cve_id
stringlengths
13
16
cve_published
stringlengths
23
23
cve_descriptions
stringlengths
54
997
cve_metrics
dict
cve_references
listlengths
1
68
cve_configurations
listlengths
1
5
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
76 values
url
stringlengths
37
79
cve_tags
listlengths
1
4
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
3
88.6k
issue_title
stringlengths
3
335
issue_comments_url
stringlengths
56
81
issue_comments_count
int64
0
146
issue_created_at
stringlengths
20
20
issue_updated_at
stringlengths
20
20
issue_html_url
stringlengths
37
62
issue_github_id
int64
128M
2.84B
issue_number
int64
1
128k
CVE-2023-49993
2023-12-12T14:15:07.700
Espeak-ng 1.52-dev was discovered to contain a Buffer Overflow via the function ReadClause at readclause.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/espeak-ng/espeak-ng/issues/1826" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:espeak-ng:espeak-ng:1.52:dev:*:*:*:*:*:*", "matchCriteriaId": "B073B0F6-3979-4E7D-BF6F-29C9EB1F3480", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ "120" ]
120
https://github.com/espeak-ng/espeak-ng/issues/1826
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "espeak-ng", "espeak-ng" ]
**System info** Ubuntu x86_64, clang 12.0 version: espeak-ng(1.52-dev) **Command line** ./espeak-ng -f poc -w /dev/null **Poc** poc:[poc](https://github.com/SEU-SSL/Poc/blob/main/espeak-ng/id_000205%2Csig_11%2Csrc_013749%2Cop_havoc%2Crep_4) **AddressSanitizer output** ==4070638==ERROR: AddressSanitizer: g...
global-buffer-overflow exists in the function ReadClause in readclause.c
https://api.github.com/repos/espeak-ng/espeak-ng/issues/1826/comments
1
2023-11-13T03:35:17Z
2023-12-17T12:53:10Z
https://github.com/espeak-ng/espeak-ng/issues/1826
1,989,826,100
1,826
CVE-2023-49994
2023-12-12T14:15:07.750
Espeak-ng 1.52-dev was discovered to contain a Floating Point Exception via the function PeaksToHarmspect at wavegen.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/espeak-ng/espeak-ng/issues/1823" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:espeak-ng:espeak-ng:1.52:dev:*:*:*:*:*:*", "matchCriteriaId": "B073B0F6-3979-4E7D-BF6F-29C9EB1F3480", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ "697" ]
697
https://github.com/espeak-ng/espeak-ng/issues/1823
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "espeak-ng", "espeak-ng" ]
**System info** Ubuntu x86_64, clang 12.0 version: espeak-ng(1.52-dev) **Command line** ./espeak-ng -f poc -w /dev/null **Poc** poc:[poc](https://github.com/SEU-SSL/Poc/blob/main/espeak-ng/id_000000%2Csig_08%2Csrc_003156%2B002428%2Cop_splice%2Crep_32) **AddressSanitizer output** ==4069818==ERROR: AddressS...
Floating Point Exception exists in the function PeaksToHarmspect in wavegen.c
https://api.github.com/repos/espeak-ng/espeak-ng/issues/1823/comments
1
2023-11-13T03:23:53Z
2023-12-17T12:29:31Z
https://github.com/espeak-ng/espeak-ng/issues/1823
1,989,816,339
1,823
CVE-2023-6772
2023-12-13T19:15:08.513
A vulnerability, which was classified as critical, was found in OTCMS 7.01. Affected is an unknown function of the file /admin/ind_backstage.php. The manipulation of the argument sqlContent leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PAR...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Num-Nine/CVE/issues/8" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ],...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:otcms:otcms:7.01:*:*:*:*:*:*:*", "matchCriteriaId": "18E47DA7-DFAF-4D23-A3F5-3C1631975FA1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding":...
[ "89" ]
89
https://github.com/Num-Nine/CVE/issues/8
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Num-Nine", "CVE" ]
1.Official website:http://otcms.com/ 2.Hole location: /admin/ind_backstage.php 3.Log in to the background and send the packet as follows POST /admin/sysCheckFile_deal.php?mudi=sql HTTP/1.1 Host: otcms.com User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0...
sql injection exists in otcmsV7.01
https://api.github.com/repos/QianGeG/CVE/issues/8/comments
0
2023-12-11T09:51:15Z
2023-12-11T09:51:15Z
https://github.com/QianGeG/CVE/issues/8
2,035,266,663
8
CVE-2023-50566
2023-12-14T15:15:10.460
A stored cross-site scripting (XSS) vulnerability in EyouCMS-V1.6.5-UTF8-SP1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Public Security Registration Number parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/56" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.5-utf8-sp1:*:*:*:*:*:*:*", "matchCriteriaId": "920C4179-21B4-4BEC-AC3C-8C7530C41B13", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "79" ]
79
https://github.com/weng-xianhu/eyoucms/issues/56
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
Version : V1.6.5 ![image](https://github.com/weng-xianhu/eyoucms/assets/92859218/ac2e0f3e-ae29-4847-bee5-ba5cdc9213ab) Vulnerability point 1: "基本信息"->"备案号"&“公安备案号”->"代码模式",HTML code can be edited directly: ![image](https://github.com/weng-xianhu/eyoucms/assets/92859218/b0ba7efa-fb46-439d-b188-43294602b112) ![ima...
EyouCMS-V1.6.5-UTF8-SP1 has a stored XSS vulnerability
https://api.github.com/repos/weng-xianhu/eyoucms/issues/56/comments
1
2023-12-08T08:39:23Z
2024-03-22T06:31:10Z
https://github.com/weng-xianhu/eyoucms/issues/56
2,032,215,326
56
CVE-2023-49006
2023-12-19T10:15:07.883
Cross Site Request Forgery (CSRF) vulnerability in Phpsysinfo version 3.4.3 allows a remote attacker to obtain sensitive information via a crafted page in the XML.php file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Hebing123/cve/issues/5" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/phpsysinfo/phpsysinfo/commit/4f2cee505e4f2e9b369a321063ff2c5e...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpsysinfo:phpsysinfo:3.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "E23F0F66-F333-46A3-97D0-044CB005C884", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "352" ]
352
https://github.com/Hebing123/cve/issues/5
[ "Exploit", "Issue Tracking" ]
github.com
[ "Hebing123", "cve" ]
### **Description** phpsysinfo v3.4.3 has JSONP vulnerability.The XML.php file has a JSONP hijacking vulnerability. When a user visits a page carefully crafted by the attacker, the JSON data is obtained and sent to the attacker. ### **Proof of Concept** We created an HTML file as a proof of concept to showcase the...
XML.php JSONP hijacking in phpsysinfo v3.4.3
https://api.github.com/repos/Hebing123/cve/issues/5/comments
1
2023-12-15T07:09:51Z
2024-03-11T06:23:33Z
https://github.com/Hebing123/cve/issues/5
2,043,028,601
5
CVE-2023-50044
2023-12-20T09:15:07.297
Cesanta MJS 2.20.0 has a getprop_builtin_foreign out-of-bounds read if a Built-in API name occurs in a substring of an input string.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/cesanta/mjs/issues/254" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/cesanta/mjs/pull/255" }, { "source": "af854a3a-2127-4...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "56AA92AF-E8DC-45C1-9BD0-9511720BD225", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "120" ]
120
https://github.com/cesanta/mjs/issues/254
[ "Exploit", "Issue Tracking" ]
github.com
[ "cesanta", "mjs" ]
## Environment Ubuntu 22.04.3 LTS ## Compiler clang version 11.0.0 Target: x86_64-unknown-linux-gnu Thread model: posix ## Affected Version mjs 2.20.0 ## Step to reproduce ```git clone https://github.com/cesanta/mjs.git cd mjs git checkout b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551 export LDFLAGS="-...
Segmentation Fault in getprop_builtin_foreign
https://api.github.com/repos/cesanta/mjs/issues/254/comments
1
2023-11-23T03:20:25Z
2023-12-27T18:24:10Z
https://github.com/cesanta/mjs/issues/254
2,007,422,344
254
CVE-2023-50628
2023-12-20T09:15:07.350
Buffer Overflow vulnerability in libming version 0.4.8, allows attackers to execute arbitrary code and obtain sensitive information via parser.c component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/libming/libming/issues/289" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/libming/libming/pull/290" }, { "source": "af854a3...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "120" ]
120
https://github.com/libming/libming/issues/289
[ "Exploit", "Issue Tracking" ]
github.com
[ "libming", "libming" ]
## Environment Ubuntu 22.04.3 LTS ## Compiler clang version 11.0.0 Target: x86_64-unknown-linux-gnu Thread model: posix ## Affected Version libming 0.4.8 ## Step to reproduce ```cd libming ./autogen.sh ./configure --disable-shared --disable-freetype cd util ./swftophp <PoC file> ``` ## Contents of PoC f...
Memory leaks at parser.c:2353:51
https://api.github.com/repos/libming/libming/issues/289/comments
1
2023-12-07T19:49:34Z
2023-12-20T01:44:57Z
https://github.com/libming/libming/issues/289
2,031,418,685
289
CVE-2023-49391
2023-12-22T11:15:07.517
An issue was discovered in free5GC version 3.3.0, allows remote attackers to execute arbitrary code and cause a denial of service (DoS) on AMF component via crafted NGAP message.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/free5gc/free5gc/issues/497" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:free5gc:free5gc:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "89BA8BA8-E366-48F9-930A-91ED1442AAFE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "94" ]
94
https://github.com/free5gc/free5gc/issues/497
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "free5gc", "free5gc" ]
## Describe the bug When testing the free5gc AMF, it always crashes when receiving invalid NGAP messages. ## To Reproduce Steps to reproduce the behavior: 1. Use https://github.com/free5gc/free5gc-compose as the test target 2. Start it with command `docker compose up` 3. Find the amf address with command `docke...
[Bugs] AMF crashed when receving invalid NGAP messages
https://api.github.com/repos/free5gc/free5gc/issues/497/comments
1
2023-10-25T08:11:58Z
2023-12-04T09:48:25Z
https://github.com/free5gc/free5gc/issues/497
1,960,809,373
497
CVE-2023-51075
2023-12-27T21:15:08.300
hutool-core v5.8.23 was discovered to contain an infinite loop in the StrSplitter.splitByRegex function. This vulnerability allows attackers to cause a Denial of Service (DoS) via manipulation of the first two parameters.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dromara/hutool/issues/3421" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hutool:hutool:5.8.23:*:*:*:*:*:*:*", "matchCriteriaId": "E06EB61A-4250-4F44-9743-3108FF70C157", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "835" ]
835
https://github.com/dromara/hutool/issues/3421
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "dromara", "hutool" ]
### 版本情况 JDK版本: openjdk_8_201 hutool-core版本: 5.8.23 ### 问题描述(包括截图) 在使用StrSplitter.splitByRegex函数时,如果前两个参数为“”,无论后两个参数如何设置,执行程序会进入死循环,最终都会导致程序崩溃(OOM or StackOverFlow)。 1. 复现代码 ```java import org.junit.Test; import cn.hutool.core.text.*; import java.util.List; public class StrSplitterFuzzerSplitByReg...
StrSplitter.splitByRegex函数使用过程中出现OOM or StackOverFlow
https://api.github.com/repos/chinabugotech/hutool/issues/3421/comments
1
2023-12-11T12:24:53Z
2023-12-11T20:29:51Z
https://github.com/chinabugotech/hutool/issues/3421
2,035,564,943
3,421
CVE-2023-51080
2023-12-27T21:15:08.397
The NumberUtil.toBigDecimal method in hutool-core v5.8.23 was discovered to contain a stack overflow.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/dromara/hutool/issues/3423" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hutool:hutool:5.8.23:*:*:*:*:*:*:*", "matchCriteriaId": "E06EB61A-4250-4F44-9743-3108FF70C157", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "787" ]
787
https://github.com/dromara/hutool/issues/3423
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "dromara", "hutool" ]
### 版本情况 JDK版本: openjdk_8_201 hutool-core: 5.8.23(请确保最新尝试是否还有问题) ### 问题描述(包括截图) 在hutool-core的5.8.23版本中,调用NumberUtil.toBigDecimal方法时,如果入参为“NaN”,程序会崩溃,报StackOverflowError 1. 复现代码 ```java import org.junit.Test; import cn.hutool.core.util.*; import java.math.BigDecimal; public class NumberUtilFuzzerToB...
NumberUtil.toBigDecimal方法报StackOverflowError
https://api.github.com/repos/chinabugotech/hutool/issues/3423/comments
2
2023-12-13T06:23:42Z
2024-01-11T02:39:14Z
https://github.com/chinabugotech/hutool/issues/3423
2,039,038,848
3,423
CVE-2023-7152
2023-12-29T05:15:09.473
A vulnerability, which was classified as critical, has been found in MicroPython 1.21.0/1.22.0-preview. Affected by this issue is the function poll_set_add_fd of the file extmod/modselect.c. The manipulation leads to use after free. The exploit has been disclosed to the public and may be used. The patch is identified a...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.2, "confidentialityImpact...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/jimmo/micropython/commit/8b24aa36ba978eafc6114b6798b47b7bfecdca26" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/micropython/microp...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:micropython:micropython:1.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "92240FCD-0BA9-46D0-9C9A-2CDD8FE2A769", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "416" ]
416
https://github.com/micropython/micropython/issues/12887
[ "Exploit", "Issue Tracking" ]
github.com
[ "micropython", "micropython" ]
## Environment - **OS**: Ubuntu 22.04 64bit - **Version**: micropython at commit db06041d59ef8d5524340c4d2c4490c8e770591f - **Build**: unix standard build - **Bug Type**: use-after-free - **Bug location**: `micropython/extmod/modselect.c:151` - **Detection Tool**: our custom tool, not disclosed yet - **Credits...
Use After Free at modselect.c:151
https://api.github.com/repos/micropython/micropython/issues/12887/comments
3
2023-11-05T09:58:40Z
2023-12-21T03:52:51Z
https://github.com/micropython/micropython/issues/12887
1,977,696,903
12,887
CVE-2023-7158
2023-12-29T07:15:11.060
A vulnerability was found in MicroPython up to 1.21.0. It has been classified as critical. Affected is the function slice_indices of the file objslice.c. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgr...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/micropython/micropython/issues/13007" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/micropython/micropython/pull/13039" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:micropython:micropython:*:*:*:*:*:*:*:*", "matchCriteriaId": "98250EF6-59E9-440F-95EB-5A5BB2B54639", "versionEndExcluding": "1.22.0", "versionEndIncluding": null, "versionSta...
[ "787" ]
787
https://github.com/micropython/micropython/issues/13007
[ "Exploit", "Issue Tracking" ]
github.com
[ "micropython", "micropython" ]
# Summary - **OS**: Ubuntu 22.04 - **version**: micropython@a00c9d56db775ee5fc14c2db60eb07bab8e872dd - **port**: unix - **contribution**: Junwha Hong and Wonil Jang @S2-Lab, UNIST - **description**: `slice_indices` misinterpret float value as integer value, and leads to buffer overflow. # PoC ```c # A cla...
heap-buffer-overflow: mis-interpretation of float as int at slice_indices
https://api.github.com/repos/micropython/micropython/issues/13007/comments
2
2023-11-17T09:50:54Z
2023-11-22T06:11:45Z
https://github.com/micropython/micropython/issues/13007
1,998,711,622
13,007
CVE-2023-26157
2024-01-02T05:15:08.160
Versions of the package libredwg before 0.12.5.6384 are vulnerable to Denial of Service (DoS) due to an out-of-bounds read involving section->num_pages in decode_r2007.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "report@snyk.io", "tags": [ "Patch" ], "url": "https://github.com/LibreDWG/libredwg/commit/c8cf03ce4c2315b146caf582ea061c0460193bcc" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/L...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "C0D7618D-9F7C-4654-822E-48A907537B85", "versionEndExcluding": "0.12.5.6384", "versionEndIncluding": null, "versionStartExcl...
[ "125" ]
125
https://github.com/LibreDWG/libredwg/issues/850
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi rurban, Making a quick report on an out-of-bounds read fuzzing crash. I confirmed this with a build using the `--enable-release` flag as well. Release build error: ``` ./programs/dwgread crash.dwg ERROR: Invalid num_pages 7274598, skip ERROR: Invalid section->pages[0] size Warning: Failed to find secti...
Out-of-Bound Read in read_data_section in 0.12.5
https://api.github.com/repos/LibreDWG/libredwg/issues/850/comments
1
2023-09-26T13:28:46Z
2023-10-30T17:06:23Z
https://github.com/LibreDWG/libredwg/issues/850
1,913,517,983
850
CVE-2023-49551
2024-01-02T23:15:12.233
An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_op_json_parse function in the msj.c file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/cesanta/mjs/issues/257" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "20" ]
20
https://github.com/cesanta/mjs/issues/257
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "cesanta", "mjs" ]
**The name of an affected Product** [mjs](https://github.com/cesanta/mjs) **The affected version** Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) (Tag: [2.20.0](https://github.com/cesanta/mjs/releases/tag/2.20.0)) **Description** An issue in cesanta mjs 2.20.0...
SEGV in mjs_op_json_parse() at mjs.c:11364
https://api.github.com/repos/cesanta/mjs/issues/257/comments
0
2023-11-26T09:51:38Z
2023-12-22T02:39:20Z
https://github.com/cesanta/mjs/issues/257
2,010,974,674
257
CVE-2023-49552
2024-01-02T23:15:12.290
An Out of Bounds Write in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_op_json_stringify function in the msj.c file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/cesanta/mjs/issues/256" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "125" ]
125
https://github.com/cesanta/mjs/issues/256
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "cesanta", "mjs" ]
**The name of an affected Product** [mjs](https://github.com/cesanta/mjs) **The affected version** Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) (Tag: [2.20.0](https://github.com/cesanta/mjs/releases/tag/2.20.0)) **Description** An issue in cesanta mjs 2.20.0...
stack-overflow in mjs_op_json_stringify() at mjs.c:11362
https://api.github.com/repos/cesanta/mjs/issues/256/comments
0
2023-11-26T08:00:13Z
2023-12-22T02:21:04Z
https://github.com/cesanta/mjs/issues/256
2,010,943,506
256
CVE-2023-49554
2024-01-03T00:15:08.987
Use After Free vulnerability in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the do_directive function in the modules/preprocs/nasm/nasm-pp.c component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/yasm/yasm/issues/249" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.86.g9def:*:*:*:*:*:*:*", "matchCriteriaId": "C9D63BD2-36F6-440B-AC78-6F48EDDC12CD", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "416" ]
416
https://github.com/yasm/yasm/issues/249
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "yasm", "yasm" ]
**The name of an affected Product** [yasm](https://github.com/yasm/yasm) **The affected version** Commit: [9defefa](https://github.com/yasm/yasm/commit/9defefae9fbcb6958cddbfa778c1ea8605da8b8b) yasm 1.3.0.86.g9def **Description** An issue in yasm 1.3.0.86.g9def allows a attacker to cause a denial of service v...
heap-use-after-free in the function do_directive() at modules/preprocs/nasm/nasm-pp.c:2389
https://api.github.com/repos/yasm/yasm/issues/249/comments
0
2023-11-20T14:16:57Z
2024-01-03T11:22:46Z
https://github.com/yasm/yasm/issues/249
2,002,305,193
249
CVE-2023-50120
2024-01-10T09:15:44.290
MP4Box GPAC version 2.3-DEV-rev636-gfbd7e13aa-master was discovered to contain an infinite loop in the function av1_uvlc at media_tools/av_parsers.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted MP4 file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/gpac/gpac/issues/2698" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/gpac/gpac/iss...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3:dev:*:*:*:*:*:*", "matchCriteriaId": "0099B624-674B-4F45-9270-DD638617A1D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "835" ]
835
https://github.com/gpac/gpac/issues/2698
[ "Exploit", "Issue Tracking" ]
github.com
[ "gpac", "gpac" ]
1.Version MP4Box - GPAC version 2.3-DEV-rev636-gfbd7e13aa-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - https://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --static-...
Infinite loop in av1_uvlc media_tools/av_parsers.c:1664
https://api.github.com/repos/gpac/gpac/issues/2698/comments
1
2023-12-01T04:51:55Z
2023-12-01T10:00:42Z
https://github.com/gpac/gpac/issues/2698
2,020,058,777
2,698
CVE-2023-37644
2024-01-11T08:15:35.737
SWFTools 0.9.2 772e55a allows attackers to trigger a large memory-allocation attempt via a crafted document, as demonstrated by pdf2swf. This occurs in png_read_chunk in lib/png.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/202" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/matthiaskramm/swftools/issues/202
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
Hi there We would like to share that the latest version of pdf2swf causes heap-buffer-overflow when executed with a crafted png input. We assume that the invalid memory access happens due to the improper processing malformed input in png_read_chunk() in spite of the error handling. Here is the output of progra...
Heap-buffer-overflow when processing an png file in png_read_chunk()
https://api.github.com/repos/swftools/swftools/issues/202/comments
1
2023-07-01T08:50:15Z
2023-09-06T08:36:00Z
https://github.com/swftools/swftools/issues/202
1,783,702,020
202
CVE-2023-51790
2024-01-12T13:15:11.733
Cross Site Scripting vulnerability in piwigo v.14.0.0 allows a remote attacker to obtain sensitive information via the lang parameter in the Admin Tools plug-in component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/Piwigo/AdminTools/issues/21" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DF997677-CC8C-40D2-BAA6-EF1374DC731F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "79" ]
79
https://github.com/Piwigo/Piwigo/issues/2069
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
### **Summary** A reflected cross-site scripting (XSS) vulnerability has been discovered in the "ato_lang" parameter. This vulnerability can be exploited by an attacker to inject malicious HTML and JS code into the HTML page, which could then be executed by webmaster or administrators when they visit the URL with the...
piwigo v14.0.0 has a reflected XSS vulnerability
https://api.github.com/repos/Piwigo/AdminTools/issues/21/comments
0
2023-12-18T04:03:44Z
2024-06-06T09:48:54Z
https://github.com/Piwigo/AdminTools/issues/21
2,054,769,328
21
CVE-2024-22562
2024-01-19T15:15:09.463
swftools 0.9.2 was discovered to contain a Stack Buffer Underflow via the function dict_foreach_keyvalue at swftools/lib/q.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/210" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/matthiaskramm/swftools/issues/210
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# project https://github.com/matthiaskramm/swftools version:0.9.2 # os info Ubuntu18.04 TLS # poc [poc.zip](https://github.com/matthiaskramm/swftools/files/13785772/poc.zip) # build git clone https://github.com/matthiaskramm/swftools.git cd swftools ./configure --disable-shared && make /swftools/src/swfc ./p...
stack-buffer-underflow exists in the function dict_foreach_keyvalue in swftools/lib/q.c
https://api.github.com/repos/swftools/swftools/issues/210/comments
0
2023-12-28T11:52:17Z
2024-01-10T03:23:59Z
https://github.com/swftools/swftools/issues/210
2,058,345,861
210
CVE-2024-22920
2024-01-19T15:15:09.560
swftools 0.9.2 was discovered to contain a heap-use-after-free via the function bufferWriteData in swftools/lib/action/compile.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/211" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "416" ]
416
https://github.com/matthiaskramm/swftools/issues/211
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# project https://github.com/matthiaskramm/swftools version 0.9.2 # os info Ubuntu18.04 TLS # poc [poc.zip](https://github.com/matthiaskramm/swftools/files/13786202/poc.zip) # build git clone https://github.com/matthiaskramm/swftools.git cd swftools ./configure --disable-shared && make ./swftools/src/swfc ./...
heap-use-after-free exists in the function bufferWriteData in swftools/lib/action/compile.c:223
https://api.github.com/repos/swftools/swftools/issues/211/comments
1
2023-12-28T12:06:28Z
2024-12-02T11:46:34Z
https://github.com/swftools/swftools/issues/211
2,058,359,151
211
CVE-2024-22911
2024-01-19T18:15:08.680
A stack-buffer-underflow vulnerability was found in SWFTools v0.9.2, in the function parseExpression at src/swfc.c:2602.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/216" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/matthiaskramm/swftools/issues/216
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# Summary A stack-buffer-overflow caused when using swfc. # Version ``` $ ./swfc -V swfc - part of swftools 0.9.2 $ git log --oneline -1 772e55a2 (HEAD, origin/master, origin/HEAD, master) ``` # Platform ``` $ uname -a Linux 1cc373898f58 5.4.0-150-generic #167~18.04.1-Ubuntu SMP Wed May 24 00:51:42 UTC 2023...
stack-buffer-overflow exit in parseExpression at src/swfc.c:2602
https://api.github.com/repos/swftools/swftools/issues/216/comments
0
2024-01-10T13:04:05Z
2024-01-11T06:44:59Z
https://github.com/swftools/swftools/issues/216
2,074,336,039
216
CVE-2024-22912
2024-01-19T18:15:08.723
A global-buffer-overflow was found in SWFTools v0.9.2, in the function countline at swf5compiler.flex:327. It allows an attacker to cause code execution.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/212" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "120" ]
120
https://github.com/matthiaskramm/swftools/issues/212
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# Summary A global-buffer-overflow caused when using swfc. # Version ``` $ ./swfc -V swfc - part of swftools 0.9.2 $ git log --oneline -1 772e55a2 (HEAD, origin/master, origin/HEAD, master) ``` # Platform ``` $ uname -a Linux 1cc373898f58 5.4.0-150-generic #167~18.04.1-Ubuntu SMP Wed May 24 00:51:42 UTC 202...
global-buffer-overflow exists in countline() at lib/swf5compiler.flex:327
https://api.github.com/repos/swftools/swftools/issues/212/comments
0
2024-01-10T12:20:57Z
2024-01-11T06:47:20Z
https://github.com/swftools/swftools/issues/212
2,074,257,410
212
CVE-2024-22913
2024-01-19T18:15:08.767
A heap-buffer-overflow was found in SWFTools v0.9.2, in the function swf5lex at lex.swf5.c:1321. It allows an attacker to cause code execution.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/213" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/matthiaskramm/swftools/issues/213
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# Summary A heap-buffer-overflow caused when using swfc, which results in out-of-bounds write. # Version ``` $ ./swfc -V swfc - part of swftools 0.9.2 $ git log --oneline -1 772e55a2 (HEAD, origin/master, origin/HEAD, master) ``` # Platform ``` $ uname -a Linux 1cc373898f58 5.4.0-150-generic #167~18.04.1-Ub...
heap-buffer-overflow exit in swf5lex() at lib/lex.swf5.c:1321
https://api.github.com/repos/swftools/swftools/issues/213/comments
1
2024-01-10T12:41:19Z
2024-10-11T15:06:09Z
https://github.com/swftools/swftools/issues/213
2,074,294,602
213
CVE-2024-22914
2024-01-19T18:15:08.807
A heap-use-after-free was found in SWFTools v0.9.2, in the function input at lex.swf5.c:2620. It allows an attacker to cause denial of service.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/214" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "416" ]
416
https://github.com/matthiaskramm/swftools/issues/214
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# Summary A heap-use-after-free caused when using swfc. # Version ``` $ ./swfc -V swfc - part of swftools 0.9.2 $ git log --oneline -1 772e55a2 (HEAD, origin/master, origin/HEAD, master) ``` # Platform ``` $ uname -a Linux 1cc373898f58 5.4.0-150-generic #167~18.04.1-Ubuntu SMP Wed May 24 00:51:42 UTC 2023 x...
heap-use-after-free exit in input() at lib/lex.swf5.c:2620
https://api.github.com/repos/swftools/swftools/issues/214/comments
0
2024-01-10T12:47:45Z
2024-01-11T06:46:39Z
https://github.com/swftools/swftools/issues/214
2,074,305,829
214
CVE-2024-22915
2024-01-19T18:15:08.847
A heap-use-after-free was found in SWFTools v0.9.2, in the function swf_DeleteTag at rfxswf.c:1193. It allows an attacker to cause code execution.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/215" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "416" ]
416
https://github.com/matthiaskramm/swftools/issues/215
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# Summary A heap-use-after-free caused when using swfc, which results in out-of-bounds write. # Version ``` $ ./swfc -V swfc - part of swftools 0.9.2 $ git log --oneline -1 772e55a2 (HEAD, origin/master, origin/HEAD, master) ``` # Platform ``` $ uname -a Linux 1cc373898f58 5.4.0-150-generic #167~18.04.1-Ubu...
heap-use-after-free exit in swf_DeleteTag() at lib/rfxswf.c:1193
https://api.github.com/repos/swftools/swftools/issues/215/comments
0
2024-01-10T12:59:20Z
2024-01-11T06:45:39Z
https://github.com/swftools/swftools/issues/215
2,074,326,548
215
CVE-2024-22919
2024-01-19T18:15:08.950
swftools0.9.2 was discovered to contain a global-buffer-overflow vulnerability via the function parseExpression at swftools/src/swfc.c:2587.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/209" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "120" ]
120
https://github.com/matthiaskramm/swftools/issues/209
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# project https://github.com/matthiaskramm/swftools version:0.9.2 # os info Ubuntu20.04 TLS # poc [poc.zip](https://github.com/matthiaskramm/swftools/files/13783540/poc.zip) # build git clone https://github.com/matthiaskramm/swftools.git cd swftools ./configure --disable-shared && make ./swftools/src...
global-buffer-overflow exists in the function parseExpression in swftools/src/swfc.c:2587
https://api.github.com/repos/swftools/swftools/issues/209/comments
0
2023-12-28T05:21:08Z
2024-01-11T01:14:11Z
https://github.com/swftools/swftools/issues/209
2,058,003,911
209
CVE-2024-22955
2024-01-19T18:15:09.003
swftools 0.9.2 was discovered to contain a stack-buffer-underflow vulnerability via the function parseExpression at swftools/src/swfc.c:2576.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/207" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/matthiaskramm/swftools/issues/207
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# project https://github.com/matthiaskramm/swftools version:0.9.2 # os info Ubuntu20.04 TLS # poc [gbo_poc.zip](https://github.com/matthiaskramm/swftools/files/13783442/gbo_poc.zip) # build git clone https://github.com/matthiaskramm/swftools.git cd swftools ./configure --disable-shared && make ./swftools/s...
stack-buffer-underflow exists in the function parseExpression in swftools/src/swfc.c:2576
https://api.github.com/repos/swftools/swftools/issues/207/comments
1
2023-12-28T05:05:17Z
2024-12-02T11:45:06Z
https://github.com/swftools/swftools/issues/207
2,057,993,750
207
CVE-2024-22956
2024-01-19T18:15:09.050
swftools 0.9.2 was discovered to contain a heap-use-after-free vulnerability via the function removeFromTo at swftools/src/swfc.c:838
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/208" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "416" ]
416
https://github.com/matthiaskramm/swftools/issues/208
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# project https://github.com/matthiaskramm/swftools version:0.9.2 # os info Ubuntu18.04 TLS # poc [poc.zip](https://github.com/matthiaskramm/swftools/files/13783478/poc.zip) # build git clone https://github.com/matthiaskramm/swftools.git cd swftools ./configure --disable-shared && make ./swftools/src/s...
heap-use-after-free exists in the function removeFromTo in swftools/src/swfc.c:838
https://api.github.com/repos/swftools/swftools/issues/208/comments
1
2023-12-28T05:12:39Z
2024-12-02T11:45:49Z
https://github.com/swftools/swftools/issues/208
2,057,998,005
208
CVE-2024-22957
2024-01-19T18:15:09.093
swftools 0.9.2 was discovered to contain an Out-of-bounds Read vulnerability via the function dict_do_lookup in swftools/lib/q.c:1190.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/206" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "125" ]
125
https://github.com/matthiaskramm/swftools/issues/206
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# project https://github.com/matthiaskramm/swftools version:0.9.2 # os info Ubuntu18.04 TLS # poc [swfc_crash.zip](https://github.com/matthiaskramm/swftools/files/13815139/swfc_crash.zip) # build git clone https://github.com/matthiaskramm/swftools.git cd swftools ./configure --disable-shared && make ./sw...
Out-of-bounds Read swftools/lib/q.c:1190 in dict_do_lookup
https://api.github.com/repos/swftools/swftools/issues/206/comments
1
2023-12-28T04:25:13Z
2024-12-02T11:42:15Z
https://github.com/swftools/swftools/issues/206
2,057,972,921
206
CVE-2024-22749
2024-01-25T16:15:09.010
GPAC v2.3 was detected to contain a buffer overflow via the function gf_isom_new_generic_sample_description function in the isomedia/isom_write.c:4577
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/gpac/gpac/issues/2713" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hanxuer/crashes...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "58C43523-0CB3-474F-B88B-6ACA538645FF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
[ "120" ]
120
https://github.com/gpac/gpac/issues/2713
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at https://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough inf...
buffer-overflow in gf_isom_new_generic_sample_description function at isomedia/isom_write.c:4577
https://api.github.com/repos/gpac/gpac/issues/2713/comments
1
2024-01-06T06:07:11Z
2024-01-08T10:22:24Z
https://github.com/gpac/gpac/issues/2713
2,068,418,306
2,713
CVE-2024-22570
2024-01-29T20:15:15.420
A stored cross-site scripting (XSS) vulnerability in /install.php?m=install&c=index&a=step3 of GreenCMS v2.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/Num-Nine/CVE/issues/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/Num-Nine/CVE/issues/11" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:njtech:greencms:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "7271D633-9BD0-4E2B-BA69-E732E3E19D43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/Num-Nine/CVE/issues/11
[ "Issue Tracking" ]
github.com
[ "Num-Nine", "CVE" ]
1.Download address: https://codeload.github.com/GreenCMS/GreenCMS/zip/refs/heads/beta 2.Hole location: http://greencms.com/install.php?m=install&c=index&a=step3 3.Fill in the payload at the site name `<script>alert(/xss/)</script>` 4.After the installation is complete, xss can be triggered by visiting the fol...
GreenCMS v2.3 exists storage xss
https://api.github.com/repos/QianGeG/CVE/issues/11/comments
0
2023-12-30T08:57:42Z
2023-12-30T08:57:42Z
https://github.com/QianGeG/CVE/issues/11
2,060,685,426
11
CVE-2024-22569
2024-01-31T02:15:54.467
Stored Cross-Site Scripting (XSS) vulnerability in POSCMS v4.6.2, allows attackers to execute arbitrary code via a crafted payload to /index.php?c=install&m=index&step=2&is_install_db=0.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Num-Nine/CVE/issues/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:poscms:poscms:4.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "A62614D0-0876-4DEA-BADB-2ADDA028B7FA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/Num-Nine/CVE/issues/12
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Num-Nine", "CVE" ]
1.Download address: http://www.poscms.net/xiazai/ 2.Hole location: http://127.0.0.1/index.php? c=install&m=index&step=2&is_install_db=0 3.Fill in the payload at the project name `<script>alert(/xss/)</script>` 4.xss is triggered when you return to the home page after installation ![image](https://github.co...
poscms 4.6.2 Storage xss Exists
https://api.github.com/repos/QianGeG/CVE/issues/12/comments
0
2023-12-30T09:06:40Z
2023-12-30T09:08:11Z
https://github.com/QianGeG/CVE/issues/12
2,060,687,596
12
CVE-2024-22927
2024-02-01T23:15:10.960
Cross Site Scripting (XSS) vulnerability in the func parameter in eyoucms v.1.6.5 allows a remote attacker to run arbitrary code via crafted URL.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/57" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "C5AE12B9-F8D6-4F10-9B49-50E0263ECA55", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "79" ]
79
https://github.com/weng-xianhu/eyoucms/issues/57
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
### **Summary** EyouCMS-V1.6.5 When uploading images locally, the program will use the info parameter to set the parameters carried by the upload form. Multiple reflective XSS vulnerabilities can be created by modifying the JWT encrypted HEADER of the accepted JSON data and setting the parameter it contains to a mali...
EyouCMS-V1.6.5 has multiple reflective XSS vulnerabilities
https://api.github.com/repos/weng-xianhu/eyoucms/issues/57/comments
1
2024-01-05T08:05:47Z
2024-03-22T01:36:04Z
https://github.com/weng-xianhu/eyoucms/issues/57
2,066,903,491
57
CVE-2024-24267
2024-02-05T18:15:52.427
gpac v2.2.1 was discovered to contain a memory leak via the gfio_blob variable in the gf_fileio_from_blob function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/gpac/gpac/commit/d28d9ba45cf4f628a7b2c351849a895e6fcf2234" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/gpac/gpac/issues/2571" }, { "source": "cve@mitre.org", "tags": [ "Ex...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "81FBED81-2989-4E6D-83CF-BF8E4989F5ED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "401" ]
401
https://github.com/gpac/gpac/issues/2571
null
github.com
[ "gpac", "gpac" ]
Memory leak in function [gf_fileio_from_mem](https://github.com/gpac/gpac/blob/941a0891b989f5ad86b739cfb12c84b7e62e8ee4/src/utils/os_file.c#L1447) The memory leak is reported by a static analyzer tool developed at CAST (https://www.linkedin.com/company/cast-center). Dynamic memory is allocated [here](https://github...
Memory leak in function gf_fileio_from_mem
https://api.github.com/repos/gpac/gpac/issues/2571/comments
0
2023-08-29T11:13:38Z
2023-08-29T13:47:19Z
https://github.com/gpac/gpac/issues/2571
1,871,446,973
2,571
CVE-2024-24130
2024-02-07T14:15:52.720
Mail2World v12 Business Control Center was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the Usr parameter at resellercenter/login.asp.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Hebing123/cve/issues/13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Hebing123/c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mail2world:mail2world:12:*:*:*:*:*:*:*", "matchCriteriaId": "814F8AA9-4951-4025-A7F3-A434BE630122", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "79" ]
79
https://github.com/Hebing123/cve/issues/13
[ "Exploit", "Issue Tracking" ]
github.com
[ "Hebing123", "cve" ]
### **Summary** Mail2World V12 Business Control Center has a reflective cross-site vulnerability. ### **Details** A reflective XSS vulnerability exists in the resellercenter/login.asp path of Mail2World v12 Business Control Center. The cause of this XSS vulnerability is that Usr parameters are displayed to the fron...
Mail2World v12 Business Control Center has a reflective XSS vulnerability
https://api.github.com/repos/Hebing123/cve/issues/13/comments
1
2024-01-12T17:37:39Z
2024-03-11T06:20:40Z
https://github.com/Hebing123/cve/issues/13
2,079,360,954
13
CVE-2024-24131
2024-02-07T14:15:52.770
SuperWebMailer v9.31.0.01799 was discovered to contain a reflected cross-site scripting (XSS) vulenrability via the component api.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Hebing123/cve/issues/14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Hebing123/c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:superwebmailer:superwebmailer:9.31.0.01799:*:*:*:*:*:*:*", "matchCriteriaId": "E69A9B02-9E6A-421A-8E38-9A315640DD73", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "79" ]
79
https://github.com/Hebing123/cve/issues/14
[ "Exploit", "Issue Tracking" ]
github.com
[ "Hebing123", "cve" ]
### **Summary** SuperWebMailer 9.31.0.01799 has a reflective cross-site vulnerability. ### **Details** SuperWebMailer in version 9.31.0.01799 has a reflection cross-site attack vulnerability caused by api.php directly referencing urls without filtering. ### **Proof of Concept (POC)** http://ip:port/api/api.php/%3...
SuperWebMailer 9.31.0.01799 has a reflective XSS vulnerability
https://api.github.com/repos/Hebing123/cve/issues/14/comments
1
2024-01-12T18:45:40Z
2024-03-11T06:20:34Z
https://github.com/Hebing123/cve/issues/14
2,079,480,963
14
CVE-2024-24133
2024-02-07T14:15:52.820
Atmail v6.6.0 was discovered to contain a SQL injection vulnerability via the username parameter on the login page.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Hebing123/cve/issues/16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Hebing123/cve/issues/16" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atmail:atmail:6.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F9DFF09-D9A8-46F7-A466-6C538C591651", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "89" ]
89
https://github.com/Hebing123/cve/issues/16
[ "Third Party Advisory" ]
github.com
[ "Hebing123", "cve" ]
### **Summary** On January 12, we discovered that atmail 6.6.0 and atmail 6.3.0 weretested for SQL injection vulnerabilities that could be larger than 6.6.0. The username parameter during admin login is at risk of SQL injection. ### **Details** We can prove this with delayed SQL injection, which we have tes...
SQL Injection Vulnerability in Atmail 6.6.0
https://api.github.com/repos/Hebing123/cve/issues/16/comments
2
2024-01-16T06:20:56Z
2024-03-11T06:17:35Z
https://github.com/Hebing123/cve/issues/16
2,083,096,416
16
CVE-2024-24113
2024-02-08T13:15:09.807
xxl-job =< 2.4.1 has a Server-Side Request Forgery (SSRF) vulnerability, which causes low-privileged users to control executor to RCE.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xuxueli/xxl-job/issues/3375" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xuxueli:xxl-job:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C421D48-E483-44C2-A4A9-F0FBC31E17C7", "versionEndExcluding": null, "versionEndIncluding": "2.4.1", "versionStartExcludi...
[ "918" ]
918
https://github.com/xuxueli/xxl-job/issues/3375
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "xuxueli", "xxl-job" ]
### Which version of XXL-JOB do you using? 2.4.1(latest) ### vulnerability description XXL-JOB is a distributed task scheduling platform based on java language in the XXL (XXL-JOB) community. There is an SSRF vulnerability in xxl-job-2.4.1/xxl-job-admin/src/main/java/com/xxl/job/admin/controller/JobInfoController...
xxl-job =< 2.4.1 version has SSRF vulnerability, which causes low-privileged users to control executor to RCE
https://api.github.com/repos/xuxueli/xxl-job/issues/3375/comments
2
2024-01-11T12:24:35Z
2024-10-12T06:24:51Z
https://github.com/xuxueli/xxl-job/issues/3375
2,076,500,051
3,375
CVE-2024-25451
2024-02-09T15:15:09.143
Bento4 v1.6.0-640 was discovered to contain an out-of-memory bug via the AP4_DataBuffer::ReallocateBuffer() function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/872" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*", "matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "400" ]
400
https://github.com/axiomatic-systems/Bento4/issues/872
[ "Exploit", "Issue Tracking" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, Thanks for fixing the issue #741, but still there is out-of-memory bug in the latest version (1.6.0-640) of multiple programs because of the function AP4_DataBuffer::ReallocateBuffer() at Ap4DataBuffer.cpp:210. We observed the same bug in mp4info, mp42aac, mp42avc, mp4decrypt, and mp4dump with the same root c...
Out-of-memory bug from AP4_DataBuffer::ReallocateBuffer() in multiple programs (v1.6.0-640)
https://api.github.com/repos/axiomatic-systems/Bento4/issues/872/comments
2
2023-06-12T09:44:14Z
2024-02-17T17:35:35Z
https://github.com/axiomatic-systems/Bento4/issues/872
1,752,341,840
872
CVE-2024-25452
2024-02-09T15:15:09.193
Bento4 v1.6.0-640 was discovered to contain an out-of-memory bug via the AP4_UrlAtom::AP4_UrlAtom() function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/873" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*", "matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "400" ]
400
https://github.com/axiomatic-systems/Bento4/issues/873
[ "Exploit", "Issue Tracking" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, There is another out-of-memory bug in the latest version (1.6.0-640) of mp4info because of the function AP4_UrlAtom::AP4_UrlAtom() at Ap4UrlAtom.cpp:71. Unlike the issue #771, this vunerability happened in the different function AP4_UrlAtom::AP4_UrlAtom(). Here is the output of program with address saniti...
Out-of-memory bug from AP4_UrlAtom::AP4_UrlAtom() in v1.6.0-640
https://api.github.com/repos/axiomatic-systems/Bento4/issues/873/comments
1
2023-06-12T10:03:27Z
2024-02-20T02:41:04Z
https://github.com/axiomatic-systems/Bento4/issues/873
1,752,379,751
873
CVE-2024-25453
2024-02-09T15:15:09.240
Bento4 v1.6.0-640 was discovered to contain a NULL pointer dereference via the AP4_StszAtom::GetSampleSize() function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/204" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bent...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*", "matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "476" ]
476
https://github.com/axiomatic-systems/Bento4/issues/204
[ "Exploit", "Issue Tracking" ]
github.com
[ "axiomatic-systems", "Bento4" ]
On master compiled on 2017-09-10 (but please confirm if this affects current stable): ``` # mp4compact $FILE out.mp4 ASAN:DEADLYSIGNAL ================================================================= ==156195==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000060a4b3 bp 0x7ffed6dd9e30 s...
NULL pointer dereference in AP4_StszAtom::GetSampleSize (Ap4StszAtom.cpp)
https://api.github.com/repos/axiomatic-systems/Bento4/issues/204/comments
0
2017-09-15T07:10:24Z
2017-12-17T00:59:26Z
https://github.com/axiomatic-systems/Bento4/issues/204
257,947,117
204
CVE-2024-25453
2024-02-09T15:15:09.240
Bento4 v1.6.0-640 was discovered to contain a NULL pointer dereference via the AP4_StszAtom::GetSampleSize() function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/204" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bent...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*", "matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "476" ]
476
https://github.com/axiomatic-systems/Bento4/issues/874
[ "Exploit", "Issue Tracking" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, There still exists the null pointer reference bug in the latest version (1.6.0-640) of mp4info by the function AP4_StszAtom::GetSampleSize(). Here is the output of program with address sanitizer attached. ### Bug Report File: major brand: isom minor version: 200 compatible brand: isom ...
NULL pointer reference from AP4_StszAtom::GetSampleSize() in v1.6.0-640
https://api.github.com/repos/axiomatic-systems/Bento4/issues/874/comments
1
2023-06-12T10:08:57Z
2024-02-17T17:33:31Z
https://github.com/axiomatic-systems/Bento4/issues/874
1,752,392,145
874
CVE-2024-25454
2024-02-09T15:15:09.293
Bento4 v1.6.0-640 was discovered to contain a NULL pointer dereference via the AP4_DescriptorFinder::Test() function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/875" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*", "matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "476" ]
476
https://github.com/axiomatic-systems/Bento4/issues/875
[ "Exploit", "Issue Tracking" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, There still exists the null pointer reference bug in the latest version (1.6.0-640) of mp4info by the function AP4_DescriptorFinder::Test(). Here is the output of program with address sanitizer attached. ### Bug Report File: major brand: isom minor version: 200 compatible brand: isom c...
NULL pointer reference from AP4_DescriptorFinder::Test() in v1.6.0-640
https://api.github.com/repos/axiomatic-systems/Bento4/issues/875/comments
1
2023-06-12T10:12:34Z
2024-02-17T17:30:47Z
https://github.com/axiomatic-systems/Bento4/issues/875
1,752,398,555
875
CVE-2023-52430
2024-02-12T23:15:08.353
The caddy-security plugin 1.1.20 for Caddy allows reflected XSS via a GET request to a URL that contains an XSS payload and begins with either a /admin or /settings/mfa/delete/ substring.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://github.c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:authcrunch:caddy-security:1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "0DA78C41-C188-45AD-9102-E019F39AC33F", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "79" ]
79
https://github.com/greenpau/caddy-security/issues/264
[ "Issue Tracking", "Vendor Advisory" ]
github.com
[ "greenpau", "caddy-security" ]
_Severity: High_ Reflected XSS occurs when an application includes untrusted data in the HTML response sent to the user’s browser. In this case, the provided` /admin%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E/admin/login` or `/settings/mfa/delete/<img%20src=x%20onerror=alert(document.domain)>` API calls tr...
Reflected Cross-Site Scripting
https://api.github.com/repos/greenpau/caddy-security/issues/264/comments
0
2023-09-19T09:29:44Z
2023-12-02T14:49:00Z
https://github.com/greenpau/caddy-security/issues/264
1,902,573,548
264
CVE-2024-21493
2024-02-17T05:15:08.747
All versions of the package github.com/greenpau/caddy-security are vulnerable to Improper Validation of Array Index when parsing a Caddyfile. Multiple parsing functions in the affected library do not validate whether their input values are nil before attempting to access elements, which can lead to a panic (index out o...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integ...
[ { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/" }, { "source": "report@snyk.io", "tags": [ "Issue Tracking" ], "url": "https://github.com/greenpau/caddy-secur...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:greenpau:caddy-security:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC59AC36-173D-4F24-9F39-50F992A248B8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "129" ]
129
https://github.com/greenpau/caddy-security/issues/263
[ "Issue Tracking" ]
github.com
[ "greenpau", "caddy-security" ]
_Severity: Low_ Multiple parsing functions do not validate whether their input values are nil before attempting to access elements, which can lead to a panic (index out of range). Panics during the parsing of a Caddyfile may introduce ambiguity and vulnerabilities, hindering the correct interpretation and configurat...
Multiple Panics when Parsing Caddyfile
https://api.github.com/repos/greenpau/caddy-security/issues/263/comments
0
2023-09-19T09:24:59Z
2023-12-02T14:48:50Z
https://github.com/greenpau/caddy-security/issues/263
1,902,565,722
263
CVE-2024-21494
2024-02-17T05:15:09.077
All versions of the package github.com/greenpau/caddy-security are vulnerable to Authentication Bypass by Spoofing via the X-Forwarded-For header due to improper input sanitization. An attacker can spoof an IP address used in the user identity module (/whoami API endpoint). This could lead to unauthorized access if the...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/" }, { "source": "report@snyk.io", "tags": [ "Issue Tracking" ], "url": "https://github.com/greenpau/caddy-secur...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:greenpau:caddy-security:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC59AC36-173D-4F24-9F39-50F992A248B8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "290" ]
290
https://github.com/greenpau/caddy-security/issues/266
[ "Issue Tracking" ]
github.com
[ "greenpau", "caddy-security" ]
_Severity: Medium_ By manipulating the X-Forwarded-For header, an attacker can spoof an IP address used in the user identity module (/whoami API endpoint). This could lead to unauthorized access if the system trusts this spoofed IP address. HTTP request-response cycle with the injected `X-Forwarded-For` header: ...
IP Spoofing via X-Forwarded-For Header
https://api.github.com/repos/greenpau/caddy-security/issues/266/comments
0
2023-09-19T09:37:14Z
2023-12-02T14:29:45Z
https://github.com/greenpau/caddy-security/issues/266
1,902,586,609
266
CVE-2024-21495
2024-02-17T05:15:09.343
Versions of the package github.com/greenpau/caddy-security before 1.0.42 are vulnerable to Insecure Randomness due to using an insecure random number generation library which could possibly be predicted via a brute-force search. Attackers could use the potentially predictable nonce value used for authentication purpose...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/" }, { "source": "report@snyk.io", "tags": [ "Issue Tracking" ], "url": "https://github.com/greenpau/caddy-secur...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:greenpau:caddy-security:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E38C1D1-8679-4D77-858C-E2DCDAC2440C", "versionEndExcluding": "1.0.42", "versionEndIncluding": null, "versionSta...
[ "330" ]
330
https://github.com/greenpau/caddy-security/issues/265
[ "Issue Tracking" ]
github.com
[ "greenpau", "caddy-security" ]
_Severity: High_ The caddy-security plugin uses the math/rand Golang library with a seed based on the Unix timestamp to generate strings for three security-critical contexts in the application, which could possibly be predicted via a brute-force search. Attackers could use the potentially predictable nonce value use...
Insecure Randomness
https://api.github.com/repos/greenpau/caddy-security/issues/265/comments
6
2023-09-19T09:34:06Z
2023-12-09T14:47:04Z
https://github.com/greenpau/caddy-security/issues/265
1,902,581,538
265
CVE-2024-21497
2024-02-17T05:15:09.863
All versions of the package github.com/greenpau/caddy-security are vulnerable to Open Redirect via the redirect_url parameter. An attacker could perform a phishing attack and trick users into visiting a malicious website by crafting a convincing URL with this parameter. To exploit this vulnerability, the user must take...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "report@snyk.io", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/" }, { "source": "report@snyk.io", "tags": [ "Issue Tracking" ], "url": "https://github.com/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:greenpau:caddy-security:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC59AC36-173D-4F24-9F39-50F992A248B8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "601" ]
601
https://github.com/greenpau/caddy-security/issues/268
[ "Issue Tracking" ]
github.com
[ "greenpau", "caddy-security" ]
When a logged-in user clicks on a specially crafted link with a `redirect_url` parameter, the user can be redirected to an external website. The user must take an action, such as clicking on a portal button or using the browser’s back button, to trigger the redirection. This could lead to phishing attacks, where an att...
Open Redirection Vulnerability
https://api.github.com/repos/greenpau/caddy-security/issues/268/comments
3
2023-09-19T09:53:46Z
2024-07-24T10:23:04Z
https://github.com/greenpau/caddy-security/issues/268
1,902,619,338
268
CVE-2024-21499
2024-02-17T05:15:10.400
All versions of the package github.com/greenpau/caddy-security are vulnerable to HTTP Header Injection via the X-Forwarded-Proto header due to redirecting to the injected protocol.Exploiting this vulnerability could lead to bypass of security mechanisms or confusion in handling TLS.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/" }, { "source": "report@snyk.io", "tags": [ "Issue Tracking" ], "url": "https://github.com/greenpau/caddy-secur...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:greenpau:caddy-security:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC59AC36-173D-4F24-9F39-50F992A248B8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "116" ]
116
https://github.com/greenpau/caddy-security/issues/270
[ "Issue Tracking" ]
github.com
[ "greenpau", "caddy-security" ]
_Severity: Low_ The processing of the X-Forwarded-Proto header results in redirection to the injected protocol. While this scenario may have limited impact, improper handling of such headers could result in unpredictable security risks, such as bypass of security mechanisms or confusion in handling TLS. ```http ...
X-Forwarded-Proto Header Manipulation
https://api.github.com/repos/greenpau/caddy-security/issues/270/comments
0
2023-09-19T10:04:09Z
2023-12-02T14:28:13Z
https://github.com/greenpau/caddy-security/issues/270
1,902,637,888
270
CVE-2024-25898
2024-02-21T18:15:51.820
A XSS vulnerability was found in the ChurchCRM v.5.5.0 functionality, edit your event, where malicious JS or HTML code can be inserted in the Event Sermon field in EventEditor.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ChurchCRM/CRM/issues/6851" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ChurchCRM...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:churchcrm:churchcrm:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "1FEB8DD0-3ADC-4C06-84DF-9296533BFBD7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "79" ]
79
https://github.com/ChurchCRM/CRM/issues/6851
[ "Exploit", "Issue Tracking" ]
github.com
[ "ChurchCRM", "CRM" ]
If you have the ChurchCRM software running, please file an issue using the Report an issue in the help menu. On what page in the application did you find this issue? EventEditor.php On what type of server is this running? Dedicated / Shared hosting? Linux / Windows? Linux What browser (and version) are you r...
Security Bug: SELF XSS - Event Editor
https://api.github.com/repos/ChurchCRM/CRM/issues/6851/comments
2
2024-02-10T14:07:57Z
2024-06-12T13:16:53Z
https://github.com/ChurchCRM/CRM/issues/6851
2,128,477,169
6,851
CVE-2024-24146
2024-02-29T01:44:11.657
A memory leak issue discovered in parseSWF_DEFINEBUTTON in libming v0.4.8 allows attackers to cause s denial of service via a crafted SWF file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/307" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "401" ]
401
https://github.com/libming/libming/issues/307
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
### Envrionment ```bash ubuntu  ~/lab/libming/util   master  lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 22.04.2 LTS Release: 22.04 Codename: jammy ``` ### Compiler ```bash ubuntu  ~/lab/libming/util   master  clang -v Ubuntu clang vers...
Memory leaks on parseSWF_DEFINEBUTTON
https://api.github.com/repos/libming/libming/issues/307/comments
1
2024-01-12T22:46:35Z
2024-02-21T22:35:18Z
https://github.com/libming/libming/issues/307
2,079,829,395
307
CVE-2024-24147
2024-02-29T01:44:11.693
A memory leak issue discovered in parseSWF_FILLSTYLEARRAY in libming v0.4.8 allows attackers to cause s denial of service via a crafted SWF file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/311" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "401" ]
401
https://github.com/libming/libming/issues/311
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
### Envrionment ```bash ubuntu  ~/lab/libming/util   master  lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 22.04.2 LTS Release: 22.04 Codename: jammy ``` ### Compiler ```bash ubuntu  ~/lab/libming/util   master  clang -v Ubuntu clang vers...
Memory leaks on parseSWF_FILLSTYLEARRAY
https://api.github.com/repos/libming/libming/issues/311/comments
1
2024-01-13T00:00:25Z
2024-02-21T22:33:33Z
https://github.com/libming/libming/issues/311
2,079,901,582
311
CVE-2024-24149
2024-02-29T01:44:11.737
A memory leak issue discovered in parseSWF_GLYPHENTRY in libming v0.4.8 allows attackers to cause a denial of service via a crafted SWF file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/310" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "401" ]
401
https://github.com/libming/libming/issues/310
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
### Envrionment ```bash ubuntu  ~/lab/libming/util   master  lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 22.04.2 LTS Release: 22.04 Codename: jammy ``` ### Compiler ```bash ubuntu  ~/lab/libming/util   master  clang -v Ubuntu clang vers...
Memory leaks on parseSWF_GLYPHENTRY
https://api.github.com/repos/libming/libming/issues/310/comments
1
2024-01-12T23:51:34Z
2024-02-21T22:35:36Z
https://github.com/libming/libming/issues/310
2,079,896,237
310
CVE-2024-24150
2024-02-29T01:44:11.777
A memory leak issue discovered in parseSWF_TEXTRECORD in libming v0.4.8 allows attackers to cause a denial of service via a crafted SWF file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/309" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "401" ]
401
https://github.com/libming/libming/issues/309
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
### Envrionment ```bash ubuntu  ~/lab/libming/util   master  lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 22.04.2 LTS Release: 22.04 Codename: jammy ``` ### Compiler ```bash ubuntu  ~/lab/libming/util   master  clang -v Ubuntu clang vers...
Memory leaks on parseSWF_TEXTRECORD
https://api.github.com/repos/libming/libming/issues/309/comments
1
2024-01-12T23:44:59Z
2024-02-21T22:47:44Z
https://github.com/libming/libming/issues/309
2,079,890,770
309
CVE-2024-24155
2024-02-29T01:44:11.810
Bento4 v1.5.1-628 contains a Memory leak on AP4_Movie::AP4_Movie, parsing tracks and added into m_Tracks list, but mp42aac cannot correctly delete when we got an no audio track found error. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted mp4 file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/919" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*", "matchCriteriaId": "27A2EAA1-1740-4A14-BFFC-BD4406E9BD87", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "401" ]
401
https://github.com/axiomatic-systems/Bento4/issues/919
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
### Envrionment ```bash ubuntu  ~/lab/Bento4-clean/cmakebuild  ◈ v1.5.1-628  lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 22.04.2 LTS Release: 22.04 Codename: jammy ``` ### Compiler ```bash ubuntu  ~/lab/Bento4-clean/cmakebuild  ◈ v1.5.1-628...
Memory leaks in mp42aac on adding / deleting AP4_Track::AP4_Tracks
https://api.github.com/repos/axiomatic-systems/Bento4/issues/919/comments
1
2024-01-13T21:23:38Z
2024-02-21T22:47:29Z
https://github.com/axiomatic-systems/Bento4/issues/919
2,080,480,764
919
CVE-2024-2849
2024-03-23T18:15:07.770
A vulnerability classified as critical was found in SourceCodester Simple File Manager 1.0. This vulnerability affects unknown code. The manipulation of the argument photo leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-257770 is the ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.257770" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ganeshrkt:simple_file_manager_web_app:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "3077F229-94E7-49B4-9E8E-A44CB9702353", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "434" ]
434
https://github.com/CveSecLook/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# Simple File Manager Web App using PHP and MySQL Database Free Source Code - Arbitrary file vulnerability uploading leads to command execution + Author: FanYZ # Vendor Homepage + https://www.sourcecodester.com/upload-download-and-delete-file-using-php-mysql.html # Software Link + https://www.sourcecodester.com/si...
Simple File Manager Web App using PHP and MySQL Database Free Source Code - Arbitrary file vulnerability uploading leads to command execution
https://api.github.com/repos/CveSecLook/cve/issues/1/comments
0
2024-03-22T14:51:45Z
2024-03-22T14:51:45Z
https://github.com/CveSecLook/cve/issues/1
2,202,684,616
1
CVE-2024-2932
2024-03-27T01:15:46.830
A vulnerability classified as critical has been found in SourceCodester Online Chatting System 1.0. Affected is an unknown function of the file admin/update_room.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public an...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.258012" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:donbermoy:online_chatting_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "85923067-902A-42B7-BB5E-4C6ACE3990C0", "versionEndExcluding": null, "versionEndIncluding": null, "ver...
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# Online Chatting System using PHP/MySQL update_room.php - SQL injection vulnerability + Author: WangPeng CUMT # Vendor Homepage + https://www.sourcecodester.com/php/14224/online-chatting-system-using-phpmysql.html # Software Link + https://www.sourcecodester.com/download-code?nid=14224&title=Online+Chatting+Syste...
Online Chatting System using PHP/MySQL update_room.php - SQL injection vulnerability
https://api.github.com/repos/CveSecLook/cve/issues/3/comments
0
2024-03-25T20:14:01Z
2024-03-25T20:14:01Z
https://github.com/CveSecLook/cve/issues/3
2,206,616,626
3
CVE-2024-31506
2024-04-09T18:15:10.467
Sourcecodester Online Graduate Tracer System v1.0 is vulnerable to SQL Injection via the "id" parameter in admin/admin_cs.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tamparongj03:online_graduate_tracer_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "48BB2CA2-9E7E-4C08-B25E-7377696BF3B5", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/4
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# Online Graduate Tracer System for College of ICT Alumni in PHP Free Source Code V1.0 admin/admin_cs.php - SQL injection vulnerability V1.0 admin/admin_cs.php - SQL injection vulnerability + Author: zhang guixiang # Vendor Homepage + https://www.sourcecodester.com/php/15904/online-graduate-tracer-system-college-ict...
Online Graduate Tracer System for College of ICT Alumni in PHP Free Source Code V1.0 admin/admin_cs.php - SQL injection vulnerability V1.0 admin/admin_cs.php - SQL injection vulnerability
https://api.github.com/repos/CveSecLook/cve/issues/4/comments
0
2024-03-27T16:28:13Z
2024-03-28T16:31:03Z
https://github.com/CveSecLook/cve/issues/4
2,211,250,054
4
CVE-2024-4809
2024-05-14T15:44:59.720
A vulnerability has been found in SourceCodester Open Source Clinic Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file setting.php. The manipulation of the argument logo leads to unrestricted upload. The attack can be launched remotely. The exploit h...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/26" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.263929" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nikhil-bhalerao:open_source_clinic_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "31D19E63-4EB6-42AC-AA1B-C9E734140902", "versionEndExcluding": null, "versionEndIncluding": nu...
[ "434" ]
434
https://github.com/CveSecLook/cve/issues/26
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Open Source Clinic Management System in PHP with Full Source Code 1.0 setting.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Open Source Clinic Management System in PHP with Full Source Code ## Vendor Homepage + https://www.sourcecodester.com/php/14243/open-source-clinic-management-system-...
SourceCodester Open Source Clinic Management System in PHP with Full Source Code 1.0 setting.php Unrestricted Upload
https://api.github.com/repos/CveSecLook/cve/issues/26/comments
0
2024-05-10T15:41:06Z
2024-05-10T15:41:07Z
https://github.com/CveSecLook/cve/issues/26
2,289,966,823
26
CVE-2024-4920
2024-05-16T00:15:08.563
A vulnerability was found in SourceCodester Online Discussion Forum Site 1.0. It has been rated as critical. This issue affects some unknown processing of the file registerH.php. The manipulation of the argument ima leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to th...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/27" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.264455" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:razormist:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1F9F37D-C115-4EC6-A1DD-FFB3869E79C0", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "434" ]
434
https://github.com/CveSecLook/cve/issues/27
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Online Discussion Forum Site 1.0 registerH.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Online Discussion Forum Site ## Vendor Homepage + https://www.sourcecodester.com/php/14234/complete-e-commerce-site-phpmysqli.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter + Cece Chen from W...
SourceCodester Online Discussion Forum Site 1.0 registerH.php Unrestricted Upload
https://api.github.com/repos/CveSecLook/cve/issues/27/comments
0
2024-05-13T16:22:30Z
2024-05-13T16:22:30Z
https://github.com/CveSecLook/cve/issues/27
2,293,275,185
27
CVE-2024-4945
2024-05-16T05:15:52.187
A vulnerability was found in SourceCodester Best Courier Management System 1.0. It has been classified as problematic. Affected is an unknown function of the file view_parcel.php. The manipulation of the argument id leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclos...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/28" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.264480" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mayurik:best_courier_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D0B90AE-6DFA-40B1-A97C-B445F29F3EB3", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/28
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Best courier management system project in php view_parcel.php V1.0 SQL injection vulnerability # NAME OF AFFECTED PRODUCT(S) + Best courier management system project in php ## Vendor Homepage + https://www.sourcecodester.com/php/16848/best-courier-management-system-project-php.html#google_vignette ...
SourceCodester Best courier management system project in php view_parcel.php V1.0 SQL injection vulnerability
https://api.github.com/repos/CveSecLook/cve/issues/28/comments
0
2024-05-14T14:55:17Z
2024-05-15T02:18:44Z
https://github.com/CveSecLook/cve/issues/28
2,295,712,099
28
CVE-2024-4946
2024-05-16T06:15:13.547
A vulnerability was found in SourceCodester Online Art Gallery Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file admin/adminHome.php. The manipulation of the argument sliderpic leads to unrestricted upload. The attack can be launched remotely...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/29" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.264481" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:donbermoy:online_art_gallery_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DB5104A2-50A5-41E1-8D7F-812A138D0D06", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "434" ]
434
https://github.com/CveSecLook/cve/issues/29
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Online Art Gallery Management System Project using PHP/MySQL 1.0 admin/adminHome.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Online Art Gallery Management System Project using PHP/MySQL ## Vendor Homepage + https://www.sourcecodester.com/php/14211/online-art-gallery-management-system-pr...
SourceCodester Online Art Gallery Management System Project using PHP/MySQL 1.0 admin/adminHome.php Unrestricted Upload
https://api.github.com/repos/CveSecLook/cve/issues/29/comments
0
2024-05-14T15:41:58Z
2024-05-14T15:41:59Z
https://github.com/CveSecLook/cve/issues/29
2,295,816,357
29
CVE-2024-4966
2024-05-16T08:15:39.317
A vulnerability was found in SourceCodester SchoolWebTech 1.0. It has been classified as critical. Affected is an unknown function of the file /improve/home.php. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the publi...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/30" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.264534" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sinamjackson:schoolwebtech:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DA9F74E9-7B76-4ABC-8E25-9525AC85DB93", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "434" ]
434
https://github.com/CveSecLook/cve/issues/30
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester SchoolWebTech 1.0 /improve/home.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + SchoolWebTech ## Vendor Homepage + https://www.sourcecodester.com/php/6638/school-web-tech.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter + zebra11 ## Vulnerable File + /improve/home.php ## VERSION(S...
SourceCodester SchoolWebTech 1.0 /improve/home.php Unrestricted Upload
https://api.github.com/repos/CveSecLook/cve/issues/30/comments
0
2024-05-14T15:45:21Z
2024-05-14T15:45:21Z
https://github.com/CveSecLook/cve/issues/30
2,295,823,794
30
CVE-2024-5046
2024-05-17T13:15:59.540
A vulnerability was found in SourceCodester Online Examination System 1.0. It has been rated as critical. This issue affects some unknown processing of the file registeracc.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the pub...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/32" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.264743" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:warrendaloyan:online_examination_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "1AD6E663-A1BA-4328-BEBF-73C8D20DEA66", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/32
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Online Examination System Project 1.0 registeracc.php SQL injection vulnerability # NAME OF AFFECTED PRODUCT(S) + Online Examination System Project ## Vendor Homepage + https://www.sourcecodester.com/php/14351/online-examination-system-project.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter ...
SourceCodester Online Examination System Project 1.0 registeracc.php SQL injection vulnerability
https://api.github.com/repos/CveSecLook/cve/issues/32/comments
0
2024-05-15T16:50:17Z
2024-05-15T16:50:17Z
https://github.com/CveSecLook/cve/issues/32
2,298,393,646
32
CVE-2024-5145
2024-05-20T23:15:08.533
A vulnerability was found in SourceCodester Vehicle Management System up to 1.0 and classified as critical. This issue affects some unknown processing of the file /newdriver.php of the component HTTP POST Request Handler. The manipulation of the argument file leads to unrestricted upload. The attack may be initiated re...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/38" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.265289" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:warrendaloyan:vehicle_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02A258DE-6115-4843-AC16-CA63EBAB3142", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "434" ]
434
https://github.com/CveSecLook/cve/issues/38
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Vehicle Management System in PHP/MySQL 1.0 newdriver.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Vehicle Management System in PHP/MySQL ## Vendor Homepage + https://www.sourcecodester.com/php/14404/vehicle-management-system-phpmysql.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter...
SourceCodester Vehicle Management System in PHP/MySQL 1.0 newdriver.php Unrestricted Upload
https://api.github.com/repos/CveSecLook/cve/issues/38/comments
0
2024-05-20T11:32:27Z
2024-05-20T11:32:28Z
https://github.com/CveSecLook/cve/issues/38
2,305,786,142
38
CVE-2024-5362
2024-05-26T12:15:08.023
A vulnerability classified as critical has been found in SourceCodester Online Hospital Management System 1.0. Affected is an unknown function of the file departmentDoctor.php. The manipulation of the argument deptid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/41" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266274" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:warrendaloyan:online_hospital_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7AE707F-ECBF-4435-B06E-4E87FA07FC29", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/41
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Online Hospital Management System Using PHP/MySQL departmentDoctor.php V1.0 SQL injection vulnerability # NAME OF AFFECTED PRODUCT(S) + Online Hospital Management System Using PHP/MySQL ## Vendor Homepage + https://www.sourcecodester.com/php/14386/online-hospital-management-system-using-phpmysql.ht...
SourceCodester Online Hospital Management System Using PHP/MySQL departmentDoctor.php V1.0 SQL injection vulnerability
https://api.github.com/repos/CveSecLook/cve/issues/41/comments
0
2024-05-23T12:08:12Z
2024-05-23T12:08:12Z
https://github.com/CveSecLook/cve/issues/41
2,312,753,429
41
CVE-2024-5381
2024-05-26T23:15:22.150
A vulnerability classified as critical was found in itsourcecode Student Information Management System 1.0. Affected by this vulnerability is an unknown functionality of the file view.php. The manipulation of the argument studentId leads to sql injection. The attack can be launched remotely. The exploit has been disclo...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.2662...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:student_information_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EC83737B-EB58-46E4-B676-6F2B29894828", "versionEndExcluding": null, "versionEndIncluding": null...
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# Itsourcecode Student Information Management System in PHP 1.0 view.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Student Information Management System in PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/st-columban-student-information-management-system # AFFECTED AND/OR FIXED VERSI...
Itsourcecode Student Information Management System in PHP 1.0 view.php SQL injection
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/2/comments
0
2024-05-25T08:52:02Z
2024-05-25T08:52:02Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/2
2,316,847,327
2
CVE-2024-5390
2024-05-27T01:15:20.410
A vulnerability, which was classified as critical, was found in itsourcecode Online Student Enrollment System 1.0. Affected is an unknown function of the file listofstudent.php. The manipulation of the argument lname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.2663...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# Itsourcecode Online Student Enrollment System Project In PHP listofstudent.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Student Enrollment System Project In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/ # AFFECTED AND/OR FIXED VERSION(S...
Itsourcecode Online Student Enrollment System Project In PHP listofstudent.php SQL injection
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/3/comments
0
2024-05-26T03:19:39Z
2024-05-26T03:19:40Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/3
2,317,412,593
3
CVE-2024-5391
2024-05-27T01:15:20.693
A vulnerability has been found in itsourcecode Online Student Enrollment System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file listofsubject.php. The manipulation of the argument subjcode leads to sql injection. The attack can be launched remotely. The exploit has...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/4" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.2663...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/4
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# Itsourcecode Online Student Enrollment System Project In PHP listofsubject.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Student Enrollment System Project In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/ # AFFECTED AND/OR FIXED VERSION(S...
Itsourcecode Online Student Enrollment System Project In PHP listofsubject.php SQL injection
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/4/comments
0
2024-05-26T03:31:54Z
2024-05-26T05:03:24Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/4
2,317,416,662
4
CVE-2024-5392
2024-05-27T02:15:08.933
A vulnerability was found in itsourcecode Online Student Enrollment System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file editSubject.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/5" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.2663...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/5
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# Itsourcecode Online Student Enrollment System Project In PHP editSubject.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Student Enrollment System Project In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/ # AFFECTED AND/OR FIXED VERSION(S) ...
Itsourcecode Online Student Enrollment System Project In PHP editSubject.php SQL injection
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/5/comments
0
2024-05-26T03:42:45Z
2024-05-26T03:42:45Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/5
2,317,418,785
5
CVE-2024-5393
2024-05-27T02:15:09.240
A vulnerability was found in itsourcecode Online Student Enrollment System 1.0. It has been classified as critical. This affects an unknown part of the file listofcourse.php. The manipulation of the argument idno leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/6" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.2663...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/6
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# Itsourcecode Online Student Enrollment System Project In PHP listofcourse.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Student Enrollment System Project In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/ # AFFECTED AND/OR FIXED VERSION(S)...
Itsourcecode Online Student Enrollment System Project In PHP listofcourse.php SQL injection
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/6/comments
0
2024-05-26T03:55:14Z
2024-05-26T03:55:14Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/6
2,317,425,493
6
CVE-2024-5394
2024-05-27T02:15:09.530
A vulnerability was found in itsourcecode Online Student Enrollment System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file newDept.php. The manipulation of the argument deptname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/7" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.2663...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/7
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# Itsourcecode Online Student Enrollment System Project In PHP newDept.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Student Enrollment System Project In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/ # AFFECTED AND/OR FIXED VERSION(S) ## ...
Itsourcecode Online Student Enrollment System Project In PHP newDept.php SQL injection
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/7/comments
0
2024-05-26T04:13:15Z
2024-05-26T04:14:08Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/7
2,317,452,360
7
CVE-2024-5395
2024-05-27T03:15:08.370
A vulnerability was found in itsourcecode Online Student Enrollment System 1.0. It has been rated as critical. This issue affects some unknown processing of the file listofinstructor.php. The manipulation of the argument FullName leads to sql injection. The attack may be initiated remotely. The exploit has been disclos...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/8" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.2663...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/8
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# Itsourcecode Online Student Enrollment System Project In PHP listofinstructor.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Student Enrollment System Project In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/ # AFFECTED AND/OR FIXED VERSIO...
Itsourcecode Online Student Enrollment System Project In PHP listofinstructor.php SQL injection
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/8/comments
0
2024-05-26T04:42:31Z
2024-05-26T04:42:32Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/8
2,317,479,011
8
CVE-2024-5396
2024-05-27T03:15:08.650
A vulnerability classified as critical has been found in itsourcecode Online Student Enrollment System 1.0. Affected is an unknown function of the file newfaculty.php. The manipulation of the argument name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/9" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.2663...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/9
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# Itsourcecode Online Student Enrollment System Project In PHP newfaculty.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Student Enrollment System Project In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/ # AFFECTED AND/OR FIXED VERSION(S) ...
Itsourcecode Online Student Enrollment System Project In PHP newfaculty.php SQL injection
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/9/comments
0
2024-05-26T04:49:51Z
2024-05-26T04:49:51Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/9
2,317,480,857
9
CVE-2024-5397
2024-05-27T03:15:08.923
A vulnerability classified as critical was found in itsourcecode Online Student Enrollment System 1.0. Affected by this vulnerability is an unknown functionality of the file instructorSubjects.php. The manipulation of the argument instructorId leads to sql injection. The attack can be launched remotely. The exploit has...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/10" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/10
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# Itsourcecode Online Student Enrollment System Project In PHP instructorSubjects.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Student Enrollment System Project In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/ # AFFECTED AND/OR FIXED VERS...
Itsourcecode Online Student Enrollment System Project In PHP instructorSubjects.php SQL injection
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/10/comments
0
2024-05-26T04:59:07Z
2024-05-26T04:59:07Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/10
2,317,483,336
10
CVE-2024-5516
2024-05-30T14:15:09.277
A vulnerability was found in itsourcecode Online Blood Bank Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file massage.php. The manipulation of the argument bid leads to sql injection. The attack can be launched remotely. The exploit has been ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/ha/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266587" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adonesevangelista:online_blood_bank_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F53F723-1E87-4190-A902-24A47378C80B", "versionEndExcluding": null, "versionEndIncluding": n...
[ "89" ]
89
https://github.com/ppp-src/ha/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "ha" ]
# Itsourcecode "Online Blood Bank Management System" in PHP 1.0 "massage.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Blood Bank Management System in PHP with Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-blood-bank-management-system-in-php-with-source-code/...
Itsourcecode "Online Blood Bank Management System" in PHP 1.0 "massage.php" SQL injection
https://api.github.com/repos/ppp-src/ha/issues/3/comments
0
2024-05-29T02:22:54Z
2024-05-29T02:22:54Z
https://github.com/ppp-src/ha/issues/3
2,322,218,913
3
CVE-2024-5517
2024-05-30T15:15:50.120
A vulnerability was found in itsourcecode Online Blood Bank Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file changepwd.php. The manipulation of the argument useremail leads to sql injection. The attack may be launched remotely. The exploit has been d...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/ha/issues/4" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266588" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adonesevangelista:online_blood_bank_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F53F723-1E87-4190-A902-24A47378C80B", "versionEndExcluding": null, "versionEndIncluding": n...
[ "89" ]
89
https://github.com/ppp-src/ha/issues/4
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "ha" ]
# Itsourcecode "Online Blood Bank Management System" in PHP 1.0 "changepwd.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Blood Bank Management System in PHP with Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-blood-bank-management-system-in-php-with-source-cod...
“Online Blood Bank Management System" in PHP 1.0 "changepwd.php" SQL injection
https://api.github.com/repos/ppp-src/ha/issues/4/comments
0
2024-05-29T02:27:59Z
2024-05-29T02:27:59Z
https://github.com/ppp-src/ha/issues/4
2,322,222,992
4
CVE-2024-5588
2024-06-02T15:15:08.230
A vulnerability was found in itsourcecode Learning Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file processscore.php. The manipulation of the argument LessonID leads to sql injection. The attack can be launched remotely. The exploit has been...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/12" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:learning_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C73EA1D-9BD1-42A6-8A1B-5517519304A8", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/12
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# Itsourcecode Learning Management System Project In PHP With Source Code v1.0 processscore.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Learning Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/learning-management-system-project-in-php-w...
Itsourcecode Learning Management System Project In PHP With Source Code v1.0 processscore.php SQL injection
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/12/comments
0
2024-05-31T04:03:32Z
2024-05-31T04:03:32Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/12
2,326,918,435
12
CVE-2024-36779
2024-06-06T13:15:31.590
Sourcecodester Stock Management System v1.0 is vulnerable to SQL Injection via editCategories.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/42" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stock_management_system_project:stock_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F48DAD43-EB1C-4267-B97D-63BBFF86C70F", "versionEndExcluding": null, "versionEndIncluding":...
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/42
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Stock Management System in PHP 1.0 editCategories.php SQL injection vulnerability # NAME OF AFFECTED PRODUCT(S) + Stock Management System in PHP ## Vendor Homepage + https://www.sourcecodester.com/php/14366/stock-management-system-php.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter + xiao h...
SourceCodester Stock Management System in PHP 1.0 editCategories.php SQL injection vulnerability
https://api.github.com/repos/CveSecLook/cve/issues/42/comments
0
2024-05-24T00:25:31Z
2024-05-24T04:30:13Z
https://github.com/CveSecLook/cve/issues/42
2,314,064,021
42
CVE-2024-36673
2024-06-07T13:15:49.547
Sourcecodester Pharmacy/Medical Store Point of Sale System 1.0 is vulnerable SQL Injection via login.php. This vulnerability stems from inadequate validation of user inputs for the email and password parameters, allowing attackers to inject malicious SQL queries.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/39" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pharmacy\\/medical_store_point_of_sale_system_project:pharmacy\\/medical_store_point_of_sale_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F27B3402-54AA-4DAF-BEF4-E6E6EB9EFEC1", "versionEndExcludin...
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/39
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code 1.0 login.php SQL injection vulnerability # NAME OF AFFECTED PRODUCT(S) + Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code ## Vendor Homepage + ht...
SourceCodester Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code 1.0 login.php SQL injection vulnerability
https://api.github.com/repos/CveSecLook/cve/issues/39/comments
0
2024-05-21T09:26:36Z
2024-05-21T09:26:36Z
https://github.com/CveSecLook/cve/issues/39
2,307,818,147
39
CVE-2024-5774
2024-06-09T06:15:07.410
A vulnerability has been found in SourceCodester Stock Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file index.php of the component Login. The manipulation of the argument username/password leads to sql injection. The attack can be launched remotely...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/CveSecLook/cve/issues/43" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.267457" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:warrendaloyan:stock_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "8F75A0CB-D496-4651-8633-972D8FA69746", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/43
[ "Exploit", "Issue Tracking" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Stock Management System in PHP 1.0 index.php SQL injection vulnerability # NAME OF AFFECTED PRODUCT(S) + Stock Management System in PHP ## Vendor Homepage + https://www.sourcecodester.com/php/14366/stock-management-system-php.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter + xuanluansec ##...
SourceCodester Stock Management System in PHP 1.0 index.php SQL injection vulnerability
https://api.github.com/repos/CveSecLook/cve/issues/43/comments
0
2024-06-08T04:24:31Z
2024-06-08T04:24:31Z
https://github.com/CveSecLook/cve/issues/43
2,341,450,040
43
CVE-2024-5775
2024-06-09T08:15:23.373
A vulnerability was found in SourceCodester Vehicle Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file updatebill.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the pu...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/CveSecLook/cve/issues/44" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.267458" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:warrendaloyan:vehicle_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02A258DE-6115-4843-AC16-CA63EBAB3142", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/44
[ "Exploit", "Issue Tracking" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Vehicle Management System in PHP/MySQL 1.0 updatebill.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Vehicle Management System in PHP/MySQL ## Vendor Homepage + https://www.sourcecodester.com/php/14404/vehicle-management-system-phpmysql.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter + x...
SourceCodester Vehicle Management System in PHP/MySQL 1.0 updatebill.php SQL injection
https://api.github.com/repos/CveSecLook/cve/issues/44/comments
0
2024-06-08T04:29:27Z
2024-06-08T04:29:27Z
https://github.com/CveSecLook/cve/issues/44
2,341,453,168
44
CVE-2024-5985
2024-06-14T02:15:10.713
A vulnerability classified as critical has been found in SourceCodester Best Online News Portal 1.0. This affects an unknown part of the file /admin/index.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public a...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/CveSecLook/cve/issues/45" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.268461" }, { "source": "cna@vuldb.com", "tags": [ ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:best_online_news_portal_project:best_online_news_portal:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "83739685-D8B6-4A14-89A7-C1AC4F28260A", "versionEndExcluding": null, "versionEndIncluding":...
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/45
[ "Exploit" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Best online news portal project in php free download /admin/index.php SQL injection # NAME OF AFFECTED PRODUCT(S) + CASAP Automated Enrollment System using PHP/MySQLi with Source Code ## Vendor Homepage + https://www.sourcecodester.com/php/16067/best-online-news-portal-project-php-free-download.htm...
SourceCodester Best online news portal project in php free download /admin/index.php SQL injection
https://api.github.com/repos/CveSecLook/cve/issues/45/comments
0
2024-06-13T11:20:09Z
2024-06-13T11:20:09Z
https://github.com/CveSecLook/cve/issues/45
2,350,883,829
45
CVE-2024-37619
2024-06-17T14:15:10.943
StrongShop v1.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the spec_group_id parameter at /spec/index.blade.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/Hebing123/cve/issues/45" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://www.strongshop.cn/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strongshop:strongshop:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "C00D0882-D77C-4C00-BC4C-D0F94A2649D8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "79" ]
79
https://github.com/Hebing123/cve/issues/45
[ "Exploit" ]
github.com
[ "Hebing123", "cve" ]
# Summary StrongShop v1.0 has a Reflective Cross-Site Scripting (XSS) vulnerability located in the file `resources/views/admin/product/spec/index.blade.php`. # Details The vulnerability is located in the script tag. The application does not escape the user-supplied `spec_group_id` parameter before including it in th...
StrongShop v1.0 has a reflected XSS vulnerability
https://api.github.com/repos/Hebing123/cve/issues/45/comments
1
2024-05-30T02:50:20Z
2024-06-21T02:34:30Z
https://github.com/Hebing123/cve/issues/45
2,324,586,619
45
CVE-2024-6061
2024-06-17T20:15:14.850
A vulnerability has been found in GPAC 2.5-DEV-rev228-g11067ea92-master and classified as problematic. Affected by this vulnerability is the function isoffin_process of the file src/filters/isoffin_read.c of the component MP4Box. The manipulation leads to infinite loop. It is possible to launch the attack on the local ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 1.7, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/gpac/gpac/commit/20c0f29139a82779b86453ce7f68d0681ec7624c" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/287...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.5-dev-rev288-g11067ea92-master:*:*:*:*:*:*:*", "matchCriteriaId": "8CB1A488-697C-4770-B217-33A7F8403E77", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "835" ]
835
https://github.com/gpac/gpac/issues/2871
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## version ```shell ./MP4Box -version MP4Box - GPAC version 2.5-DEV-rev228-g11067ea92-master (c) 2000-2024 Telecom Paris distributed under LGPL v2.1+ - https://gpac.io Please cite our work in your research: GPAC Filters: http...
Infinite loop in MP4Box
https://api.github.com/repos/gpac/gpac/issues/2871/comments
0
2024-06-12T08:30:30Z
2024-06-12T13:25:17Z
https://github.com/gpac/gpac/issues/2871
2,348,153,606
2,871
CVE-2024-6062
2024-06-17T20:15:15.170
A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master and classified as problematic. Affected by this issue is the function swf_svg_add_iso_sample of the file src/filters/load_text.c of the component MP4Box. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 1.7, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/gpac/gpac/commit/31e499d310a48bd17c8b055a0bfe0fe35887a7cd" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/287...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.5-dev-rev288-g11067ea92-master:*:*:*:*:*:*:*", "matchCriteriaId": "8CB1A488-697C-4770-B217-33A7F8403E77", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/2872
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## version ```shell ./MP4Box -version MP4Box - GPAC version 2.5-DEV-rev228-g11067ea92-master (c) 2000-2024 Telecom Paris distributed under LGPL v2.1+ - https://gpac.io Please cite our work in your research: GPAC Filters: http...
Null pointer deference in filters/load_text.c:2534
https://api.github.com/repos/gpac/gpac/issues/2872/comments
0
2024-06-12T08:31:34Z
2024-06-12T13:31:34Z
https://github.com/gpac/gpac/issues/2872
2,348,155,759
2,872
CVE-2024-6063
2024-06-17T21:15:51.443
A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master. It has been classified as problematic. This affects the function m2tsdmx_on_event of the file src/filters/dmx_m2ts.c of the component MP4Box. The manipulation leads to null pointer dereference. An attack has to be approached locally. The exploit has be...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 1.7, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/gpac/gpac/commit/8767ed0a77c4b02287db3723e92c2169f67c85d5" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/287...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.5-dev-rev288-g11067ea92-master:*:*:*:*:*:*:*", "matchCriteriaId": "8CB1A488-697C-4770-B217-33A7F8403E77", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/2873
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## version ```shell ./MP4Box -version MP4Box - GPAC version 2.5-DEV-rev228-g11067ea92-master (c) 2000-2024 Telecom Paris distributed under LGPL v2.1+ - https://gpac.io Please cite our work in your research: GPAC Filters: http...
Null pointer deference in filters/dmx_m2ts.c:1215
https://api.github.com/repos/gpac/gpac/issues/2873/comments
5
2024-06-12T08:32:57Z
2024-09-27T11:43:26Z
https://github.com/gpac/gpac/issues/2873
2,348,158,622
2,873
CVE-2024-6064
2024-06-17T21:15:51.727
A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master. It has been declared as problematic. This vulnerability affects the function xmt_node_end of the file src/scene_manager/loader_xmt.c of the component MP4Box. The manipulation leads to use after free. Local access is required to approach this attack. Th...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/gpac/gpac/commit/c1b9c794bad8f262c56f3cf690567980d96662f5" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.5-dev-rev288-g11067ea92-master:*:*:*:*:*:*:*", "matchCriteriaId": "8CB1A488-697C-4770-B217-33A7F8403E77", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "416" ]
416
https://github.com/gpac/gpac/issues/2874
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## version ```shell ./MP4Box -version MP4Box - GPAC version 2.5-DEV-rev228-g11067ea92-master (c) 2000-2024 Telecom Paris distributed under LGPL v2.1+ - https://gpac.io Please cite our work in your research: GPAC Filters: http...
Heap-use-after-free scene_manager/loader_xmt.c:531 in xmt_resolve_od_links
https://api.github.com/repos/gpac/gpac/issues/2874/comments
2
2024-06-12T08:34:24Z
2024-06-18T07:43:59Z
https://github.com/gpac/gpac/issues/2874
2,348,161,533
2,874
CVE-2024-6065
2024-06-17T21:15:52.007
A vulnerability was found in itsourcecode Bakery Online Ordering System 1.0. It has been rated as critical. This issue affects some unknown processing of the file index.php. The manipulation of the argument user_email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the pu...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/ppp-src/CVE/issues/4" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.268793" }, { "source": "cna@...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:janobe:bakery_online_ordering_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BF7A73B7-CA75-4CF3-AE1D-54B35F99D710", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/ppp-src/CVE/issues/4
[ "Exploit" ]
github.com
[ "ppp-src", "CVE" ]
# Itsourcecode Bakery Online Ordering System Using PHP and MySQL Database 1.0 report/index.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Bakery Online Ordering System Using PHP and MySQL Database ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/bakery-online-ordering-system/ # AFFECTED A...
Itsourcecode Bakery Online Ordering System Using PHP and MySQL Database 1.0 report/index.php SQL injection
https://api.github.com/repos/ppp-src/CVE/issues/4/comments
0
2024-06-16T23:28:05Z
2024-06-16T23:28:05Z
https://github.com/ppp-src/CVE/issues/4
2,356,047,127
4
CVE-2024-6111
2024-06-18T13:15:52.193
A vulnerability classified as critical has been found in itsourcecode Pool of Bethesda Online Reservation System 1.0. This affects an unknown part of the file login.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the p...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wangyuan-ui/CVE/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.26...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:janobe:pool_of_bethesda_online_reservation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9DE894B7-EE1B-4ABB-8881-CF3BA3911206", "versionEndExcluding": null, "versionEndIncluding": null,...
[ "89" ]
89
https://github.com/wangyuan-ui/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wangyuan-ui", "CVE" ]
# Itsourcecode Pool of Bethesda Online Reservation System Using PHP 1.0 login.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Pool of Bethesda Online Reservation System Using PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/bakery-online-ordering-system/ # AFFECTED AND/OR FIXED VERSION...
Itsourcecode Pool of Bethesda Online Reservation System Using PHP 1.0 login.php SQL injection
https://api.github.com/repos/wangyuan-ui/CVE/issues/1/comments
0
2024-06-18T04:36:29Z
2024-06-18T04:36:29Z
https://github.com/wangyuan-ui/CVE/issues/1
2,358,872,827
1
CVE-2024-6112
2024-06-18T13:15:52.550
A vulnerability classified as critical was found in itsourcecode Pool of Bethesda Online Reservation System 1.0. This vulnerability affects unknown code of the file index.php. The manipulation of the argument log_email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the p...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wangyuan-ui/CVE/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.26...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:janobe:pool_of_bethesda_online_reservation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9DE894B7-EE1B-4ABB-8881-CF3BA3911206", "versionEndExcluding": null, "versionEndIncluding": null,...
[ "89" ]
89
https://github.com/wangyuan-ui/CVE/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wangyuan-ui", "CVE" ]
# Itsourcecode Pool of Bethesda Online Reservation System Using PHP 1.0 index.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Pool of Bethesda Online Reservation System Using PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/bakery-online-ordering-system/ # AFFECTED AND/OR FIXED VERSION...
Itsourcecode Pool of Bethesda Online Reservation System Using PHP 1.0 index.php SQL injection
https://api.github.com/repos/wangyuan-ui/CVE/issues/2/comments
0
2024-06-18T04:39:57Z
2024-06-18T04:40:28Z
https://github.com/wangyuan-ui/CVE/issues/2
2,358,881,049
2
CVE-2024-6114
2024-06-18T13:15:52.897
A vulnerability classified as critical has been found in itsourcecode Monbela Tourist Inn Online Reservation System up to 1.0. Affected is an unknown function of the file controller.php. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has be...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wangyuan-ui/CVE/issues/4" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.26...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:janobe:monbela_tourist_inn_online_reservation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E689E6B3-30E9-405A-A3AB-A5597F84A664", "versionEndExcluding": null, "versionEndIncluding": nu...
[ "434" ]
434
https://github.com/wangyuan-ui/CVE/issues/4
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wangyuan-ui", "CVE" ]
# Itsourcecode Monbela Tourist In Online Reservation System Using PHP 1.0 controller.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Monbela Tourist In Online Reservation System Using PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/monbela-tourist-inn-online-reservation-system/ ...
Itsourcecode Monbela Tourist In Online Reservation System Using PHP 1.0 controller.php Unrestricted Upload
https://api.github.com/repos/wangyuan-ui/CVE/issues/4/comments
0
2024-06-18T04:46:56Z
2024-06-18T04:48:47Z
https://github.com/wangyuan-ui/CVE/issues/4
2,358,888,461
4
CVE-2024-6115
2024-06-18T13:15:53.267
A vulnerability classified as critical was found in itsourcecode Simple Online Hotel Reservation System 1.0. Affected by this vulnerability is an unknown functionality of the file add_room.php. The manipulation of the argument photo leads to unrestricted upload. The attack can be launched remotely. The exploit has been...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wangyuan-ui/CVE/issues/5" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.26...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clivedelacruz:simple_online_hotel_reservation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BEE3B1B1-BA46-42EB-BF9A-B1A7D52EF741", "versionEndExcluding": null, "versionEndIncluding": nu...
[ "434" ]
434
https://github.com/wangyuan-ui/CVE/issues/5
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wangyuan-ui", "CVE" ]
# Itsourcecode Simple Online Hotel Reservation System in PHP Project With Source Code 1.0 add_room.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Simple Online Hotel Reservation System in PHP Project With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/simple-hotel-onlin...
Itsourcecode Simple Online Hotel Reservation System in PHP Project With Source Code 1.0 add_room.php Unrestricted Upload
https://api.github.com/repos/wangyuan-ui/CVE/issues/5/comments
0
2024-06-18T04:51:01Z
2024-06-18T04:51:01Z
https://github.com/wangyuan-ui/CVE/issues/5
2,358,892,810
5
CVE-2024-6116
2024-06-18T14:15:12.440
A vulnerability, which was classified as critical, has been found in itsourcecode Simple Online Hotel Reservation System 1.0. Affected by this issue is some unknown functionality of the file edit_room.php. The manipulation of the argument photo leads to unrestricted upload. The attack may be launched remotely. The expl...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wangyuan-ui/CVE/issues/6" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.26...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clivedelacruz:simple_online_hotel_reservation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BEE3B1B1-BA46-42EB-BF9A-B1A7D52EF741", "versionEndExcluding": null, "versionEndIncluding": nu...
[ "434" ]
434
https://github.com/wangyuan-ui/CVE/issues/6
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wangyuan-ui", "CVE" ]
# Itsourcecode Simple Online Hotel Reservation System in PHP Project With Source Code 1.0 edit_room.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Simple Online Hotel Reservation System in PHP Project With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/simple-hotel-onli...
Itsourcecode Simple Online Hotel Reservation System in PHP Project With Source Code 1.0 edit_room.php Unrestricted Upload
https://api.github.com/repos/wangyuan-ui/CVE/issues/6/comments
0
2024-06-18T04:55:42Z
2024-06-18T04:55:42Z
https://github.com/wangyuan-ui/CVE/issues/6
2,358,897,857
6
CVE-2024-6113
2024-06-20T06:15:10.310
A vulnerability was found in itsourcecode Monbela Tourist Inn Online Reservation System 1.0. It has been rated as critical. This issue affects some unknown processing of the file login.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The identifier VDB-268865 was...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wangyuan-ui/CVE/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:janobe:monbela_tourist_inn_online_reservation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E689E6B3-30E9-405A-A3AB-A5597F84A664", "versionEndExcluding": null, "versionEndIncluding": nu...
[ "89" ]
89
https://github.com/wangyuan-ui/CVE/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wangyuan-ui", "CVE" ]
# Itsourcecode Monbela Tourist In Online Reservation System Using PHP 1.0 login.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Monbela Tourist In Online Reservation System Using PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/monbela-tourist-inn-online-reservation-system/ # AFFECTED ...
Itsourcecode Monbela Tourist In Online Reservation System Using PHP 1.0 login.php SQL injection
https://api.github.com/repos/wangyuan-ui/CVE/issues/3/comments
0
2024-06-18T04:42:44Z
2024-06-18T04:42:44Z
https://github.com/wangyuan-ui/CVE/issues/3
2,358,884,062
3
CVE-2024-6190
2024-06-20T15:15:50.940
A vulnerability was found in itsourcecode Farm Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file index.php of the component Login. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has b...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/HryspaHodor/CVE/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.269162" }, { "source": "cna@vuldb.com", "tags": [ ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:farm_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D2822E78-3BA7-4DFA-9CCE-39AB33ABA296", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/HryspaHodor/CVE/issues/2
[ "Exploit" ]
github.com
[ "HryspaHodor", "CVE" ]
# Itsourcecode Farm Management System In PHP With Source Code v1.0 index.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Farm Management System In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/farm-management-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED ...
Itsourcecode Farm Management System In PHP With Source Code v1.0 index.php SQL injection
https://api.github.com/repos/HryspaHodor/CVE/issues/2/comments
0
2024-06-18T05:38:13Z
2024-06-18T05:38:13Z
https://github.com/HryspaHodor/CVE/issues/2
2,358,954,914
2
CVE-2024-6191
2024-06-20T15:15:51.230
A vulnerability classified as critical has been found in itsourcecode Student Management System 1.0. This affects an unknown part of the file login.php of the component Login Page. The manipulation of the argument user leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclose...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/HryspaHodor/CVE/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.269163" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:student_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "7816C1E9-D65F-4652-A2F5-27FDEAA6B33D", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/HryspaHodor/CVE/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "HryspaHodor", "CVE" ]
# Itsourcecode "Student Management System " in PHP 1.0 "login.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Student Management System In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/student-management-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSI...
Itsourcecode "Student Management System " in PHP 1.0 "login.php" SQL injection
https://api.github.com/repos/HryspaHodor/CVE/issues/3/comments
0
2024-06-18T05:51:27Z
2024-06-18T05:51:27Z
https://github.com/HryspaHodor/CVE/issues/3
2,358,970,853
3
CVE-2024-6192
2024-06-20T15:15:51.517
A vulnerability classified as critical was found in itsourcecode Loan Management System 1.0. This vulnerability affects unknown code of the file login.php of the component Login Page. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/HryspaHodor/CVE/issues/4" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.269164" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:loan_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "250E4057-0CA7-43C6-8B0E-D37FEF3D3CF2", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/HryspaHodor/CVE/issues/4
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "HryspaHodor", "CVE" ]
# Itsourcecode "Loan Management System Project " in PHP 1.0 "login.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Loan Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/student-management-system-in-php-with-source-code/ # AFFECTED AND/OR ...
# Itsourcecode "Loan Management System Project " in PHP 1.0 "login.php" SQL injection
https://api.github.com/repos/HryspaHodor/CVE/issues/4/comments
0
2024-06-18T05:57:17Z
2024-06-18T05:57:17Z
https://github.com/HryspaHodor/CVE/issues/4
2,358,978,656
4
CVE-2024-6193
2024-06-20T16:15:15.110
A vulnerability, which was classified as critical, has been found in itsourcecode Vehicle Management System 1.0. This issue affects some unknown processing of the file driverprofile.php. The manipulation of the argument driverid leads to sql injection. The attack may be initiated remotely. The exploit has been disclose...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://github.com/HryspaHodor/CVE/issues/5" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.2...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:vehicle_management_system_project_in_php_and_mysql_with_source_code:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A78DEBCC-775E-4584-81CA-8C3C1DD16C4C", "versionEndExcluding": null, ...
[ "89" ]
89
https://github.com/HryspaHodor/CVE/issues/5
[ "Exploit", "Technical Description", "Third Party Advisory" ]
github.com
[ "HryspaHodor", "CVE" ]
# Itsourcecode Vehicle Management System Project in PHP 1.0 driverprofile.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Vehicle Management System Project in PHP Free Download ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/vehicle-management-system-project-in-php-free-download/ # AFFEC...
Itsourcecode Vehicle Management System Project in PHP 1.0 driverprofile.php SQL injection
https://api.github.com/repos/HryspaHodor/CVE/issues/5/comments
0
2024-06-18T06:01:51Z
2024-06-18T06:01:51Z
https://github.com/HryspaHodor/CVE/issues/5
2,358,984,521
5