cve_id
stringlengths
13
16
cve_published
stringlengths
23
23
cve_descriptions
stringlengths
48
2.08k
cve_metrics
dict
cve_references
listlengths
1
138
cve_configurations
listlengths
1
39
url
stringlengths
37
77
cve_tags
listlengths
1
4
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
88.6k
issue_title
stringlengths
3
335
issue_comments_url
stringlengths
56
81
issue_comments_count
int64
0
146
issue_created_at
stringlengths
20
20
issue_updated_at
stringlengths
20
20
issue_html_url
stringlengths
37
62
issue_github_id
int64
104M
2.09B
issue_number
int64
1
122k
CVE-2020-12286
2020-04-28T07:15:12.250
In Octopus Deploy before 2019.12.9 and 2020 before 2020.1.12, the TaskView permission is not scoped to any dimension. For example, a scoped user who is scoped to only one tenant can view server tasks scoped to any other tenant.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6331" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6332" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*", "matchCriteriaId": "765C9D1B-67C4-4BBD-B5F1-AB3F8161DCF4", "versionEndExcluding": "2019.12.9", "versionEndIncluding": null, "versionS...
https://github.com/OctopusDeploy/Issues/issues/6331
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
# Prerequisites - [x] We are ready to publicly disclose this vulnerability or exploit according to our [responsible disclosure process](https://octopushq.atlassian.net/wiki/spaces/IN/pages/2430143/Security+Disclosure+Policy). - [x] I have raised a CVE according to our [CVE process](https://octopushq.atlassian.net/w...
TaskView permission is not scoped to any dimensions e.g. Projects, environments and tenants
https://api.github.com/repos/OctopusDeploy/Issues/issues/6331/comments
0
2020-04-28T03:36:15Z
2020-05-04T23:40:25Z
https://github.com/OctopusDeploy/Issues/issues/6331
607,999,573
6,331
CVE-2020-12286
2020-04-28T07:15:12.250
In Octopus Deploy before 2019.12.9 and 2020 before 2020.1.12, the TaskView permission is not scoped to any dimension. For example, a scoped user who is scoped to only one tenant can view server tasks scoped to any other tenant.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6331" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6332" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*", "matchCriteriaId": "765C9D1B-67C4-4BBD-B5F1-AB3F8161DCF4", "versionEndExcluding": "2019.12.9", "versionEndIncluding": null, "versionS...
https://github.com/OctopusDeploy/Issues/issues/6332
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
# Prerequisites - [x] We are ready to publicly disclose this vulnerability or exploit according to our [responsible disclosure process](https://octopushq.atlassian.net/wiki/spaces/IN/pages/2430143/Security+Disclosure+Policy). - [x] I have raised a CVE according to our [CVE process](https://octopushq.atlassian.net/w...
TaskView permission is not scoped to any dimensions e.g. Projects, environments and tenants
https://api.github.com/repos/OctopusDeploy/Issues/issues/6332/comments
0
2020-04-28T03:44:10Z
2020-05-04T23:40:46Z
https://github.com/OctopusDeploy/Issues/issues/6332
608,002,011
6,332
CVE-2020-12286
2020-04-28T07:15:12.250
In Octopus Deploy before 2019.12.9 and 2020 before 2020.1.12, the TaskView permission is not scoped to any dimension. For example, a scoped user who is scoped to only one tenant can view server tasks scoped to any other tenant.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6331" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6332" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*", "matchCriteriaId": "765C9D1B-67C4-4BBD-B5F1-AB3F8161DCF4", "versionEndExcluding": "2019.12.9", "versionEndIncluding": null, "versionS...
https://github.com/OctopusDeploy/Issues/issues/6333
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
# Prerequisites - [x] We are ready to publicly disclose this vulnerability or exploit according to our [responsible disclosure process](https://octopushq.atlassian.net/wiki/spaces/IN/pages/2430143/Security+Disclosure+Policy). - [x] I have raised a CVE according to our [CVE process](https://octopushq.atlassian.net/w...
TaskView permission is not scoped to any dimensions e.g. Projects, environments and tenants
https://api.github.com/repos/OctopusDeploy/Issues/issues/6333/comments
0
2020-04-28T03:53:17Z
2020-05-04T23:40:57Z
https://github.com/OctopusDeploy/Issues/issues/6333
608,004,702
6,333
CVE-2020-12740
2020-05-08T18:15:10.457
tcprewrite in Tcpreplay through 4.3.2 has a heap-based buffer over-read during a get_c operation. The issue is being triggered in the function get_ipv6_next() at common/get.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/appneta/tcpreplay/issues/576" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announc...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB196463-1184-4D1D-936B-8B9105BDDFD7", "versionEndExcluding": null, "versionEndIncluding": "4.3.2", "versionStartExcl...
https://github.com/appneta/tcpreplay/issues/576
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "appneta", "tcpreplay" ]
**Describe the bug** A heap-based buffer overflow was discovered in tcprewrite binary, during the get_c operation. The issue is being triggered in the function get_ipv6_next() at common/get.c. **To Reproduce** Steps to reproduce the behavior: 1. Compile tcpreplay according to the default configuration 2. execute...
Heap overflow in get_ipv6_next()
https://api.github.com/repos/appneta/tcpreplay/issues/576/comments
4
2020-05-08T15:35:39Z
2020-06-02T00:41:03Z
https://github.com/appneta/tcpreplay/issues/576
614,818,164
576
CVE-2020-13230
2020-05-20T14:15:11.407
In Cacti before 1.2.11, disabling a user account does not immediately invalidate any permissions granted to that account (e.g., permission to view logs).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Cacti/cacti/issues/3343" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://git...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*", "matchCriteriaId": "71E927CB-B43A-486F-980C-24BB8CF50FBD", "versionEndExcluding": "1.2.11", "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/Cacti/cacti/issues/3343
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Cacti", "cacti" ]
**Describe the bug** Cacti admin console provides a functionality to disable a created user which takes his privileges to perform any action but if a page is auto-refreshed a disabled user can view updated data. **To Reproduce** Steps to reproduce the behavior: 1. Log in with Admin account and navigate to http://...
Improper Access Control on disabling a user.
https://api.github.com/repos/Cacti/cacti/issues/3343/comments
2
2020-03-11T14:37:20Z
2020-06-30T12:20:21Z
https://github.com/Cacti/cacti/issues/3343
579,312,165
3,343
CVE-2020-13231
2020-05-20T14:15:11.487
In Cacti before 1.2.11, auth_profile.php?action=edit allows CSRF for an admin email change.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Cacti/cacti/issues/3342" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/Cacti/cacti/releases/t...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*", "matchCriteriaId": "71E927CB-B43A-486F-980C-24BB8CF50FBD", "versionEndExcluding": "1.2.11", "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/Cacti/cacti/issues/3342
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Cacti", "cacti" ]
**Describe the bug** A malformed GET request at http://192.168.56.106/cacti/auth_profile.php?action=edit can lead to admin email change. Affected URI http://192.168.56.106/cacti/auth_profile.php?action=edit **To Reproduce** Steps to reproduce the behavior: 1. Go to 'http://192.168.56.106/cacti/auth_profile.ph...
CSRF at Admin Email
https://api.github.com/repos/Cacti/cacti/issues/3342/comments
2
2020-03-11T13:32:33Z
2020-06-30T12:20:22Z
https://github.com/Cacti/cacti/issues/3342
579,267,172
3,342
CVE-2020-13438
2020-05-24T23:15:09.867
ffjpeg through 2020-02-24 has an invalid read in jfif_encode in jfif.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/23" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6FB3E34-01AE-4929-99A3-4A246FC15008", "versionEndExcluding": null, "versionEndIncluding": "2020-02-24", "versionStartE...
https://github.com/rockcarry/ffjpeg/issues/23
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
Tested in Ubuntu 16.04, 64bit. The testcase is [segv_ffjpeg_e2](https://github.com/xiaoxiongwang/function_bugs/blob/master/ffjpeg/segv_ffjpeg_e2). I use the following command: ``` ffjpeg -e segv_ffjpeg_e2 ``` and get: ``` Segmentation fault ``` I use **valgrind** to analysis the bug and get the be...
SEGV in function jfif_encode in jfif.c:748
https://api.github.com/repos/rockcarry/ffjpeg/issues/23/comments
2
2020-05-23T17:08:31Z
2020-07-27T08:14:45Z
https://github.com/rockcarry/ffjpeg/issues/23
623,701,501
23
CVE-2020-13439
2020-05-24T23:15:09.927
ffjpeg through 2020-02-24 has a heap-based buffer over-read in jfif_decode in jfif.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/24" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6FB3E34-01AE-4929-99A3-4A246FC15008", "versionEndExcluding": null, "versionEndIncluding": "2020-02-24", "versionStartE...
https://github.com/rockcarry/ffjpeg/issues/24
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
Tested in Ubuntu 16.04, 64bit. The tesecase is [heap-buffer-overflow_ffjpeg_d1](https://github.com/xiaoxiongwang/function_bugs/blob/master/ffjpeg/heap-buffer-overflow_ffjpeg_d1). I use the following command: ``` ffjpeg -d heap-buffer-overflow_ffjpeg_d1 ``` and get: ``` Segmentation fault ``` I use...
heap-buffer-overflow in function jfif_decode at jfif.c:546
https://api.github.com/repos/rockcarry/ffjpeg/issues/24/comments
2
2020-05-23T17:09:21Z
2020-07-27T08:17:04Z
https://github.com/rockcarry/ffjpeg/issues/24
623,701,677
24
CVE-2020-13440
2020-05-24T23:15:09.990
ffjpeg through 2020-02-24 has an invalid write in bmp_load in bmp.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/22" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6FB3E34-01AE-4929-99A3-4A246FC15008", "versionEndExcluding": null, "versionEndIncluding": "2020-02-24", "versionStartE...
https://github.com/rockcarry/ffjpeg/issues/22
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
Tested in Ubuntu 16.04, 64bit. The testcase is [segv_ffjpeg_e1](https://github.com/xiaoxiongwang/function_bugs/blob/master/ffjpeg/segv_ffjpeg_e1). I use the following command: ``` ffjpeg -e segv_ffjpeg_e1 ``` and get: ``` Segmentation fault ``` I use **valgrind** to analysis the bug and get the be...
SEGV in function bmp_load at bmp.c:57
https://api.github.com/repos/rockcarry/ffjpeg/issues/22/comments
3
2020-05-23T17:07:53Z
2022-05-22T03:18:28Z
https://github.com/rockcarry/ffjpeg/issues/22
623,701,352
22
CVE-2020-13622
2020-05-27T00:15:11.497
JerryScript 2.2.0 allows attackers to cause a denial of service (assertion failure) because a property key query for a Proxy object returns unintended data.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3787" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/pull...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/3787
[ "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision https://github.com/jerryscript-project/jerryscript/commit/6cd309b5252d15f3e3e6481c72a4d8fa7f9557a9 ###### Build platform Ubuntu 20.04 LTS (Linux 5.4.0-31-generic x86_64) ###### Build steps ```sh python tools/build.py --profile=es2015-subset --lto=off --compile-flag=-g \ --error-...
Assertion 'ecma_is_value_string (value)' failed at jerry-core/ecma/base/ecma-helpers-value.c(ecma_get_string_from_value):742
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3787/comments
0
2020-05-23T17:53:33Z
2020-05-26T13:22:51Z
https://github.com/jerryscript-project/jerryscript/issues/3787
623,709,607
3,787
CVE-2020-13623
2020-05-27T00:15:11.557
JerryScript 2.2.0 allows attackers to cause a denial of service (stack consumption) via a proxy operation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3785" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/3785
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision https://github.com/jerryscript-project/jerryscript/commit/6cd309b5252d15f3e3e6481c72a4d8fa7f9557a9 ###### Build platform Ubuntu 20.04 LTS (Linux 5.4.0-31-generic x86_64) ###### Build steps ```sh python tools/build.py --profile=es2015-subset --lto=off --compile-flag=-g \ --error-...
Stack Exhaustion (ecma_proxy_object_get, ecma_proxy_object_set)
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3785/comments
3
2020-05-23T08:58:58Z
2020-05-26T07:44:39Z
https://github.com/jerryscript-project/jerryscript/issues/3785
623,613,918
3,785
CVE-2020-13649
2020-05-28T15:15:11.980
parser/js/js-scanner.c in JerryScript 2.2.0 mishandles errors during certain out-of-memory conditions, as demonstrated by a scanner_reverse_info_list NULL pointer dereference and a scanner_scan_all assertion failure.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/commit/69f8e78c2f8d562bd6d8002b5488f1662ac30d24" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/3786
[ "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision https://github.com/jerryscript-project/jerryscript/commit/6cd309b5252d15f3e3e6481c72a4d8fa7f9557a9 ###### Build platform Ubuntu 20.04 LTS (Linux 5.4.0-31-generic x86_64) ###### Build steps ```sh python tools/build.py --profile=es2015-subset --lto=off --compile-flag=-g \ --error-...
NULL dereference in scanner_reverse_info_list
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3786/comments
0
2020-05-23T17:46:47Z
2020-05-27T12:40:44Z
https://github.com/jerryscript-project/jerryscript/issues/3786
623,708,437
3,786
CVE-2020-13649
2020-05-28T15:15:11.980
parser/js/js-scanner.c in JerryScript 2.2.0 mishandles errors during certain out-of-memory conditions, as demonstrated by a scanner_reverse_info_list NULL pointer dereference and a scanner_scan_all assertion failure.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/commit/69f8e78c2f8d562bd6d8002b5488f1662ac30d24" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/3788
[ "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision https://github.com/jerryscript-project/jerryscript/commit/6cd309b5252d15f3e3e6481c72a4d8fa7f9557a9 ###### Build platform Ubuntu 20.04 LTS (Linux 5.4.0-31-generic x86_64) ###### Build steps ```sh python tools/build.py --profile=es2015-subset --lto=off --compile-flag=-g \ --error-...
Assertion 'context_p->error == PARSER_ERR_NO_ERROR' failed at jerry-core/parser/js/js-scanner.c(scanner_scan_all):3196
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3788/comments
0
2020-05-23T17:56:43Z
2020-05-27T12:40:44Z
https://github.com/jerryscript-project/jerryscript/issues/3788
623,710,199
3,788
CVE-2019-20805
2020-06-01T14:15:09.977
p_lx_elf.cpp in UPX before 3.96 has an integer overflow during unpacking via crafted values in a PT_DYNAMIC segment.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/upx/upx/commit/8be9da8280dfa69d5df4417d4d81bda1cab78010" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/upx/upx/i...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A4A2432-18AE-4B27-A527-030DD9D34F93", "versionEndExcluding": "3.96", "versionEndIncluding": null, "versionStartExcludin...
https://github.com/upx/upx/issues/317
[ "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
ubuntu 1604 x32 //////////////////////////////////////////////////////////// ddos 1 attachment p_lx_elf.cpp^%1613 p_lx_elf.cpp:1613 unsigned const nbucket = get_te32(&hashtab[0]); crashes ///////////////////////////////////////////////////////////////////// ddos 2 attachment p_lx_elf.cpp^%1635 p_lx_elf.cpp:1635...
upx-devel ddos Vulnerability
https://api.github.com/repos/upx/upx/issues/317/comments
1
2019-11-21T09:32:01Z
2020-01-16T11:38:51Z
https://github.com/upx/upx/issues/317
526,469,669
317
CVE-2020-13597
2020-06-03T17:15:24.887
Clusters using Calico (version 3.14.0 and below), Calico Enterprise (version 2.8.2 and below), may be vulnerable to information disclosure if IPv6 is enabled but unused. A compromised pod with sufficient privilege is able to reconfigure the node’s IPv6 interface due to the node accepting route advertisement by default,...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", ...
[ { "source": "psirt@tigera.io", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/91507" }, { "source": "psirt@tigera.io", "tags": null, "url": "https://groups.google.com/forum/#%21topic/kubernetes-security-announ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:projectcalico:calico:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "95DB38FE-A03E-456B-874A-A58C31BE7592", "versionEndExcluding": null, "versionEndIncluding": "2.6.2", "versi...
https://github.com/kubernetes/kubernetes/issues/91507
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: [CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L) (6.0 Medium) A cluster configured to use an affected container networking implementation is susceptible to man-in-the-middle (MitM) attacks. By sending “rogue” router ad...
CVE-2020-10749: IPv4 only clusters susceptible to MitM attacks via IPv6 rogue router advertisements
https://api.github.com/repos/kubernetes/kubernetes/issues/91507/comments
7
2020-05-27T19:32:29Z
2022-09-14T11:48:50Z
https://github.com/kubernetes/kubernetes/issues/91507
625,973,443
91,507
CVE-2020-8555
2020-06-05T17:15:11.640
The Kubernetes kube-controller-manager in versions v1.0-1.14, versions prior to v1.15.12, v1.16.9, v1.17.5, and version v1.18.0 are vulnerable to a Server Side Request Forgery (SSRF) that allows certain authorized users to leak up to 500 bytes of arbitrary information from unprotected endpoints within the master's host...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL"...
[ { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/01/4" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://w...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BB84B14-8D71-4BEA-90FC-DB76F9A0F781", "versionEndExcluding": "1.15.11", "versionEndIncluding": null, "versionStar...
https://github.com/kubernetes/kubernetes/issues/91542
[ "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: [CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N) There exists a Server Side Request Forgery (SSRF) vulnerability in kube-controller-manager that allows certain authorized users to leak up to 500 bytes of arbitrary info...
CVE-2020-8555: Half-Blind SSRF in kube-controller-manager
https://api.github.com/repos/kubernetes/kubernetes/issues/91542/comments
4
2020-05-28T16:13:34Z
2021-12-02T22:54:48Z
https://github.com/kubernetes/kubernetes/issues/91542
626,636,248
91,542
CVE-2020-13889
2020-06-06T20:15:11.200
showAlert() in the administration panel in Bludit 3.12.0 allows XSS.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bludit/bludit/issues/1205" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D6D30E3-E730-47C2-BB7F-3C54EB771AFA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/bludit/bludit/issues/1205
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "bludit", "bludit" ]
Hello I think I found a vulnerability. This vulnerability consists in a function called showAlert() in the administration panel of bludit,that when accessed in DOM, allows users define the text to be popped up in the message box. But this function dont have any sanatization and the user can inject any javascript and...
Possible XSS and HTML injection on admin page.
https://api.github.com/repos/bludit/bludit/issues/1205/comments
1
2020-06-05T01:31:12Z
2020-06-07T10:05:27Z
https://github.com/bludit/bludit/issues/1205
631,247,131
1,205
CVE-2020-14061
2020-06-14T20:15:10.027
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oracle.jms.AQjmsQueueConnectionFactory, oracle.jms.AQjmsXATopicConnectionFactory, oracle.jms.AQjmsTopicConnectionFactory, oracle.jms.AQjmsXAQueueConnectionFactory, and oracle.jms.AQjmsXAConnect...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2698" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.or...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B92AF50-0155-471E-B5C4-1CFD95F4B7D0", "versionEndExcluding": "2.9.10.5", "versionEndIncluding": null, "versi...
https://github.com/FasterXML/jackson-databind/issues/2698
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding class(es) of `aqapi.jar` library, included in Weblogic (for Oracle AQ/JMS support). See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-14061 Reporter(s): F...
Block one more gadget type (weblogic/oracle-aqjms, CVE-2020-14061)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2698/comments
0
2020-04-25T02:27:29Z
2020-07-16T17:22:34Z
https://github.com/FasterXML/jackson-databind/issues/2698
606,669,819
2,698
CVE-2020-14062
2020-06-14T20:15:10.167
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (aka xalan2).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2704" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.or...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B92AF50-0155-471E-B5C4-1CFD95F4B7D0", "versionEndExcluding": "2.9.10.5", "versionEndIncluding": null, "versi...
https://github.com/FasterXML/jackson-databind/issues/2704
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding class(es) of `com.sun.xml.parsers:jaxp-ri` (in shaded copy of Xalan2). See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-14062 Reporter(s): XuYuanzhen fro...
Block one more gadget type (jaxp-ri, CVE-2020-14062)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2704/comments
0
2020-04-30T00:43:03Z
2020-07-16T17:22:25Z
https://github.com/FasterXML/jackson-databind/issues/2704
609,469,620
2,704
CVE-2020-14060
2020-06-14T21:15:09.817
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.xalan.lib.sql.JNDIConnectionPool (aka apache/drill).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2688" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.or...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B92AF50-0155-471E-B5C4-1CFD95F4B7D0", "versionEndExcluding": "2.9.10.5", "versionEndIncluding": null, "versi...
https://github.com/FasterXML/jackson-databind/issues/2688
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding class(es) of `org.apache.drill.exec:drill-jdbc-all`. library. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-14060 Reporter(s): Topsec(tcc) from Alphalab...
Block one more gadget type (apache-drill, CVE-2020-14060)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2688/comments
0
2020-04-16T15:11:49Z
2020-08-24T22:25:58Z
https://github.com/FasterXML/jackson-databind/issues/2688
601,148,139
2,688
CVE-2020-14163
2020-06-15T21:15:10.553
An issue was discovered in ecma/operations/ecma-container-object.c in JerryScript 2.2.0. Operations with key/value pairs did not consider the case where garbage collection is triggered after the key operation but before the value operation, as demonstrated by improper read access to memory in ecma_gc_set_object_visited...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/commit/c2b662170245a16f46ce02eae68815c325d99821" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/3804
[ "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision 7a20150ae747742c178e7d61bb4b3c71476925e2 ###### Build platform Ubuntu 18.04.4 LTS (Linux 4.15.0-91-generic x86_64) and ProductName: Mac OS X ProductVersion: 10.15.4 BuildVersion: 19E287 ###### Build steps ```sh python tools/build.py --profile=es2015-subset --lto=off --com...
Memory corruption in ecma_gc_set_object_visited (jerry-core/ecma/base/ecma-gc.c:85)
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3804/comments
0
2020-05-27T18:29:22Z
2020-05-28T05:55:17Z
https://github.com/jerryscript-project/jerryscript/issues/3804
625,930,295
3,804
CVE-2020-14195
2020-06-16T16:15:11.107
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to org.jsecurity.realm.jndi.JndiRealmFactory (aka org.jsecurity).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2765" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B92AF50-0155-471E-B5C4-1CFD95F4B7D0", "versionEndExcluding": "2.9.10.5", "versionEndIncluding": null, "versi...
https://github.com/FasterXML/jackson-databind/issues/2765
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding class(es) of `org.jsecurity:jsecurity`. library. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-14195 Reporter(s): Al1ex@knownsec Fix will likely be i...
Block one more gadget type (org.jsecurity, CVE-2020-14195)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2765/comments
0
2020-06-13T23:22:50Z
2020-07-16T17:22:08Z
https://github.com/FasterXML/jackson-databind/issues/2765
638,251,364
2,765
CVE-2020-10268
2020-06-16T18:15:17.027
Critical services for operation can be terminated from windows task manager, bringing the manipulator to a halt. After this a Re-Calibration of the brakes needs to be performed. Be noted that this only can be accomplished either by a Kuka technician or by Kuka issued calibration hardware that interfaces with the manipu...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "NONE", ...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2550" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:kuka:kr_c4_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "377A0187-FEE3-48BB-A225-30B13FBC3EF9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/aliasrobotics/RVD/issues/2550
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml { "id": 2550, "title": "RVD#2550: Terminate Critical Services in KUKA controller KR C4", "type": "Vulnerability", "description": "Critical services for operation can be terminated from windows task manager, bringing the manipulator to a halt. After this a Re-Calibration of the brakes needs ...
RVD#2550: Terminate Critical Services in KUKA controller KR C4
https://api.github.com/repos/aliasrobotics/RVD/issues/2550/comments
0
2020-06-16T17:22:11Z
2020-06-19T07:29:29Z
https://github.com/aliasrobotics/RVD/issues/2550
639,842,815
2,550
CVE-2020-14295
2020-06-17T14:15:10.617
A SQL injection issue in color.php in Cacti 1.2.12 allows an admin to inject SQL via the filter parameter. This can lead to remote command execution because the product accepts stacked queries.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cacti:cacti:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "697145F3-CB18-45CF-9671-148B10B2F3F5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/Cacti/cacti/issues/3622
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Cacti", "cacti" ]
# sqli as admin v1.2.12 There is an sql injection on the latest version (in the /cacti/color.php page on the parameter filter. ## To Reproduce Steps to reproduce the behavior: call `/cacti/color.php?action=export&header=false&filter=')<SQLI HERE>--+-` ![image](https://user-images.githubusercontent.com/2317...
SQL Injection vulnerability due to input validation failure when editing colors (CVE-2020-14295)
https://api.github.com/repos/Cacti/cacti/issues/3622/comments
13
2020-06-17T07:02:46Z
2020-10-11T00:06:05Z
https://github.com/Cacti/cacti/issues/3622
640,193,667
3,622
CVE-2020-14470
2020-06-19T16:15:10.983
In Octopus Deploy 2018.8.0 through 2019.x before 2019.12.2, an authenticated user with could trigger a deployment that leaks the Helm Chart repository password.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6438" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*", "matchCriteriaId": "42BAC346-1A6F-48B0-A0C1-8D420011E67C", "versionEndExcluding": "2019.12.2", "versionEndIncluding": null, "versionS...
https://github.com/OctopusDeploy/Issues/issues/6438
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
# Prerequisites - [x] We are ready to publicly disclose this vulnerability or exploit according to our [responsible disclosure process](https://octopushq.atlassian.net/wiki/spaces/IN/pages/2430143/Security+Disclosure+Policy). - [x] I have raised a CVE according to our [CVE process](https://octopushq.atlassian.net/w...
Helm chart download can leak feed password
https://api.github.com/repos/OctopusDeploy/Issues/issues/6438/comments
5
2020-06-19T04:37:00Z
2020-06-24T05:23:29Z
https://github.com/OctopusDeploy/Issues/issues/6438
641,698,080
6,438
CVE-2020-10269
2020-06-24T05:15:12.647
One of the wireless interfaces within MiR100, MiR200 and possibly (according to the vendor) other MiR fleet vehicles comes pre-configured in WiFi Master (Access Point) mode. Credentials to such wireless Access Point default to well known and widely spread SSID (MiR_RXXXX) and passwords (omitted). This information is al...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2566" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:aliasrobotics:mir100:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0989373-02AB-4E05-BAC2-0522A641D73A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/aliasrobotics/RVD/issues/2566
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2566 title: 'RVD#2566: Hardcoded Credentials on MiRX00 wireless Access Point' type: vulnerability description: One of the wireless interfaces within MiR100, MiR200 and possibly (according to the vendor) other MiR fleet vehicles comes pre-configured in WiFi Master (Access Point) mode. Credentials t...
RVD#2566: Hardcoded Credentials on MiRX00 wireless Access Point
https://api.github.com/repos/aliasrobotics/RVD/issues/2566/comments
0
2020-06-24T04:59:00Z
2020-07-10T06:38:08Z
https://github.com/aliasrobotics/RVD/issues/2566
644,318,586
2,566
CVE-2020-10270
2020-06-24T05:15:12.753
Out of the wired and wireless interfaces within MiR100, MiR200 and other vehicles from the MiR fleet, it's possible to access the Control Dashboard on a hardcoded IP address. Credentials to such wireless interface default to well known and widely spread users (omitted) and passwords (omitted). This information is also ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2557" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBDEDA2D-26AB-4F23-B672-D0C89A7BEFB9", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "ver...
https://github.com/aliasrobotics/RVD/issues/2557
[ "Exploit", "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2557 title: 'RVD#2557: Hardcoded Credentials on MiRX00 Control Dashboard' type: vulnerability description: Out of the wired and wireless interfaces within MiR100, MiR200 and other vehicles from the MiR fleet, it's possible to access the Control Dashboard on a hardcoded IP address. Credentials to s...
RVD#2557: Hardcoded Credentials on MiRX00 Control Dashboard
https://api.github.com/repos/aliasrobotics/RVD/issues/2557/comments
0
2020-06-24T04:43:23Z
2020-07-10T06:38:05Z
https://github.com/aliasrobotics/RVD/issues/2557
644,313,367
2,557
CVE-2020-10271
2020-06-24T05:15:12.847
MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph to all network interfaces, wireless and wired. This is the result of a bad set up and can be mitigated by appropriately configuring ROS and/or applying custom patches as appropriate. Currently, the...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2555" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBDEDA2D-26AB-4F23-B672-D0C89A7BEFB9", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "ver...
https://github.com/aliasrobotics/RVD/issues/2555
[ "Exploit", "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2555 title: 'RVD#2555: MiR ROS computational graph is exposed to all network interfaces, including poorly secured wireless networks and open wired ones' type: vulnerability description: MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computati...
RVD#2555: MiR ROS computational graph is exposed to all network interfaces, including poorly secured wireless networks and open wired ones
https://api.github.com/repos/aliasrobotics/RVD/issues/2555/comments
0
2020-06-24T04:34:30Z
2020-07-10T06:38:04Z
https://github.com/aliasrobotics/RVD/issues/2555
644,310,466
2,555
CVE-2020-10272
2020-06-24T05:15:12.943
MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph without any sort of authentication. This allows attackers with access to the internal wireless and wired networks to take control of the robot seamlessly. In combination with CVE-2020-10269 and CVE...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10, "confidentialityImpact": "COMPLETE"...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2554" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBDEDA2D-26AB-4F23-B672-D0C89A7BEFB9", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "ver...
https://github.com/aliasrobotics/RVD/issues/2554
[ "Exploit", "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2554 title: 'RVD#2554: MiR ROS computational graph presents no authentication mechanisms' type: vulnerability description: MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph without any sort of authentication. This allows atta...
RVD#2554: MiR ROS computational graph presents no authentication mechanisms
https://api.github.com/repos/aliasrobotics/RVD/issues/2554/comments
0
2020-06-24T04:14:56Z
2020-07-10T06:38:04Z
https://github.com/aliasrobotics/RVD/issues/2554
644,304,134
2,554
CVE-2020-10273
2020-06-24T05:15:13.020
MiR controllers across firmware versions 2.8.1.1 and before do not encrypt or protect in any way the intellectual property artifacts installed in the robots. This flaw allows attackers with access to the robot or the robot network (while in combination with other flaws) to retrieve and easily exfiltrate all installed i...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2560" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBDEDA2D-26AB-4F23-B672-D0C89A7BEFB9", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "ver...
https://github.com/aliasrobotics/RVD/issues/2560
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2560 title: 'RVD#2560: Unprotected intellectual property in Mobile Industrial Robots (MiR) controllers' type: vulnerability description: MiR controllers across firmware versions 2.8.1.1 and before do not encrypt or protect in any way the intellectual property artifacts installed in the robots. ...
RVD#2560: Unprotected intellectual property in Mobile Industrial Robots (MiR) controllers
https://api.github.com/repos/aliasrobotics/RVD/issues/2560/comments
0
2020-06-24T04:50:27Z
2020-07-10T06:38:06Z
https://github.com/aliasrobotics/RVD/issues/2560
644,315,644
2,560
CVE-2020-10274
2020-06-24T05:15:13.113
The access tokens for the REST API are directly derived (sha256 and base64 encoding) from the publicly available default credentials from the Control Dashboard (refer to CVE-2020-10270 for related flaws). This flaw in combination with CVE-2020-10273 allows any attacker connected to the robot networks (wired or wireless...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL"...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2556" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C1ED80A-1AE1-4868-AD13-F37079F69B60", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", ...
https://github.com/aliasrobotics/RVD/issues/2556
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2556 title: 'RVD#2556: MiR REST API allows for data exfiltration by unauthorized attackers (e.g. indoor maps)' type: vulnerability description: The access tokens for the REST API are directly derived (sha256 and base64 encoding) from the publicly available default credentials from the Control Dash...
RVD#2556: MiR REST API allows for data exfiltration by unauthorized attackers (e.g. indoor maps)
https://api.github.com/repos/aliasrobotics/RVD/issues/2556/comments
0
2020-06-24T04:37:32Z
2020-07-10T06:38:05Z
https://github.com/aliasrobotics/RVD/issues/2556
644,311,434
2,556
CVE-2020-10275
2020-06-24T05:15:13.193
The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly with base64(USERNAME:sha256(PASSWORD)). An unauthorized attacker inside the network can use the default credentials to co...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2565" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C1ED80A-1AE1-4868-AD13-F37079F69B60", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", ...
https://github.com/aliasrobotics/RVD/issues/2565
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2565 title: 'RVD#2565: Weak token generation for the REST API.' type: vulnerability description: The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly wi...
RVD#2565: Weak token generation for the REST API.
https://api.github.com/repos/aliasrobotics/RVD/issues/2565/comments
0
2020-06-24T04:56:18Z
2020-07-10T06:38:08Z
https://github.com/aliasrobotics/RVD/issues/2565
644,317,700
2,565
CVE-2020-10276
2020-06-24T05:15:13.270
The password for the safety PLC is the default and thus easy to find (in manuals, etc.). This allows a manipulated program to be uploaded to the safety PLC, effectively disabling the emergency stop in case an object is too close to the robot. Navigation and any other components dependent on the laser scanner are not af...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2558" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C1ED80A-1AE1-4868-AD13-F37079F69B60", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", ...
https://github.com/aliasrobotics/RVD/issues/2558
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2558 title: 'RVD#2558: Default credentials on SICK PLC allows disabling safety features' type: vulnerability description: The password for the safety PLC is the default and thus easy to find (in manuals, etc.). This allows a manipulated program to be uploaded to the safety PLC, effectively disabli...
RVD#2558: Default credentials on SICK PLC allows disabling safety features
https://api.github.com/repos/aliasrobotics/RVD/issues/2558/comments
0
2020-06-24T04:45:55Z
2020-07-10T06:38:05Z
https://github.com/aliasrobotics/RVD/issues/2558
644,314,162
2,558
CVE-2020-10277
2020-06-24T05:15:13.347
There is no mechanism in place to prevent a bad operator to boot from a live OS image, this can lead to extraction of sensible files (such as the shadow file) or privilege escalation by manually adding a new user with sudo privileges on the machine.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2562" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C1ED80A-1AE1-4868-AD13-F37079F69B60", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", ...
https://github.com/aliasrobotics/RVD/issues/2562
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2562 title: 'RVD#2562: Booting from a live image leads to exfiltration of sensible information and privilege escalation' type: vulnerability description: There is no mechanism in place to prevent a bad operator to boot from a live OS image, this can lead to extraction of sensible files (such as th...
RVD#2562: Booting from a live image leads to exfiltration of sensible information and privilege escalation
https://api.github.com/repos/aliasrobotics/RVD/issues/2562/comments
0
2020-06-24T04:52:57Z
2020-07-10T06:38:07Z
https://github.com/aliasrobotics/RVD/issues/2562
644,316,520
2,562
CVE-2020-10278
2020-06-24T05:15:13.443
The BIOS onboard MiR's Computer is not protected by password, therefore, it allows a Bad Operator to modify settings such as boot order. This can be leveraged by a Malicious operator to boot from a Live Image.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2561" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBDEDA2D-26AB-4F23-B672-D0C89A7BEFB9", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "ver...
https://github.com/aliasrobotics/RVD/issues/2561
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2561 title: 'RVD#2561: Unprotected BIOS allows user to boot from live OS image.' type: vulnerability description: The BIOS onboard MiR's Computer is not protected by password, therefore, it allows a Bad Operator to modify settings such as boot order. This can be leveraged by a Malicious operator t...
RVD#2561: Unprotected BIOS allows user to boot from live OS image.
https://api.github.com/repos/aliasrobotics/RVD/issues/2561/comments
0
2020-06-24T04:51:45Z
2020-07-10T06:38:06Z
https://github.com/aliasrobotics/RVD/issues/2561
644,316,102
2,561
CVE-2020-10279
2020-06-24T06:15:11.543
MiR robot controllers (central computation unit) makes use of Ubuntu 16.04.2 an operating system, Thought for desktop uses, this operating system presents insecure defaults for robots. These insecurities include a way for users to escalate their access beyond what they were granted via file creation, access race condit...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2569" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBDEDA2D-26AB-4F23-B672-D0C89A7BEFB9", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "ver...
https://github.com/aliasrobotics/RVD/issues/2569
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2569 title: 'RVD#2569: Insecure operating system defaults in MiR robots' type: vulnerability description: MiR robot controllers (central computation unit) makes use of Ubuntu 16.04.2 an operating system, Thought for desktop uses, this operating system presents insecure defaults for robots. These i...
RVD#2569: Insecure operating system defaults in MiR robots
https://api.github.com/repos/aliasrobotics/RVD/issues/2569/comments
0
2020-06-24T06:00:50Z
2020-07-10T06:38:09Z
https://github.com/aliasrobotics/RVD/issues/2569
644,342,659
2,569
CVE-2020-10280
2020-06-24T06:15:11.620
The Apache server on port 80 that host the web interface is vulnerable to a DoS by spamming incomplete HTTP headers, effectively blocking the access to the dashboard.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2568" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C1ED80A-1AE1-4868-AD13-F37079F69B60", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", ...
https://github.com/aliasrobotics/RVD/issues/2568
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2568 title: 'RVD#2568: Apache server is vulnerable to a DoS' type: vulnerability description: The Apache server on port 80 that host the web interface is vulnerable to a DoS by spamming incomplete HTTP headers, effectively blocking the access to the dashboard. cwe: CWE-239 cve: CVE-2020-10280 k...
RVD#2568: Apache server is vulnerable to a DoS
https://api.github.com/repos/aliasrobotics/RVD/issues/2568/comments
0
2020-06-24T05:44:10Z
2020-07-10T06:38:09Z
https://github.com/aliasrobotics/RVD/issues/2568
644,335,617
2,568
CVE-2020-15006
2020-06-24T11:15:11.980
Bludit 3.12.0 allows stored XSS via JavaScript code in an SVG document to bl-kernel/ajax/logo-upload.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bludit/bludit/issues/1212" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D6D30E3-E730-47C2-BB7F-3C54EB771AFA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/bludit/bludit/issues/1212
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "bludit", "bludit" ]
### Describe your problem https://github.com/bludit/bludit/blob/master/bl-kernel/ajax/logo-upload.php Logo upload only determines the suffix, but not the content, which causes XSS and the user can inject any javascript and html code in the page payload ![image](https://user-images.githubusercontent.com/8120951...
Store XSS
https://api.github.com/repos/bludit/bludit/issues/1212/comments
10
2020-06-19T07:23:19Z
2022-02-22T16:10:21Z
https://github.com/bludit/bludit/issues/1212
641,764,976
1,212
CVE-2020-15026
2020-06-24T19:15:10.287
Bludit 3.12.0 allows admins to use a /plugin-backup-download?file=../ directory traversal approach for arbitrary file download via backup/plugin.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/bludit/bludit/issues/1214" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D6D30E3-E730-47C2-BB7F-3C54EB771AFA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/bludit/bludit/issues/1214
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "bludit", "bludit" ]
### **problem** hi, The problem is in the backup plugin, the $file parameter is not filtered, resulting in arbitrary file downloads ### **recurrent** ![image](https://user-images.githubusercontent.com/21289548/85357036-16500280-b543-11ea-9c7b-10d78fbf6e57.png) ### **repair** [https://github.com/bludit/bludit/blob/...
Arbitrary file download vulnerability
https://api.github.com/repos/bludit/bludit/issues/1214/comments
1
2020-06-23T03:25:01Z
2020-06-23T17:59:50Z
https://github.com/bludit/bludit/issues/1214
643,500,132
1,214
CVE-2020-15470
2020-07-01T11:15:10.880
ffjpeg through 2020-02-24 has a heap-based buffer overflow in jfif_decode in jfif.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/26" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6FB3E34-01AE-4929-99A3-4A246FC15008", "versionEndExcluding": null, "versionEndIncluding": "2020-02-24", "versionStartE...
https://github.com/rockcarry/ffjpeg/issues/26
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
ffjpeg "jfif_decode()" function heap-overflow vulnerability Description: There is a heap-overflow bug in jfif_decode(void *ctxt, BMP *pb) function at ffjpeg/src/jfif.c : line 516. An attacker can exploit this bug to cause a Denial of Service (DoS) by submitting a malicious jpeg image. The bug is caused by the fol...
ffjpeg "jfif_decode()" function heap-overflow vulnerability
https://api.github.com/repos/rockcarry/ffjpeg/issues/26/comments
3
2020-06-30T05:18:26Z
2020-12-02T00:21:37Z
https://github.com/rockcarry/ffjpeg/issues/26
647,869,169
26
CVE-2020-10285
2020-07-15T21:15:12.193
The authentication implementation on the xArm controller has very low entropy, making it vulnerable to a brute-force attack. There is no mechanism in place to mitigate or lockout automated attempts to gain access.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/3322" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ufactory:xarm_5_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A890A4C3-06E6-4A87-A2D5-D57BFD1CFE9D", "versionEndExcluding": null, "versionEndIncluding": "1.5.0", "versi...
https://github.com/aliasrobotics/RVD/issues/3322
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 3322 title: 'RVD#3322: Weak authentication implementation make the system vulnerable to a brute-force attack over adjacent networks' type: vulnerability description: The authentication implementation on the xArm controller has very low entropy, making it vulnerable to a brute-force attack. There i...
RVD#3322: Weak authentication implementation make the system vulnerable to a brute-force attack over adjacent networks
https://api.github.com/repos/aliasrobotics/RVD/issues/3322/comments
0
2020-07-15T20:55:50Z
2020-07-15T20:57:07Z
https://github.com/aliasrobotics/RVD/issues/3322
657,649,760
3,322
CVE-2020-10286
2020-07-15T22:15:13.857
the main user account has restricted privileges but is in the sudoers group and there is not any mechanism in place to prevent sudo su or sudo -i to be run gaining unrestricted access to sensible files, encryption, or issue orders that disrupt robot operation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact":...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/3323" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ufactory:xarm_5_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A890A4C3-06E6-4A87-A2D5-D57BFD1CFE9D", "versionEndExcluding": null, "versionEndIncluding": "1.5.0", "versi...
https://github.com/aliasrobotics/RVD/issues/3323
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 3323 title: 'RVD#3323: Mismanaged permission implementation leads to privilege escalation, exfiltration of sensitive information, and DoS' type: vulnerability description: "the main user account has restricted privileges but is in the sudoers group and there is not any mechanism in place to preven...
RVD#3323: Mismanaged permission implementation leads to privilege escalation, exfiltration of sensitive information, and DoS
https://api.github.com/repos/aliasrobotics/RVD/issues/3323/comments
0
2020-07-15T21:06:12Z
2020-07-15T21:09:16Z
https://github.com/aliasrobotics/RVD/issues/3323
657,656,985
3,323
CVE-2020-10287
2020-07-15T23:15:11.283
The IRC5 family with UAS service enabled comes by default with credentials that can be found on publicly available manuals. ABB considers this a well documented functionality that helps customer set up however, out of our research, we found multiple production systems running these exact default credentials and conside...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/3326" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:irb140_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D490DBD-AF3C-46EF-8CA0-6C113C7FF3A8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/aliasrobotics/RVD/issues/3326
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 3326 title: 'RVD#3326: Hardcoded default credentials on IRC 5 OPC Server' type: exposure description: The IRC5 family with UAS service enabled comes by default with credentials that can be found on publicly available manuals. ABB considers this a well documented functionality that helps customer set up ...
RVD#3326: Hardcoded default credentials on IRC 5 OPC Server
https://api.github.com/repos/aliasrobotics/RVD/issues/3326/comments
0
2020-07-15T21:59:00Z
2020-07-15T22:05:07Z
https://github.com/aliasrobotics/RVD/issues/3326
657,686,393
3,326
CVE-2020-10288
2020-07-15T23:15:11.393
IRC5 exposes an ftp server (port 21). Upon attempting to gain access you are challenged with a request of username and password, however you can input whatever you like. As long as the field isn't empty it will be accepted.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/3327" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:abb:robotware:5.09:*:*:*:*:*:*:*", "matchCriteriaId": "C9C363AC-475E-42E1-937B-D34A45AE9E32", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/aliasrobotics/RVD/issues/3327
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 3327 title: 'RVD#3327: No authentication required for accesing ABB IRC5 FTP server' type: vulnerability description: IRC5 exposes an ftp server (port 21). Upon attempting to gain access you are challenged with a request of username and password, however you can input whatever you like. As long as the fi...
RVD#3327: No authentication required for accesing ABB IRC5 FTP server
https://api.github.com/repos/aliasrobotics/RVD/issues/3327/comments
0
2020-07-15T22:03:16Z
2020-07-15T22:05:07Z
https://github.com/aliasrobotics/RVD/issues/3327
657,688,647
3,327
CVE-2019-20909
2020-07-16T18:15:12.690
An issue was discovered in GNU LibreDWG through 0.9.3. There is a NULL pointer dereference in the function dwg_encode_LWPOLYLINE in dwg.spec.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/commit/d7913b893bfa98fab27f05825dc4cab2d3a20c83" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "h...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "28E3A7DE-65A0-4A6B-BF63-00F627CF17CB", "versionEndExcluding": null, "versionEndIncluding": "0.9.3", "versionStartExcluding"...
https://github.com/LibreDWG/libredwg/issues/178
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, I got some bugs, and I tested on master branch and version **0.9.3**. There are **3 heap overflow**, **2 NULL pointer deference**, **1 denial of service**, **1 stack overflow** (this bug causes memory leak in master branch) in that. Compile with **ASAN** and use **dwgrewrite** to repro that. Hear are some detail...
Several bugs need to be fixed.
https://api.github.com/repos/LibreDWG/libredwg/issues/178/comments
18
2019-12-31T06:04:23Z
2020-01-16T12:12:03Z
https://github.com/LibreDWG/libredwg/issues/178
544,098,538
178
CVE-2020-15807
2020-07-17T16:15:11.560
GNU LibreDWG before 0.11 allows NULL pointer dereferences via crafted input files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/186" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "581DFE64-B504-4D86-AAAA-33836C432C53", "versionEndExcluding": "0.11", "versionEndIncluding": null, "versionStartExcluding":...
https://github.com/LibreDWG/libredwg/issues/186
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hello, I got a NULL pointer deference bug in **0.10.1.2677 and even earlier** by run `dxf2dwg poc -o /dev/null` ``` ==12391==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f9f9b4f3284 bp 0x7ffcfa3b08a0 sp 0x7ffcfa3b0860 T0) ==12391==The signal is caused by a READ memory access. ==12391==Hi...
NULL pointer deference
https://api.github.com/repos/LibreDWG/libredwg/issues/186/comments
3
2020-01-14T12:30:37Z
2020-07-20T02:14:44Z
https://github.com/LibreDWG/libredwg/issues/186
549,536,132
186
CVE-2020-15807
2020-07-17T16:15:11.560
GNU LibreDWG before 0.11 allows NULL pointer dereferences via crafted input files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/186" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "581DFE64-B504-4D86-AAAA-33836C432C53", "versionEndExcluding": "0.11", "versionEndIncluding": null, "versionStartExcluding":...
https://github.com/LibreDWG/libredwg/issues/189
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, I got some bugs which you can reproduce `dxf2dwg $PoC -o /dev/null` .Thses bugs work on version `0.10.1.2685` and `earlier`.
Some NULL pointer bugs
https://api.github.com/repos/LibreDWG/libredwg/issues/189/comments
58
2020-01-16T11:36:57Z
2020-07-20T02:15:32Z
https://github.com/LibreDWG/libredwg/issues/189
550,751,408
189
CVE-2020-15807
2020-07-17T16:15:11.560
GNU LibreDWG before 0.11 allows NULL pointer dereferences via crafted input files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/186" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "581DFE64-B504-4D86-AAAA-33836C432C53", "versionEndExcluding": "0.11", "versionEndIncluding": null, "versionStartExcluding":...
https://github.com/LibreDWG/libredwg/issues/190
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, I got some bugs which you can reproduce `dxf2dwg $PoC -o /dev/null` .Thses bugs work on version `0.10.1.2685` and `earlier`.
Some heap_overflow bug
https://api.github.com/repos/LibreDWG/libredwg/issues/190/comments
5
2020-01-16T11:51:56Z
2020-07-20T02:16:17Z
https://github.com/LibreDWG/libredwg/issues/190
550,758,758
190
CVE-2020-15121
2020-07-20T18:15:12.187
In radare2 before version 4.5.0, malformed PDB file names in the PDB server path cause shell injection. To trigger the problem it's required to open the executable in radare2 and run idpd to trigger the download. The shell code will execute, and will create a file called pwned in the current directory.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/commit/04edfa82c1f3fa2bc3621ccdad2f93bdbf00e4f9" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2252909-1FFD-484D-AC5B-6227CD4FB1BA", "versionEndExcluding": "4.5.0", "versionEndIncluding": null, "versionStartExcludin...
https://github.com/radareorg/radare2/issues/16945
[ "Third Party Advisory" ]
github.com
[ "radareorg", "radare2" ]
### Work environment | Questions | Answers |------------------------------------------------------|-------------------- | OS/arch/bits (mandatory) | N/A | File format of the file you reverse (mandatory) | PE | Architecture/bits of the fi...
Command injection across r_sys_cmd*
https://api.github.com/repos/radareorg/radare2/issues/16945/comments
10
2020-05-24T12:20:29Z
2020-07-21T03:48:53Z
https://github.com/radareorg/radare2/issues/16945
623,853,564
16,945
CVE-2020-8559
2020-07-22T14:15:16.517
The Kubernetes kube-apiserver in versions v1.6-v1.15, and versions prior to v1.16.13, v1.17.9 and v1.18.6 are vulnerable to an unvalidated redirect on proxied upgrade requests that could allow an attacker to escalate privileges from a node compromise to a full cluster compromise.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6, "confidentialityImpact": "PART...
[ { "source": "jordan@liggitt.net", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/92914" }, { "source": "jordan@liggitt.net", "tags": [ "Exploit", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "43222A9D-6D48-490F-8120-349DCE1C1218", "versionEndExcluding": null, "versionEndIncluding": "1.15.0", "versionStart...
https://github.com/kubernetes/kubernetes/issues/92914
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: Medium (6.4) [CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H) If an attacker is able to intercept certain requests to the Kubelet, they can send a redirect response that may be followed by a client using the credential...
CVE-2020-8559: Privilege escalation from compromised node to cluster
https://api.github.com/repos/kubernetes/kubernetes/issues/92914/comments
7
2020-07-08T17:03:16Z
2021-12-02T22:54:32Z
https://github.com/kubernetes/kubernetes/issues/92914
653,456,402
92,914
CVE-2020-8557
2020-07-23T17:15:12.513
The Kubernetes kubelet component in versions 1.1-1.16.12, 1.17.0-1.17.8 and 1.18.0-1.18.5 do not account for disk usage by a pod which writes to its own /etc/hosts file. The /etc/hosts file mounted in a pod by kubelet is not included by the kubelet eviction manager when calculating ephemeral storage usage by a pod. If ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", ...
[ { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/93032" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ], "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "12849C27-DD8A-4D84-92FD-3AB32B43742B", "versionEndExcluding": "1.16.13", "versionEndIncluding": null, "versionStar...
https://github.com/kubernetes/kubernetes/issues/93032
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: Medium (5.5)  [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/CR:H/IR:H/AR:M](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/CR:H/IR:H/AR:M) The `/etc/hosts` file mounted in a pod by kubelet is not included by the kubelet eviction manager when calculating ephemeral ...
CVE-2020-8557: Node disk DOS by writing to container /etc/hosts
https://api.github.com/repos/kubernetes/kubernetes/issues/93032/comments
3
2020-07-13T18:39:08Z
2021-12-02T22:54:24Z
https://github.com/kubernetes/kubernetes/issues/93032
656,058,152
93,032
CVE-2020-8558
2020-07-27T20:15:12.413
The Kubelet and kube-proxy components in versions 1.1.0-1.16.10, 1.17.0-1.17.6, and 1.18.0-1.18.3 were found to contain a security issue which allows adjacent hosts to reach TCP and UDP services bound to 127.0.0.1 running on the node or in the node's network namespace. Such a service is generally thought to be reachabl...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact":...
[ { "source": "jordan@liggitt.net", "tags": [ "Exploit", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/92315" }, { "source": "jordan@liggitt.net", "tags": [ "Exploit", "Mailing List", "Miti...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "9586C74C-1239-4E96-89A6-F618D14EF889", "versionEndExcluding": null, "versionEndIncluding": "1.16.10", "versionStar...
https://github.com/kubernetes/kubernetes/issues/92315
[ "Exploit", "Mitigation", "Patch", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: In typical clusters: medium (5.4) [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N) In clusters where API server insecure port has not been disabled: high (8.8) [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H](https://...
CVE-2020-8558: Node setting allows for neighboring hosts to bypass localhost boundary
https://api.github.com/repos/kubernetes/kubernetes/issues/92315/comments
17
2020-06-19T18:38:58Z
2021-12-02T22:54:39Z
https://github.com/kubernetes/kubernetes/issues/92315
642,156,921
92,315
CVE-2015-9549
2020-08-03T16:15:11.927
A reflected Cross-site Scripting (XSS) vulnerability exists in OcPortal 9.0.20 via the OCF_EMOTICON_CELL.tpl FIELD_NAME field to data/emoticons.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2015-9549-ocportal.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ocportal:ocportal:9.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "A2450EFF-5D36-46A0-AAD9-D40F84CA1FDA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/cybersecurityworks/Disclosed/issues/11
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
As per the documentation of the Ocportal, a value in a template that is not meant to contain HTML is marked as an escaped value ({VALUE*}). This meant that ‘html entities’ are put in replacement of HTML control characters. ![1](https://cloud.githubusercontent.com/assets/13975575/11140283/d4bd5918-89fe-11e5-8f92-4feb42...
OcPortal CMS 9.0.20 POC
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/11/comments
1
2015-11-13T06:56:27Z
2015-12-19T10:52:31Z
https://github.com/cybersecurityworks/Disclosed/issues/11
116,713,139
11
CVE-2020-16269
2020-08-03T16:15:12.097
radare2 4.5.0 misparses DWARF information in executable files, causing a segmentation fault in parse_typedef in type_dwarf.c via a malformed DW_AT_name in the .debug_info section.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/issues/17383" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lis...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:4.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "56860C89-D0FF-4A28-B2D1-C3E8C5A9AFD6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/radareorg/radare2/issues/17383
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "radareorg", "radare2" ]
### Work environment | Questions | Answers |------------------------------------------------------|-------------------- | OS/arch/bits (mandatory) | 5.6.16-1-Manjaro x86_64, Kubuntu x86 32 | File format of the file you reverse (mandatory) ...
[ELF] Segmentation fault by opening a binary (Bug in DWARF parsing)
https://api.github.com/repos/radareorg/radare2/issues/17383/comments
4
2020-07-31T00:14:52Z
2020-08-11T05:22:04Z
https://github.com/radareorg/radare2/issues/17383
669,294,502
17,383
CVE-2020-17487
2020-08-11T20:15:13.150
radare2 4.5.0 misparses signature information in PE files, causing a segmentation fault in r_x509_parse_algorithmidentifier in libr/util/x509.c. This is due to a malformed object identifier in IMAGE_DIRECTORY_ENTRY_SECURITY.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/issues/17431" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraprojec...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:4.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "56860C89-D0FF-4A28-B2D1-C3E8C5A9AFD6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/radareorg/radare2/issues/17431
[ "Exploit", "Third Party Advisory" ]
github.com
[ "radareorg", "radare2" ]
### Work environment | Questions | Answers |------------------------------------------------------|-------------------- | OS/arch/bits (mandatory) | 5.6.16-1-Manjaro x86_64, Kubuntu x86 32 | File format of the file you reverse (mandatory) ...
[PE] Segmentation fault by opening a binary (Bug in Pe32_bin_pe_compute_authentihash)
https://api.github.com/repos/radareorg/radare2/issues/17431/comments
4
2020-08-09T11:24:28Z
2020-09-04T08:19:38Z
https://github.com/radareorg/radare2/issues/17431
675,682,836
17,431
CVE-2020-24344
2020-08-13T19:15:13.740
JerryScript through 2.3.0 has a (function({a=arguments}){const arguments}) buffer over-read.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3976" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:*:*:*:*:*:*:*:*", "matchCriteriaId": "01F91CD4-9EFF-4338-A18E-64F109090995", "versionEndExcluding": null, "versionEndIncluding": "2.3.0", "versionStar...
https://github.com/jerryscript-project/jerryscript/issues/3976
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
### JerryScript revision git hash: 392ee717128f6daaf0b94e54fc9512eb26d680e2 ### Test case ```javascript ( function ( { a = arguments }) { const arguments } ) ``` In debug build, it triggers an assertion 'scope_stack_p > context_p->scope_stack_p' failed ### Execution steps ./jerry poc.js ### Bui...
Heap overflow in jerry-core
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3976/comments
14
2020-07-05T20:43:50Z
2021-06-16T09:03:07Z
https://github.com/jerryscript-project/jerryscript/issues/3976
651,142,365
3,976
CVE-2020-24345
2020-08-13T19:15:13.807
JerryScript through 2.3.0 allows stack consumption via function a(){new new Proxy(a,{})}JSON.parse("[]",a). NOTE: the vendor states that the problem is the lack of the --stack-limit option
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3977" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:*:*:*:*:*:*:*:*", "matchCriteriaId": "01F91CD4-9EFF-4338-A18E-64F109090995", "versionEndExcluding": null, "versionEndIncluding": "2.3.0", "versionStar...
https://github.com/jerryscript-project/jerryscript/issues/3977
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
### JerryScript revision git hash: 392ee717128f6daaf0b94e54fc9512eb26d680e2 ### Test case ```javascript function a() { new new Proxy(a, {}) } JSON.parse("[]", a) ``` ### Execution steps ./jerry poc.js ### Build cmd python tools/build.py --compile-flag="-fsanitize=address" Stack dump: --- ``` ASAN:...
Stack overflow in ecma_is_lexical_environment
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3977/comments
1
2020-07-06T05:01:36Z
2020-07-06T13:02:51Z
https://github.com/jerryscript-project/jerryscript/issues/3977
651,247,064
3,977
CVE-2020-24346
2020-08-13T19:15:13.880
njs through 0.4.3, used in NGINX, has a use-after-free in njs_json_parse_iterator_call in njs_json.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/325" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netap...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "1171CB43-C37C-4242-AD28-A8B94D288BE3", "versionEndExcluding": null, "versionEndIncluding": "0.4.3", "versionStartExcluding": null...
https://github.com/nginx/njs/issues/325
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
Version:`0.4.2`, git commit `32a70c899c1f136fbc3f97fcc050d59e0bd8c6a5` POC: ```javascript function a() { this[this['use asm'] = this[this[1024] = ArrayBuffer]] = this[ArrayBuffer] = 4000 } JSON.parse("[1, 2, []]", a) ``` cmd: `njs poc.js` Stack dump: ``` =====================================...
heap-use-after-free in njs_json_parse_iterator_call
https://api.github.com/repos/nginx/njs/issues/325/comments
1
2020-06-28T18:40:42Z
2020-10-06T17:02:21Z
https://github.com/nginx/njs/issues/325
646,981,993
325
CVE-2020-24347
2020-08-13T19:15:13.943
njs through 0.4.3, used in NGINX, has an out-of-bounds read in njs_lvlhsh_level_find in njs_lvlhsh.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/323" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netap...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "1171CB43-C37C-4242-AD28-A8B94D288BE3", "versionEndExcluding": null, "versionEndIncluding": "0.4.3", "versionStartExcluding": null...
https://github.com/nginx/njs/issues/323
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
Version:`0.4.2`, git commit `32a70c899c1f136fbc3f97fcc050d59e0bd8c6a5` POC: ```javascript var once = false ; var a = 1 ; function f ( ) { if ( this [ 8 ] = new Uint32Array ( this , this [ 8 ] , ) ) { a = new Array ( new Uint32Array ( a = new Array ( Array , 3 ) ) , { } , new ArrayBuffer ( this [ 8 ] ) , 2 , ...
Segfault in njs_lvlhsh_bucket_find
https://api.github.com/repos/nginx/njs/issues/323/comments
0
2020-06-27T19:58:35Z
2020-10-06T16:55:13Z
https://github.com/nginx/njs/issues/323
646,750,520
323
CVE-2020-24348
2020-08-13T19:15:14.003
njs through 0.4.3, used in NGINX, has an out-of-bounds read in njs_json_stringify_iterator in njs_json.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/322" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netap...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "1171CB43-C37C-4242-AD28-A8B94D288BE3", "versionEndExcluding": null, "versionEndIncluding": "0.4.3", "versionStartExcluding": null...
https://github.com/nginx/njs/issues/322
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
Version:`0.4.2`, git commit `32a70c899c1f136fbc3f97fcc050d59e0bd8c6a5` POC: ```javascript var array = []; var funky; funky = { get value() { array[10000000] = 12; } }; for (var i = 0; i < 10; i++) array[i] = i; array[3] = funky; '' == JSON.stringify(array); ``` cmd: `njs poc.js` Stack dump: ```...
Segfault in njs_json_stringify_iterator
https://api.github.com/repos/nginx/njs/issues/322/comments
0
2020-06-27T19:55:59Z
2020-10-06T17:53:12Z
https://github.com/nginx/njs/issues/322
646,750,084
322
CVE-2020-24349
2020-08-13T19:15:14.050
njs through 0.4.3, used in NGINX, allows control-flow hijack in njs_value_property in njs_value.c. NOTE: the vendor considers the issue to be "fluff" in the NGINX use case because there is no remote attack surface.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/416.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "1171CB43-C37C-4242-AD28-A8B94D288BE3", "versionEndExcluding": null, "versionEndIncluding": "0.4.3", "versionStartExcluding": null...
https://github.com/nginx/njs/issues/324
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
Version:`0.4.2`, git commit `32a70c899c1f136fbc3f97fcc050d59e0bd8c6a5` This bug is likely exploitable. POC: ```javascript function a() { new Uint32Array(this[8] = a) return Array } JSON.parse("[1, 2, []]", a) ``` cmd: `njs poc.js` Stack dump: ``` #0 0x0000623000000cc0 in ?? () #1 0x000000000...
Control flow hijack in njs_value_property
https://api.github.com/repos/nginx/njs/issues/324/comments
5
2020-06-27T20:07:39Z
2020-10-06T16:56:40Z
https://github.com/nginx/njs/issues/324
646,752,255
324
CVE-2020-10283
2020-08-20T09:15:11.140
The Micro Air Vehicle Link (MAVLink) protocol presents authentication mechanisms on its version 2.0 however according to its documentation, in order to maintain backwards compatibility, GCS and autopilot negotiate the version via the AUTOPILOT_VERSION message. Since this negotiation depends on the answer, an attacker m...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/3316" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dronecode:micro_air_vehicle_link:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F56CC677-E829-48A5-B01B-9B33F13C084B", "versionEndExcluding": null, "versionEndIncluding": null, "v...
https://github.com/aliasrobotics/RVD/issues/3316
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 3316 title: 'RVD#3316: No authentication in MAVLink protocol' type: vulnerability description: The Micro Air Vehicle Link (MAVLink) protocol presents no authentication mechanism on its version 1.0 (nor authorization) whichs leads to a variety of attacks including identity spoofing, unauthorized a...
RVD#3316: No authentication in MAVLink protocol
https://api.github.com/repos/aliasrobotics/RVD/issues/3316/comments
22
2020-06-30T17:20:40Z
2021-11-04T16:22:48Z
https://github.com/aliasrobotics/RVD/issues/3316
648,358,479
3,316
CVE-2020-10290
2020-08-21T15:15:12.540
Universal Robots controller execute URCaps (zip files containing Java-powered applications) without any permission restrictions and a wide API that presents many primitives that can compromise the overall robot operations as demonstrated in our video. In our PoC we demonstrate how a malicious actor could 'cook' a custo...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE",...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/1495" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sintef:urx:-:*:*:*:*:*:*:*", "matchCriteriaId": "D90D07FA-3643-4EBD-A0B3-7A5915E5216B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nul...
https://github.com/aliasrobotics/RVD/issues/1495
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 1495 title: 'RVD#1495: Universal Robots URCaps execute with unbounded privileges' type: vulnerability description: Universal Robots controller execute URCaps (zip files containing Java-powered applications) without any permission restrictions and a wide API that presents many primitives that can c...
RVD#1495: Universal Robots URCaps execute with unbounded privileges
https://api.github.com/repos/aliasrobotics/RVD/issues/1495/comments
2
2020-04-03T15:49:12Z
2020-08-21T15:02:32Z
https://github.com/aliasrobotics/RVD/issues/1495
593,476,197
1,495
CVE-2020-24616
2020-08-25T18:15:11.133
FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource (aka Anteros-DBCP).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2814" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "8395437B-348F-4291-B79B-2794C1A0B560", "versionEndExcluding": "2.9.10.6", "versionEndIncluding": null, "versi...
https://github.com/FasterXML/jackson-databind/issues/2814
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding class(es) of `br.com.anteros:Anteros-DBCP` library. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-24616 Reporter(s): ChenZhaojun (Security Team of Aliba...
Block one more gadget type (Anteros-DBCP, CVE-2020-24616)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2814/comments
2
2020-08-11T02:05:43Z
2020-12-02T03:57:22Z
https://github.com/FasterXML/jackson-databind/issues/2814
676,524,402
2,814
CVE-2020-16197
2020-08-25T19:15:12.500
An issue was discovered in Octopus Deploy 3.4. A deployment target can be configured with an Account or Certificate that is outside the scope of the deployment target. An authorised user can potentially use a certificate that they are not in scope to use. An authorised user is also able to obtain certificate metadata b...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6529" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6530" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_server:3.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "9A1A66B5-9F14-49CE-95D6-A64A6D4EDE72", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
https://github.com/OctopusDeploy/Issues/issues/6529
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
[CVE-2020-16197](https://nvd.nist.gov/vuln/detail/CVE-2020-16197) ## Description A credential scoped to one tenant could be used to affect another tenant in certain circumstances. Effectively, the logic was previously, "A credential may be used to access this target if it is applicable to any tenant on this ta...
Certificates and accounts associated with tenanted deployment targets are not validated
https://api.github.com/repos/OctopusDeploy/Issues/issues/6529/comments
0
2020-08-23T12:21:15Z
2022-01-19T01:01:09Z
https://github.com/OctopusDeploy/Issues/issues/6529
684,173,453
6,529
CVE-2020-16197
2020-08-25T19:15:12.500
An issue was discovered in Octopus Deploy 3.4. A deployment target can be configured with an Account or Certificate that is outside the scope of the deployment target. An authorised user can potentially use a certificate that they are not in scope to use. An authorised user is also able to obtain certificate metadata b...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6529" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6530" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_server:3.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "9A1A66B5-9F14-49CE-95D6-A64A6D4EDE72", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
https://github.com/OctopusDeploy/Issues/issues/6530
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
This is the 2020.2.18 version of https://github.com/OctopusDeploy/Issues/issues/6529 [CVE-2020-16197](https://nvd.nist.gov/vuln/detail/CVE-2020-16197) ## Description A credential scoped to one tenant could be used to affect another tenant in certain circumstances. Effectively, the logic was previously, "A c...
Certificates and accounts associated with tenanted deployment targets are not validated
https://api.github.com/repos/OctopusDeploy/Issues/issues/6530/comments
0
2020-08-23T12:30:12Z
2022-01-19T01:01:57Z
https://github.com/OctopusDeploy/Issues/issues/6530
684,174,811
6,530
CVE-2020-16197
2020-08-25T19:15:12.500
An issue was discovered in Octopus Deploy 3.4. A deployment target can be configured with an Account or Certificate that is outside the scope of the deployment target. An authorised user can potentially use a certificate that they are not in scope to use. An authorised user is also able to obtain certificate metadata b...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6529" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6530" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_server:3.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "9A1A66B5-9F14-49CE-95D6-A64A6D4EDE72", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
https://github.com/OctopusDeploy/Issues/issues/6531
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
This is the 2020.1.22 version of https://github.com/OctopusDeploy/Issues/issues/6529 [CVE-2020-16197](https://nvd.nist.gov/vuln/detail/CVE-2020-16197) ## Description A credential scoped to one tenant could be used to affect another tenant in certain circumstances. Effectively, the logic was previously, "A c...
Certificates and accounts associated with tenanted deployment targets are not validated
https://api.github.com/repos/OctopusDeploy/Issues/issues/6531/comments
0
2020-08-23T12:31:17Z
2020-08-26T22:46:20Z
https://github.com/OctopusDeploy/Issues/issues/6531
684,174,965
6,531
CVE-2020-19007
2020-08-26T14:15:10.637
Halo blog 1.2.0 allows users to submit comments on blog posts via /api/content/posts/comments. The javascript code supplied by the attacker will then execute in the victim user's browser.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/547" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "DB3E9501-E452-4B2A-AD4A-D803C8A9C40C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/halo-dev/halo/issues/547
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
<!-- 你好!感谢你正在考虑为 Halo 提交一个 bug。请花一点点时间尽量详细地回答以下基础问题。 谢谢! --> <!-- 请确认你已经做了下面这些事情,若 bug 还是未解决,那么请尽可详细地描述你的问题。 - 我已经安装了最新版的 Halo - 我已经搜索了已有的 Issues 列表中有关的信息 - 我已经搜索了论坛中有关的信息:https://bbs.halo.run - 我已经阅读了 Halo 的 FAQ:https://halo.run/archives/other-faq --> ## Environment Server Version:1....
Stored xss on Halo blog
https://api.github.com/repos/halo-dev/halo/issues/547/comments
2
2020-02-08T08:43:59Z
2020-03-16T09:15:11Z
https://github.com/halo-dev/halo/issues/547
561,990,601
547
CVE-2020-24566
2020-09-09T16:15:11.923
In Octopus Deploy 2020.3.x before 2020.3.4 and 2020.4.x before 2020.4.1, if an authenticated user creates a deployment or runbook process using Azure steps and sets the step's execution location to run on the server/worker, then (under certain circumstances) the account password is exposed in cleartext in the verbose t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6563" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6564" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBE2EA3F-968A-4528-A3C3-0FE92A4DB9DE", "versionEndExcluding": "2020.3.4", "versionEndIncluding": null, "versionSt...
https://github.com/OctopusDeploy/Issues/issues/6563
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
## Description <!-- Take the time to figure out a description for disclosure which gives customers enough detail to understand if they will be affected or not, without disclosing how to exploit the vulnerability to bad actors. --> A regression was introduced that caused certain passwords to be written to the depl...
Passwords written to deployment log in plain-text
https://api.github.com/repos/OctopusDeploy/Issues/issues/6563/comments
1
2020-09-08T03:28:35Z
2020-09-10T06:08:43Z
https://github.com/OctopusDeploy/Issues/issues/6563
695,516,197
6,563
CVE-2020-24566
2020-09-09T16:15:11.923
In Octopus Deploy 2020.3.x before 2020.3.4 and 2020.4.x before 2020.4.1, if an authenticated user creates a deployment or runbook process using Azure steps and sets the step's execution location to run on the server/worker, then (under certain circumstances) the account password is exposed in cleartext in the verbose t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6563" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6564" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBE2EA3F-968A-4528-A3C3-0FE92A4DB9DE", "versionEndExcluding": "2020.3.4", "versionEndIncluding": null, "versionSt...
https://github.com/OctopusDeploy/Issues/issues/6564
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
#6563 also affected `2020.3`. The fix has been shipped in the patch indicated by the milestone. If you are using `2020.3` we highly recommend applying this patch. Learn about [Releases of Octopus Deploy Server](https://g.octopushq.com/longtermsupport).
Passwords written to deployment log in plain-text
https://api.github.com/repos/OctopusDeploy/Issues/issues/6564/comments
1
2020-09-08T03:44:23Z
2020-09-10T06:08:53Z
https://github.com/OctopusDeploy/Issues/issues/6564
695,521,561
6,564
CVE-2020-24750
2020-09-17T19:15:13.580
FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/commit/ad5a630174f08d279504bc51ebba8772fd71b86b" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "4892ABAA-57A0-43D3-965C-2D7F4A8A6024", "versionEndExcluding": "2.6.7.5", "versionEndIncluding": null, "versio...
https://github.com/FasterXML/jackson-databind/issues/2798
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding class(es) of `com.pastdev.httpcomponents:configuration`. library. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-24750 Reporter(s): Al1ex@knownsec Fix ...
Block one more gadget type (com.pastdev.httpcomponents, CVE-2020-24750)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2798/comments
2
2020-07-16T17:25:52Z
2021-06-22T04:03:19Z
https://github.com/FasterXML/jackson-databind/issues/2798
658,400,094
2,798
CVE-2020-13991
2020-09-24T23:15:13.540
vm/opcodes.c in JerryScript 2.2.0 allows attackers to hijack the flow of control by controlling a register.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/googleprojectzero/fuzzilli#JerryScript" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerr...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/3858
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision c09c2c5dd7144d97b8b32cc2697d5b04bb647e35 ###### Build platform Ubuntu 18.04 LTS ###### Build steps python tools/build.py --profile=es2015-subset --lto=off --error-messages=on --strip=off --compile-flag=-fsanitize=address ###### Test case ``` function main() { const v1 = ~21474...
SEGV in ecma_deref_ecma_string
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3858/comments
0
2020-06-05T03:38:44Z
2020-06-06T16:39:42Z
https://github.com/jerryscript-project/jerryscript/issues/3858
631,287,137
3,858
CVE-2020-13991
2020-09-24T23:15:13.540
vm/opcodes.c in JerryScript 2.2.0 allows attackers to hijack the flow of control by controlling a register.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/googleprojectzero/fuzzilli#JerryScript" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerr...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/3859
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision c09c2c5dd7144d97b8b32cc2697d5b04bb647e35 ###### Build platform Ubuntu 18.04 LTS ###### Build steps python tools/build.py --profile=es2015-subset --lto=off --error-messages=on --strip=off --compile-flag=-fsanitize=address ###### Test case ``` function main() { const v3 = {a:13....
SEGV in jmem_pools_finalize
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3859/comments
0
2020-06-05T03:41:34Z
2020-06-06T16:39:42Z
https://github.com/jerryscript-project/jerryscript/issues/3859
631,287,983
3,859
CVE-2020-13991
2020-09-24T23:15:13.540
vm/opcodes.c in JerryScript 2.2.0 allows attackers to hijack the flow of control by controlling a register.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/googleprojectzero/fuzzilli#JerryScript" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerr...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/3860
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision c09c2c5dd7144d97b8b32cc2697d5b04bb647e35 ###### Build platform Ubuntu 18.04 LTS ###### Build steps python tools/build.py --profile=es2015-subset --lto=off --error-messages=on --strip=off --compile-flag=-fsanitize=address ###### Test case ``` function main() { const v4 = [13.37...
SIGABRT in jerry_port_fatal
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3860/comments
3
2020-06-05T03:46:21Z
2020-06-06T16:39:41Z
https://github.com/jerryscript-project/jerryscript/issues/3860
631,289,340
3,860
CVE-2020-21522
2020-09-30T18:15:23.880
An issue was discovered in halo V1.1.3. A Zip Slip Directory Traversal Vulnerability in the backend,the attacker can overwrite some files, such as ftl files, .bashrc files in the user directory, and finally get the permissions of the operating system.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/418" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "6AAE0537-C39F-4121-AA74-28235A4DC07A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/halo-dev/halo/issues/418
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
<!-- 如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。 提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way --> **I am sure I have checked** - [x] [Halo User Guide Documentation ](https://halo.run/docs) - [x] [Halo BBS](https://bbs.halo.run) - [x] [Github Wiki ](https://github.com/halo-dev/halo/wiki/4....
A Zip Slip Directory Traversal Vulnerability in the backend
https://api.github.com/repos/halo-dev/halo/issues/418/comments
0
2019-12-11T10:35:33Z
2019-12-12T16:19:06Z
https://github.com/halo-dev/halo/issues/418
536,283,129
418
CVE-2020-21524
2020-09-30T18:15:24.023
There is a XML external entity (XXE) vulnerability in halo v1.1.3, The function of importing other blogs in the background(/api/admin/migrations/wordpress) needs to parse the xml file, but it is not used for security defense, This vulnerability can detect the intranet, read files, enable ddos attacks, etc. exp:https://...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/423" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:1.1.3:-:*:*:*:*:*:*", "matchCriteriaId": "1CB4664A-F423-4172-B79D-C082E4DDBC76", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/halo-dev/halo/issues/423
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
<!-- 如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。 提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way --> **I am sure I have checked** - [x] [Halo User Guide Documentation ](https://halo.run/docs) - [x] [Halo BBS](https://bbs.halo.run) - [x] [Github Wiki ](https://github.com/halo-dev/halo/wiki/4....
A XML external entity (XXE) vulnerability in the backend
https://api.github.com/repos/halo-dev/halo/issues/423/comments
1
2019-12-11T11:44:59Z
2019-12-12T17:08:25Z
https://github.com/halo-dev/halo/issues/423
536,318,212
423
CVE-2020-21525
2020-09-30T18:15:24.083
Halo V1.1.3 is affected by: Arbitrary File reading. In an interface that reads files in halo v1.1.3, a directory traversal check is performed on the input path parameter, but the startsWith function can be used to bypass it.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/420" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "6AAE0537-C39F-4121-AA74-28235A4DC07A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/halo-dev/halo/issues/420
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
<!-- 如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。 提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way --> **I am sure I have checked** - [x] [Halo User Guide Documentation ](https://halo.run/docs) - [x] [Halo BBS](https://bbs.halo.run) - [x] [Github Wiki ](https://github.com/halo-dev/halo/wiki/4.-%...
An Arbitrary File reading vulnerability in the backend(bypass the Path check)
https://api.github.com/repos/halo-dev/halo/issues/420/comments
1
2019-12-11T10:52:58Z
2019-12-12T17:13:17Z
https://github.com/halo-dev/halo/issues/420
536,292,011
420
CVE-2020-21526
2020-09-30T18:15:24.163
An Arbitrary file writing vulnerability in halo v1.1.3. In an interface to write files in the background, a directory traversal check is performed on the input path parameter, but the startsWith function can be used to bypass it.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/421" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "6AAE0537-C39F-4121-AA74-28235A4DC07A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/halo-dev/halo/issues/421
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
<!-- 如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。 提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way --> **I am sure I have checked** - [x] [Halo User Guide Documentation ](https://halo.run/docs) - [x] [Halo BBS](https://bbs.halo.run) - [x] [Github Wiki ](https://github.com/halo-dev/halo/wiki/4.-%...
An Arbitrary file writing vulnerability in the backend
https://api.github.com/repos/halo-dev/halo/issues/421/comments
0
2019-12-11T11:00:30Z
2019-12-12T16:21:37Z
https://github.com/halo-dev/halo/issues/421
536,295,949
421
CVE-2020-21527
2020-09-30T18:15:24.227
There is an Arbitrary file deletion vulnerability in halo v1.1.3. A backup function in the background allows a user, when deleting their backup files, to delete any files on the system through directory traversal.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "NONE",...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/422" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "6AAE0537-C39F-4121-AA74-28235A4DC07A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/halo-dev/halo/issues/422
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
<!-- 如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。 提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way --> **I am sure I have checked** - [x] [Halo User Guide Documentation ](https://halo.run/docs) - [x] [Halo BBS](https://bbs.halo.run) - [x] [Github Wiki ](https://github.com/halo-dev/halo/wiki/4.-%...
An Arbitrary file deletion vulnerability in the backend
https://api.github.com/repos/halo-dev/halo/issues/422/comments
0
2019-12-11T11:06:14Z
2019-12-12T16:32:49Z
https://github.com/halo-dev/halo/issues/422
536,298,956
422
CVE-2020-21564
2020-09-30T18:15:24.303
An issue was discovered in Pluck CMS 4.7.10-dev2 and 4.7.11. There is a file upload vulnerability that can cause a remote command execution via admin.php?action=files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pluck-cms/pluck/issues/83" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.10:dev2:*:*:*:*:*:*", "matchCriteriaId": "960CA1A9-1510-488A-82C2-14AFA3AF7FBE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
https://github.com/pluck-cms/pluck/issues/83
[ "Exploit", "Third Party Advisory" ]
github.com
[ "pluck-cms", "pluck" ]
Vulnerability location: /data/inc/file.php line:42 ![image](https://user-images.githubusercontent.com/55877767/67195146-04a1e280-f42b-11e9-9b70-023bde63d1a7.png) If the file name is '.htaccess', the strpos function returns a result of 0. Demo: Upload these two files in the management file interface. ![image](http...
Pluck-4.7.10-dev2 admin background exists a remote command execution vulnerability in the management file interface.
https://api.github.com/repos/pluck-cms/pluck/issues/83/comments
5
2019-10-21T09:08:10Z
2020-05-01T07:25:08Z
https://github.com/pluck-cms/pluck/issues/83
509,831,136
83
CVE-2020-21564
2020-09-30T18:15:24.303
An issue was discovered in Pluck CMS 4.7.10-dev2 and 4.7.11. There is a file upload vulnerability that can cause a remote command execution via admin.php?action=files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pluck-cms/pluck/issues/83" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.10:dev2:*:*:*:*:*:*", "matchCriteriaId": "960CA1A9-1510-488A-82C2-14AFA3AF7FBE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
https://github.com/pluck-cms/pluck/issues/91
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pluck-cms", "pluck" ]
Pluck-4.7.11 admin background exists a remote command execution vulnerability when uploading files Proof step1: login -> pages -> manage files upload .htaccess file to turn files/.htaccess to .htaccess.txt ![图片](https://user-images.githubusercontent.com/48854942/71186014-6cec3380-22b7-11ea-9557-3e257ec201ae.png) ...
Pluck-4.7.11 admin background exists a remote command execution vulnerability when uploading files
https://api.github.com/repos/pluck-cms/pluck/issues/91/comments
10
2019-12-19T15:37:06Z
2020-01-08T06:45:09Z
https://github.com/pluck-cms/pluck/issues/91
540,390,005
91
CVE-2020-18190
2020-10-02T14:15:12.657
Bludit v3.8.1 is affected by directory traversal. Remote attackers are able to delete arbitrary files via /admin/ajax/upload-profile-picture.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bludit/bludit/issues/978" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "20051CC0-35E9-4FC7-ABE1-BC02C7CF7656", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
https://github.com/bludit/bludit/issues/978
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "bludit", "bludit" ]
Hi There. I found Bludit v3.8.1 allows remote attackers to delete arbitrary files via /admin/ajax/upload-profile-picture. payload: ``` POST /bludit-3-8-1/admin/ajax/upload-profile-picture HTTP/1.1 Host: 127.0.0.1 User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:61.0) Gecko/20100101 Firefox/61.0 Accept: ...
Arbitrary File Delete - Security
https://api.github.com/repos/bludit/bludit/issues/978/comments
3
2019-03-05T02:50:16Z
2019-03-29T13:49:45Z
https://github.com/bludit/bludit/issues/978
417,089,224
978
CVE-2020-26048
2020-10-05T15:15:12.170
The file manager option in CuppaCMS before 2019-11-12 allows an authenticated attacker to upload a malicious file within an image extension and through a custom request using the rename function provided by the file manager is able to modify the image extension into PHP resulting in remote arbitrary code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/7" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8ED1BEA-DDC5-4FB0-BD5B-B8BED225773A", "versionEndExcluding": "2019-11-12", "versionEndIncluding": null, "versionStart...
https://github.com/CuppaCMS/CuppaCMS/issues/7
[ "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
Affected software: CuppaCMS Type of vulnerability: Remote code execution Discovered by: Yosri Debaibi ## Description: The file manager option allows admin users to upload images to the application, the rename function could be altered by the users, An authenticated attacker is able to upload a malicious file...
Authenticated Remote code Execution
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/7/comments
5
2019-11-01T17:33:20Z
2020-12-10T09:56:08Z
https://github.com/CuppaCMS/CuppaCMS/issues/7
516,250,138
7
CVE-2020-25825
2020-10-12T17:15:12.437
In Octopus Deploy 3.1.0 to 2020.4.0, certain scripts can reveal sensitive information to the user in the task logs.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6604" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6605" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4C10C29-B76F-448A-8A47-5769053CD559", "versionEndExcluding": null, "versionEndIncluding": "2020.4.0", "versionSt...
https://github.com/OctopusDeploy/Issues/issues/6604
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
# Prerequisites - [x] We are ready to publicly disclose this vulnerability or exploit according to our [responsible disclosure process](https://octopushq.atlassian.net/wiki/spaces/IN/pages/2430143/Security+Disclosure+Policy). - [x] I have raised a CVE according to our [CVE process](https://octopushq.atlassian.net/w...
Bash scripts can reveal sensitive variable values
https://api.github.com/repos/OctopusDeploy/Issues/issues/6604/comments
1
2020-10-05T22:27:43Z
2020-10-05T22:39:22Z
https://github.com/OctopusDeploy/Issues/issues/6604
715,204,037
6,604
CVE-2020-25825
2020-10-12T17:15:12.437
In Octopus Deploy 3.1.0 to 2020.4.0, certain scripts can reveal sensitive information to the user in the task logs.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6604" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6605" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4C10C29-B76F-448A-8A47-5769053CD559", "versionEndExcluding": null, "versionEndIncluding": "2020.4.0", "versionSt...
https://github.com/OctopusDeploy/Issues/issues/6605
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
#6604 also affected `2020.4`. The fix has been shipped in the patch indicated by the milestone. If you are using `2020.4` we highly recommend applying this patch. Learn about [Releases of Octopus Deploy Server](https://g.octopushq.com/longtermsupport).
Bash scripts can reveal sensitive variable values
https://api.github.com/repos/OctopusDeploy/Issues/issues/6605/comments
1
2020-10-05T22:30:33Z
2021-01-22T03:19:44Z
https://github.com/OctopusDeploy/Issues/issues/6605
715,205,289
6,605
CVE-2020-25825
2020-10-12T17:15:12.437
In Octopus Deploy 3.1.0 to 2020.4.0, certain scripts can reveal sensitive information to the user in the task logs.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6604" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6605" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4C10C29-B76F-448A-8A47-5769053CD559", "versionEndExcluding": null, "versionEndIncluding": "2020.4.0", "versionSt...
https://github.com/OctopusDeploy/Issues/issues/6606
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
#6604 also affected `2020.3`. The fix has been shipped in the patch indicated by the milestone. If you are using `2020.3` we highly recommend applying this patch. Learn about [Releases of Octopus Deploy Server](https://g.octopushq.com/longtermsupport).
Bash scripts can reveal sensitive variable values
https://api.github.com/repos/OctopusDeploy/Issues/issues/6606/comments
1
2020-10-05T22:32:55Z
2021-01-22T03:22:16Z
https://github.com/OctopusDeploy/Issues/issues/6606
715,206,405
6,606
CVE-2020-25825
2020-10-12T17:15:12.437
In Octopus Deploy 3.1.0 to 2020.4.0, certain scripts can reveal sensitive information to the user in the task logs.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6604" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6605" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4C10C29-B76F-448A-8A47-5769053CD559", "versionEndExcluding": null, "versionEndIncluding": "2020.4.0", "versionSt...
https://github.com/OctopusDeploy/Issues/issues/6607
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
#6604 also affected `2020.2`. The fix has been shipped in the patch indicated by the milestone. If you are using `2020.2` we highly recommend applying this patch. Learn about [Releases of Octopus Deploy Server](https://g.octopushq.com/longtermsupport).
Bash scripts can reveal sensitive variable values
https://api.github.com/repos/OctopusDeploy/Issues/issues/6607/comments
1
2020-10-05T22:34:11Z
2021-01-22T04:39:29Z
https://github.com/OctopusDeploy/Issues/issues/6607
715,206,938
6,607
CVE-2020-24265
2020-10-19T15:15:13.847
An issue was discovered in tcpreplay tcpprep v4.3.3. There is a heap buffer overflow vulnerability in MemcmpInterceptorCommon() that can make tcpprep crash and cause a denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/appneta/tcpreplay/issues/616" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "B3327FA3-0901-443F-AA8A-1F077972DD5E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/appneta/tcpreplay/issues/616
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "appneta", "tcpreplay" ]
**What's the problem (or question)?** A heap buffer overflow with MemcmpInterceptorCommon() in the 4.3.3 version of tcpprep. ```ASAN report: ==74==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000032 at pc 0x000000432f16 bp 0x7ffe3a489250 sp 0x7ffe3a4889f8 READ of size 3 at 0x602000000032 thr...
[Bug]heap-buffer-overflow in tcpprep with MemcmpInterceptorCommon()
https://api.github.com/repos/appneta/tcpreplay/issues/616/comments
9
2020-07-30T07:46:09Z
2021-08-25T15:22:07Z
https://github.com/appneta/tcpreplay/issues/616
668,454,948
616
CVE-2020-24266
2020-10-19T15:15:13.927
An issue was discovered in tcpreplay tcpprep v4.3.3. There is a heap buffer overflow vulnerability in get_l2len() that can make tcpprep crash and cause a denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/appneta/tcpreplay/issues/617" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "B3327FA3-0901-443F-AA8A-1F077972DD5E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/appneta/tcpreplay/issues/617
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "appneta", "tcpreplay" ]
**Describe the bug** A heap buffer overflow found in tcpprep with get_l2len(). ASAN report: ``` ==83==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000034 at pc 0x0000004e1900 bp 0x7fffed14c660 sp 0x7fffed14c658 READ of size 2 at 0x602000000034 thread T0 #0 0x4e18ff in get_l2len /src/tcpr...
[Bug]heap buffer overflow in tcpprep with get_l2len()
https://api.github.com/repos/appneta/tcpreplay/issues/617/comments
3
2020-07-30T08:41:03Z
2021-08-25T15:21:01Z
https://github.com/appneta/tcpreplay/issues/617
668,498,490
617
CVE-2020-27155
2020-10-22T17:15:12.520
An issue was discovered in Octopus Deploy through 2020.4.4. If enabled, the websocket endpoint may allow an untrusted tentacle host to present itself as a trusted one.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6637" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*", "matchCriteriaId": "604AB1E6-C84D-420A-81FC-A5726F354F3E", "versionEndExcluding": null, "versionEndIncluding": "2020.4.4", "versionSt...
https://github.com/OctopusDeploy/Issues/issues/6637
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
# Prerequisites - [x] We are ready to publicly disclose this vulnerability or exploit according to our [responsible disclosure process](https://octopushq.atlassian.net/wiki/spaces/IN/pages/2430143/Security+Disclosure+Policy). - [x] I have raised a CVE according to our [CVE process](https://octopushq.atlassian.net/w...
WebSocket polling endpoint can allow untrusted connections
https://api.github.com/repos/OctopusDeploy/Issues/issues/6637/comments
1
2020-10-20T23:16:44Z
2020-10-20T23:57:59Z
https://github.com/OctopusDeploy/Issues/issues/6637
726,008,640
6,637
CVE-2020-27155
2020-10-22T17:15:12.520
An issue was discovered in Octopus Deploy through 2020.4.4. If enabled, the websocket endpoint may allow an untrusted tentacle host to present itself as a trusted one.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6637" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*", "matchCriteriaId": "604AB1E6-C84D-420A-81FC-A5726F354F3E", "versionEndExcluding": null, "versionEndIncluding": "2020.4.4", "versionSt...
https://github.com/OctopusDeploy/Issues/issues/6639
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
#6637 also affected `2020.4`. The fix has been shipped in the patch indicated by the milestone. If you are using `2020.4` we highly recommend applying this patch. Learn about [Releases of Octopus Deploy Server](https://g.octopushq.com/longtermsupport).
WebSocket polling endpoint can allow untrusted connections
https://api.github.com/repos/OctopusDeploy/Issues/issues/6639/comments
1
2020-10-20T23:49:24Z
2020-10-20T23:58:18Z
https://github.com/OctopusDeploy/Issues/issues/6639
726,020,579
6,639
CVE-2020-27155
2020-10-22T17:15:12.520
An issue was discovered in Octopus Deploy through 2020.4.4. If enabled, the websocket endpoint may allow an untrusted tentacle host to present itself as a trusted one.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6637" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*", "matchCriteriaId": "604AB1E6-C84D-420A-81FC-A5726F354F3E", "versionEndExcluding": null, "versionEndIncluding": "2020.4.4", "versionSt...
https://github.com/OctopusDeploy/Issues/issues/6640
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
#6637 also affected `2020.3`. The fix has been shipped in the patch indicated by the milestone. If you are using `2020.3` we highly recommend applying this patch. Learn about [Releases of Octopus Deploy Server](https://g.octopushq.com/longtermsupport).
WebSocket polling endpoint can allow untrusted connections
https://api.github.com/repos/OctopusDeploy/Issues/issues/6640/comments
1
2020-10-20T23:51:07Z
2020-10-20T23:56:07Z
https://github.com/OctopusDeploy/Issues/issues/6640
726,021,115
6,640
CVE-2020-26161
2020-10-26T18:15:14.667
In Octopus Deploy through 2020.4.2, an attacker could redirect users to an external site via a modified HTTP Host header.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6622" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*", "matchCriteriaId": "A73EF26C-489C-4970-811B-32DCE7E6844E", "versionEndExcluding": null, "versionEndIncluding": "2020.4.2", "versionSt...
https://github.com/OctopusDeploy/Issues/issues/6622
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
**_Are you a customer of Octopus Deploy? Don't raise the issue here. Please contact [our security team](mailto:security@octopus.com) so we can triage your report, making sure it's handled appropriately._** # Prerequisites - [x] We are ready to publicly disclose this vulnerability or exploit according to our [resp...
Self-hosted Octopus susceptible to host-header injection attacks
https://api.github.com/repos/OctopusDeploy/Issues/issues/6622/comments
3
2020-10-11T22:50:29Z
2021-01-22T04:38:18Z
https://github.com/OctopusDeploy/Issues/issues/6622
718,943,960
6,622
CVE-2020-26161
2020-10-26T18:15:14.667
In Octopus Deploy through 2020.4.2, an attacker could redirect users to an external site via a modified HTTP Host header.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6622" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*", "matchCriteriaId": "A73EF26C-489C-4970-811B-32DCE7E6844E", "versionEndExcluding": null, "versionEndIncluding": "2020.4.2", "versionSt...
https://github.com/OctopusDeploy/Issues/issues/6627
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
**_Are you a customer of Octopus Deploy? Don't raise the issue here. Please contact [our security team](mailto:security@octopus.com) so we can triage your report, making sure it's handled appropriately._** # Prerequisites - [x] We are ready to publicly disclose this vulnerability or exploit according to our [resp...
Self-hosted Octopus susceptible to host-header injection attacks
https://api.github.com/repos/OctopusDeploy/Issues/issues/6627/comments
1
2020-10-13T21:49:42Z
2020-10-13T21:50:09Z
https://github.com/OctopusDeploy/Issues/issues/6627
720,885,553
6,627
CVE-2020-10291
2020-11-06T12:15:11.633
Visual Components (owned by KUKA) is a robotic simulator that allows simulating factories and robots in order toimprove planning and decision-making processes. Visual Components software requires a special license which can beobtained from a network license server. The network license server binds to all interfaces (0....
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/3336" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kuka:visual_components_network_license_server:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "37AF9A3F-EDE2-4943-B441-F32E1669B48A", "versionEndExcluding": null, "versionEndIncluding": null, ...
https://github.com/aliasrobotics/RVD/issues/3336
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 3336 title: 'RVD#3336: System information disclosure without authentication on KUKA simulators' type: vulnerability description: "Visual Components (owned by KUKA) is a robotic simulator that allows simulating factories and robots in order toimprove planning and decision-making processes. Visual Compone...
RVD#3336: System information disclosure without authentication on KUKA simulators
https://api.github.com/repos/aliasrobotics/RVD/issues/3336/comments
0
2020-11-06T09:25:26Z
2020-11-06T11:12:00Z
https://github.com/aliasrobotics/RVD/issues/3336
737,607,249
3,336
CVE-2020-25706
2020-11-12T14:15:22.970
A cross-site scripting (XSS) vulnerability exists in templates_import.php (Cacti 1.2.13) due to Improper escaping of error message during template import preview in the xml_path field
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25706" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advis...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cacti:cacti:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "77AFE7F3-A74A-43C1-AD56-A247F5AD00E2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/Cacti/cacti/issues/3723
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Cacti", "cacti" ]
the XSS issue has been found on templates_import.php (Cacti 1.2.13). The vulnerability could be exploited by an attacker by forcing a user to upload a file with a "name" or "xml_path" containing client-side code ![12](https://user-images.githubusercontent.com/35767652/88395674-06eb0000-cdf4-11ea-9e03-60a134ffb461.p...
Improper escaping of error message leads to XSS during template import preview
https://api.github.com/repos/Cacti/cacti/issues/3723/comments
1
2020-07-24T13:25:27Z
2020-10-31T00:03:49Z
https://github.com/Cacti/cacti/issues/3723
665,167,449
3,723
CVE-2020-22394
2020-11-19T18:15:14.757
In YzmCMS v5.5 the member contribution function in the editor contains a cross-site scripting (XSS) vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/42" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yzmcms:yzmcms:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "FF8F8058-3DAF-474C-9F13-6080D6023FD5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/yzmcms/yzmcms/issues/42
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yzmcms", "yzmcms" ]
会员投稿功能,使用如下payload即可造成xss `<img+src%3d1+onpointerout%3dalert(1)>` 直接在请求包的content中加上payload,等待审核通过即可。当鼠标滑过图片然后又划出的时候即触发xss ![](https://s2.ax1x.com/2020/03/04/3oQZ4J.jpg) 我在官方演示站投稿了一个文章,id=104,请确认。 ----- Member submission function, using the following payload can cause xss `<img+src%3d1+onpointerout%3dalert(1)>`...
XSS vulnerability exists in member submission function
https://api.github.com/repos/yzmcms/yzmcms/issues/42/comments
1
2020-03-04T11:56:13Z
2020-03-05T07:53:19Z
https://github.com/yzmcms/yzmcms/issues/42
575,343,692
42
CVE-2020-19667
2020-11-20T16:15:15.557
Stack-based buffer overflow and unconditional jump in ReadXPMImage in coders/xpm.c in ImageMagick 7.0.10-7.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1895" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.10-7:*:*:*:*:*:*:*", "matchCriteriaId": "A6D172B4-41A4-4E14-A094-EEBBAB83ECAF", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/ImageMagick/ImageMagick/issues/1895
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [✅ ] I have written a descriptive issue title - [ ✅] I have verified that I am using the latest version of ImageMagick - [ ✅] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues...
stack-buffer-overflow at /coders/xpm.c:232 in ReadXPMImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1895/comments
9
2020-04-14T10:46:31Z
2020-11-30T07:10:48Z
https://github.com/ImageMagick/ImageMagick/issues/1895
599,474,018
1,895
CVE-2020-19668
2020-11-20T16:15:15.620
Unverified indexs into the array lead to out of bound access in the gif_out_code function in fromgif.c in libsixel 1.8.6.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/136" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "D78CB59C-7966-46E3-A325-A7508F0ED51D", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
https://github.com/saitoha/libsixel/issues/136
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
run_cmd `img2sixel -8 array_overflow` [poc](https://github.com/minghangshen/bug_poc/blob/master/libsixel/poc) the asan log ``` ASAN:DEADLYSIGNAL ================================================================= ==21151==ERROR: AddressSanitizer: SEGV on unknown address 0x10007fffb228 (pc 0x7ffff6bb5a03 bp...
Unverified indexs into the array lead to out of bound access in fromgif.c:283
https://api.github.com/repos/saitoha/libsixel/issues/136/comments
4
2020-04-15T10:14:08Z
2021-06-09T13:33:43Z
https://github.com/saitoha/libsixel/issues/136
600,183,617
136
CVE-2020-25649
2020-12-03T17:15:12.503
A flaw was found in FasterXML Jackson Databind, where it did not have entity expansion secured properly. This flaw allows vulnerability to XML external entity (XXE) attacks. The highest threat from this vulnerability is data integrity.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1887664" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C23395F-4438-4B80-9DA6-87E760F7459A", "versionEndExcluding": "2.6.7.4", "versionEndIncluding": null, "versio...
https://github.com/FasterXML/jackson-databind/issues/2589
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
As per description: https://github.com/FasterXML/jackson-databind/blob/master/src/main/java/com/fasterxml/jackson/databind/ext/DOMDeserializer.java#L30 and https://github.com/FasterXML/jackson-databind/blob/master/src/main/java/com/fasterxml/jackson/databind/ext/DOMDeserializer.java#L33 is not enough to stop expa...
`DOMDeserializer`: setExpandEntityReferences(false) may not prevent external entity expansion in all cases [CVE-2020-25649]
https://api.github.com/repos/FasterXML/jackson-databind/issues/2589/comments
22
2020-01-09T09:23:57Z
2021-04-06T19:58:08Z
https://github.com/FasterXML/jackson-databind/issues/2589
547,352,044
2,589