swftools/issues/175/comments
0
2021-10-07T13:20:00Z
2021-10-07T13:20:00Z
https://github.com/swftools/swftools/issues/175
1,020,037,867
175
CVE-2021-42202
2022-06-02T14:15:30.030
An issue was discovered in swftools through 20201222. A NULL pointer dereference exists in the function swf_DeleteFilter() located in swffilter.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/171" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "903C4729-89F8-4583-AEFA-C1883FE61F59", "versionEndExcluding": null, "versionEndIncluding": "2020-12-22", "versionStart...
https://github.com/matthiaskramm/swftools/issues/171
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
### system info Ubuntu x86_64, clang 6.0, swfdump (latest master a9d5082) ### Command line ./src/swfdump -D @@ ### AddressSanitizer output ==5769==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000042ba78 bp 0x000000000073 sp 0x7fffffffdea0 T0) #0 0x42ba77 in swf_DeleteFilter modu...
A NULL pointer dereference exists in the function swf_DeleteFilter in swffilter.c
https://api.github.com/repos/swftools/swftools/issues/171/comments
0
2021-10-07T13:09:20Z
2021-10-07T13:09:20Z
https://github.com/swftools/swftools/issues/171
1,020,026,516
171
CVE-2021-42203
2022-06-02T14:15:30.083
An issue was discovered in swftools through 20201222. A heap-use-after-free exists in the function swf_FontExtract_DefineTextCallback() located in swftext.c. It allows an attacker to cause code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/176" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "903C4729-89F8-4583-AEFA-C1883FE61F59", "versionEndExcluding": null, "versionEndIncluding": "2020-12-22", "versionStart...
https://github.com/matthiaskramm/swftools/issues/176
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
### system info Ubuntu x86_64, clang 6.0, swfdump (latest master a9d5082) ### Command line ./src/swfdump -D @@ ### AddressSanitizer output ==25679==ERROR: AddressSanitizer: heap-use-after-free on address 0x60600000d6a0 at pc 0x00000044059d bp 0x7fffffffd270 sp 0x7fffffffd260 WRITE of size 2 at 0x60600000d6a0 ...
heap-use-after-free exists in the function swf_FontExtract_DefineTextCallback in swftext.c
https://api.github.com/repos/swftools/swftools/issues/176/comments
1
2021-10-07T13:21:58Z
2022-05-31T23:28:37Z
https://github.com/swftools/swftools/issues/176
1,020,039,831
176
CVE-2021-42204
2022-06-02T14:15:30.127
An issue was discovered in swftools through 20201222. A heap-buffer-overflow exists in the function swf_GetBits() located in rfxswf.c. It allows an attacker to cause code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/169" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "903C4729-89F8-4583-AEFA-C1883FE61F59", "versionEndExcluding": null, "versionEndIncluding": "2020-12-22", "versionStart...
https://github.com/matthiaskramm/swftools/issues/169
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
### system info Ubuntu x86_64, clang 6.0, swfdump (latest master a9d5082) ### Command line ./src/swfdump -D @@ ### AddressSanitizer output ==28613==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60300000efdf at pc 0x00000047238d bp 0x7fffffffdbe0 sp 0x7fffffffdbd0 READ of size 1 at 0x60300000efdf ...
heap-buffer-overflow exists in the function swf_GetBits in rfxswf.c
https://api.github.com/repos/swftools/swftools/issues/169/comments
0
2021-10-07T13:00:58Z
2021-10-07T13:00:58Z
https://github.com/swftools/swftools/issues/169
1,020,017,571
169
CVE-2022-29648
2022-06-02T14:15:50.000
A cross-site scripting (XSS) vulnerability in Jfinal CMS v5.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted X-Forwarded-For request.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/34" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/jflyfox/jfinal_cms/issues/34
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jflyfox", "jfinal_cms" ]
There is a storage XSS vulnerability in the guest TOP10 of jfinal_cms. TOP10 will display the ip of the user, but it can be modified by X-Forwarded-For, where the attacker can insert malicious XSS code. When the administrator logs in, the malicious XSS code triggers successfully. payload: X-Forwarded-For: 192.168.1...
There is an xss vulnerability of HTTP header injection storage in jfinal_cms V5.1.0
https://api.github.com/repos/jflyfox/jfinal_cms/issues/34/comments
0
2022-04-14T02:59:27Z
2022-04-15T01:12:18Z
https://github.com/jflyfox/jfinal_cms/issues/34
1,203,980,157
34
CVE-2022-29779
2022-06-02T14:15:51.160
Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_value_own_enumerate at src/njs_value.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/commit/2e00e95473861846aa8538be87db07699d9f676d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nginx:njs:0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0BCE5-65F7-4B13-BD30-E80964201D0C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/nginx/njs/issues/485
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
# Environment OS : Linux leanderwang-LC2 5.13.0-30-generic https://github.com/nginx/njs/issues/33 SMP Mon Feb 7 14:25:10 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : https://github.com/nginx/njs/commit/f65981b0b8fcf02d69a40bc934803c25c9f607ab Version : 0.7.3 Build : NJS_CFLAGS="$NJS_CFLAGS -fsanitize=address" ...
SEGV src/njs_value.c:240 in njs_value_own_enumerate
https://api.github.com/repos/nginx/njs/issues/485/comments
0
2022-03-16T09:40:33Z
2022-04-23T00:05:07Z
https://github.com/nginx/njs/issues/485
1,170,769,314
485
CVE-2022-29780
2022-06-02T14:15:51.203
Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_array_prototype_sort at src/njs_array.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/commit/8b39afdad9a0761e0a5d4af1a762bd9a6daef572" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nginx:njs:0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0BCE5-65F7-4B13-BD30-E80964201D0C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/nginx/njs/issues/486
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
# Environment OS : Linux leanderwang-LC2 5.13.0-30-generic https://github.com/nginx/njs/issues/33 SMP Mon Feb 7 14:25:10 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : https://github.com/nginx/njs/commit/f65981b0b8fcf02d69a40bc934803c25c9f607ab Version : 0.7.3 Build : NJS_CFLAGS="$NJS_CFLAGS -fsanitize=address...
SEGV in njs_array_prototype_sort
https://api.github.com/repos/nginx/njs/issues/486/comments
1
2022-03-21T02:29:41Z
2022-04-23T00:53:30Z
https://github.com/nginx/njs/issues/486
1,174,808,007
486
CVE-2022-30503
2022-06-02T14:15:53.390
Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_set_number at src/njs_value.h.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/commit/5c6130a2a0b4c41ab415f6b8992aa323636338b9" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/nginx/n...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nginx:njs:0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0BCE5-65F7-4B13-BD30-E80964201D0C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/nginx/njs/issues/478
[ "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
# Environment OS : Linux leanderwang-LC2 5.13.0-30-generic https://github.com/nginx/njs/issues/33~20.04.1-Ubuntu SMP Mon Feb 7 14:25:10 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : https://github.com/nginx/njs/commit/f65981b0b8fcf02d69a40bc934803c25c9f607ab Version : 0.7.3 Build : NJS_CFLAGS="$NJS_CFLAGS -fsan...
SEGV src/njs_value.h in njs_set_number
https://api.github.com/repos/nginx/njs/issues/478/comments
1
2022-03-01T10:21:25Z
2022-05-07T01:57:07Z
https://github.com/nginx/njs/issues/478
1,155,152,026
478
CVE-2022-31796
2022-06-02T14:15:58.153
libjpeg 1.63 has a heap-based buffer over-read in HierarchicalBitmapRequester::FetchRegion in hierarchicalbitmaprequester.cpp because the MCU size can be different between allocation and use.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/commit/187035b9726710b4fe11d565c7808975c930895d" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpeg:libjpeg:1.63:*:*:*:*:*:*:*", "matchCriteriaId": "13A26F18-0121-441E-AEF2-B13F7E608A8F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/thorfdbg/libjpeg/issues/71
[ "Third Party Advisory" ]
github.com
[ "thorfdbg", "libjpeg" ]
There is a heap-overflow in HierarchicalBitmapRequester::FetchRegion in hierarchicalbitmaprequester.cpp. reproduce steps: 1. unzip poc.zip 2. compile libjpeg with address sanitizer enabled 3. run jpeg ./poc /dev/null poc [poc.zip](https://github.com/thorfdbg/libjpeg/files/8759320/poc.zip) stack trace ...
heap-overflow in HierarchicalBitmapRequester::FetchRegion
https://api.github.com/repos/thorfdbg/libjpeg/issues/71/comments
6
2022-05-24T03:23:18Z
2022-05-26T17:06:18Z
https://github.com/thorfdbg/libjpeg/issues/71
1,245,927,743
71
CVE-2022-32201
2022-06-02T14:16:01.213
In libjpeg 1.63, there is a NULL pointer dereference in Component::SubXOf in component.hpp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/commit/ea6315164b1649ff932a396b7600eac4bffcfaba" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisor...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libjpeg_project:libjpeg:1.63:*:*:*:*:*:*:*", "matchCriteriaId": "E19EEAA5-8206-4988-90CB-8C560A0B932C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
https://github.com/thorfdbg/libjpeg/issues/73
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "thorfdbg", "libjpeg" ]
## reproduce steps 1. compile libjpeg with address sanitizer 2. run `./jpeg ./poc /dev/null` ## poc [poc.zip](https://github.com/thorfdbg/libjpeg/files/8798327/poc.zip) ## stack trace ``` ================================================================= ==3114171==ERROR: AddressSanitizer: SEGV on unknown ...
null pointer dereference in Component::SubXOf in component.hpp
https://api.github.com/repos/thorfdbg/libjpeg/issues/73/comments
2
2022-05-30T12:33:53Z
2022-05-31T07:10:25Z
https://github.com/thorfdbg/libjpeg/issues/73
1,252,677,631
73
CVE-2022-32202
2022-06-02T14:16:01.253
In libjpeg 1.63, there is a NULL pointer dereference in LineBuffer::FetchRegion in linebuffer.cpp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/commit/51c3241b6da39df30f016b63f43f31c4011222c7" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisor...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libjpeg_project:libjpeg:1.63:*:*:*:*:*:*:*", "matchCriteriaId": "E19EEAA5-8206-4988-90CB-8C560A0B932C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
https://github.com/thorfdbg/libjpeg/issues/74
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "thorfdbg", "libjpeg" ]
## stack trace ``` jpeg Copyright (C) 2012-2018 Thomas Richter, University of Stuttgart and Accusoft For license conditions, see README.license for details. *** Warning -1038 in Tables::ParseTables, line 1386, file tables.cpp *** Reason is: found invalid marker, probably a marker size is out of range ***...
null pointer dereference in LineBuffer::FetchRegion in linebuffer.cpp
https://api.github.com/repos/thorfdbg/libjpeg/issues/74/comments
1
2022-05-31T09:21:46Z
2022-05-31T10:19:20Z
https://github.com/thorfdbg/libjpeg/issues/74
1,253,583,604
74
CVE-2021-40592
2022-06-08T18:15:08.173
GPAC version before commit 71460d72ec07df766dab0a4d52687529f3efcf0a (version v1.0.1 onwards) contains loop with unreachable exit condition ('infinite loop') vulnerability in ISOBMFF reader filter, isoffin_read.c. Function isoffin_process() can result in DoS by infinite loop. To exploit, the victim must open a specially...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/71460d72ec07df766dab0a4d52687529f3efcf0a" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCA1FE1D-17AE-45F9-A7BD-A8316EE859D6", "versionEndExcluding": "1.0.1", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/1876
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Hi. There is an infinite loop bug in MP4Box. to reproduce, follow the command below with the attachment file. ``` ./MP4Box -nhnt 1 hang_file -out /dev/nul ``` [hang_file.zip](https://github.com/gpac/gpac/files/6991064/hang_file.zip) Credit : ADLab of Venustech
Infinite Loop in MP4Box
https://api.github.com/repos/gpac/gpac/issues/1876/comments
0
2021-08-16T09:08:59Z
2021-08-30T15:33:42Z
https://github.com/gpac/gpac/issues/1876
971,526,752
1,876
CVE-2022-30898
2022-06-09T19:15:10.643
A Cross-site request forgery (CSRF) vulnerability in Cscms music portal system v4.2 allows remote attackers to change the administrator's username and password.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/chshcms/cscms/issues/37" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chshcms:cscms:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "1865339A-4927-439D-9D16-D38C8330CB92", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/chshcms/cscms/issues/37
[ "Exploit", "Third Party Advisory" ]
github.com
[ "chshcms", "cscms" ]
details In cscms v4.2 A problem was found in 1 Cross-site request forgery (CSRF) vulnerability in /Cscms_4.2/upload/admin.php/sys/save allow remote attackers to change administrator's username and password. Trigger condition: the administrator clicks a malicious link Cause of vulnerability: We can find that...
Cross-site request forgery vulnerability exists in Cscms music portal system v4.2
https://api.github.com/repos/chshcms/cscms/issues/37/comments
0
2022-05-12T08:31:17Z
2022-05-12T08:40:47Z
https://github.com/chshcms/cscms/issues/37
1,233,634,156
37
CVE-2022-32978
2022-06-10T15:15:08.090
There is an assertion failure in SingleComponentLSScan::ParseMCU in singlecomponentlsscan.cpp in libjpeg before 1.64 via an empty JPEG-LS scan.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/commit/4746b577931e926a49e50de9720a4946de3069a7" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisor...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpeg:libjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "A438F885-68BD-47F9-A55F-42EA445EF19D", "versionEndExcluding": "1.64", "versionEndIncluding": null, "versionStartExcluding":...
https://github.com/thorfdbg/libjpeg/issues/75
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "thorfdbg", "libjpeg" ]
## stack trace ``` ───────────────────────────────────────────────────────────────────────────────────── pwndbg> bt #0 __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50 #1 0x00007ffff7053859 in __GI_abort () at abort.c:79 #2 0x00007ffff7053729 in __assert_fail_base (fmt=0x7ffff71e9588 "...
Abort in SingleComponentLSScan::ParseMCU
https://api.github.com/repos/thorfdbg/libjpeg/issues/75/comments
1
2022-06-08T09:09:39Z
2022-06-08T10:59:47Z
https://github.com/thorfdbg/libjpeg/issues/75
1,264,435,121
75
CVE-2022-31282
2022-06-10T18:15:08.627
Bento4 MP4Dump v1.2 was discovered to contain a segmentation violation via an unknown address at /Source/C++/Core/Ap4DataBuffer.cpp:175.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/708" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F7A3D679-CF47-47D3-AED0-94803AC18598", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/axiomatic-systems/Bento4/issues/708
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
SUMMARY: AddressSanitizer: SEGV on unknown address 0x000000000000 in /Source/C++/Core/Ap4DataBuffer.cpp:175 - Version ``` $ ./mp4dump MP4 File Dumper - Version 1.2 (Bento4 Version 1.6.0.0) (c) 2002-2011 Axiomatic Systems, LLC ``` branch [d02ef82](https://github.com/axiomatic-systems/Bento4/commit/d02ef8230a8...
SEGV on unknown address 0x000000000000 in /Source/C++/Core/Ap4DataBuffer.cpp:175
https://api.github.com/repos/axiomatic-systems/Bento4/issues/708/comments
0
2022-05-08T16:25:44Z
2022-05-08T16:25:44Z
https://github.com/axiomatic-systems/Bento4/issues/708
1,228,929,453
708
CVE-2022-31285
2022-06-10T18:15:08.820
An issue was discovered in Bento4 1.2. The allocator is out of memory in /Source/C++/Core/Ap4Array.h.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/702" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F7A3D679-CF47-47D3-AED0-94803AC18598", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/axiomatic-systems/Bento4/issues/702
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
SUMMARY: AddressSanitizer: allocator is out of memory in /Source/C++/Core/Ap4Array.h:172 - Version ``` $ ./mp42hls MP4 To HLS File Converter - Version 1.2 (Bento4 Version 1.6.0.0) (c) 2002-2018 Axiomatic Systems, LLC ``` branch [d02ef82](https://github.com/axiomatic-systems/Bento4/commit/d02ef8230a8fee4904a7...
allocator is out of memory in /Source/C++/Core/Ap4Array.h:172
https://api.github.com/repos/axiomatic-systems/Bento4/issues/702/comments
0
2022-05-08T09:35:50Z
2022-05-08T09:35:50Z
https://github.com/axiomatic-systems/Bento4/issues/702
1,228,840,395
702
CVE-2022-31287
2022-06-10T18:15:08.900
An issue was discovered in Bento4 v1.2. There is an allocation size request error in /Ap4RtpAtom.cpp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/703" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F7A3D679-CF47-47D3-AED0-94803AC18598", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/axiomatic-systems/Bento4/issues/703
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
SUMMARY: AddressSanitizer: requested allocation size 0xfffffffffffffffd in /Source/C++/Core/Ap4RtpAtom.cpp:49 - Version ``` $ ./mp42hls MP4 To HLS File Converter - Version 1.2 (Bento4 Version 1.6.0.0) (c) 2002-2018 Axiomatic Systems, LLC ``` branch [d02ef82](https://github.com/axiomatic-systems/Bento4/commit...
requested allocation size 0xfffffffffffffffd in /Source/C++/Core/Ap4RtpAtom.cpp:49
https://api.github.com/repos/axiomatic-systems/Bento4/issues/703/comments
0
2022-05-08T09:38:48Z
2022-05-08T09:38:48Z
https://github.com/axiomatic-systems/Bento4/issues/703
1,228,840,962
703
CVE-2021-40678
2022-06-14T13:15:07.937
In Piwigo 11.5.0, there exists a persistent cross-site scripting in the single mode function through /admin.php?page=batch_manager&mode=unit.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1476" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:11.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B6BC6DF8-D938-4413-B4C7-132BCC938E68", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/Piwigo/Piwigo/issues/1476
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
**Description:** In the single mode function of the Piwigo system, modifying the author parameter of the picture can cause persistent cross-site scripting **Vulnerable Instances:** /admin.php?page=batch_manager&mode=unit ![image](https://user-images.githubusercontent.com/49687778/132269709-b5092ef5-eac5-4aa2-808d-c...
Persistent Cross Site Scripting in Batch Manager(version:11.5.0)
https://api.github.com/repos/Piwigo/Piwigo/issues/1476/comments
0
2021-09-06T02:58:29Z
2021-09-07T01:10:19Z
https://github.com/Piwigo/Piwigo/issues/1476
988,691,714
1,476
CVE-2021-41458
2022-06-16T10:15:09.053
In GPAC MP4Box v1.1.0, there is a stack buffer overflow at src/utils/error.c:1769 which leads to a denial of service vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1910" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:mp4box:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "AAC8DC7B-40A5-4CE7-B534-D17901AECE66", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/gpac/gpac/issues/1910
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
SEGV on unknown address in MP4Box at src/utils/error.c:1769 in gf_blob_get
https://api.github.com/repos/gpac/gpac/issues/1910/comments
0
2021-09-07T16:19:06Z
2021-09-09T13:04:24Z
https://github.com/gpac/gpac/issues/1910
990,148,297
1,910
CVE-2021-41682
2022-06-20T14:15:08.947
There is a heap-use-after-free at ecma-helpers-string.c:1940 in ecma_compare_ecma_non_direct_strings in JerryScript 2.4.0
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4747" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "1E97C345-3992-457E-928D-05A0B97B2A5F", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/4747
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision 3bcd48f ###### Build platform Ubuntu 20.04.2 LTS (Linux 5.11.0-25-generic x86_64) ###### Build steps ``` ./tools/build.py --clean --debug --compile-flag=-fsanitize=address \ --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer \ --compile-flag=-fno-common --compile-flag=-...
heap-use-after-free in ecma_compare_ecma_non_direct_strings
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4747/comments
0
2021-08-24T03:35:55Z
2021-11-02T07:40:08Z
https://github.com/jerryscript-project/jerryscript/issues/4747
977,668,295
4,747
CVE-2021-41683
2022-06-20T14:15:08.997
There is a stack-overflow at ecma-helpers.c:326 in ecma_get_lex_env_type in JerryScript 2.4.0
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4745" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "1E97C345-3992-457E-928D-05A0B97B2A5F", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/4745
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision ``` 3bcd48f7 ``` ###### Build platform ``` Ubuntu 20.04.2 LTS (Linux 5.11.0-25-generic x86_64) ``` ###### Build steps ``` ./tools/build.py --clean --debug --compile-flag=-fsanitize=address \ --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer \ --compile-flag=-fno-co...
stack-overflow in ecma_get_lex_env_type
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4745/comments
0
2021-08-24T03:27:50Z
2021-10-20T14:03:14Z
https://github.com/jerryscript-project/jerryscript/issues/4745
977,665,470
4,745
CVE-2022-31306
2022-06-21T13:15:08.237
Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_array_convert_to_slow_array at src/njs_array.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/commit/81af26364c21c196dd21fb5e14c7fa9ce7debd17" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "C1858598-78C6-451F-81B4-57F6D636EBAC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nul...
https://github.com/nginx/njs/issues/481
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
### Environment ``` OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : f65981b0b8fcf02d69a40bc934803c25c9f607ab Version : 0.7.2 Build : NJS_CFLAGS="$NJS_CFLAGS -fsanitize=address" NJS_CFLAGS="$NJS_CFLAGS -...
SEGV njs_array.c:151:13 in njs_array_convert_to_slow_array
https://api.github.com/repos/nginx/njs/issues/481/comments
0
2022-03-02T11:45:41Z
2022-05-07T01:57:07Z
https://github.com/nginx/njs/issues/481
1,157,083,066
481
CVE-2022-31307
2022-06-21T13:15:08.287
Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_string_offset at src/njs_string.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/commit/eafe4c7a326b163612f10861392622b5da5b1792" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "C1858598-78C6-451F-81B4-57F6D636EBAC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nul...
https://github.com/nginx/njs/issues/482
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
### Environment ``` OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : f65981b0b8fcf02d69a40bc934803c25c9f607ab Version : 0.7.2 Build : NJS_CFLAGS="$NJS_CFLAGS -fsanitize=address" NJS_CFLAGS="$NJS_CFLAGS -...
SEGV njs_string.c:2535:18 in njs_string_offset
https://api.github.com/repos/nginx/njs/issues/482/comments
0
2022-03-02T11:46:11Z
2022-04-28T00:08:07Z
https://github.com/nginx/njs/issues/482
1,157,083,610
482
CVE-2022-32414
2022-06-21T13:15:08.437
Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_vmcode_interpreter at src/njs_vmcode.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/commit/31ed93a5623f24ca94e6d47e895ba735d9d97d46" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "C1858598-78C6-451F-81B4-57F6D636EBAC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nul...
https://github.com/nginx/njs/issues/483
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
### Environment ``` OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : f65981b0b8fcf02d69a40bc934803c25c9f607ab Version : 0.7.2 Build : NJS_CFLAGS="$NJS_CFLAGS -fsanitize=address" NJS_CFLAGS="$NJS_CFLAGS -...
SEGV njs_vmcode.c:802:27 in njs_vmcode_interpreter
https://api.github.com/repos/nginx/njs/issues/483/comments
0
2022-03-02T11:46:31Z
2022-04-26T23:10:07Z
https://github.com/nginx/njs/issues/483
1,157,083,929
483
CVE-2022-29526
2022-06-23T17:15:12.747
Go before 1.17.10 and 1.18.x before 1.18.2 has Incorrect Privilege Assignment. When called with a non-zero flags parameter, the Faccessat function could incorrectly report that a file is accessible.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/golang/go/issues/52313" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mailing List", "Third Party Adv...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", "matchCriteriaId": "397D7E19-74A1-4CCC-BF0A-D5A03151F171", "versionEndExcluding": "1.17.10", "versionEndIncluding": null, "versionStartExcluding":...
https://github.com/golang/go/issues/52313
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "golang", "go" ]
The `syscall.Faccessat` function checks whether the calling process can access a file. `Faccessat` contains a bug where it checks a file's group permission bits if the process's user is a member of the *process's* group rather than a member of the *file's* group. https://github.com/golang/go/blob/c9fe126c8bf25d14...
syscall: Faccessat checks wrong group
https://api.github.com/repos/golang/go/issues/52313/comments
10
2022-04-12T20:16:17Z
2023-06-22T22:01:33Z
https://github.com/golang/go/issues/52313
1,202,343,099
52,313
CVE-2022-33024
2022-06-23T17:15:13.993
There is an Assertion `int decode_preR13_entities(BITCODE_RL, BITCODE_RL, unsigned int, BITCODE_RL, BITCODE_RL, Bit_Chain *, Dwg_Data *' failed at dwg2dxf: decode.c:5801 in libredwg v0.12.4.4608.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/492" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.12.4.4608:*:*:*:*:*:*:*", "matchCriteriaId": "205AD0A5-0F64-4F38-A208-B41F8C1E8952", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/LibreDWG/libredwg/issues/492
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
### system info Ubuntu x86_64, clang 6.0, dwg2dxf([0.12.4.4608](https://github.com/LibreDWG/libredwg/releases/tag/0.12.4.4608)) ### Command line ./programs/dwg2dxf -b -m @@ -o /dev/null ### output dwg2dxf: decode.c:5801: int decode_preR13_entities(BITCODE_RL, BITCODE_RL, unsigned int, BITCODE_RL, BITCODE_RL, ...
Assertion dwg2dxf: decode.c:5801: int decode_preR13_entities(BITCODE_RL, BITCODE_RL, unsigned int, BITCODE_RL, BITCODE_RL, Bit_Chain *, Dwg_Data *): Assertion `!dat->bit' failed. Aborted.
https://api.github.com/repos/LibreDWG/libredwg/issues/492/comments
4
2022-06-07T01:43:47Z
2022-12-15T08:04:07Z
https://github.com/LibreDWG/libredwg/issues/492
1,262,615,938
492
CVE-2022-33025
2022-06-23T17:15:14.033
LibreDWG v0.12.4.4608 was discovered to contain a heap-use-after-free via the function decode_preR13_section at decode_r11.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/487" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FE47054-8B69-4569-934E-EE67FC88DD36", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/LibreDWG/libredwg/issues/487
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
### system info Ubuntu x86_64, clang 6.0, dwg2dxf([0.12.4.4608](https://github.com/LibreDWG/libredwg/releases/tag/0.12.4.4608)) ### Command line ./programs/dwg2dxf -b -m @@ -o /dev/null ### AddressSanitizer output ==8989==ERROR: AddressSanitizer: heap-use-after-free on address 0x7ffff7e35838 at pc 0x0000007106...
heap-use-after-free exists in the function decode_preR13_section in decode_r11.c
https://api.github.com/repos/LibreDWG/libredwg/issues/487/comments
3
2022-06-07T01:31:30Z
2022-12-15T08:44:07Z
https://github.com/LibreDWG/libredwg/issues/487
1,262,609,657
487
CVE-2022-33026
2022-06-23T17:15:14.073
LibreDWG v0.12.4.4608 was discovered to contain a heap buffer overflow via the function bit_calc_CRC at bits.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/484" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FE47054-8B69-4569-934E-EE67FC88DD36", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/LibreDWG/libredwg/issues/484
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
### system info Ubuntu x86_64, clang 6.0, dwg2dxf([0.12.4.4608](https://github.com/LibreDWG/libredwg/releases/tag/0.12.4.4608)) ### Command line ./programs/dwg2dxf -b -m @@ -o /dev/null ### AddressSanitizer output ==8982==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x616000000592 at pc 0x000000528...
heap-buffer-overflow exists in the function bit_calc_CRC in bits.c
https://api.github.com/repos/LibreDWG/libredwg/issues/484/comments
3
2022-06-07T01:21:33Z
2022-12-15T08:15:29Z
https://github.com/LibreDWG/libredwg/issues/484
1,262,604,647
484
CVE-2022-33027
2022-06-23T17:15:14.113
LibreDWG v0.12.4.4608 was discovered to contain a heap-use-after-free via the function dwg_add_handleref at dwg.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/490" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FE47054-8B69-4569-934E-EE67FC88DD36", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/LibreDWG/libredwg/issues/490
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
### system info Ubuntu x86_64, clang 6.0, dwg2dxf([0.12.4.4608](https://github.com/LibreDWG/libredwg/releases/tag/0.12.4.4608)) ### Command line ./programs/dwg2dxf -b -m @@ -o /dev/null ### AddressSanitizer output ==8997==ERROR: AddressSanitizer: heap-use-after-free on address 0x604000000730 at pc 0x0000005173...
heap-use-after-free exists in the function dwg_add_handleref in dwg.c
https://api.github.com/repos/LibreDWG/libredwg/issues/490/comments
3
2022-06-07T01:40:09Z
2022-12-15T08:40:34Z
https://github.com/LibreDWG/libredwg/issues/490
1,262,614,234
490
CVE-2022-33028
2022-06-23T17:15:14.150
LibreDWG v0.12.4.4608 was discovered to contain a heap buffer overflow via the function dwg_add_object at decode.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/489" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FE47054-8B69-4569-934E-EE67FC88DD36", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/LibreDWG/libredwg/issues/489
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
### system info Ubuntu x86_64, clang 6.0, dwg2dxf([0.12.4.4608](https://github.com/LibreDWG/libredwg/releases/tag/0.12.4.4608)) ### Command line ./programs/dwg2dxf -b -m @@ -o /dev/null ### AddressSanitizer output ==8995==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62e00000ac80 at pc 0x0000004bc...
heap-buffer-overflow exists in the function dwg_add_object in decode.c
https://api.github.com/repos/LibreDWG/libredwg/issues/489/comments
3
2022-06-07T01:37:45Z
2022-12-15T08:41:39Z
https://github.com/LibreDWG/libredwg/issues/489
1,262,613,027
489
CVE-2022-33032
2022-06-23T17:15:14.190
LibreDWG v0.12.4.4608 was discovered to contain a heap-buffer-overflow via the function decode_preR13_section_hdr at decode_r11.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/488" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FE47054-8B69-4569-934E-EE67FC88DD36", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/LibreDWG/libredwg/issues/488
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
### system info Ubuntu x86_64, clang 6.0, dwg2dxf([0.12.4.4608](https://github.com/LibreDWG/libredwg/releases/tag/0.12.4.4608)) ### Command line ./programs/dwg2dxf -b -m @@ -o /dev/null ### AddressSanitizer output ==8993==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x611000000144 at pc 0x000000706...
heap-buffer-overflow exists in the function decode_preR13_section_hdr in decode_r11.c
https://api.github.com/repos/LibreDWG/libredwg/issues/488/comments
3
2022-06-07T01:34:49Z
2022-12-15T08:43:05Z
https://github.com/LibreDWG/libredwg/issues/488
1,262,611,394
488
CVE-2022-33033
2022-06-23T17:15:14.230
LibreDWG v0.12.4.4608 was discovered to contain a double-free via the function dwg_read_file at dwg.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/493" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.12.4.4608:*:*:*:*:*:*:*", "matchCriteriaId": "205AD0A5-0F64-4F38-A208-B41F8C1E8952", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/LibreDWG/libredwg/issues/493
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
### system info Ubuntu x86_64, clang 6.0, dwg2dxf([0.12.4.4608](https://github.com/LibreDWG/libredwg/releases/tag/0.12.4.4608)) ### Command line ./programs/dwg2dxf -b -m @@ -o /dev/null ### AddressSanitizer output ==9541==ERROR: AddressSanitizer: attempting double-free on 0x61a000000100 in thread T0: #0 0...
double-free exists in the function dwg_read_file in dwg.c
https://api.github.com/repos/LibreDWG/libredwg/issues/493/comments
2
2022-06-08T01:47:21Z
2022-12-01T08:12:49Z
https://github.com/LibreDWG/libredwg/issues/493
1,264,080,771
493
CVE-2022-33034
2022-06-23T17:15:14.270
LibreDWG v0.12.4.4608 was discovered to contain a stack overflow via the function copy_bytes at decode_r2007.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/494" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.12.4.4608:*:*:*:*:*:*:*", "matchCriteriaId": "205AD0A5-0F64-4F38-A208-B41F8C1E8952", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/LibreDWG/libredwg/issues/494
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
### system info Ubuntu x86_64, clang 6.0, dwg2dxf([0.12.4.4608](https://github.com/LibreDWG/libredwg/releases/tag/0.12.4.4608)) ### Command line ./programs/dwg2dxf -b -m @@ -o /dev/null ### AddressSanitizer output ==9543==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fffffffc8f0 at pc 0x00000072...
stack-buffer-overflow exists in the function copy_bytes in decode_r2007.c
https://api.github.com/repos/LibreDWG/libredwg/issues/494/comments
3
2022-06-08T01:51:23Z
2022-12-15T08:47:23Z
https://github.com/LibreDWG/libredwg/issues/494
1,264,082,849
494
CVE-2022-33113
2022-06-23T17:15:14.793
Jfinal CMS v5.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the keyword text field under the publish blog module.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/39" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/jflyfox/jfinal_cms/issues/39
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jflyfox", "jfinal_cms" ]
There is a stored XSS vulnerability in JFinal_cms 's publish blog module. An attacker can insert malicious XSS code into the keyword field. When the user views the content of the article in the foreground, the malicious XSS code is triggered successfully. payload: `" onmouseover="alert(document.cookie)` <img widt...
XSS vulnerability stored in the publish blog module of Jfinal_cms V5.1.0
https://api.github.com/repos/jflyfox/jfinal_cms/issues/39/comments
1
2022-06-10T14:54:45Z
2022-07-11T10:09:49Z
https://github.com/jflyfox/jfinal_cms/issues/39
1,267,664,722
39
CVE-2022-33114
2022-06-23T17:15:14.833
Jfinal CMS v5.1.0 was discovered to contain a SQL injection vulnerability via the attrVal parameter at /jfinal_cms/system/dict/list.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/38" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/jflyfox/jfinal_cms/issues/38
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jflyfox", "jfinal_cms" ]
# Vulnerability Analysis The vulnerability appears in lines 23-28 of the **com.jflyfox.system.dict.DictController.java** <img width="951" alt="image-20220610104610536" src="https://user-images.githubusercontent.com/30547070/172980296-78159fe2-2e0d-4e2c-aae3-cf1bd3095253.png"> <img width="1079" alt="image-2022061...
SQL injection vulnerability exists in JFinal CMS 5.1.0
https://api.github.com/repos/jflyfox/jfinal_cms/issues/38/comments
0
2022-06-10T02:49:09Z
2022-06-14T20:59:46Z
https://github.com/jflyfox/jfinal_cms/issues/38
1,266,938,033
38
CVE-2021-40941
2022-06-27T18:15:08.803
In Bento4 1.6.0-638, there is an allocator is out of memory in the function AP4_Array<AP4_TrunAtom::Entry>::EnsureCapacity in Ap4Array.h:172, as demonstrated by GPAC. This can cause a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/644" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-638:*:*:*:*:*:*:*", "matchCriteriaId": "2122DA5E-A523-4D07-B017-982DF2B8B829", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/644
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
How to reproduce: ``` 1.check out latest code, 5922ba762a 2.compile with asan, set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -fsanitize=address -g") set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -fsanitize=address -g") 3.run ./mp4dump --verbosity 3 --format text poc1 ``` [poc1.zip](https://github.com/axiomatic-sy...
allocator is out of memory in Ap4Array.h:172
https://api.github.com/repos/axiomatic-systems/Bento4/issues/644/comments
0
2021-08-25T02:03:31Z
2021-09-08T02:36:45Z
https://github.com/axiomatic-systems/Bento4/issues/644
978,628,921
644
CVE-2021-40942
2022-06-27T21:15:07.900
In GPAC MP4Box v1.1.0, there is a heap-buffer-overflow in the function filter_parse_dyn_args function in filter_core/filter.c:1454, as demonstrated by GPAC. This can cause a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1908" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "56FF2AB9-517D-43A7-867E-9FB6B833194F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1908
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
heap-buffer-overflow in MP4Box at filter_core/filter.c:1454
https://api.github.com/repos/gpac/gpac/issues/1908/comments
1
2021-09-07T10:07:06Z
2021-09-07T12:49:31Z
https://github.com/gpac/gpac/issues/1908
989,818,036
1,908
CVE-2021-40606
2022-06-28T13:15:09.740
The gf_bs_write_data function in GPAC 1.0.1 allows attackers to cause a denial of service via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1885" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCC969A1-3F88-40F5-B4A1-54DA05DF081E", "versionEndExcluding": "2.0.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/1885
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
- [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line .....
Bug: Memcpy from unknown addrees in MP4BOX at src/utils/bitstream.c:1028
https://api.github.com/repos/gpac/gpac/issues/1885/comments
0
2021-08-24T02:45:45Z
2021-08-30T15:33:43Z
https://github.com/gpac/gpac/issues/1885
977,647,480
1,885
CVE-2021-40607
2022-06-28T13:15:09.797
The schm_box_size function in GPAC 1.0.1 allows attackers to cause a denial of service via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1879" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCC969A1-3F88-40F5-B4A1-54DA05DF081E", "versionEndExcluding": "2.0.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/1879
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
- [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line .....
BUG: heap-buffer-overflow in MP4Box at src/isomedia/schm_box_size:179
https://api.github.com/repos/gpac/gpac/issues/1879/comments
0
2021-08-19T02:52:37Z
2021-08-30T15:33:42Z
https://github.com/gpac/gpac/issues/1879
974,213,413
1,879
CVE-2021-40608
2022-06-28T13:15:09.840
The gf_hinter_track_finalize function in GPAC 1.0.1 allows attackers to cause a denial of service via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1883" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCC969A1-3F88-40F5-B4A1-54DA05DF081E", "versionEndExcluding": "2.0.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/1883
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
- [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line .....
BUG : free on unknown addrees in MP4BOX at gf_hinter_track_finalize media_tools/isom_hinter.c:956
https://api.github.com/repos/gpac/gpac/issues/1883/comments
0
2021-08-20T05:15:45Z
2021-08-30T15:33:43Z
https://github.com/gpac/gpac/issues/1883
975,274,297
1,883